• Dashboard
  • Resumes
  • Cover Letters
  • Resumes
    • Resumes
    • Resume Builder
    • Resume Examples
      • Resume Examples
      • Nursing
      • Customer Service
      • Education
      • Sales
      • Manager
      • View All
    • Resume Search
    • Resume Templates
      • Resume Templates
      • Microsoft Word
      • Professional
      • Modern
      • Traditional
      • Creative
      • View All
    • Resume Services
    • Resume Formats
      • Resume Formats
      • Chronological
      • Functional
      • Combination
    • Resume Review
    • How to Write a Resume
      • How to Write a Resume
      • Summary
      • Experience
      • Education
      • Skills
        • Skills
        • Hard Skills
        • Soft Skills
    • Resume Objectives
  • CV
    • CV
    • CV Examples
    • CV Formats
    • CV Templates
    • How to Write a CV
  • Cover Letters
    • Cover Letters
    • Cover Letter Builder
    • Cover Letter Examples
      • Cover Letter Examples
      • Customer Service
      • Marketing
      • Sales
      • Education
      • Accounting
      • View All
    • Cover Letter Services
    • Cover Letter Templates
    • Cover Letter Formats
    • How to Write a Cover Letter
  • Questions
  • Resources
  • About
    • About
    • Reviews
  • Contact
  • jane
    • Settings
    • Help & Support
    • Sign Out
  • Sign In
Member Login
  • LiveCareer
  • Resume Search
  • Security Analyst
Please provide a type of job or location to search!
SEARCH

Security Analyst Resume Example

Love this resume?Build Your Own Now
SECURITY ANALYST
Experience
01/2015 to Current
Security AnalystAllied Universal Security - Pleasant Hill , CAProvides oversight of information systems activities. Monitors, evaluates and maintains systems and procedures to safeguard internal information systems and databases. Researches, recommends and implements changes to enhance systems security. Educates and communicates security requirements and procedures to all user. IP360 Security Manager- prepares activity and progress reports, responsible for vulnerability scanning, and establishment and maintenance of LOB compliance boundaries. Analyzing vulnerability and compliance scan results and compare results against industry security guidelines. Responsible for the planning, implementation and execution of compliance vulnerability and baseline configuration scanning, validation and boundary work processes in support of PCI, DoD DIACAP, RMF, NIST and FISMA compliance requirements Administrative Review- complies and reports on domain access
01/2012 to 01/2012
Security AnalystAllied Universal Security - Redmond , WAIP360 Security Manager- prepares activity and progress reports, responsible for vulnerability scanning, and establishment and maintenance of LOB compliance boundaries. Analyzing vulnerability and compliance scan results and compare results against industry security guidelines. Responsible for the planning, implementation and execution of compliance vulnerability and baseline configuration scanning, validation and boundary work processes in support of PCI, DoD DIACAP, RMF, NIST and FISMA compliance requirements Administrative Review- complies and reports on domain access SECURE MISSION SOLUTIONS, Department of Defense, Charleston, South Carolina 2011 Mitigation and Remediation Support Specialist Analyzing vulnerability and compliance scan results and compare results against industry security guidelines. Responsible for the planning, implementation and execution of compliance vulnerability and baseline configuration scanning, validation and boundary work processes in support of PCI, DoD DIACAP, RMF, NIST and FISMA compliance requirements Provide support as needed to complete the certification on multiple systems. Examine and test the security posture of the systems and applications. Examine STIGS, create Custom Remedies and Patches for the remediation of vulnerabilities. Prepare Documentation on Plan of Actions and Milestone (POA&M) and other documents that support the C&A process. Provide recommended remediation for identified weaknesses.
01/2009 to 01/2009
Mitigation and Remediation Support SpecialistCrown Castle Usa Inc - Englewood , COAnalyzing vulnerability and compliance scan results and compare results against industry security guidelines. Technical Writing role with emphasis on developing the operations and maintenance plans for IT systems. Prepare documents for C&A packages by pre-determined deadlines. Familiar with federal IT operations guidelines with an emphasis on NIST and FISMA Patch level maintenance; Discussed security issues with management and drafted and edited information security policies, standards, and processes. Recommended hardware and software upgrades to help secure the company's valuable information and prevent Distributed Denial of Service (DDoS) attacks. Ensure systems and networks comply with federal, state and local regulatory standards and internal policies. Assess business risks and evaluate the effectiveness of controls at the network, operating system, database and application level Research, recommend, and implement changes to procedures and systems to enhance data systems security. Monitor software updates, document, and install as needed. Security architect responsible for network, server, desktop, application and data
01/1999 to 01/1999
Supervisor, Network OperationsVERIZON - City , STATECross trained 300+ associates in all aspects for order creation to customer remediation and completion. Collaborated in everyday workforce management, including scheduling, hiring, terminations, promotions and reassigning employees. Responsible for budgeting, reporting, procurement, process development and operational planning/execution. Resolved technical problems, including coordination of problem solving efforts between customers and Verizon. Collaborated with Quality Assurance Team to monitor performance, ensure associates met or exceeded Public Utilities Commission (PUC) standards and develop required customer service skills. Generated and ensured adherence to employee work schedules. Documented and communicated policies and processes regarding scheduling to network and resource management personnel. Developed reputation for professional judgment and skill in dealing with unresponsive and uncooperative associates. Served as first point of contact for hardware/software quality assurance and procurement. Functioned as departmental approver for access to all systems. Provided ongoing feedback about the employee performance and conducted performance appraisals on a regular basis, including assessing performance and suggesting quality improvements. Gained knowledge of investigative techniques with the ability to identify problem areas and develop solutions (Root Cause Analysis) Processed complex customer requests, order processing and customer service. Created atmosphere of collaboration with customer to further understand goals / business plans.
Education
Bachelor of Science: Economic Crime Investigation, Computer SecurityHilbert College - City, State, USHilbert College, Hamburg, New York Bachelor of Science in Economic Crime Investigation; Concentration in Computer Security (includes computer crime and forensics, operating systems and networks, programming and database software)
Certifications
DOD
Skills
Security, Access, Federal Information Security Management Act, Fisma, Maintenance, Nist, Remediation, Boundaries, Dod, Payment Card Industry, Pci, Progress, Scanning, Mitigation, Solutions, Operations, Systems Security, Database, Documentation, Ddos, Ddos/dos, Distributed Denial Of Service, Information Security, Basis, Budgeting, Business Plans, Customer Service, Employee Performance, Network Operations, Order Processing, Problem Solving, Process Development, Procurement, Quality Assurance, Receptionist, Retail Sales, Root Cause Analysis, Scheduling, Software Quality Assurance, Terminations, Verizon, Html, Lockout/tagout, Safety Procedures, Databases, Team Lead, Computer Security, Forensics
Build Your Own Now

DISCLAIMER

Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.

How this resume score could be improved?

Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume:

53Fair
Resume Strength
  • Completeness
  • Formatting
  • Word choice
  • Measurable results
  • Strong summary

Resume Overview

School Attended

  • Hilbert College

Job Titles Held:

  • Security Analyst
  • Mitigation and Remediation Support Specialist
  • Supervisor, Network Operations

Degrees

  • Bachelor of Science : Economic Crime Investigation, Computer Security

Create a job alert for [job role title] at [location].

×

Advertisement

Similar Resumes

View All
IT-Security,-Vulnerability-Risk-Management-Analyst-resume-sample

IT Security, Vulnerability Risk Management Analyst

Rossier Park School

Crestwood , IL

Information-Security-Analyst-resume-sample

Information Security Analyst

Smuckers

Union , NJ

Cyber-Security-Analyst-resume-sample

Cyber Security Analyst

Engility Corporation

Flexwork , CO

  • About Us
  • Privacy Policy
  • Terms of Use
  • Sitemap
  • Work Here
  • Contact Us
  • FAQs
  • Accessibility
  • EN
  • UK
  • ES
  • FR
  • IT
  • DE
  • NL
  • PT
  • PL
customerservice@livecareer.com
800-652-8430 Mon- Fri 8am - 8pm CST
Sat 8am - 5pm CST, Sun 10am - 6pm CST
  • Stay in touch with us
Site jabber winner award

© 2022, Bold Limited. All rights reserved.