threat intelligence analyst resume example with 13+ years of experience

Jessica Claire
  • Montgomery Street, San Francisco, CA 94105 609 Johnson Ave., 49204, Tulsa, OK
  • Home: (555) 432-1000
  • Cell:
Professional Summary
Exceptional professional with fifteen years of experience in progressively responsible positions including but not limited to all functional areas of systems analysis and design, information security engineering, network engineering, intrusion analysis and incident response.
  • Microsoft MCSE Certified
  • A+/Network+
  • Wireshark WCNA
  • ITIL Level 1 Foundations
  • GREM
  • Excellent problem-solving abilities
  • Team focused attitude
  • Self-motivated and reliable
  • Excellent communication skills
  • Accomplished investigative abilities
Work History
Threat Intelligence Analyst, Current to Current
Motorola Solutions, ,
  • Provided tactical and operation intelligence support for Mandiant consultants.
  • Discover, research ad define individual threat groups and malware
  • Update company knowledge base about each threat group
  • Research and discovery into emerging threat group and techniques
  • Conducted analysis to provide best intelligence context for customers

Mid-Level Malware Analyst, Current to Current
Arista Networks, Inc., ,
  • Reverse engineering and behavioral analysis of malicious code and documents
  • Gathered technical intelligence of malware to find related campaigns
  • Identify new campaigns to track
  • Compile technical reports and briefs related to internal and external interests

Incident Responder, Current to Current
Chevron, ,
  • Performed Incident Response for a wide variety of Fortune 500 companies
  • Primary duties included malware analysis, memory forensics, network forensics, and threat hunting
  • Acting team lead for Memory Forensics Center of Excellence Team, spanning globally
  • Assisted in creation of team incident response methodologies and procedures
  • Performed product testing in evaluation of effectiveness of incident response investigations.

Senior Security Analyst, Current to Current
Forsythe Technology, Inc., ,
  • Performed malware analysis and memory forensics to support incident response engagements
  • Provided assistance to Penetration Testing Team in firewall configuration review, web application re-validation testing, and vulnerability scanning
  • Designed, implemented and managed company's core infrastructure
  • Installation and configuration of multiple servers running Ubuntu, CentOS 6.3 and Windows Server 2008

Senior Security Engineer, Current to Current
Chevron, ,
  • Planned and executed migration of 30+ checkpoint firewalls from Nokia platform to R75.35 (SPLAT)
  • Utilized Qualys scanner to perform vulnerability assessment and host discovery for hosts supporting the EDGAR project
  • Implemented WSUS server to push patches to all hosts running Microsoft Operating Systems

Senior Security Analyst, Current to Current
Imagine One, ,
  • Conduct vulnerability assessments and analysis for customer identifying high priority assets and perform recommendations to remediate vulnerabilities that may lead to the  compromise of government assets
  • Analyze network traffic from foreign and domestic entities using multiple sources including firewalls, IDS, and IPS logs to identify potentially malicious traffic
  • Utilize ArcSight for analysis based on various log sources that have been correlated
  • Generate detailed investigative reports to inform customer of observed traffic
  • Mentor junior analyst and provide assistance in their investigations
  • Perform duties of Acting shift Watch Officer when needed

Senior Security Systems Engineer, Current to Current
Cystic Fibrosis Foundation, ,
  • Installed, configured and maintained Cisco ASA firewall appliances in failover configuration
  • Managed entire network infrastructure including but not limited to routers, switches, VPN Concentrators, load balancers and DNS
  • Installed, configured, and managed ISA 2006 firewall; configured as a reverse proxy for applications such as Outlook Web Access and SharePoint
  • Installed, configured and managed F5 BIGIP Link Controller and Local Traffic Manager
  • Managed small IDS deployment of two sensors logging to a centralized management station using Snort, MySQL 5.0, Barnyard, SGUIL, sancp, p0f, and Splunk
  • Assisted in deployment of foundation's corporate web portal using Microsoft SharePoint
  • Collaborated with HIPAA Compliance Officer in drafting security policies that aided foundation in aligning with HIPAA compliance regulations for securing a network infrastructure and handling patient data securely

MCSE, Network +, A+ Certifications: IT and Computer Skills, Expected in 2000
Northern Virginia Community College/ ICTS - Alexandria, Virginia
Course Completion Certificate: GIAC 610: Reverse Engineering Malware, Expected in 2013
SANS Institute - Bethesda, Maryland

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Your data is safe with us

Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

Resume Overview

School Attended

  • Northern Virginia Community College/ ICTS
  • SANS Institute

Job Titles Held:

  • Threat Intelligence Analyst
  • Mid-Level Malware Analyst
  • Incident Responder
  • Senior Security Analyst
  • Senior Security Engineer
  • Senior Security Analyst
  • Senior Security Systems Engineer


  • MCSE, Network +, A+ Certifications
  • Course Completion Certificate

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: