Analyst‚ Cybersecurity Resume Samples

4.9 (79 votes) for Analyst‚ Cybersecurity Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the analyst‚ cybersecurity job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
VP
V Prohaska
Vince
Prohaska
86064 Keyon Mountain
Philadelphia
PA
+1 (555) 797 4707
86064 Keyon Mountain
Philadelphia
PA
Phone
p +1 (555) 797 4707
Experience Experience
Detroit, MI
Cybersecurity Risk Analyst
Detroit, MI
Bailey-Rau
Detroit, MI
Cybersecurity Risk Analyst
  • Assists Management in identifying knowledge gaps and providing training to Analysts and Technicians in the IT Security Organization
  • Be responsible for establishing strong working relationships within Information Security (AIS), outside AIS, as well as other brand/affiliate organizations
  • Manage workload, prioritizing tasks and documenting time, and other duties as directed by management
  • Superior attention to detail and focus on quality work packet delivery
  • Assists in Continual Service Improvement efforts by identifying opportunities for process improvement. Drives some process improvement efforts
  • Leads development of training material
  • Coordinate Business As Usual (BAU) activities, overseeing monthly and quarterly metrics program. Provide assistance to management team to Identify metric anomalies/trends/outliers and challenge these accordingly
Houston, TX
Cybersecurity Senior Analyst
Houston, TX
Orn LLC
Houston, TX
Cybersecurity Senior Analyst
  • Collaborate with director, managers, project managers, architects, and other individuals to ensure continuity and communication across teams
  • Assist in the determination for and establishment of War Rooms, managing and monitoring War Room activities
  • Mentor and coach cyber security analysts, providing guidance and expertise in incident/issue response and resolution methodology
  • Collaborate with director, managers, and other technical personnel to ensure mitigation of risks to the company
  • Mentors and coaches cyber security analysts, providing guidance and expertise in incident/issue response and resolution methodology
  • Collaborate with director, managers, and other technical personnel to ensure mitigation of security risks related to the company
  • To create and capture opportunities to advance your career and fulfill your potential. To learn more, visit us at www.pwc.com/careers
present
Los Angeles, CA
Senior Cybersecurity Senior Analyst
Los Angeles, CA
Hegmann LLC
present
Los Angeles, CA
Senior Cybersecurity Senior Analyst
present
  • Participate in War Rooms and manage War Room activities relating to security/network incidents
  • Mentor and coach cyber security analysts, provide guidance and expertise in incident response and resolution methodology
  • Collaborate in the development of training content for response and resolution of Cybersecurity issues/incidents
  • Advise Enterprise directors, managers, and other technical personnel to ensure mitigation of risks to the company
  • Monitor KPI on all ISO sensors (firewalls, IPS, Proxies, etc.) and proactively address incidents
  • Ensure requests and resolutions comply with standards set by Optum
  • Serve as a Subject Matter Expert (SME) to the IRM ISO organization for solutions, procedures, and implementation of Cybersecurity systems
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Ohio University
Bachelor’s Degree in Computer Science
Skills Skills
  • Ability to act independently and exercise good judgment as well as the ability to work cross functionally and create virtual teams is essential
  • Superior attention to detail and focus on quality work packet delivery
  • Excellent analytical & technical skills, able to research problems, determine root causes and solutions
  • Ability to work in a fast-paced & team environment, prioritize workload and meet deadlines
  • Proficiency in Excel and relational database modeling
  • Knowledge of Information Security Risk Frameworks as well as SAP Business objects/Data warehousing skills
  • Ability to build KPIs, KGIs, KRIs reports and balance scorecard from conceptualization through presentation
  • Experience in risk management in highly technical environments
  • Ability to evaluate technical risk and business impact and explain the impact of security issues to both technical and non-technical audiences
  • Be responsible for establishing strong working relationships within Information Security (AIS), outside AIS, as well as other brand/affiliate organizations
Create a Resume in Minutes

15 Analyst‚ Cybersecurity resume templates

1

Cybersecurity Project Analyst Resume Examples & Samples

  • Provide direct support to Director of Program Delivery, Firmwide Cybersecurity Program
  • Demonstrated understanding of requirements development, project scoping and resource management
  • Demonstrated understanding of financial planning
  • Demonstrated understanding of stakeholder management
  • Demonstrated experience in IT program / project delivery
  • Demonstrated experience in data analysis and presentation
  • Excellent communication, presentation (both oral and written) & influencing skills
  • Experience in risk management and controls is beneficial but not required
2

Analyst, Cybersecurity Resume Examples & Samples

  • Development and implementation of cybersecurity policies and procedures
  • Conduct vulnerability scans
  • Continuously monitor relevant regulatory changes and assist clients in developing internal controls, accordingly
3

Cybersecurity Senior Analyst Resume Examples & Samples

  • Ensure optimal effectiveness of incident/issue resolution
  • Determine the severity and complexity of issues pertaining to the security and protection of systems data, to ensure the protections, conservation and accountability of proprietary, personal, or privileged electronic data. Escalate when needed
  • Assist in the determination for and establishment of War Rooms, managing and monitoring War Room activities
  • Collaborate with director, managers, and other technical personnel to ensure mitigation of risks to the company
  • Promote continued integration of technological advances to further enhance security and reduce risks
  • Mentors and coaches cyber security analysts, providing guidance and expertise in incident/issue response and resolution methodology
  • 2 or more years of experience in IT Security for large corporation
  • 2 or more years experience with Palo Alto Firewalls
  • 2 or more years network experience
  • 1 or more years’ experience of Firewall upgrades, conversions, or migrations
4

IT Cybersecurity Senior Analyst Resume Examples & Samples

  • Serve as the functional subject matter expert for the A-10 sensors
  • Serve as a technical lead for all A-10 deployments (such as the cabling and initial configuration of the devices)
  • Determine the severity and complexity of issues pertaining to the security and protection of systems data, (either alone or as part of a team) to ensure the protections, conservation and accountability of proprietary, personal, or privileged electronic data
  • Apply the most up-to-date code versions for the A-10 sensors
  • Assist Cyber Defense Security in the determination and establishment of War Rooms, managing and monitoring War Room activities; assist with escalations to the Vendor
  • Collaborate with director, managers, project managers, architects, and other individuals to ensure continuity and communication across teams
  • Collaborate with director, managers, and other technical personnel to ensure mitigation of Load Balancer security risks related to the company
  • Mentor and coach cyber security analysts, providing guidance and expertise in incident/issue response and resolution methodology
  • 5 or more years experience with Load Balancer sensor (A-10 a plus)
  • Prior networking experience
  • Prior experience identifying and mitigating security issues and incidents
  • Availability to work on-call /non-standard hours when necessary in a 24/7/365 operations environment
  • Have or be in process of obtaining advanced certifications pertinent to area of expertise (CISSP)
  • Experience in Fortune 500 company
5

Cybersecurity & Cryptographic Analyst Resume Examples & Samples

  • Experience with Cryptographic and IT network requirements for the Navy and DoD networks or the JIE initiative
  • Experience with Computer Network Defense (CND), Information System Security Program (ISSP), and Communication Security (COMSEC) programs, including PKI, KMI, and EKMS
  • Experience with the Navy’s financial and IT systems databases, including PBIS and iRAPS
  • Experience with Microsoft software, including Project, Word, PowerPoint, and Excel
  • Experience with engaging with SES/Flag-level leadership
  • Ability to work independently and manage work efficiently
  • Experience with the PPBE and requirements generation process
  • Experience with working in the OPNAV staff or other Navy Headquarters function
  • Experience as staff, including Joint Staff, OPNAV, and Navy SYSCOMs
6

Cybersecurity Assessment & Authorization Analyst Resume Examples & Samples

  • 5 years of experience with information assurance, A&A, or Cybersecurity
  • 5 years of experience with documenting IT systems vulnerabilities and mitigation strategies
  • 5 years of experience with DoD 8500 series documents
  • 5 years of experience with implementing and assessing security controls from the DoDI 8500.2 and the NIST 800-53 series
  • Knowledge of certification and accreditation artifacts and supporting documents
  • Experience with managing projects independently
  • Knowledge of DoDI 8510.01, ICD 503, and NIST SP 800-37
  • Knowledge of Xacta
  • Knowledge of the Enterprise Mission Assurance Support Service (eMASS)
  • Knowledge of DevOps principles and concepts preferred
  • Knowledge of FISMA requirements preferred
  • Knowledge of software, network, and computer architectures
  • BA or BS degree in a related field a plus
7

Project Analyst / Cybersecurity Manager Resume Examples & Samples

  • Experience with the delivery of integrated project plans and risk plans
  • Experience with Microsoft Office, including Word, Excel, PowerPoint, Project, Visio, Access, and SharePoint
  • Knowledge of technical and market requirements in an enterprise environment and the development of quality projects using a stage and gate model to achieve key deliverables
  • Ability to solve problems in a fast-paced environment
  • Ability to work collaboratively within cross-functional and intercultural teams based on an excellent team spirit and solid work ethic
  • Program Management Professional (PgMP) or Project Management Professional (PMP) Certification
  • Experience with Lean Six Sigma process improvement projects
  • Experience with data analysis for an overall budget
  • Knowledge of operational technology
  • Knowledge of Cybersecurity principles, frameworks, and policies, including the risk management framework, NIST, HIPPA, ISO 27000, or SOX
  • Knowledge of Cybersecurity tools, including vulnerability management and security incident and event monitoring tools
8

IT Cybersecurity Senior Analyst Resume Examples & Samples

  • Serve as the functional subject matter expert for the F5 ASM sensors
  • Serve as a technical lead for all F5 ASM deployments
  • Apply the most up-to-date code versions for the F5 ASM sensors
  • Collaborate with director, managers, and other technical personnel to ensure mitigation of security risks related to the company
  • Experience with F5 ASM sensor
  • Must have or be able to gain NAC Clearance
  • Ability to identify and mitigate security issues/incidents
9

Cybersecurity Senior Analyst Resume Examples & Samples

  • Serve as the functional subject matter expert for the Virtual Firewall sensors
  • Serve as a technical lead for all Virtual Firewall deployments
  • Monitor and respond to security incidents. Collaborate with Cyber Defense Security to ensure prompt and effective resolution
  • Apply the most up-to-date code versions for the Virtual Firewall sensors
  • Experience with VMWare NSX
  • Strong planning and problem-solving skills
  • Engineering background
  • Ability to document and communicate on an expert level
  • Undergraduate degree and/or equivalent experience
10

Cybersecurity Senior Analyst Resume Examples & Samples

  • Serve as the functional subject matter expert for the Palo Alto Firewall sensors
  • Serve as a technical lead for all Palo Alto Firewall deployments (such as the cabling and initial configuration of the devices)
  • Apply the most up-to-date code versions for the Palo Alto Firewall sensors
  • Firewall experience
  • Strong scripting skills (API, Scripting
  • Palo Alto Firewall sensor experience
11

Cybersecurity Intrusion Analyst Resume Examples & Samples

  • 2+ years of experience with Cyber threat analysis or Cyber intelligence analysis
  • Experience with conducting network intrusion analysis
  • Experience with identifying and tracking advanced persistent threats (APT) and threat operations
  • Experience with conducting oral presentations and writing reports
  • DoD 8570.01-M Compliant IAT II Certification
  • BA or BS degree in CS or related field
  • One or more of the following Certifications preferred: GXPN: GIAC Exploit Researcher and Advanced Penetration Tester, GREM: GIAC Reverse Engineering Malware, GCFA: GIAC Certified Forensic Analyst, GWAPT: GIAC Web Application Penetration Tester, GPEN: GIAC Certified Penetration Tester, GCIA: GIAC Certified Intrusion Analyst, or GCIH: GIAC Certified Incident Handler
12

Senior Cybersecurity Senior Analyst Resume Examples & Samples

  • Serve as a Subject Matter Expert (SME) to the IRM ISO organization for solutions, procedures, and implementation of Cybersecurity systems
  • Coordinate with ISO, Application SLOs, and CAB teams on the implementation of Cybersecurity procedures and systems
  • Troubleshoot and analyze incidents concerning sensor outputs from a wide variety of technologies used by Optum
  • Ensure requests and resolutions comply with standards set by Optum
  • Monitor KPI on all ISO sensors (firewalls, IPS, Proxies, etc.) and proactively address incidents
  • Respond to high priority security incidents collaborating with Security Incident Response (SIR) to ensure prompt and effective resolution
  • Participate in War Rooms and manage War Room activities relating to security/network incidents
  • Advise Enterprise directors, managers, project managers, architects, and other individuals to ensure continuity and communication of cyber security procedures and standards across teams
  • Advise Enterprise directors, managers, and other technical personnel to ensure mitigation of risks to the company
  • Collaborate in the development of training content for response and resolution of Cybersecurity issues/incidents
  • Consult on integration of new technology, assess risk, and ensure data security
  • Mentor and coach cyber security analysts, provide guidance and expertise in incident response and resolution methodology
  • Undergraduate degree in Cybersecurity and/or equivalent experience
  • 5 or more years of experience providing technical leadership and operational support for complex enterprise security projects/programs for large enterprise organizations
  • 5 or more years of experience in network/security architecture, engineering, and/ or technical oversight for large enterprise systems with federally regulated data flows
  • 5 ore more years of combined experience in firewall technologies (both physical or virtual)
  • Knowledge of infrastructure, application, and data security architecture best practices
  • Ability to identify and mitigate Cybersecurity risks
  • Ability to obtain and maintain required security clearances (government and other). Must be US Citizen
  • Hands-on experience with security platform policy management on multiple security platforms
  • Ability to troubleshoot in highly complex, technical situations within a matrixed organization
13

Analyst‚ Cybersecurity Resume Examples & Samples

  • Provide day-to-day support in the development, implementation and maintenance of compliance programs and cybersecurity programs for a variety of registered investment advisers, including but not limited to
  • Conduct annual Cybersecurity Reviews
  • Ensure cybersecurity policies and procedures are effectively communicated to client, in accordance with the Firm’s regulatory requirements
  • Prepare and deliver cybersecurity training
  • Conduct phishing examinations
  • Assist clients in responding to SEC OCIE Alert
14

Senior Cybersecurity Operation Centre Analyst Resume Examples & Samples

  • Vulnerability Scanning & report analysis (Nessus / QualysGuard)
  • Identification of false positives
  • Understand & share remediation strategies when required (application of remediation patches is out of scope)
  • Knowledge on Active directory and patch management ( Microsoft system Interface)
  • SIEM Tools (Archsight, Net Forensics, etc)
  • Splunk experience
  • Thorough knowledge of TCP/IP and file transfer protocols
  • Knowledge on IDS / IPS, Firewall monitoring and change in rule base
  • Fair Knowledge on antimalware, antispam tools, vulnerability management
  • Log reviews and security forensic reviews
  • Access review of account to support Audit requirement
  • Review security device logs to analyze network traffic for suspicious/malicious activity
  • Access Control Management
  • Knowledge of offensive security tactics and tools
  • Knowledge of cryptographic tools & methodologies
  • Certifications like CCNA, MCSE, MCP or CEH would be an advantage
  • Experience with working in Windows as well as Unix/Linux environments
  • Willingness to work under 24/7 rotating shift basis
  • Effective communication skills in both verbal and written English
  • Ability to adhere to strict quality, service levels and change management process
  • Security certification such as CISSP or any other equivalent is desirable
15

Cybersecurity Senior Analyst Resume Examples & Samples

  • Intrusion Detection/Prevention Systems
  • Proxy Servers
  • Log Aggregation Technology
  • Participating actively in client discussions and meetings
  • Communicating a broad range of Firm services
  • Managing engagements
  • Preparing concise and accurate documents, leveraging and utilizing MS Office (Word, Excel, Access, PowerPoint) and Lotus Notes to complete related project deliverables, as necessary; and,
  • Balancing project economics management with the occurrence of unanticipated issues
  • Creating a positive environment by monitoring workloads of the team while meeting client expectations and respecting the work-life quality of team members
  • Providing candid, meaningful feedback in a timely manner to the Cybercrime team; and
  • Keeping leadership informed of progress and issues
16

Cybersecurity Business Intelligence Analyst Resume Examples & Samples

  • Define and deliver weekly reporting, including metrics and KPIs and significant case summaries
  • Perform data analyses as needed using various statistical/predictive modeling, machine learning and text mining techniques
  • Anticipate, prioritize and quickly advance key projects
  • Bachelor’s or Master’s degree in Computer Science, Math, Statistics or a related quantitative field
  • Scripting knowledge in Unix and/or Windows platforms required
  • Experience with the dashboard/reporting functionality of Splunk a plus but not required
  • Proficient with MS Office Suite (Word, Excel and PowerPoint)
  • Ability to develop creative solutions to meet deadlines
  • Excellent time management and organizational skills with attention to detail
  • Positive attitude and self-motivated with ability to learn quickly, adjust to changes and think outside the box
  • Proven ability to translate business reporting requirements into sustainable reporting solutions
  • Good verbal/written and inter-personal skills
  • Experience with operational risk analytics in the banking industry is preferred
  • Experience managing confidential data with the utmost discretion
17

Cybersecurity Risk Analyst Resume Examples & Samples

  • Work independently to conduct Ad Hoc and scheduled risk assessments as assigned, identifying and applying the appropriate methodology
  • Assist in managing Cyber-Security risk register and communicate risk information to team members, Cyber-Security leadership, and stakeholders. Participate in determining the appropriate content for risk reports and draft reports and presentations using non-technical language
  • Manage workload, prioritizing tasks and documenting time, and other duties as directed by management
  • Assists in Continual Service Improvement efforts by identifying opportunities for process improvement. Drives some process improvement efforts
  • Participate in the collection and documentation of departmental knowledge artifacts
  • Provide assistance and support to the Technology Risk Manager
  • Assist in developing risk management processes and tools
  • Participate in the development of the annual Risk Management Team work plan
  • Proactively identifies and escalates incidents as well as operational performance concerns
  • Pursue continuing education to grow and maintain knowledge of best practices, compliance requirements, threats and trends in information security, translating into operational action items, policies, procedures, standards and guidelines as part of the IT Security team
  • Act as a security advocate for IT operations team’s adherence to Dignity Health policies and industry best practices
  • Participate in the collection and documentation of departmental knowledge artifacts, participant in the development and population of knowledge management and collaboration systems for the IT Security team
  • Communicates technical information to team members and across the IT Organization
  • Assists Management in identifying knowledge gaps and providing training to Analysts and Technicians in the IT Security Organization as directed
  • Assists in development of training material
  • 1-2 years project management for minor projects experience preferred
  • 3-5 years risk management GRC experience in the healthcare/medical environment preferred
  • 5-7 years in security risk, information security, audit, compliance, or privacy
18

Cybersecurity Threat Intelligence Analyst Resume Examples & Samples

  • Risk Management - The identification, assessment, and prioritization of risks followed by coordinated response to minimize, monitor, and control the probability and/or impact of unfortunate future events
  • Research - Able to conduct a process of steps used to collect and analyze information to increase our understanding of a topic or issue
  • Intermediate level of relevant work experience required. 3-5 years of experience
  • Experience with support of Information Security operational needs e.g. incident response, problem management, investigation support, data collection, and Information Security initiatives
  • Experience providing guidance on security practices to other IT functions
  • Experience with security exception handling processes
  • Experience with evaluation of third party security practices
  • Ability to effectively and clearly communicate in both written and verbal means
  • Knowledgeable on incident response processes
  • Knowledgeable on security operational tools to protect enterprise environments
  • Knowledgeable on Cloud based security
19

Cybersecurity Infosec Analyst Resume Examples & Samples

  • Performs scheduled and Ad Hoc regulatory and Cybersecurity vulnerability risk assessments according to the risk assessment plan, identifies and prioritizes threats and vulnerabilities, considers existing controls, and evaluates the sufficiency of information provided by application/system/risk owners, obtains additional information if needed
  • Provides Cybersecurity leadership with vulnerability and threat response recommendations
  • Works with risk owners to develop the appropriate threat response, assists with remediation or mitigation plans, and monitors progress against those remediation/mitigation plans
  • Processes Information Security, Identity Management access requests and/or operational incident tickets of medium complexity
  • Follows established process for common requests and issues
  • Performs intermediate operational and trouble-shooting tasks related to access control, provisioning requests, network & endpoint-security-systems, and/or Security Risk Management processes
  • Proactively identifies and escalates incidents and operational performance concerns
  • Provides assistance and support as requested to Security Engineering, IDM Engineering, Network Engineering, and/or the ISIRT SOC
  • Work independently and as part of team to conduct Ad Hoc and scheduled vulnerability assessments as assigned, identifying and applying the appropriate methodology
  • Assists in vulnerability Ad-Hoc scans and other vulnerability operational assignments
  • Analyze and condense vulnerability data in various forms such as .PDF and MS Excel
  • Provide remediation options and guidance to teams inside and outside of IT and Security
  • Experience with vulnerability risk ranking
  • Operational tasks include
  • 1-2 years’ experience in related job area (IT support, information security, identity/access management, IT Audit, forensics/eDiscovery) required
  • 2-4 years’ experience in programing or system/network operations and administration preferred
  • 3-4 years’ experience in IT/Cybersecurity role (e.g. Vulnerability Management, Incident Response, System Administrator, etc.) required
  • 1-2 years’ experience with vulnerability management – required
20

IA / Cybersecurity Test Analyst Resume Examples & Samples

  • Work closely with the Information Assurance workforce to clearly and accurately document system cybersecurity
  • Staff system documents for ISSO/ISSM review and signature
  • Support all aspects of the RMF accreditation process
  • Support daily management and execution of JITC cybersecurity programs (i.e. ensure IA compliance, perform security reviews, manage accreditation documentation, and guide the workforce’s IA implementation)
  • Assist with responding to Higher Headquarter requests/taskings
  • Have an active Secret clearance
  • Have at least 2 years of IA/CS experience
  • Demonstrated the capability to work on a team and independently
  • Be familiar with the Risk Management Framework
  • Demonstrated competencies using IA/CS tools (i.e. Retina, SCAP, ACAS, Nessus, and Kali Linux Security Suite)
  • Be able to obtain a DoD 8570.01M IAM Level I certification or higher (i.e. Security +) within 90 days
  • Self-motivated with the ability to operate with minimal supervision
  • Knowledge and experience with Defense Information Systems Agency (DISA) Security Implementation Guides (STIGs) and security controls
  • Possess a sound understanding of Microsoft and UNIX/Linux Oss
  • Have a AS/BS in related field
  • Additional certifications similar to GPEN, GWAPT, GCIH, CEH, Network+, CCNA, CCNP
  • Working knowledge of various programming and scripting languages
21

Cybersecurity Assessment & Authorization Analyst Resume Examples & Samples

  • 5 years of experience with implementing and assessing security controls from the DoDI 8500.2 and the NIST 800
  • 53 series
  • HS diploma or GED
  • Knowledge of DoDI 8510.01, ICD 503, and NIST SP 800
22

Cybersecurity Systems Analyst Resume Examples & Samples

  • 1+ years of experience with supporting software development projects
  • Ability to show excellent technical expertise and comprehension of software, networks, and Web applications
  • BA or BS degree in Information Systems, Systems Engineering, or CS
  • Experience with Atlassian tools, including JIRA and Confluence
  • Experience with programming and scripting languages, including Python, JavaScript, C#, C++, or Java
  • Experience with software testing and automated testing
  • Knowledge of Cybersecurity technologies, policies, and information assurance, including DIACAP, RMF, Continuous Monitoring, and FISMA
  • Possession of excellent analysis and data gathering skills
  • DoD 8570 Compliant Certification at IAT II, including Security+
23

Senior Cybersecurity Risk Analyst Resume Examples & Samples

  • Provides complex analytical, audit and project support in the following areas
  • Years of functional/professional experience: 8+ years of experience in Risk Management, Information Security, IT Audit, Information Assurance and/or Compliance, Physical Security, and/or Business Resiliency (BCP/DR), preferably in the financial services industry
  • Knowledge in various areas, such as: Identity and Access Management, Threat and Vulnerability Management, Information Risk and Governance, IT Architecture, Monitoring, Incident Response, Security Strategy, Physical Security, and Business Resiliency (BCP/DR)
  • Knowledge of generally accepted information security audit standards, statements and practices, and information security and control practices, physical security standards and business resiliency (BCP/DR) standards
  • Ability to exercise sound judgment regarding findings and make effective recommendations to management
  • Ability to work effectively with people from many different disciplines with varying degrees of technical experience
24

Cybersecurity Risk Analyst Resume Examples & Samples

  • Demonstrates excellent knowledge of information, cyber, security, and technology risk concepts
  • Support Information Risk Managers in matters related to their team field of expertise and works independently to execute
  • Performs detailed application risk analysis to facilitate comprehensive risk assessment; including managing discussions with stakeholders
  • Managing projects to completion, consulting with various corporate teams, both within the IT and business environments, to derive information risk solutions
  • Participates in technology risk and control environment initiatives and associated tools and processes
  • A minimum of 3 years' experience, 3-5 years experience in information risk or technology is preferred
  • Should be aware and have a good understanding of control and risk management concepts
  • Must possess a general knowledge of security systems, applications and be able to assist in communicating related policies, procedures and guidelines
  • Ability to assist on technology risk and control environment initiatives and associated tools and processes
  • Risk analysis (Understanding of Infrastructure Risk, Technically speaking Databases, OS, Network)
  • Must be proficient in using MS Office (Excel, Word, PowerPoint) along with strong verbal and written communication skills with stakeholder management experience
  • Should have the ability to facilitate requirements gathering and be able to communicate risk mitigation strategies, and track remediation
  • A good aptitude in understanding laws, regulations in the countries we operate in would be a plus
  • Understanding of Industry Best Practices working knowledge (i.e., NIST, ISO, CoBIT, OWASP, ITIL)
  • Must possess technical writing abilities
  • Experience in assigning and managing individual work queues and providing written and verbal communications with individuals, broader technical teams and vendors
25

Cybersecurity Risk Analyst Resume Examples & Samples

  • Minimum 5 years of experience in cyber risk metrics an reporting
  • Minimum 3 years of project management, consulting, and/or application security analyst experience
  • Practical experience delivering Risk and Compliance consulting services to enterprise, typically obtained in 3-5 year, or related experience in information security
  • Knowledge of Information Security Risk Frameworks as well as SAP Business objects/Data warehousing skills
  • Experience in performing data mining on large data sets using SAP Business object analysis tools
  • Knowledge and prior experience of statistical data analysis and acquiring data from various sources, analyzing results using statistical techniques and developing reporting capabilities with scripting, Tableau or alternate platform
  • Proficiency in Excel and relational database modeling
  • Excellent analytical & technical skills, able to research problems, determine root causes and solutions
  • Ability to build KPIs, KGIs, KRIs reports and balance scorecard from conceptualization through presentation
  • Experience in risk management in highly technical environments
  • Existing information security certifications desired, such as CISSP, CCSP, CISM, CISA; or
  • Be responsible for establishing strong working relationships within Information Security (AIS), outside AIS, as well as other brand/affiliate organizations
  • Demonstrate practical experience evaluating technical data or security analytics
  • Experience designing and implementing Information Security reporting and metrics
  • Excellent communication skills, written and verbal - this role requires interaction across the enterprise and regular interface with people at all organization levels
  • Coordinate Business As Usual (BAU) activities, overseeing monthly and quarterly metrics program. Provide assistance to management team to Identify metric anomalies/trends/outliers and challenge these accordingly
  • Proactively identify enhancement that will improve the security posture and identify cyber security control deficiencies within the organization
  • Ability to act independently and exercise good judgment as well as the ability to work cross functionally and create virtual teams is essential
  • Knowledge of security technologies (authentication, encryption, key management, sandboxing, VPNs, firewalls, intrusion detection/prevention), security controls and risks
  • Ability to evaluate technical risk and business impact and explain the impact of security issues to both technical and non-technical audiences
  • Superior attention to detail and focus on quality work packet delivery
  • Ability to work in a fast-paced & team environment, prioritize workload and meet deadlines
  • Work ethic based on a strong desire to exceed expectations. Experience working successfully in a very fast-paced, results-oriented environment
  • Excellent time management skills, ability to juggle multiple, competing priorities, with strength in identifying and implementing solutions to address the critical needs
26

Intrusion Analyst, Cybersecurity Resume Examples & Samples

  • Understanding of Boolean Logic
  • Problem determination and resolution capabilities
  • Ability to research ability including: fact-based information collection & analysis
  • Understanding of data visualization technologies
  • Understanding of packet analysis tools & methodologies
  • Good interpersonal skills, as well as phone and customer service skills
  • Ability to work under pressure from internal and external sources
  • Experience in documenting standard operating procedures
  • Understanding of Desk-side and/or Security Support environments
27

Cybersecurity / IA Analyst & Engineers Resume Examples & Samples

  • Bachelor’s degree in a technically related field
  • Minimum 4 to 10 years of related experience
  • Currently active Security+ and/or CISSP. Should be enrolled in Continuing Education (CE) courses
  • Familiarity with DISA mandated security tools to include Assured Compliance Assessment Solution (ACAS), Host Based Security System (HBSS), analyze results and create reports
  • Technical skills related to Arcsight or other SIEM tools, Windows Operating Systems, Red Hat Enterprise Linux (basic proficiency), Microsoft SQL, File/System Storage Administration, Server Backup and Patch Management tools
  • Familiarity with MS PowerShell or other scripting languages
  • Familiarity with Virtualization Technologies such as Citrix, VDI, Cisco, LINUX/UNIX, VMware, scripting, firewall rules and SQL a plus
28

Cybersecurity Senior Analyst Resume Examples & Samples

  • Working knowledge of cybersecurity and associated threat categories
  • Broad and varied knowledge of Financial Services Products and Operations
  • Risk analysis skills and techniques
  • Ability to develop actionable programs to address risk vectors
  • Strong background with Microsoft Office suite
  • Experience with SharePoint web application
  • Self-Starter with ability to deliver on expectations with minimal supervision
  • Quickly grasp/master new requirements and related knowledge
  • Manage tight deadlines or unexpected requirement changes
  • Team player within a matrixed organization
  • Experience in managing the production of “management ready” media content for all aspects of an organization’s operating functions (Strategy/Goals/Roadmaps/Budget/Metrics/etc.)
  • Ability to translate complex technical requirements into a format suitable for specific audiences
  • Readiness to represent Senior Team members within various forums as needed
29

Cybersecurity Systems Analyst Resume Examples & Samples

  • Must be a US Citizen and holds, or is able to obtain, a valid US passport
  • Pass an extensive background check
  • Possess a Bachelor degree earned in the field of computer science, programming, technology and/or mathematics from an accredited university or college
  • Has a minimum 1 to 3 years of experience working with various aspects of information security management systems such as ISO 27001, NIST, SANS Critical 20, COBIT, etc
  • Thoroughly understands MS Windows OS , Active Directory, Windows Security, TCP/IP networking, and the fundamentals of Internet Security systems and technologies
  • Ability to understand and interpret the business, legal and regulatory requirements involving cybersecurity and related information technologies
  • Certification to CISSP, CISM, CISA and/or other Information Security credentials is a plus
30

Cybersecurity Grc-senior Analyst Resume Examples & Samples

  • Ensure timely execution of Cybersecurity deliverables including analysis, aggregation and reporting of compliance requirements
  • Identify issues and root causes including oversight and facilitation of plans including security concepts, controls, etc. that reduces risk while enabling the HP business units to conduct their business
  • Prepare and present Governance & Compliance management reports, key performance metrics, scorecards, and briefings as required
  • Support internal & external Audit readiness, HP Privacy, HP Legal
  • Must keep abreast of latest security and privacy legislation, regulatory, advisories, alerts, and vulnerabilities and ensure GRC solutions & capabilities remain in compliance
  • As needed, participate in risk assessments in other cybersecurity and areas of focus; e.g. PCI, 3rd Party Assessments, Legal Wellness, Privacy
  • Maintain strong working relationships with individuals and groups involved in managing information security risks, and governance & compliance across the organization
  • Conduct periodic touch bases with GRC and Business Unit Sr. Leadership risk owners to ensure accountability and visibility of all open issues and to verify progress is being made towards previously committed remediation plans
  • Bachelor's Degree in Information Security, Cyber Security, or related
  • 7 years of experience ranging across: PCI, GRC in a Security team focused on Compliance & Incident/Crisis Management, aggressive Risk Mitigation or equivalent
  • Certification as a PCIP, CRISC, CISM, CISSP, CISA or other Security discipline preferred
  • Deep technical knowledge of PCI DSS including scoping and assessment of PCI applications, Contact/Call Centers, Third Party vendors, and processes
  • Knowledge and experience with encryption technology and techniques
  • Knowledge and experience with pen testing – scoping, interpretation of results, vulnerability classification (NIST, CVSS) – and scanning tools (Qualys, Navis, Nessus)
  • Knowledge and experience with networking – firewall rules, IDS, IPS – and networking tools
  • Knowledge and experience with cloud security
  • Experience as a Process Engineer, Tech Writer; preferably with Cyber/Information Security processes, playbooks, policies, and Awareness & Training type content
31

Cybersecurity Systems Analyst Resume Examples & Samples

  • 1+ years of experience with NIST SP 800 issuances
  • 1+ years of experience with NIST and the DoD Risk Management Framework
  • 1+ years of experience with National Vulnerability Database CVEs
  • 1+ years of experience with programming and scripting languages, including Python, JavaScript, C#, C++, or Java
  • 1+ years of experience with data and business process analysis
  • Ability to show excellent technical expertise and comprehension of information technology, network, systems, and software architecture
  • BA or BS degree in CS, Computer Engineering, Systems Engineering, IT, or Business Information Technology
  • Experience with supporting software development projects
  • Experience with configuration management
  • Experience with Cybersecurity technologies, policies, and information assurance, including DIACAP, RMF, Continuous Monitoring, and FISMA
  • DoD 8570 Compliant IAT II Certification
  • CISSP, Security+, Network+, or Certified Ethical Hacker Certification
32

Cybersecurity Risk Analyst Resume Examples & Samples

  • Pursue continuing education to grow and maintain knowledge of best practices, compliance requirements, and threats and trends in the information security, translating into operational action items, policies, procedures, standards and guidelines as part of the IT Security team
  • Communicates technical information to team members and across the IT Organization and all management levels
  • Assists Management in identifying knowledge gaps and providing training to Analysts and Technicians in the IT Security Organization
  • Leads development of training material
  • Acts as Lead for other InfoSec Analysts
  • 4+ years’ experience in related job area (information security, identity/access management, IT Audit, forensics/eDiscovery) required
  • 3-5 years risk management GRC experience in the healthcare/medical environment preferred Knowledge of NIST 800-30, ISO 27001, or HITRUST HIPAA Security Rule
  • 4+ years’ experience in programing or system/network operations and administration preferred
33

Cybersecurity / IA Analyst Resume Examples & Samples

  • Requires a minimum of eight (8) years of work experience as an Information Systems Security Officer or Information assurance Manage
  • Requires a BS Degree in an IT related field
  • Preferred BS/BA degree in Computer Science or Information Systems
  • DoD 8570/DoD 8140 IAT Level III – CISA, CISSP, CASP