Cybersecurity Analyst Resume Samples

4.7 (119 votes) for Cybersecurity Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cybersecurity analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
AW
A White
Abbie
White
5009 Turner Garden
Dallas
TX
+1 (555) 266 4614
5009 Turner Garden
Dallas
TX
Phone
p +1 (555) 266 4614
Experience Experience
Dallas, TX
Cybersecurity Analyst
Dallas, TX
Harris LLC
Dallas, TX
Cybersecurity Analyst
  • Assist the Cybersecurity Manager with the development of the IA related Procedures, and Work Instructions
  • Researches and assesses external intelligence sources and makes recommendations to improve and augment intelligence gathering efforts
  • Implement, maintain, and monitor network and security and performance
  • Assisting in tracking and reporting on portfolio performance
  • Work with Legal and Compliance teams and perform electronic discovery and computer forensics to support investigations
  • Perform periodic attestation, control, and performance procedures as deemed necessary
  • Providing Quality Control and Quality Assurance of other team member’s work
Los Angeles, CA
Senior Cybersecurity Analyst
Los Angeles, CA
Schuppe, Batz and Greenholt
Los Angeles, CA
Senior Cybersecurity Analyst
  • Responsible for guiding committees in coordinating the development, publication, and revision of consensus standards and guidelines that address ISAO capabilities, business processes, training and exercises, and automated exchange of cybersecurity threat data. To promote widespread adoption, all standards and guidelines will be developed using consensus standards development principles articulated in the United States Standards Strategy and the National Technology Transfer and Advancement Act of 1995
  • Oversight of staff performing daily monitoring of network and endpoint assets, hunting for anomalous or malicious activity
  • Provides subject matter expertise in integrating or “on-boarding” applications using disparate authentication and/or authorization services (i.e., Windows Active Directory, LCAP/Top Secret, internal DB, etc.) into the ICAM infrastructure to include the integration points with PIV
  • Provide advice and assistance with implementation of standards, guidelines, and best practices
  • Designs and develops new systems, applications, and solutions for enterprise wide systems and networks
  • Perform compliance scanning to analyze configurations and compare to established baselines, recommending remedial actions where necessary
  • Mentor junior staff, provide development programs for such staff and ensure technical progress of their abilities
present
San Francisco, CA
Senior Insider Threat Cybersecurity Analyst
San Francisco, CA
Okuneva and Sons
present
San Francisco, CA
Senior Insider Threat Cybersecurity Analyst
present
  • Execute high risk cyber security incidents by working in conjunction with response partners
  • Propose and execute program initiatives, and collaborate with key stakeholders to create business value
  • Develop strategies to improve the efficiency and consistency of service delivery
  • Maintain an awareness of industry challenges and advancements in order to add value to existing technologies and processes used within the team
  • Receive, evaluate and initiate the processing of cyber forensic investigations
  • Review and direct user activity monitoring strategies
  • Imaging of hard disk drives and other digital storage media
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Virginia Commonwealth University
Bachelor’s Degree in Computer Science
Skills Skills
  • Good knowledge of Risk and Project Management concepts
  • Ability to analyze business applications to determine and communicate risk to stakeholders in an understandable way in a consultative manner
  • Demonstrates the ability to learn rapidly and adapt quickly to new processes and technology
  • Strong organizational skills and ability to stay focused while managing multiple tasks concurrently
  • Strong critical thinking/analytical skills, creativity, and a proven drive for quality
  • Possesses unimpeachable personal and professional integrity
  • Excellent communication skills (both oral and written)
  • Excellent communication skills (verbally and written)
  • Conduct hands-on vulnerability analysis and penetration testing of software, networks, wireless systems, and embedded hardware
  • Strong written and verbal communication skills
Create a Resume in Minutes

15 Cybersecurity Analyst resume templates

1

Cybersecurity Analyst Resume Examples & Samples

  • Maintaining Network Auditing systems to detect, track, and report malicious computer-related activities and incidents
  • Conducting Network Vulnerability Scanning and Vulnerability Assessment
  • Monitor information system activity, collect, review, and retain audit logs to include system logs and records and determine actions to be taken when discrepancies are detected
  • Performs analyses to validate established security processes and recommend additional security steps to ensure compliance with applicable DOD IA requirements and baseline IA controls
  • Conduct network security vulnerability assessments using DoD provided scanning tools and liaison with network administrators to correct identified problems
  • Review Information Assurance Vulnerability Alerts (IAVA) for applicability and impact to the range networks. Ensure that all systems are patched and report compliance
  • Conduct vulnerability scanning for new information system deployment or systems temporary connected to support training events or testing
  • Verify all Virus Signatures are kept up to date, and Automated and Manual Virus Scans are documented, scheduled and are being completed
  • Assist in evaluation of Information Systems for compliance with Government statutes, DoD 8500.2 IA Controls, DoD FISMA directives, policies and regulations
  • Assist the Cybersecurity Manager with the development of the IA related Procedures, and Work Instructions
  • Information System Security
  • Risk Analysts
  • Network Security Auditing
  • Host Based Security System (HBSS) Server Administration
  • Assured Compliance Assessment Solution (ACAS) Administration
  • VMware Administration
  • DoD Certification and Accreditation
2

Cybersecurity Analyst Resume Examples & Samples

  • Plan, execute on project and vendor risk assessments
  • Review, recommend, and draft IT controls
  • Educate IT management and owners on IT related security risks, controls and general awareness
  • Facilitate and coordinate on IT related internal and external audits
  • Track and report risks, audits, and certification testing
  • Coordinate and compile evidence for gap closures
  • Govern, monitor, and report on compliance to IT policies, standards, methodologies, and processes
  • Good networking knowledge – including reading network diagrams
  • Must have strong documentation skills and communication skills to report to several layers of management and technical teams
  • Good understanding of vulnerability management
  • Familiar with all types of threat and risk, vendor assessments
  • Understanding of privacy, regulatory, compliance, vendor management and legal requirements
  • Experience with security or control frameworks including ISO, NIST and/or Cobit5
  • Understand systems development lifecycle process and agile methodologies
  • Knowledge of related industry/audit, IT operational and/or IT risk management experience
  • Knowledge of IT general control components including IT Governance, logical access and security, change management, System Development Life Cycle (SDLC), production operation and support, development and coding practices, and secure information management practices
  • Good presentation/facilitation skills and/or experience in risk and control self-assessment techniques
  • CISSP, CISA, CISM or CRISC designation would be an asset
  • Security scanning, web and application tools, e.g. Qualysguard, Nessus and Acunetix
  • Linux, Windows, AIX, web or cloud based applications
  • Application development, release management, code promotion, scripting concepts, schedulers and enterprise automation tools
  • Network and Security Firewalls (ASA/Palo Alto/Checkpoint), F5/WAF, McAfee Nitro,McAfee IDS/IPS, McAfee ePO
  • Security governance frameworks, cyber security policies and standards
  • IT risk and control frameworks (including CobIT, NIST & Security Governance Frameworks such as ISO27001
3

Cybersecurity Analyst Resume Examples & Samples

  • Assesses and tracks changes to the global threat landscape and assesses the impact and exposure to the Bank and its' customers. Recommends corrective measures based upon actionable intelligence
  • Provides timely and actionable communications, via written reports and/or oral presentations, to management to understand and address cybersecurity threats and trends
  • Researches and assesses external intelligence sources and makes recommendations to improve and augment intelligence gathering efforts
  • Acts as a subject matter expert to various internal groups on emerging threats
  • Assists in post event analysis for indicators of compromise makes recommendations for preventative measures
  • Perform duties & responsibilities specific to department functions & activities or as assigned by supervisor
  • 4 year university degree or equivalent experience required
  • Proven analytical skills with an acute attention to detail and persistence
  • Excellent communication skills (verbally and written)
4

Cybersecurity Analyst Resume Examples & Samples

  • BA or BS degree and 5 years of experience with developing information technology solutions or 10 years of experience with information assurance designing, developing, and implementing identity management and COMSEC technologies and building network identity architectures, analysis, and plans
  • Experience with Army Cybersecurity strategy, policy, and programs as a program manager, systems engineer, or analyst
  • Experience with managing large teams across geographic locations
  • Knowledge of emerging Cybersecurity DOTMLPF-P solutions
  • Knowledge of the PPBE process and DoD or Army acquisition process
  • Ability to plan, direct, manage, and control staff performance across a diverse range of tasks to meet and exceed schedule and budget targets
  • Possession of excellent oral and written communication skills to provide consistent, highly available leadership to the team
5

Cybersecurity Analyst Resume Examples & Samples

  • 6+ years of experience with IT, including ACAS, VRAM, HBSS, database system administration and security, Windows administration and security, or traditional security
  • Experience with Command Cyber Readiness Inspection (CCRI) or CSICP processes and requirements
  • Ability to perform work proficiently in a team environment
  • DoD 8570 IAT Level II Certification
  • Experience with metrics development and analysis
  • Experience as an Information Systems Security Manager (ISSM)
  • BS degree in CS, Cybersecurity, or related field
6

Cybersecurity Analyst Resume Examples & Samples

  • Active TS/SCI
  • BA or BS degree and 5 years of experience with developing information technology solutions, or 10 years of experience in Information Assurance designing, developing, and implementing Identity Management and COMSEC technologies and building network identity architectures, analysis, and plans
  • Knowledge of the PPBE process and DoD and Army acquisition process
7

Cybersecurity Analyst, Junior Resume Examples & Samples

  • Experience with Cybersecurity, computer network defense, software development, or computer engineering in an internship or academic environment
  • Experience with the configuration or functionality of intranets, firewalls, servers, applications, remote access, databases, and the information systems infrastructure in an internship or academic environment
  • Scheduled to obtain a BS degree by August 2017
8

Cybersecurity Analyst Resume Examples & Samples

  • 5+ years of experience with IT or information assurance (IA) and risk management and assessment concepts
  • 3+ years of experience with information assurance and security practices
  • 3+ years of experience with IT policies and regulations and the certification and accreditation (C&A) process
  • 3+ years of experience with technical writing and requirements development
  • Experience with the OSD, Service Staff, DoD, or Joint staff as a contractor or military personnel, leading teams, and providing logistical support to meetings
  • Knowledge of FedRAMP, DoD organizational structures, and the DoD’s 8500 series Cybersecurity policy
  • Knowledge of NIST Special Publications, including 800-37, 39, 53, and 137
  • Top Secret clearance
  • CISSP, CISM, or other commercial Cybersecurity-related Certification
  • Cloud+, CSSP, or other commercial Cloud Security-related Certification
9

Cybersecurity Analyst Resume Examples & Samples

  • 2 years of experience with on-the-job progressive responsibility in Cybersecurity analysis or incident response
  • Experience with network defense monitoring tools and systems, information assurance assessment tools, encryption technologies, and identity and authentication technologies
  • Experience with monitoring network defense technologies and analyzing the products produced
  • Experience in working with TCP/IP routing and database structure and queries
  • Experience with basic network services, vulnerabilities, and attacks
  • Experience with planning and prioritizing multiple tasks so that work is completed on schedule
  • Experience with communicating complex technical concepts and project information clearly and concisely to both technical and non-technical audiences
  • Experience with enterprise information security management tools, including HP ArcSight Suite for analyzing audit data and reports and generating content a plus
  • Possession of excellent oral and written communication skills, including briefing
  • BS degree in Computer Engineering, CS, Science, Mathematics, Engineering, or a related IT field preferred
  • Certified Information Systems Security Professional or other equivalent security or related IT Certification a plus
10

Cybersecurity Analyst Junior / Mid / Senior Resume Examples & Samples

  • Interpreting policies, procedures, standards, guidelines, and regulations to include National Institute of Standards and Technology (NIST) and Federal Information Security Management Act (FISMA)
  • Conducting security control assessments with information system security stakeholders; collect and review artifacts and evidence for compliance with security controls; document and update security assessment results in accordance with NIST SP 800-37, SP 800-53 Rev 4, and SP 800-53A Rev 4
  • Providing detailed written reports of assessment activities to meet customer requirements
  • Assessing evidence of remediated vulnerabilities and documenting the results
  • Providing Quality Control and Quality Assurance of other team member’s work
  • Tracking and reporting the status of all of the team’s assessments in progress and supervising team members to keep assessments on track
  • Mentoring team members by providing procedural guidance and technical expertise
  • Must be available during core work hours of 9 am to 3 pm, Monday – Friday
  • Currently possess a Secret clearance with the ability to get a Top Secret clearance
  • Ability to work in a team-oriented, collaborative environment, and independently
  • Experience interpreting vulnerability and compliance scan results
  • Relevant professional certifications from recognized industry consortiums including ISC2, ISACA, CompTIA, and GIAC specifically Security+, CAP, CISSP or equivalent
11

Cybersecurity Analyst Resume Examples & Samples

  • Conduct hands-on vulnerability analysis and penetration testing of software, networks, wireless systems, and embedded hardware
  • Conduct daily cyber analysis and network monitoring of Smart Grid systems in ACS SecureSmart Security Operations Center (SOC)
  • Research emerging cybersecurity threats and zero-day vulnerabilities
  • Develop tools and techniques to identify and exploit vulnerable systems
  • Develop and execute security assessment test plans, document and present results to customers
  • Monitor and maintain SecureSmart real-time monitoring infrastructure and ACS Security Assessment Toolkit
  • Bachelor’s degree (Electrical Engineering (BSEE/BEEE) or Computer Science (BSCS)) with 3.4 GPA or better
  • Interest in pursuing a cybersecurity career that involves monitoring and analyzing Smart Energy field networks, conducting cyber vulnerability analysis, researching intrusion detection techniques, and prototyping tools and embedded systems with a wide range of cutting-edge network and software technologies
  • Working knowledge of IP networks, LAN/WAN/WIFI protocols, security services and encryption protocols, firewalls and filtering, and intrusion detection
  • Network packet and protocol analysis using tools such as Wireshark
  • Software development skills (Python, Django, C, Assembly, JavaScript, Java)
  • Working knowledge of Linux and Windows operating systems and various web technologies
  • Ability to obtain government security clearance at TOP SECRET or higher level (this requires current US Citizenship)
  • 1-2 years industry experience
  • Training or experience with common security assessment tools (e.g., Nmap, Nessus, Burp Suite, Paros, John the Ripper, Kismit)
  • Training or experience with Intrusion Detection, Monitoring, and Event Correlation Tools (e.g., SNORT, Splunk, ArcSight, QRadar, Netflow, etc.)
  • An internship or work experience in an information assurance, cybersecurity engineering or energy system development job function
  • An internship or work experience with an Electric Utility company or Electric Utility supplier
  • CISSP or equivalent certification
12

Cybersecurity Analyst Resume Examples & Samples

  • Comprehensive understanding of IT infrastructure including data center, storage, network, system servers, and desktop computing environment
  • Ability to analyze, audit, and detect security vulnerabilities in the infrastructure described above
  • Enforce security policies at the Irvine site
  • Supports the development and maintenance of Security Program
  • Report security incidents to Chief Information Security Officer
  • Responsible for operational support for security functions to other Thales USA locations as needed
  • Acts as a subject matter expert (SME) for IT Security operations, ensuring security requirements are enforced
  • Makes recommendations to CISO about new security practices and policies, system patching frequency, and ensuring all systems are up-to-date with latest virus definitions and zero-day patches
  • Monitors and maintains all security processes, applications, and servers including: SIEM, ePo, SCCM, and BlueCoat web content filtering
  • Enforce security policies and procedures by monitoring security profiles, reviews security violation reports and investigates security exceptions
  • Responsible Security Incident Management
  • Supports all efforts related to supporting the Security Operations Center
  • Acts to educate and enforce change management policies and procedures
  • Develop and comply with core IT processes, including change control , change management, policy development & enforcement, systems design review, systems troubleshooting and documentation
  • Develop and maintain documentation (best practice, solutions documents), procedures, security and follow ITIL processes for problem and change management
  • Verifies that IS security policies are applied for the managed systems and reports failure to CISO
  • Manage Encase Forensics tools and conduct audits
  • ITIL certification (V3) required
  • Bachelor’s degree from an accredited college or higher, and a minimum of four years’ experience working in fast paced, customer facing enterprise environment
  • Two years’ experience working with information security administration tools
  • Administrator level SCCM 2012 knowledge with ability to write scripts and remotely deploy software
  • Strong understanding of SIEM solutions such as Splunk
  • Solid understanding of large enterprise IT infrastructure components such as networks, telephony, enterprise storage, servers, clients and the relationships between these components
  • Able to quickly identify problems related to the above components and alert the right resource to address the problem
  • Must possess an in depth level understanding of Cisco networking principles and assist with resolution of networking problems if asked
  • Must possess an in depth level understanding of security principles
  • Malware scanning and analysis
  • Familiarity with Project Management principles such as project initiation and gates
  • Ability to lead small to mid -sized projects or components thereof
  • Ability to meet challenging timelines
  • Ability to communicate expectations and meet commitments
  • CISSP or related security certification preferred
  • MCSE or related Microsoft certificate preferred
13

CAP Cybersecurity Analyst Resume Examples & Samples

  • Serve as Cybersecurity (CS) Analyst, helping the OTES Team provide technical, scientific, and engineering services for the conduct of the Cybersecurity Assessment Program (CAP) on behalf of AFOTEC/OL-KT for the United States Northern Command (USNORTHCOM), Unites States Pacific Command (USPACOM) and the United States Air Force (USAF)
  • Assist in providing in-depth technical and operational knowledge as related to CS and Information Technology (IT), Multidisciplinary Security, Joint Exercises, Joint Planning, exercise training objective development, and Joint Lessons Learned
  • Provide programmatic analysis experience sufficient to conduct the CAP assessments and Joint and Service-level training exercise assessments IAW Office of the Secretary of Defense, Director, Operational Test and Evaluation (DOT&E) Cybersecurity Assessment Program guidance
  • Conduct assessments in areas of cybersecurity, interoperability, mission assurance, acquisition, and exercise mission areas
  • Participate in planning, execution and reporting of these assessments to include: non-technical network vulnerability assessments, interoperability assessments, mission assurance assessments, vulnerability remediation events, reporting of exercise-based information assurance assessments, development of methods and metrics to guide these efforts, and the scheduling and management of assessment tasks, and deliverable documents
  • Bachelor’s degree in a technical related field required
  • 10 years related experience in DoD/AF Computer-Network Operations (emphasis on Computer Network Defense, Exploitation or Attack), Information Operations, or Information Systems Security Engineering required; 18 years of experience in lieu of a bachelor’s degree
  • Must have certifications to perform IA and Computer Network Defense duties in accordance with DoD 8570.01M
  • Must exemplify a dedication to achieving the mission of AFOTEC as well as high standards of quality and excellence in performing the duties
  • Must be able to work in a fast paced team environment while being able to prioritize work to balance multiple projects and deadline
  • Ability to quickly understand the customer’s overall technical objectives and mission and provide effective solutions
  • Excellent verbal and written communication skills along with positive customer interaction and presentation capabilities required
  • Master's degree in a technical related field preferred
  • Air Operations Center (AOC) experience in the area of Combat Plans Division (CPD), Combat Operations Division (COD), or Strategy Division (SRD)
  • Computer Network Defense Service Provider (CNDSP) or Network Operations and Security Center (NOSC) experience
  • Technical writing experience
  • Prior experience in Cybersecurity, Interoperability, or Mission Assurance assessment exercises
  • Mathematical and statistical knowledge sufficient to develop assessment metrics
  • Direct experience in the OT&E of Air Force systems, particularly ensuring cybersecurity
  • An understanding of AFOTEC specific procedures and processes
  • Knowledgeable in common cyber threat terminology, methodologies
  • Experience or familiarity with military operations
14

Cybersecurity Analyst Resume Examples & Samples

  • Investigates available tools and countermeasures to remedy detected vulnerabilities, and recommends solutions
  • Analyzes and assesses damage to the data / infrastructure as a result of security incidents
  • Examines available recovery tools and processes, and recommends solutions to resolve identified incidents
  • Bachelor’s or Master’s degree in computer science, information
15

Senior Cybersecurity Analyst Resume Examples & Samples

  • Provide critical leadership and support for a newly-established standards organization (SO) supporting cybersecurity Information Sharing and Analysis Organizations (ISAO). ISAOs are intended to enable and facilitate private companies, nonprofit organizations and federal agencies to share information related to cybersecurity threats and incidents on a voluntary basis, and to collaborate to respond in as close to real time as possible
  • Responsible for guiding committees in coordinating the development, publication, and revision of consensus standards and guidelines that address ISAO capabilities, business processes, training and exercises, and automated exchange of cybersecurity threat data. To promote widespread adoption, all standards and guidelines will be developed using consensus standards development principles articulated in the United States Standards Strategy and the National Technology Transfer and Advancement Act of 1995
  • Provide advice and assistance with implementation of standards, guidelines, and best practices
  • Advise individuals and organizations on the creation and operation of ISAOs and conduct or review ISAO certifications
  • Advise and assist with the establishment of relevant training and exercises to benefit ISAOs and their constituents
  • Collect and publish metrics reflecting the effectiveness of ISAO establishment and cybersecurity information sharing
  • M.S. degree in computer science, cybersecurity, management information systems, engineering or a related field
  • Experience in guiding organizations in implementing cybersecurity best practices
  • Experience in consensus standards development
  • Excellent program and performance management capabilities
  • Understanding of the NIST Risk Management Framework (RMF) and other applicable cyber policies, standards, procedures and governance processes for federal government clients
  • Certification such as Certified Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM), Certified Ethical Hacker (CEH), Certified in Risk and Information Systems Control (CRISC), Certified Protection Professional (CPP), Program Management Professional (PMP) or other related certification
16

Senior Insider Threat Cybersecurity Analyst Resume Examples & Samples

  • Further the design and maturation of TIAA’s Insider Threat program
  • Develop and deliver stakeholder presentations which further the awareness and understanding of the insider threat program and capabilities
  • Propose and execute program initiatives, and collaborate with key stakeholders to create business value
  • Receive, evaluate and initiate the processing of cyber forensic investigations
  • Search and seizure of physical and logical evidence
  • Imaging of hard disk drives and other digital storage media
  • Digital forensic examination and analysis
  • Recovery of deleted files and folders, internet history, deleted emails, identification of attached devices, analysis of event logs and proxy logs
  • Review and direct user activity monitoring strategies
  • Develop strategies to improve the efficiency and consistency of service delivery
  • Provision of report and statements in clear unambiguous language
  • Maintain a strong focus on case logs, repeatability and chain of custody
  • Identification of root cause in partnership with peer groups on remediation of control gaps/failures
  • Interact with and lead discussions with executives across different functions and lines of business
  • Execute high risk cyber security incidents by working in conjunction with response partners
  • Maintain an awareness of industry challenges and advancements in order to add value to existing technologies and processes used within the team
  • Potential travel (occasional) related to investigative needs
  • Bachelor’s degree/or minimum 5-8 years of equivalent combination of education and experience
  • Minimum of 7-10 years of overall experience in Cybersecurity
  • Minimum of 3-5 years in computer forensic investigations
  • Insider Threat program experience as a focus area within Cybersecurity
  • Working knowledge of Data Loss Prevention controls (e.g. Symantec DLP, McAfee, Websense)
  • Hands on experience with industry standard computer forensics solutions (EnCase, FTK, X-Ways, Cellebrite)
  • Working knowledge of enterprise solutions for searching, monitoring, and analyzing machine-generated big data (ArcSight, LogRhythm, Splunk)
  • Hands on experience with user activity monitoring tools such as ObserveIT or Veriato 360
  • Proven ability to self-direct project outcomes, with minimal supervision, to achieve program goals
  • Experience with databases, SQL, and data visualization tools
  • Experience with scripting environments (e.g. Python, Ruby, Perl, VB Script) to automate technical response
  • Experience with Windows, MacOS, Linux, iOS
  • Ability to build consensus and cooperation as well as the ability to interact, influence, and negotiate with leadership within the firm
  • Ability to navigate and work effectively across a complex organization
  • Strong knowledge of User Behavior Analytical concepts and products
  • Experience in financial services including Retirements, Retail/Commercial banking, or another other financial institution line of business (Brokerage, Insurance, or Asset Management)
  • Good understanding of data privacy laws and experience interacting with Legal and Compliance professionals
17

Cybersecurity Analyst Resume Examples & Samples

  • Bachelor's Degree in Cyber Security, Engineering, IT or related technical field
  • Experience with ERP programs, HBSS, Fortify, and ACAS/Retina/Nessus
  • Experience with eMASS
  • Active US Secret security clearance required
  • At least 7 years of relevant experience required
  • DoD 8570.01-Manual IAM Level III baseline certification
18

Senior Cybersecurity Analyst Resume Examples & Samples

  • Manage vulnerability program (Qualys)
  • Manage Policy Compliance program (Qualys)
  • Maintain policy and technology standards
  • Operate SIEM platform (Log Rhythm)
  • Coordinate and collect metrics for reporting
  • Coordinate audits, including evidence collection and user control considerations
  • Manage device control program
  • Operate file monitoring review process
  • Contribute to awareness training activities
  • Strong interpersonal and communications skills
  • 2 years of Information Security experience
  • Enterprise Information Technology experience
  • Expertise in information systems auditing, risk management, and control
  • Experience with vulnerability management tool
  • InfoSec certification
  • PowerShell / Scripting
19

Cybersecurity Analyst Resume Examples & Samples

  • Identifying and documenting management, operational and technical deficiencies of IT systems, documentation and supporting processes against NIST standards
  • Reviewing evidence of remediation actions, and approving closure of POA&Ms when appropriate
  • Professionally interacting with customers
  • Bachelor’s degree and 2-4 years of professional IT experience with information systems. An additional 4 years of experience will be considered in lieu of degree
  • Knowledge of the NIST Risk Management Framework and NIST-based assessments
  • Ability to conduct research into security issues and products as required
  • Ability to effectively prioritize and execute tasks in a fast paced environment to keep on a schedule
  • Strong Microsoft Office skills to include (Word, Excel, and PowerPoint)
20

Cybersecurity Analyst Resume Examples & Samples

  • Manage IAM office user requests and tickets and provide guidance and recommendations that adhere to Army and DoD policyPerform IA assessments of organization and advise on best IT security practices
  • Make recommendations to IT teams on security best business practices
  • Evaluate new technologies and provide a technical recommendation for organization to meet mission critical research needs
  • Assist IA staff with ensuring that organization is meeting DoD 8570 requirements
  • Assist IA staff with Department of Certification and Accreditation (C&A) processes
  • Assist network vulnerability and analysis team
  • Work with developers to ensure the image is compliant with DoD and Army policy
  • Provide quality customer service
  • DoD Security clearanceDoD 8570 compliant by obtaining/maintaining required certifications such as Security+
  • Minimum of 2 years relevant IT experience
  • Excellent written and oral communication skills, and the ability to develop and execute detailed written plans for complex software and hardware implementations
  • Understanding of DoD and Army IA policies, guidance, and best practices
  • Working knowledge of IA tools for vulnerability management, host based security, network monitoring, etc
  • Competent understanding of network architecture
  • Working knowledge of Microsoft , Apple and UNIX operating systems
  • Ability to develop effective written procedures and SOPs to guide daily operations
  • Excellent written, verbal and problem solving skills
  • Skilled with Microsoft Office products for creating documents using Word, PowerPoint, and Excel
  • IASO/ISSO/IAM experience
  • Experience with incident reporting and trouble ticket management
  • Experience using DoD IA tools (e.g., Retina, Nessus, Host Based Security System (HBSS)
  • Experience with Army Portfolio Management System (APMS)
  • Experience with Vulnerability Management System (VMS), Army NETCROP, System Center Configuration Manager (SCCM)
  • Experience with IAVM Management
  • Experience with Database development
21

Cybersecurity Analyst Resume Examples & Samples

  • Bachelor’s degree or higher in Cybersecurity, Information Technology or related technical discipline with 2 years’ experience, or Master’s degree and 0 years of related experience, or 6 years of experience will satisfy degree and experience requirements
  • 1-2 years of experience in the examination of NIST 800-53, Security and Privacy controls for Federal Information Systems
  • 1-2 years of experience is the evaluation of evidence to determine if security controls are meeting organizational policies
  • Strong organizational skills and ability to stay focused while managing multiple tasks concurrently
  • Strong critical thinking/analytical skills, creativity, and a proven drive for quality
  • CompTIA Security+ Certification or other equivalent security certification
  • Must be a US Citizen or a Lawful Permanent Resident
  • Must be able to obtain a Public Trust Clearance
  • Experience in security penetration testing and vulnerability discovery and validation
  • ISC2 CISSP certification or ISACA CISA certification
  • Prior SSA experience is a plus
22

Cybersecurity Analyst Resume Examples & Samples

  • 1+ years of experience with Cybersecurity
  • Knowledge of FedRAMP
  • Knowledge of NIST Risk Management Framework (RMF), Cybersecurity policies, audits, risk assessments, security assessments, and assessment and authorizations, including NIST 800 special publications, such as 800-53 rev. 4
  • Experience with automated SA&A tools a plus, including Archer and CSAM
  • Security Certification preferred, including Security+
23

Cybersecurity Analyst Resume Examples & Samples

  • 4+ years of experience with MAGTF operations and staff planning
  • 3+ years of experience with IA
  • Experience with the Marine Corps Planning Process (MCPP) and Marine Corps campaign plans and their doctrinal publications
  • Experience with information systems common to client staff, including Microsoft applications, Marine Corps and DoD systems
  • DoD 8570.1M IAT Level II Certification, including GSEC, CompTIA Security+, orSCNP SSCP
24

Cybersecurity Analyst Resume Examples & Samples

  • Work with Navy program offices to apply IA and cybersecurity laws, policies, and directives to Navy programs and systems
  • Provide technical IA and Cybersecurity analysis support to the Program Office
  • Participate in the security design and review of Navy system architectures
  • Assess and recommend Cybersecurity controls for tactical systems that operate in unique environments
  • Evaluate next-generation technologies and architectural frameworks for implementation within high stress performance environments
  • Evaluate Engineering Change Proposals (ECPs) and similar artifacts for impacts to security postures
  • Must be comfortable working with the IA/Cybersecurity control sets delineated in NIST 800-53
  • Must have a working knowledge of DoD/DoN IA instructions and directives
  • Must be familiar with Navy combat, weapons and other C4I systems, architectures and security requirements
  • Must be a confident and articulate communicator and technical writer
  • Must be comfortable working with the IA/cybersecurity control sets delineated in NIST 800-53
  • Must have a working knowledge of DoD/DoN IA and cybersecurity instructions and directives
  • Must be familiar with Navy C4I systems, architectures and security requirements
  • Experience with COMSEC, TRANSEC and Key Management requirements is desirable
  • Bachelor's degree (B.A./B.S.) from four-year college or university in Computer Science, Cybersecurity, Information Systems Technologies, or related technology-focused discipline from an accredited college/university
  • Experience with the AN/SQQ-89 combat system
  • Information Assurance
25

Cybersecurity Analyst Resume Examples & Samples

  • Performs analysis to validate established security processes and recommend additional security steps to ensure compliance with applicable DOD IA requirements and baseline IA controls
  • Evaluate information systems for compliance with Defense Information Security Agency (DISA) Security Technical Implementation Guideline (STIG) and review measures needed to bring systems into compliance
  • Host Based Security System (HBSS) Administration
  • Risk Management Framework
26

Senior Cybersecurity Analyst Resume Examples & Samples

  • Serve as Vulnerability Management Analyst for applications and network components
  • Perform vulnerability scanning to discover and analyze vulnerabilities and characterize risks to networks, operating systems, applications, databases, and other information system components
  • Perform compliance scanning to analyze configurations and compare to established baselines, recommending remedial actions where necessary
  • Engage with stakeholders, to include IT professionals, management, to facilitate vulnerability discovery, remediation and tracking
  • Communicate security and compliance issues in an effective and appropriate manner
  • Validate remedial actions and ensure compliance with security policy and remediation targets
  • Perform vulnerability management system administration functions, as required
  • Perform risk assessments and make remediation recommendations to tech owners
  • Periodically review vulnerability exception requests to ensure compliance to the exception process
  • Maintain vulnerability tracker to record Identification, publication, remediation and closure of vulnerabilities
  • Ability to adapt and respond to environment and priorities; manage deadlines and projects
  • Ability to exercise sound technical, interpersonal and organizational judgment while evaluating and solving complex problems
  • Partner with system owners to identify upcoming end of life components, and plan track their decommissioning
  • At least 5years of experience in IT industry, preferably in a financial services organization
  • Minimum of 3 recent years direct experience with Patch & Vulnerability Management or other closely related processes
  • Background & experience of designing, defining and implementing Vulnerability Assessment tooling and services
  • Good working understanding and knowledge of Tenable Security Center, Rapid7, Qualys, or other related tools
  • Knowledge of python scripting is a plus
  • Interpersonal, collaboration, and negotiation skills
  • Good understanding of data analysis, business process analysis and reporting tools found within the Microsoft Office application suite
  • Excellent understanding of project management methodologies & internal processes
  • BS or BA degree, preferably in technology
27

Cybersecurity Analyst Resume Examples & Samples

  • Work with Legal and Compliance teams and perform electronic discovery and computer forensics to support investigations
  • Responsible for the identification, collection and preservation of digital evidence
  • Performs a variety of technical analysis and procedures dealing with the collection, processing, preservation, analysis, and presentation of computer-related evidence
  • Utilize forensic tools and investigative methods to find specific electronic data, including Internet use history, word processing documents, images and other files
  • Prepare reports and documents case details, development and outcome
  • Organize all relevant case information in an easy-to understand format
  • Keep abreast of current security threats, events, technologies, vendors and other aspects of the cyber threat landscape
  • Communicate and escalate incidents to management in accordance with the Incident Response Plan
  • Participates in projects in multiple areas and is able to provide technical expertise and guidance to information security issues
  • Provide support and assist the cyber incident response team during cybersecurity incidents
  • At least 3 years of experience in IT industry, preferably in a financial services organization
  • Experience in incident management and forensics is a plus
  • Hands-on experience with SIEM technologies (Splunk) and other forensics, evidence collection, and incident remediation tools
  • Experience with EnCase, FTK or Other computer forensic tools
  • Knowledge of regular expressions and common scripting languages (PERL, Python, VB Script)
  • Relevant certifications such as CCFE, CHFI, CEH, CISSP are a plus
28

Cybersecurity Analyst Co-op Resume Examples & Samples

  • Expose you to some of the most exciting and cutting edge techniques and technologies used to
  • High degree of ambiguity that requires ability to focus, distinguish and prioritize key issues
  • Cross functional and regionally distributed environment that requires good team player and
  • Large amount of information that requires ability to learn process and interpret technical
  • Active second year or above enrolment in to Computer Science or Political Studies programs
  • Ability to understand complex problems while formally presenting them simplistically
  • Strong understanding of theoretical computer science, or quantitative and/or qualitative
29

Cybersecurity Analyst Resume Examples & Samples

  • Candidate must possess a CompTIA Security+ with Continuing Education (CE) certification
  • Candidate must have experience supporting CND or related teams
  • Candidate must have strong communication skills (both written and verbal)
  • Candidate should have at least one other IA certification completed, i.e., SSCP, CSIH, GCIA, GCIH or CEH
  • Candidate should have UNIX Administrative skills
  • Candidate should have Command Line Scripting skills (PERL, python, shell scripting) to automate analysis task
  • Knowledge of hacker tactics, techniques, and procedures (TTP)
  • Be able to conduct malware analysis
  • Demonstrated hands on experience with various static and dynamic malware analysis tools
  • Knowledge of advanced threat actor tactics, techniques and procedures (TTP)
  • Understanding of software exploits
  • Ability to analyze packed and obfuscated code
  • Comprehensive understanding of common Windows APIs and ability to analyze shellcode
30

Senior Cybersecurity Analyst Resume Examples & Samples

  • Responsible for monitoring, analyzing and triaging adverse security events or security incidents escalated by a Security Information and Event Management (SIEM) service
  • Accountable for deciding if a particular security event or incident needs further investigation or can be resolved
  • Accountable for managing the case work related to security events and incidents to ensure timely mitigation and remediation efforts are completed
  • Lead and coordinate the incident response process and procedures including incident escalation, containment, remediation and notification
  • Lead and coordinate forensic investigations and support evidence collection and preservation procedures
  • Closely work with Managed Security Service Provider (MSSP) to identify and resolve security incidents
  • Assist with (or Lead) management of the overall MSSP relationship including reviewing MSSP response times, monitoring coverage and metrics. Continue to develop MSSP relationship and coordination
  • Work with CISO to review new threats in the environment, make determinations if current threat monitoring and responses need modification. Work with IT Operations to modify any tools, logs or notifications to support changes needed
  • Work with IT Development team on new technology initiatives. Ensure that solutions are architected with appropriate security requirements
  • Support CISO in efforts to educate the CFA Institute workforce on security threats
  • Bachelor’s degree in Information Security, Computer Science or directly related field
  • 2+ years of professional IT Security Incident Responder/Forensics experience
  • Experience in security aspects of multiple platforms, operating systems, software, communications, and network protocols
  • Must be highly skilled and proficient in problem solving, with an aptitude and willingness to learn new technologies
  • Experience supporting Network Investigations
  • Experience conducting forensic media analysis and log file analysis
  • Understanding TCP/IP communications & knowledge of how common protocols and applications work at the network level, including DNS, HTTP, and SMB
  • Must demonstrate outstanding stewardship and relationship building/communication skills to support the objectives of the Information Security Office
  • Global cultural orientation and working experience is preferred
  • Ability to multitask and handle multiple priorities
  • Excellent interpersonal skills including a professional and diplomatic demeanor
  • Excellent communication skills including written, verbal, listening, and presentation
  • Experience with host-centric tools for forensic collection and analysis (FTK, Helios, RegRipper, ProDiscover, SIFT, Encase, etc.)
  • Strong IT infrastructure background including familiarity with the following: Snort, Wireshark, NMap
  • Experience managing cases with enterprise SIEM and logging systems
  • Experience with host based detection and prevention suites (McAfee EPO, OSSEC, Yara, MIR, CarbonBlack, Tanium, etc.)
  • Experience in financial services industry helpful
  • Detailed understanding of APT, Cyber Crime and other associated tactics
  • System/Application vulnerabilities and exploitation
  • Some experience with malware analysis (dynamic and static)
  • One or more certifications including, CFCE, GCFE, OSCP, GCIA, CFE, or similar
31

Cybersecurity Analyst Resume Examples & Samples

  • Perform IA assessments of organization and advise on best IT security practices for an R&D environment
  • Process IAM policy exception requests, perform risk assessments and provide guidance and recommendations that adhere to Army and DoD policy
  • Evaluate emerging cybersecurity tools and technologies for organizational impact
  • Coordinate cybersecurity inspections such as: DAIG, CSA, and CCRI
  • Assist IA staff with the Certification and Accreditation (C&A) processes
  • Assist IA staff with software assurance and vulnerability management for the organization
  • Perform incident and spillage management
  • Ability to maintain active DoD clearance
  • Must be DoD 8570 compliant and maintain required certifications for an IAM II appointment
  • 5+ years in Information Assurance and/or system security and a Bachelor’s degree or equivalent in work experience
  • Skilled with Microsoft Office products such as Word, PowerPoint, and Excel
  • Customer friendly with excellent written, verbal and problem solving skills
  • Able to multi-task and work independently within a team environment
  • Experience leading meetings or training sessions
  • Strong ability to develop effective written procedures and SOPs to guide daily operations
  • The ability to develop and execute detailed plans for cybersecurity projects
  • Experience evaluating and managing vulnerabilities for a DoD network
  • Experience with Army and DoD C&A procedures
  • Experience with managing cybersecurity projects
  • Knowledge of Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs), Army Gold Master (AGM) and SCAP scans
32

Principal Cybersecurity Analyst Resume Examples & Samples

  • Bachelor's degree and nine (9) years or more of related experience
  • Experience with Cross Domain technologies
  • Experience with Cryptography
  • Experience with Public Key Infrastructure
  • Experience with Cyber Defense Techniques o Operational Readiness, Verification, and Validation Reviews
  • Masters and seven (7) years or more related experience; PhD or JD and four (4) years or more of related experience
  • Applies extensive technical expertise and has full knowledge of other related disciplines
  • Receives assignments in the form of objectives and establishes goals to meet objectives
  • Provides guidance to subordinates to achieve goals in accordance with established policies
  • Work is reviewed and measured based on meeting objectives and schedules
33

Senior Cybersecurity Analyst Resume Examples & Samples

  • BA/BS required: Master’s preferred. Focus areas include: Information Assurance, Cyber Security Science, Information Security
  • Between 7 - 10 years IA/Cyber Security experience developing and executing IA, CND, Cybersecurity policy and programs within DoD
  • Possess working knowledge of DoD policies, directives and instructions (i.e. 8500 series) and technical guidance
  • Host Security & Information Security Continuous Monitoring (ISCM), Risk Management Framework Implementation and Governance, DoD IA/CND Compliance Requirements, Federal Information Security Management Act (FISMA), Computer Network Defense Service Provider (CNDSP) Program, cyber security, knowledge of relevant DoD components, IA Portfolio and Governance Management, and Cloud Computing
  • CISSP, ITIL, PMP
34

Cybersecurity Analyst Resume Examples & Samples

  • Bachelor's degree and tw0 (2) years or more of related experience
  • DoD 8570/8140 IAT II Certification (Security+, GSEC, or SSCP)
  • Experience with Information Technology Virtualization
  • Experience with Public Key Infrastructure o Experience with Network and Host-Based Intrusion Detection and Prevention Systems
  • Experience with Cyber mission Computer Network Defense of space assets
  • Experience with Cyber Defense Techniques
  • Masters and three (3) years or more related experience; PhD or (0) years’ experience
  • Complete understanding and wide application of technical principles, theories, and concepts in the field
  • General knowledge of other related disciplines
  • Receives assignments in the form of objectives and establishes goals to meet outlined objectives
  • Provides direction to employees according to established policies and management guidance
  • Work is reviewed by management to measure whether objectives have been met
35

Senior Principal Cybersecurity Analyst Resume Examples & Samples

  • Bachelor's degree and fourteen (14) years or more of related experience
  • DoD 8570/8140 IAT III Certification (CISSP, GCIH, CISA, GCED or CISM)
  • Experience with Cloud IA Technologies
  • Experience with Network and Host-Based Intrusion Detection and Prevention Systems
  • Masters and twelve (12) years or more related experience; PhD or JD and four (4) years or more of related experience
  • Applies advanced technical principles, theories, and concepts
  • Contributes to development of new principles and concepts
  • Participates with senior managers to establish strategic plans and objectives
  • Recommends/makes decisions on administrative or project work matters and ensures effective achievement of program, project, or organizational objectives
36

Senior Cybersecurity Analyst Resume Examples & Samples

  • Bachelor’s degree and 8+ years of professional IT experience with information systems. An additional 6 years of experience will be considered in lieu of degree
  • US citizenship required. Must possess at least a Secret clearance with the ability to be granted a Top Secret clearance
  • Experienced with management, operational, and technical controls
  • Be capable of carrying out complex tasks to completion, with minimum supervision
  • Be capable of interpreting task requirements and selecting appropriate methodologies to complete task
  • Must be knowledgeable of or have experience conducting A&A following NIST guidance
  • Strong organizational, interpersonal and oral communication skills
  • Ability to effectively prioritize and execute tasks in a fast paced environment
  • Ability to work in a team-oriented, collaborative environment and remotely
  • Strong Microsoft Office 2010 skills to include (Word, Excel, Visio, and PowerPoint)
  • 5+ years of experience performing NIST-based Security Assessment and Authorization activities in direct support of Federal information systems
  • 3+ years of experience of successfully managing NIST-based Security Assessment and Authorization efforts in direct support of Federal information systems
  • 5+ years of experience providing direct support to Federal IT compliance initiatives including the preparation/development of annual FISMA reports, compiling responses to Federal information requests, and implementing provisions set forth by the OMB, DHS, and other Federal guidance entities
  • Relevant professional certifications from recognized industry consortiums including ISC2, ISACA, PMI, CompTIA, and GIAC specifically Security+, CISSP, PMP, CAP are strongly desired but not required
  • Flexibility and excellent interpersonal skills coupled with IT security background
37

Cybersecurity Analyst Resume Examples & Samples

  • Contribute to the development, coordination, and execution of the cybersecurity risk advisory service for medical devices including maintenance of processes
  • Contribute to the development of cybersecurity technical controls, analysis and design recommendations for various products and technologies
  • Assist in collection of medical device hardware and software bill of materials
  • Assist in customer outreach activities for cybersecurity medical devices
  • Assist in cybersecurity process and procedure documentation and maintenance of those artifacts
  • Strong written and oral communication skills. Excellent ion MS PowerPoint, Excel, and Word
  • Work cooperatively with technical personnel in other divisions and functions to accomplish enterprise wide goals
  • General understanding of the following: computer architecture, operating systems, embedded systems design, inter and inner process communications, networking protocols and their related implementations
  • General understanding of compiled and interpreted programs and the types of security issues possible in each; database systems, web servers, application servers, firewalls, routers, load balancers, switches, and different types of middleware
  • General understanding of the following technologies
  • Demonstrated problem solving, critical thinking and logical structuring skills
  • Self-starter with maturity to accept direction and work independently
  • Bachelor's degree in Computer Science or related field or equivalent experience required, including 7+ years in a technical environment, with experience as the senior technical resource
  • Multiple certifications preferred
38

Cybersecurity Analyst Resume Examples & Samples

  • Provide analysis of security events and investigate Cybersecurity threats to the environment
  • Identify and communicate threat intelligence to appropriate stakeholders
  • Create and maintain key Cybersecurity metrics
  • Participate as a member on the Incident Response Team (IRT); including forensic evidence gathering and analysis
  • Perform reviews of business application and infrastructure systems and projects to identify Cybersecurity risk
  • Acts as a technical and process SME for Cybersecurity operations. Including attestations, checks and functions
  • Participate in preparing for Information Security IT audits and exams
  • Assist with Cybersecurity reviews of application and infrastructure systems
  • Review and consult with IT on various technologies including network security, logs, routers, switches, hubs, corporate applications and general Cybersecurity related resources
  • Implement, maintain, and monitor network and security and performance
  • Perform periodic attestation, control, and performance procedures as deemed necessary
  • A thorough understanding of key networking protocols and computer operating Systems
  • Ability to provide analysis of IDS, server, firewall logs and other security controls
  • Ability to analyze business applications to determine and communicate risk to stakeholders in an understandable way in a consultative manner
  • Experience with the creation and maintaining of Cybersecurity related metrics
  • Knowledge and understanding of incident response and computer forensics
39

Senior Cybersecurity Analyst Resume Examples & Samples

  • Proven team player, will be working individually and with other staff members, on both long-term projects and rapid response under tight deadlines
  • Effective and excellent oral and written communication, analytical, judgment and consultation skills
  • Ability to effectively communicate in both formal and informal review settings with all levels of management
  • Proven experience in developing and providing threat and situational intelligence from a variety of internal and external sources
  • Ability to work with local and remote IT staff/management, vendors and consultants
  • Bachelor’s degree in Computer Science, Engineering, or other related field
  • Minimum seven years of information security experience, preferably in the financial services industry
  • Minimum three years hands-on security operations experience including interdisciplinary experience with four or more of the following: Cyber Threat Analysis, Digital Computer Forensics, Incident Response, Application Security, Operating Systems Security, Cryptographic Controls, Networking, Programming languages
  • Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies and motives
  • Familiarity with computer network exploitation and network attack methodologies while maintaining an understanding of the relationship these activities have with the financial services industry and critical infrastructure
  • Industry knowledge of leading-edge security technologies and methods
  • Shift work and working in an on-call response capacity is required including availability for 24 x 7 on-call support responsibilities
  • Previous people/project management experience is a plus
  • Government Security Clearance is a plus
40

Senior Cybersecurity Analyst Resume Examples & Samples

  • Leading efforts to build a robust, sustainable Risk and Security Metrics and Reporting Program including identification of key measurement criteria, analysis of source data, definition of processes to produce metrics, analysis of trends and identification of key drivers
  • Telling the risk and security story through a series of easy to understand and visually compelling infographics that build progressively as the program matures
  • Partnering with risk and security subject matter experts to understand data and then define metrics and reports for information security functions such crown jewels data protection, vulnerability management, endpoint protection, content filtering and threat monitoring; work with team members to create repeatable data collection processes to ensure metrics and reports have a consistent data quality
  • Defining and delivering consistent reporting for risk and security projects and controls
  • Analyzing data to discern lessons learned and action items in order to improve security controls and risk posture; partner with the appropriate teams to help them understand the how the data can drive improvements
  • Driving the metrics program to higher levels of maturity with a particular focus on automation of data collection and dashboard creation
  • Develop a dashboard and metrics roadmap and scorecard
  • Maintain a catalog of security data, reports and dashboards that can be tailored for audience (technical / business, executive / operational) and frequency in order to support scheduled and ad-hoc requests
  • 5 – 8 years or more of continuous improvement experience, primarily in a program reporting and metrics based role, preferably in the financial sector and/or supporting IT Risk or Information Security initiatives
  • Expert level PowerPoint and Excel skills
  • Experience with the tableau visualization tool and the ability to understand SQL relational data-structures is preferable
  • Strong experience with data visualization concepts and tools
  • Ability to analyze data using Excel including use of complex Excel macros / scripts for reporting and data mining purposes from sources such as SQL databases, SharePoint and other enterprise data repositories is essential; some development experience with data extraction is preferable
  • Experience with ServiceNow and Splunk is preferable
  • Ability to work individually, as part of a team and matrix-manage other staff depending on the initiative
  • Significant, proven experience defining key measurements that will drive visibility, accountability, quality and overall IT effectiveness
41

Cybersecurity Analyst Resume Examples & Samples

  • Documenting and effectively publishing technology guidance and repeatable processes
  • Mentoringpeers in groups and individually
  • Improvingprocesses and introducing superior technology
  • Experience supporting an advanced software development organization
42

Senior Cybersecurity Analyst Resume Examples & Samples

  • Candidate will utilize various tools to analyze network flow, PCAP, malware samples, and other anomalies to draft detailed technical reports in support of the DISA GSM-O net assurance and defensive capabilities
  • Will have a working knowledge of TCP\IP, ports and protocols, and the ability to articulate analytical findings and defensive measures in a cohesive report
  • Train and interact daily with CSO personnel and will leverage tools and accesses provided by CSO
  • Regularly travel to Ft Meade, MD to interface with GSM-O personnel
  • Possess a DoD-8570 IAT Level 2 baseline (CompTIA Security+ CE, CISSP, or equivalent)
  • Have the ability to articulate analytical findings and technical analysis with DoD\Government Leadership at all levels
  • Demonstrate a strong understanding of TCP/IP, DNS, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common cybersecurity elements
  • Possess experience with Linux Command Line, Python and\or BASH scripting
  • Demonstrate experience with malicious activity, as well as adversary tactics, techniques, and procedures
  • Have experience working with DoD/Government Leaders at all levels
  • Obtain a Certified Ethical Hacker certification within 120 days of hire
  • Be willing to travel 20% of the time
  • Possesses experience analyzing network flow
  • Experience with NetWitness, Wireshark, SQL, IDA Pro, and a SIEM
  • Experience writingeading\maintaining SNORT signatures
  • Candidate possesses Cyber Intelligence experience
43

Senior Cybersecurity Analyst Resume Examples & Samples

  • Provide critical leadership and support for a standards organization (SO) supporting cybersecurity Information Sharing and Analysis Organizations (ISAO). ISAOs are intended to enable and facilitate private companies, nonprofit organizations and federal agencies to share information related to cybersecurity threats and incidents on a voluntary basis, and to collaborate to respond in as close to real time as possible
  • Responsible for outreach aimed at engaging relevant stakeholders to broaden participation in the development of cybersecurity consensus standards and guidelines that address ISAO capabilities, business processes, training and exercises, and automated exchange of cybersecurity threat data
  • Reach out to existing Information Sharing and Analysis Centers, government organizations, private firms, and other relevant organizations and individuals to staff committees, and to obtain input and comment on proposed standards and guidelines
  • Coordinate a series of public and private meetings to provide open and transparent dialogue regarding relevant standards and guidelines, as well as engagements through conferences and publications to promote the adoption of standards and guidelines once published
  • Certification such as Certified Information Systems Manager (CISM), Certified Ethical Hacker (CEH), Certified in Risk and Information Systems Control (CRISC), Certified Protection Professional (CPP), Program Management Professional (PMP) or other related certification
44

Cybersecurity Analyst Resume Examples & Samples

  • Must have High School diploma (or equivalent) and 2+ years related experience in Information Systems, Computer Science or a related field. (Additional experience, education or training may be considered in lieu of degree.)
  • Strong experience with Information Security, supporting processes and procedures
  • Candidates must have an active Secret clearance as well as the ability to obtain a Top Secret clearance
  • Ability to obtain a Security+ certification within 6 months of hire
  • Highly desired are security certifications including a S+
  • Additional desired certifications include CCNA, CCSP, MCSE, and/or SANS GIAC
  • Experience with Windows and Linux Administration
45

Cybersecurity Analyst, Junior Resume Examples & Samples

  • 1 year of experience with IT operations
  • Experience with supporting a help desk
  • Knowledge of systems accreditation and management
46

Cybersecurity Analyst Resume Examples & Samples

  • 8 years of experience with general IT
  • 4 years of experience with Public Key Infrastructure (PKI)
  • 3 years of experience with IA
  • Experience with a DoD agency
  • Experience with DoD preferred
  • CISSP Certification preferred
47

IA / Cybersecurity Analyst Resume Examples & Samples

  • 5+ years of experience with IT networking
  • 3+ years of experience in a DoD network environment
  • 3+ years of experience with system and network vulnerability analysis, risk assessment and risk mitigation analysis, security test and evaluation (ST&E), contingency planning, firewall policy, ports, and protocols
  • 2+ years of experience with the Assured Compliance Assessment Solution (ACAS)
  • Knowledge of IA or INFOSEC concepts and requirements
  • Knowledge of the DoD C&A process and standards
  • Knowledge of vulnerability remediation asset manager (VRAM) activities
  • BA or BS degree in IT or IA
  • IAT Level II Certification, including Security+ and ACAS and Windows 10 training
  • Experience with the mission critical procedures, systems, and processes for public naval shipyards’ IT and Cybersecurity requirements
  • Ability to obtain a Cybersecurity Workforce (CSWF) Certification
48

Cybersecurity Analyst Resume Examples & Samples

  • Implementation of DoD and Air Force Certification and Accreditation processes using DIACAP/ICD-503/Risk Management Framework (RMF)
  • Incorporation of Anti-Tamper and Supply Chain Risk Management (SCRM) during early stages of acquisition
  • Information Assurance (IA) Risk Assessment/Management, Plan of Action and Milestone (POA&M) Development
  • Incorporating Cyber security Strategy at various acquisition milestones
  • Conduct vulnerability scanning, risk assessments, and create required lifecycle artifacts supporting Certification and Accreditation (C&A) for multiple organizations from any point in the system lifecycle
  • Create Information Assurance strategies aligning security with DoD 5000.02 acquisition lifecycle and process
  • Contribution to the delivery of the assigned projects to cost, schedule and quality of the company commitments. Define and defend the estimates / commitments to the customer and other review boards as it relates to cyber security in Rolls-Royce products
  • Prepare for and present at technical gates and external reviews including Product Introduction Lifecycle Management technical reviews, regulatory or customer meetings and Company Safety Boards
  • Actively ensure areas in need of improvement are identified and to work with the process owners to support the subsequent improvement activities where appropriate
  • Lead the process for capturing and developing requirements and evidence to demonstrate compliance
  • Negotiate and track requirements changes, ensuring these changes are managed through the defined processes to ensure plans and budgets are communicated and on plan
  • An experienced understanding of the industry requirements for cyber security based on the applicable domain, especially as related to embedded engine control systems
  • A proven history of the ability to develop capability in cyber security, including expertise in people, processes and tools and the ability to work globally
  • Experience in Cryptography, encryption, layered protection systems
  • Experience in vulnerability assessment and threat analysis
  • Experience with embedded systems, especially around avionics systems
49

Senior Cybersecurity Analyst / Engineer Resume Examples & Samples

  • Act as primary liaison with SPAWAR and DHA senior leadership in all RMF A&A matters
  • Analyze requirements regarding applicable cybersecurity disciplines
  • Evaluate cybersecurity policy and provide recommendations to leadership
  • Lead independent and objective evaluations and audits of the cybersecurity policy implementation
  • Review controls over data integrity, identify risks, evaluate safeguards, ascertain compliance with cybersecurity policies, evaluate efficiency and cost effectiveness of the program, recommend corrective actions, monitor implementation of approved recommendations
  • Assess policy, program, and project feasibility
  • Formulate short-and-long term goals and objectives and integrate them into a strategic plan
  • Structure and organize work and set priorities
  • Anticipate, identify, diagnose, and consult on potential or actual problem areas relating to program implementation and goal achievement
  • Establish procedures and processes to monitor progress toward organizational objectives
  • Perform other related duties as required
  • BA/BS in Information Systems Management, Computer Science or related discipline with minimum of 8 years’ experience. In lieu of formal education, at least 16 years of related experience. Specific contract requirements regarding education and experience will prevail
  • Travel: 25%
  • Certified Information Systems Security Professional (CISSP) and Certified Authorization Professional (CAP) certifications desired
50

Cybersecurity Analyst, Junior Resume Examples & Samples

  • 3 years of experience with Microsoft Office, including Word, Excel, and Visio
  • 1+ years of experience with securing DoD or IT systems
  • 1+ years of experience with applying DoD Security Technical Implementation Guides (STIGs) and recommendations
51

Cybersecurity Analyst Resume Examples & Samples

  • Ensures compliance with all bank policies and procedures as well as state, federal, and regulatory requirements
  • Monitor all in-place security solutions for efficient and appropriate operations
  • Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and devise plans for appropriate resolution
  • Participate in investigations into problematic activity
  • Serves as a first responder and assists with initial investigations for potential security events
  • Serve as the operational focal point for third-party security vendors in regards to analyzing security logs
  • Work with other bank personnel in an advisory and support role for matters related to Information Security
  • Researches, evaluates, and stays current on emerging tools, techniques, and technologies
  • Participate in multiple Information Security projects or department initiatives simultaneously
  • Assists in the development and implementation of internal Security projects
52

Senior Cybersecurity Analyst / Engineer Resume Examples & Samples

  • BA/BS in Information Systems Management, Computer Science or related discipline plus 12years of experience. In lieu of formal education, at least 20 years of related experience. Specific contract requirements regarding education and experience will prevail
  • Excellent customer service and organization skills
  • OS Certification/Approved Training must be completed within 180 days of hire
53

Cybersecurity Analyst Resume Examples & Samples

  • Experience with Navy RMF A&A process
  • Knowledge of Windows operating system
  • Security+ CE Certification
  • Experience with ACAS vulnerability scanner, eMASS, and STIGs
  • Enrolled in Cybersecurity Workforce (CSWF)
  • Qualified as an Information System Security Engineering (ISSE) or Information Systems Security Operations (ISSO) Officer
  • Certified as a Fully Qualified Navy Validator (FQNV) or Navy Qualified Validator (NQV)
  • Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), CompTIA Advanced Security Practitioner (CASP), and Certified Authorization Professional (CAP) Certifications
54

Senior Cybersecurity Analyst Resume Examples & Samples

  • Work as part of the Cybersecurity Analytics program, mapping threat types to detection strategies, and working with other Cybersecurity teams such as architecture, and Incident Response
  • Keep current on external and internal threat behaviors. Translate these behaviors into Splunk search language queries in the SIEM platform
  • Communicate and escalate detected incidents to the cybersecurity Incident Response team
  • Automate detection and response technologies to improve the overall efficiency of the team
  • Construct advanced reports, dashboards and alerts using Splunk and operationalize these capabilities with documentation in the form of standard operating procedures
  • Assist other technical teams in resolution of security incidents and outages related to information security controls, including coordinating of information security resources and root cause analysis
  • Detect and investigate policy violations, correcting or working with Compliance for further investigation as appropriate. Ability to exercise sound technical, interpersonal and organizational judgment while evaluating and solving complex problems
  • At least 5 years of experience in IT industry, preferably in a financial services organization
  • Minimum of 3 recent years direct security analytics or big data analysis
  • Expert knowledge of regular expressions and at least one common scripting language (PERL, Python, VB Script)
  • Demonstrated advanced knowledge of the Splunk search language, search techniques, alerts, dashboard and report building
  • BS or BA degree, preferably in Computer Science, other sciences, or Mathematics
  • Relevant certifications such as CISSP are a plus
  • Proficiency in a second language is a plus, especially Mandarin, Korean, Japanese or Russian
55

Cybersecurity Analyst Resume Examples & Samples

  • Identify security issues and/or vulnerabilities
  • Perform ongoing assessment of team and program activities to identify opportunities for improvement
  • Ensure compliance to audit, regulatory and legal requirements
  • Build and maintain effective relationships with peers and internal business partners
  • Recommend appropriate and effective controls to address security concerns
  • Maintain knowledge of security threat and industry trends
  • Utilize Cybersecurity solutions, analyze events to mitigate risk and achieve remediation
  • Support cyber projects and contribute to delivering key milestones
  • Deliver metrics and performance reporting
  • Analyze data collected from a variety of cyber defense tools and data analytics solutions for the purposes of mitigating threats
  • Analyze vulnerabilities and investigate security incidents to derive useful information in support of system/network vulnerability mitigation
  • Contribute to actionable intelligence in the form of reports, notifications, alerts, and briefings
  • Support mitigation and countermeasure strategies from collected threat intelligence
  • Recognize security violations and take appropriate action to report each incident, as required
  • Promote a risk-aware culture, ensure efficient and effective risk and compliance management practices by adhering to required standards and processes
56

Senior Cybersecurity Analyst Resume Examples & Samples

  • Utilize Splunk and Tripwire to analyze and interpret data and make recommendations to the customer based on analysis
  • User Support / Problem resolution
  • Bachelor’s degree and a minimum of 9 years’ of directly relevant experience
  • Minimum of 1 year of Splunk experience in an enterprise environment or certified as a Splunk Power User
  • Experience utilizing Tripwire in a large enterprise environment
  • Experience conducting technical analysis to identify and remediate risks in a large enterprise
  • Expertise dealing with management of large (>1000 systems) environments
  • Expertise with Oracle CRS (installation/configuration/maintenance)
  • Expertise with SMT and custom patch solutions for SuSE and Red Hat systems
  • Ability to take customer requirements and create scalable configuration models to support them
  • Ability to troubleshoot problems from the Application tier, through the OS and Network tiers
  • Perl Scripting
  • Must be able to obtain a Position of Public Trust Designation - US Citizen or Green Card Holder
  • Must not have traveled outside of US for more than 6 months total in last 5 years
  • Position is based in Eagan, MN and does not offer relocation assistance
  • Experience with AWS
  • Excellent communication skills (both oral and written)
57

Senior Cybersecurity Analyst Resume Examples & Samples

  • Bachelor’s degree in Computer Engineering, Computer Science or related field or equivalent work experience, required
  • 5 years’ experience in Information Technology Security & Network, or related are, required
  • One or more of the following certifications required: GCIH, OSCP, CISSP, or CEH
  • Advanced knowledge of Compliance Frameworks: PCI-DSS, ISO 27001/27002, NIST CSF
  • Advanced knowledge of Programming Languages: Java, C/C++, Python, Perl, Verilog, VHDL, PHP, Assembly
  • Advanced knowledge of Operating Systems: Linux, Solaris, OS X, Windows XP, Windows 7/8/10, Windows Server 2003/ 2008/2012
  • Advanced knowledge of malware analysis
  • Advanced knowledge of Point of Sale systems payment technologies such as P2PE and Tokenization
  • Advanced knowledge of internal and external penetration testing
  • Advanced knowledge of application code and platform configuration reviews
  • Advanced knowledge of VoIP security assessments, social engineering, and wireless security testing
  • Advanced knowledge of global penetration testing designed to meet PCI requirements
  • Advanced knowledge of planning and implementing risk management programs
  • Advanced knowledge of cyber-crime remediation
  • Advanced knowledge of incident response handling, social engineering, and forensic analysis
  • Working knowledge of Continuous Improvement
  • Work professionally with customers and co-workers to efficiently serve our customers, treating both with enthusiasm and respect
58

Cybersecurity Analyst Resume Examples & Samples

  • Bachelors degree in Cyber, Computer Science or related Engineering field with 5 years of experience or 3 years with a Masters degree or 9 years in lieu of a degree
  • The position requires security engineering skills with a working knowledge of Information Assurance (IA) technology, NIST standards, DoDI 8500.2 and SP 800-53
  • Must have familiarity in the Cybersecurity Lifecycle to include: generating IA requirements, creating IA architecture design, configuring IA audit tools, conducting IA verification and performing IA compliance as well as Python or scripting knowledge
  • DoDI 8570 certification (GSEC, Security+, SCNP, SSCP) or higher
  • Desired experience with Windows and Linux servers with GPOs, IAVMs and STIGs
  • Desired recent experience creating and updating Python scripts
  • Experience with Clearquest and Clearcase are desired.Basic
59

Senior Cybersecurity Analyst Resume Examples & Samples

  • Cooperate with internal and external stakeholders to support global cybersecurity incident response process
  • Participate in security investigation activities
  • Propose and implement improvements to the landscape of technical security safeguards, including technologies, systems and associated processes and procedures
  • Contribute to development and documentation of operational procedures and metrics in relation to activities carried out by the team
  • Utilize information security technical safeguards and associated procedures, analysing output and producing relevant management information reports for further improvements in the security safeguards landscape, including vulnerability assessment and threat intelligence
  • Contribute to effectiveness of the Cybersecurity Operations team by providing expert analysis and input to incident identification, response, resolution, and post-incident investigations
  • Operate information security system components including intrusion prevention, vulnerability management, access control, event monitoring and others
  • Experience in Cybersecurity, Information Security, Risk Management, IT Controls, Security Operations or other related area is mandatory
  • Experience in information technology related positions with working knowledge of IT infrastructure, networks, databases, processing systems, web applications, mobile technology, cloud, big data and virtualization
  • Working knowledge of Cybersecurity principles, algorithms, protocols and technologies supporting encryption, authentication, access control, information systems attack patterns, intrusion detection, and network security
  • Working knowledge of IT governance frameworks and standards such as CobiT, ITIL, ISO27001
  • Experience in working with automated network and application security vulnerability scanners
  • Commitment in delivering significant value to organization as a trusted advisor
  • Excellent communication skills, including ability to communicate across countries and cultures
  • Excellent team player and collaborator
  • Ability to work under own initiative, and enthusiasm to drive through change and multi task
  • Ability to exercise high level of confidentiality when dealing with highly sensitive information
  • Experience of estimating and planning work effort including managing risks and issues in relation to delivery of work
  • Commitment to ongoing professional development
  • Bachelor degree in computer science, computer engineering, or information technology
  • Minimum 4 years of related work experience
  • At least one of the following certificates: CISSP, CEH or GIAC
  • An ITIL or project management certificates are not required but beneficial
60

Cybersecurity Analyst Resume Examples & Samples

  • Conduct IT Security and friendly hacking activities on Siemens systems, products and services
  • Ensure a baseline understanding of the IT landscape in scope and support in the design of cyberattack scenarios to jeopardize state-of-the-art technologies and prove if they are vulnerable
  • Develop automation scripts and tools to support our friendly hacking activities
  • Conduct research on latest developments in IT security technologies and threats
  • Create top-quality documentation on the performed tests and activities and discuss the observations with the auditees
  • Provide timely status updates to the engagement manager
  • Strong academic history (degree in IT, Computer Science, Engineering or other related fields)
  • First experience (up to 4 years) either academic, professional or personal in cybersecurity areas including pen-testing, vulnerability scanning and/or reverse engineering at software and/or hardware levels
  • Good scripting and programming skills (python and/or PowerShell preferred)
  • Ideally first experience on secure configuration and administration of the different layers of an IT infrastructure stack (applications, operating systems, database, networks, etc.)
  • Should be able to work independently and structure the work to meet internal deadlines
  • Fluent in English and willingness to travel 70% - 80% of your time globally
  • Motivated, creative, proactive, innovative, communicative, with solid analytical skills
61

Cybersecurity Analyst, Junior Resume Examples & Samples

  • 1+ years of experience with Cybersecurity, information security, risk management framework, or the application of Cybersecurity to equivalent technology areas
  • Ability to analyze systems and networks for a clear written determination of compliance, residual risk, and potential vulnerability mitigation strategies
  • IAM or IAT II Certification
62

Cybersecurity Analyst Intern Resume Examples & Samples

  • Analysis of static and dynamic application security testing reports
  • Creation of application security dashboards in Splunk
  • Creation of application penetration testing tool automation scripts
  • Maintenance of security backlogs in Jira and Confluence Wiki
63

Cybersecurity Analyst Resume Examples & Samples

  • Implement security requirements based on laws, regulations or Presidential directives in compliance with FISMA and DHS Cyber-security initiatives
  • Integrate security design principles across disciplines and SELC process
  • Review proposed new systems, networks, software for potential security risks
  • Review security related product selection and implementation activities
  • Participate and provide security support in Vendors Source Selection process
  • Define the scope and level of detail for security plans applicable to the system
  • Identify need for changes based on new security technology and evolving threats
  • Analyze change requests to the system for security posture impact/updates
  • Review security incident response policy, manage security incident procedures
  • Execute duties described in DHS ISSO and DHS Security Authorization Guide
  • Manage and maintain system authorization status or Authority to Operate (ATO)
  • Perform Certification and Accreditation (C&A) to existing and new systems
  • Responsible for oversight and coordination of C&A activities of each system
  • Apply CBP Security Certification and Accreditation Process to assigned systems
  • Generate Security Artifacts templates for C&A artifacts requirement
  • Review and recommend approval on systems FIPS 199 and E-Authentication
  • Prepare and provide DHS formatted System Security Plan
  • Prepare System Owner and Information System Security Officer letters
  • Coordinate Security Test and Evaluation events between involved stakeholders
  • Participate Security Test and Evaluation process and Review ST&E report
  • Perform Vulnerability Assessment review and generate reports for System Owner and stakeholders
  • Bachelor degree and at least 3 years of progressive technical (hands-on) experience related to Information Assurance, Cyber Security, Systems Engineering requirements, assessments, development, and implementation
  • Industry knowledge and experience with information security toolsets including anti-virus, assessment, scanning tools
  • Knowledgeable of NIST Special Publications related to the computer security community
  • Knowledgeable with DHS IACS compliance tools, controls and processes
  • Experience conducting cybersecurity audits to ensure appropriate implementation and security compliance
  • Performing and providing vulnerability assessment results and recommendations
  • Assessing known systems vulnerabilities and verifying system hardening and patching activities to ensure compliance with applicable Security Requirements and related checklists
  • Working knowledge of cyber security toolsets
  • Experience with network and system security administration, including operating system security configuration and account management best practices for Operating Systems
  • Understanding of Systems Engineering requirements, specifications, and demonstrated experience implementing DoD and/or Federal IA Certification and Accreditation Processes, assessing and validating compliance with IA controls and developing and maintaining associated certification and accreditation documentation
  • Have detailed knowledge of the latest versions of NIST Special Publications (SP) 800-18, 800-30, 800-37, 800-39, 800-53, 800-53A, 800-60, etc
  • Have experience with identification, documentation, and testing of security controls for information technology systems in accordance with the above NIST guidance
  • Have experience with identification of security risks (threat/likelihood/impact) to the system, networks, and organization and documenting risks for management review
  • Have experience with technical vulnerability scanning and secure configuration assessments, and documenting analysis of results
  • Ability to interface with customers of various levels, to include but not be limited to Authorizing Officials, Information System Owners, Independent Security Assessment Team and Technical system personnel
  • Have experience with analyzing vulnerabilities and providing guidance on secure IT implementation of various operating systems (e.g. Windows, Unix, Linux, and Mac)
  • Have experience with analyzing vulnerabilities and providing guidance on secure IT implementation of various applications (e.g. Oracle, SQL Server, Apache, IIS)
  • Have experience with analyzing vulnerabilities and providing guidance on secure IT implementation of network devices (e.g. switches, routers, firewalls)
  • Have experience with analyzing vulnerabilities and providing guidance on secure architecture design of various applications (e.g. internal-only, publicly available)
  • Have experience serving as an ISSO with a federal government system, a DHS system is a plus
  • Ability to interface with other systems’ ISSOs and provide support on multiple systems and security related issues
  • Bachelor's degree in systems engineering, computer science, management information systems, or related field preferred
  • Seven or more years of experience in systems engineering, software engineering, operating systems programming or naval architecture
  • Experience working with one or more structured programming languages
  • Strong communication skills to communicate systems proposals to management and customers and provide systems diagnoses and resolution for current systems
  • Strong organization skills to prioritize work, balance and lead complex projects
  • Good interpersonal skills to interact with customers, senior level personnel, subordinates, and team members
  • Ability to integrate complex hardware and software systems
64

Senior Cybersecurity Analyst Resume Examples & Samples

  • Provides subject matter expertise in integrating or “on-boarding” applications using disparate authentication and/or authorization services (i.e., Windows Active Directory, LCAP/Top Secret, internal DB, etc.) into the ICAM infrastructure to include the integration points with PIV
  • Maintain a work collaboration site or sites in which on-boarding documentation shall be obtained
  • Work with application owners for completion of the ICAM application integration forms
  • Provide ongoing development support for new policy creation, identity management workflow creation, and other COTs Software configuration related to new customer requirements
  • Review and maintain process and procedures, and implement efficiency improvements to include automation of manual activities wherever possible
  • Provide validation testing and implementation support to include; evaluating the synchronization options between Active Directory and IDMS; and verification of mapping scripts and synchronization operations functions with the DHS domain
  • Automate the process for populating IDMS with Email Addresses
  • Develop and maintain the Encryption Data Key for Revoked PIV Card Certificates
  • Bachelor’s degree in Computer Science or an equivalent field
  • Minimum 9+ years Cybersecurity experience
  • Oracle Identity Management
  • ICAM systems
  • Experience with Multi-disciplinary Enterprise environments
  • Technically proficient with IT tools, data formats, and effective IT management disciplines
  • Vulnerability Scanning, and Plan of Actions and Milestones
  • Active Directory Authentication, Enterprise Single Sign-on, Public Key Infrastructure (PKI), SAML, SSH, Radius, LDAP, Oracle DB, SQL
  • Encryption Data Recovery and PIV Card Certificates
  • Windows and Linux systems
  • Identity Management in the Enterprise and evolving standards
  • Support the development of new processes and tools in support of this task
  • Ability to manage a geographically distributed team of security engineers
65

Cybersecurity Analyst Resume Examples & Samples

  • Experience with Cybersecurity engineering, including security protocols, penetration testing, or enterprise-level applications design
  • Knowledge of Cybersecurity standards applicable to IT life cycle
  • Experience with infrastructure and IT operations security
  • Certifications in CompTIA Security+ a plus
66

Cybersecurity Analyst Resume Examples & Samples

  • 3+ years of experience with assessing NIST 800-53 Rev 4 controls using standard templates and procedures
  • Knowledge of technical and security document review and analysis
  • Ability to interview technical staff, including system, network, database, or security administrators
  • Ability to conduct vulnerability scans or analyze the scan results to identify vulnerabilities and risks
  • Ability to write security assessment and vulnerability reports
  • Public Trust or Secret clearance
  • CISSP, Security+, or other federally-recognized Security Certification
67

Cybersecurity Analyst Resume Examples & Samples

  • Track and analyze Information Assurance Vulnerability Management (IAVM) reports
  • Identify, download, analyze, test, and implement Information Assurance Vulnerability Alerts (IAVAs) and Security Technical Implementation Guides (STIGs) for system components and capabilities
  • Support operation and maintenance of the Development Software Support Environment (DSSE)
  • Support and maintain the Certification and Accreditation (C&A) requirements
  • Support the Risk Management Framework (RMF) process for cybersecurity using applicable tools
  • Update and maintain the Plan of Actions and Milestones (POA&M) and other required security documentation
  • Bachelor’s degree in Computer Science, Engineering or Technical discipline with concentration in Information Security or Cyber Security
  • 5 years of professional IA experience
  • IA Technical and Computing Environment (CE) certifications; IA trained and certified per the Defense Federal Acquisition Regulation Supplement (DFARS) 252.239-7001, Information Assurance Contractor Training and Certification; IAW DoD 8570.1-M, Information Assurance Workforce Improvement Program, Change 2 and Army Regulation (AR) 25-2, Information Assurance
  • Qualified to perform in Information Assurance Technical Level II or Computer Network Defense - Auditor (CND-AU) positions in accordance with standards in DoD 8570.01-M and the Army Information Assurance (IA) Training and Certification Best Business Practice, corrected 6 Aug 2010
  • Experience can substitute for the degree provided the person has BOTH the relevant experience AND is fully IA certified in accordance with AR 25-2, Information Assurance, and the associated best business practice for IA Training and certification (IA Training BBP)
  • Advanced Degree with concentration in Information Security or Cyber Security is desirable
  • Experience with the Force XXI Battle Command, Brigade and Below (FBCB2)/Joint Capability Release (JCR) is preferred
  • Willing to travel up to 10% CONUS to support operational requirements
68

Cybersecurity Analyst Resume Examples & Samples

  • 5+ years of experience with secure software development, application of STIGs to software, and software development methodologies
  • 1+ years of experience with Java or J2EE development
  • Experience with fortify security scan software
  • Experience with the DoD Application STIG
  • 8570 Certification preferred
69

Cybersecurity Analyst Resume Examples & Samples

  • Audit Methodologies - The ability to inspect and evaluate an assertion of fact using a mixture of qualitative and quantitative analysis techniques. The ability to apply such techniques using appropriate judgment to produce accurate and consistent conclusions regardless of the nature of assertions being evaluated
  • Investigation - Able to lead a systematic and thorough process to learn the facts about something complex or hidden
  • Respond to computer security incidents according to the Information Security Policies and Industry Best Practices
  • Coordinate efforts of and provide timely updates to multiple business units during response. Additionally, the candidate will provide recommendations to the units as required
  • Contributes to a team of cyber security professionals working with threat data, writing reports, briefing event details to leadership, and coordinating remediation with personnel
  • Analyze potential impact of new threats and exploits and communicate risks to Engineering
  • Monitor information security related web sites (SANS Internet Storm Center, etc.) and mailing lists (BugTraq, etc.) to stay up to date on current attacks and trends
  • Ensures technology employed by the Intrusion Analyst team compliments operational processes
  • Perform basic analysis in support of Intrusion detection operations
70

Cybersecurity Analyst Resume Examples & Samples

  • Unix / Linux System Administration
  • Installation/Configuration/Maintenance of Oracle CRS
  • Contributor to Incident, Problem and Change Management processes
  • Bachelor’s degree and a minimum of 5 years’ of directly relevant experience or additional 4 years of work experience can be substituted in lieu of a degree
  • Deep experience with Linux/Unix and computer security
  • Expertise with Linux (SuSE and Red Hat)
  • Expertise with configuration management of large environments, utilizing Chef, Puppet, Ansible or other configuration management frameworks
  • Experience in analyzing complex data, identifying trends, and making recommendations based on data
  • Experience with Cassandra
  • Expertise with custom AutoYaST and Kickstart deployments
  • Senior in Linux OS Administration
  • Unix Shell Scripting
  • Must have resided in the US for the past 5 years
  • Splunk expert
  • Computer security certifications (security+, CEH, CISSP, etc)
  • SOX/PCI Compliance Management
  • Senior status for the following products: Solaris 8, 9, 10; RedHat; Linux (SUSE); Veritas VxVM, VxFS, VCS
  • Experience with Kafka
  • Splunk Certified Power User
  • Patch Deployment
  • Local to the Eagan, MN area
71

Cybersecurity Analyst / Engineer Resume Examples & Samples

  • Minimum 2 to 10 years of related experience
  • Currently active Security+ and/or CISSP. Must be enrolled in Continuing Education (CE) courses
  • CEH, CND, CCNA, MCSE, and/or MCITP certification
  • Familiarity installing, patching, configuring and troubleshooting Windows servers and workstations including associated peripherals, resolving hardware & software conflicts and perform server maintenance and break/fix activities
  • Familiarity operating within a virtualized environment such as VMWare, Windows Server 2003/2008R2, file/system storage administration, Symantec Netbackup, SCCM
  • Experience managing HBSS and Windows servers/systems in a large enterprise, with a working knowledge of Microsoft Active Directory
72

Cybersecurity Analyst Luxembourg Resume Examples & Samples

  • Analyse the current state of the cyber security platforms at the client
  • Research technology trends, products, and offerings, and deliver comparative analysis on the benefits of the technology solutions considered
  • Assist in determining the best fit for purpose product for the client’s needs
  • Design and deploy cyber security platforms
  • Working knowledge of English and Dutch or French
  • Experience with one of the following cyber security platforms would be a plus: Splunk, Palo Alto, Tanium or FireEye
  • Experience in a professional’s services firm is a plus
73

Cybersecurity Analyst Resume Examples & Samples

  • Integrate new cyber security platforms in the client’s organization
  • Bachelor or master's degree
  • Excellent communication and presentation skills, both written and oral
  • Strong interpersonal skills: able to work in a team, work under pressure and flexible
74

Cybersecurity Analyst Resume Examples & Samples

  • Responsible for taking action on alerts, events, and incidents escalated from the Intrusion Analysts
  • Triages incidents, their priority and the need for escalation
  • Investigates potential escalations regarding various attack types
  • Monitoring for emerging threat patterns and vulnerabilities
  • Assists with patching recommendations and workarounds for zero-day threats
  • Coordinates with other external stakeholders
  • Communicates with management on incident updates
  • Able to run down an incident from start to finish if low to medium priority without supervision
75

Cybersecurity Analyst Resume Examples & Samples

  • Bachelor’s degree in Cyber, Computer Science or related Engineering field with 5 years of experience or 3 years with a Masters degree or 9 years in lieu of a degree
  • Experience creating and updating Python scripts
  • Must have familiarity in the Cybersecurity Lifecycle to include: generating IA requirements, creating IA architecture design, configuring IA audit tools, conducting IA verification and performing IA compliance as well as scripting knowledge
  • Desired experience with Windows and Linux servers with GPOs, IAVMs, and STIGs
  • Experience with ClearQuest and ClearCase are desired
76

Cybersecurity Analyst Resume Examples & Samples

  • Manage IAM office user requests and tickets and provide guidance and recommendations that adhere to Army and DoD policy
  • Perform IA assessments of organization and advise on best IT security practices
  • DoD Security clearance
  • DoD 8570 compliant by obtaining/maintaining required certifications such as Security+
77

Cybersecurity Analyst Resume Examples & Samples

  • Knowledge of the Cybersecurity field, including security principles, approaches, and technologies
  • Ability to be self–motivated and multi–task with limited supervision in a fast–paced environment
  • Ability to synthesize and analyze multiple views and data sets
  • 2+ years of experience or an internship with general management consulting, including change management, organizational assessment and design, human capital, strategic planning, or talent management
  • Experience in the health, financial services, government, and energy sectors preferred
  • MS degree in Business (MBA), Cybersecurity, Political Science, or a related field
  • Cybersecurity Certifications, including Security+, CEH, or SANS preferred
78

Cybersecurity Analyst Resume Examples & Samples

  • 5+ years of experience with Cybersecurity, information security, risk management framework, or the application of Cybersecurity to equivalent technology areas
  • Knowledge of Cybersecurity principles
  • IAT II Certification required
  • Experience with supporting the DoD in a technical role
  • Experience with Cloud migration projects
79

Cybersecurity Analyst Resume Examples & Samples

  • Bachelor’s Degree preferred
  • 5 Years: IT – Information Security Experience
  • CEH, GSEC, GCFA, GCIA, GCIH are preferred
  • Degree in Statistics, Mathematics, or related field preferred
  • Data systems certifications such as Hortonworks, Cloudera, EMC, Oracle, SQL server, BI, or Azure is a plus
  • 3 years' experience working with Big Data (Hadoop, Cloudera), creating complex correlation searches and applying various statistical concepts
  • Familiarity in the areas of machine and statistical learning
  • Must have practical knowledge of algorithms such as, but not limited to; decision trees, clustering, logical regression, standard deviation, random forests, and frequency analysis
  • Expertise developing dashboards, data models, reports, saved searches, etc
  • Experience with reporting tools such as Tableau or Power BI
  • Sound problem resolution, judgment, negotiating and decision making skills
80

Cybersecurity Analyst Resume Examples & Samples

  • Bachelor degree in Computer Science / Engineering or equivalent experience required
  • CISSP, GIAC, CISA, CISM or similar industry certifications preferred
  • Minimum 3 or more years of demonstrated experience in cybersecurity and risk management
  • Experience evaluating the utilization and effectiveness of cybersecurity controls and tools
  • General awareness and understanding of global regulatory compliance requirements
  • Experience participating in the ongoing maturation of an enterprise security program
81

Cybersecurity Analyst Resume Examples & Samples

  • Reviewing along-with Chief Information Security Officer (CISO) & Chief Technology Officer (CTO) of new and existing systems to identify security risks and to ensure that security measures and controls are in place to reduce risk in line with business expectations
  • Supporting the development and implementation of the Technical Cybersecurity Strategy
  • Planning and overseeing the delivery of concurrent, complex, technical cybersecurity projects
  • Acting as a reference point for Project Management Office (PMO) queries and information and an advocate for best practices in program management
  • Assisting in tracking and reporting on portfolio performance
  • Assisting Info Sec Lead in delivering the best use of program management disciplines and approaches
  • Developing positive relationships with managers and staff to enable the PMO to provide support including facilitation, tracking and reporting on programs including training as required
  • Developing and maintaining the Major Program Delivery SharePoint and Intranet sites
  • Maintaining processes to ensuring project management documentation, reports and plans are relevant, accurate and complete
  • Supporting Program Managers in the preparation of weekly and monthly reporting packs, SteerCo and Info Sec packs as required
  • Supporting the creation and improvement of processes, procedures, and tools
  • Experience with the secure configuration of various infrastructure platforms and devices such as Microsoft Windows, Unix / Linux, and common network devices (switches, routers, firewalls, and WLCs)
  • Proven experience in running patch management and vulnerability remediation programs will be an added advantage
  • Driving Information Technology Infrastructure Library (ITIL) based knowledge management processes, across the supported applications and ensuring full compliance
  • Deep understanding of cybersecurity trends in the industry
  • Experienced in managing Microsoft (MS) Sharepoint sites for document management
  • Experienced user of MS Office toolset (In particular: Excel and PowerPoint, preferably a working knowledge of MS Project)
  • Familiar with large scale change delivery
  • Good knowledge of Risk and Project Management concepts
  • Involvement in a variety of IT projects
  • Proven PMO/Project Support or Coordinator experience and knowledge of project management
  • Senior Stakeholder management
  • Strong relationship building and interpersonal skills
  • Understanding of Global Financial Services environment
  • Understanding of project delivery and acceptance processes within a fast-paced business environment
  • Understanding of the principles and frameworks of successful project management from a support perspective
  • Educated to Bachelor’s degree level or equivalent qualifications / work experience
  • IT Project Management (PMI / Prince 2 or equivalent) qualification beneficial
  • Management Information Systems Reporting
  • Strong numerical & Analytical Skills
82

Cybersecurity Analyst Resume Examples & Samples

  • IT system Accreditation & Assessment (A&A) portfolio management
  • Cybersecurity technical document review, consolidation, and feedback
  • Development of Cybersecurity SOPs, templates and business rules
  • Proficiency with Enterprise Mission Assurance Support Service (eMASS)
  • Administrative support for PMS 425 Information Assurance Branch (425i)
  • Consolidate and deconflict reporting for the 425i Weekly Highlights
  • 425i meeting coordination, minutes recording, and workflow coordination
  • Document staffing and familiarity with Department of Navy and Department of Defense correspondence
  • Cybersecurity related document/artifact repository management
  • PMS 425i workflow coordination and inter-departmental coordination (NAVSEA, NUWC, PEO(SUBS), TSUB-A, external agencies)
  • DoD or DoN Cybersecurity Workforce (CSWF) Certification or compliance (DODD 8140.01, DODD 8570.01, or SECNAV M-5239.2)
  • TOP SECRET Clearance eligible background investigation, within the last five years
  • DISA Assured Compliance Assessment Solution (ACAS) Certification
83

Senior Cybersecurity Analyst Resume Examples & Samples

  • Broad technical background required, including a mastery of system and network functional areas
  • Proficient with industry standard security technologies, including firewalls, IDS/IPS, SIEM tools, endpoint monitoring, etc
  • Hands on experience with incident response procedures and best practices
  • Familiarity with threat intelligence process and integration
  • Leadership and organizational skills
84

Cybersecurity Analyst / Specialist Resume Examples & Samples

  • 5 years of experience with Cybersecurity or Information Assurance
  • 4 years of experience with IA or CS analyses support in IA and security controls analyses, conducting risk assessments and risk mitigation analysis, and developing contingency plans
  • Experience with IA or CS requirements and IA or security controls analysis and IA or CS policy development, review, or implementation
  • Experience with C&A and A&A requirements and processes
  • Experience with risk and vulnerability assessment and risk mitigation analysis
  • Experience with system analysis, design, integration, security test, and evaluation
  • BA or BS degree or CNSSI 4012–4016, NDU CISO, NEC 2780, 2779, 2781, CCNA, CAP, Security + (CE), or ENSA Certification
  • Knowledge of MOU, MOA, ISA, and ICA review processes and WRA as it applies to C&A
  • Knowledge of contingency planning and cross–domain solutions
  • Knowledge of the DoD circuit connection approval process
  • Knowledge of encryption techniques and requirements and firewall policy
  • Knowledge of Platform Information Technology (PIT) and Industrial Control System (ICS) analysis requirements for classified data network operations
  • Knowledge of requirements for NATO information processing
  • Knowledge of technical writing, wireless and mobile technologies, Cloud platforms, or virtualization
85

Cybersecurity Analyst / Specialist, Senior Resume Examples & Samples

  • 6 years of experience with information systems operations, IA or CS, or information systems management
  • 4 years of experience with systems, networks, and applications analysis applicable to IA or CS, INFOSEC, DIACAP, and RMF
  • Experience with Web Risk Assessment or wireless and mobile technologies or Navy Qualified Validator
  • Ability to provide senior technical analysis for IA or CS support and integration efforts
  • Ability to perform in–depth analysis in various areas and technologies within DIACAP C&A and RMF A&A documentation
  • Ability to monitor, analyze, and detect Cyber events and incidents within information systems and networks
  • Ability to assist with integrated, dynamic Cyber defense
  • Ability to coordinate and maintain security toolsets to support organizations’ continuous monitoring and ongoing authorization programs
  • MA or MS degree or CNSSI4012–4016, NDU CIO, NEC 2779, CISSP, CISM, GSLC, or CASP Certification
86

Cybersecurity Analyst, Level Resume Examples & Samples

  • Use Baxter’s cybersecurity tools to monitor for policy violations in the Baxter enterprise (including networks, systems, applications, and databases)
  • Document all activity violating policy, and assign criticality based on the severity of the occurrence
  • Work with the Vulnerability Management program to maintain an accurate Current State Assessment of the enterprise security posture
  • Work with the Threat Intelligence team to identify any trends in malicious behavior. Stay current on the enterprise threat landscape
  • Document and investigate more complex Security incidents as defined by policy. Escalate incident reports to IT management in order to maintain compliance with security related regulatory requirements
  • 4 year college degree or equivalent industry experience
  • 2-3 years of experience either working in IT Security or Information Technology
  • Familiarity with network security applications, protocols, and associated hardware
  • Understanding of operating system details and their relevance to security investigations
  • Innovative and creating thinking skills in order to solve problems
  • Excellent written and verbal communication skills, with an emphasis on relationship building
87

Cybersecurity Analyst Resume Examples & Samples

  • GIAC Certified Intrusion Analyst (GCIA)
  • EC-Council Certified Ethical Hacker (CEH)
  • Systems Security Certified Practitioner (SSCP)* Security+
88

Cybersecurity Analyst Resume Examples & Samples

  • Knowledge of Windows OS
  • Ability to comprehend Navy RMF and AA policy
  • AS degree
  • Cybersecurity Workforce (CSWF) Enrollment
  • Information System Security Engineering (ISSE) or Information Systems Security Operations (ISSO) Officer Qualifications