It Security Analyst Resume Samples

HIGH QUALITY

The best examples from thousands of real-world resumes

EXPERT APPROVED

Handpicked by resume experts based on rigorous standards

DIVERSE EXAMPLES

Tailored for various backgrounds and experience levels

IT Security Analysts protect the computer networks of a company or government agency. Sample resumes for this position highlight skills like assisting system owners and ISSO in preparing certification and accreditation packages for companies' IT systems, and making sure that risks are assessed, evaluated, and that proper actions have been taken to limit their impact on information and information systems. A majority of IT Security Analysts hold a bachelor's degree, though others are able to show a master's degree in a related field on their resumes.

1

IT Security Analyst

Planned, analyzed, developed and deployed an enterprise-wide information security awareness training program to 9500 users worldwide

  • Participated in creation of Security Operations Center for the company, which included the formation of an Incident Response Team comprised of selected IT individuals worldwide
  • Provide information security support to regional IT teams worldwide
  • Provide Incident Response management and remediation assistance to regional IT teams worldwide
  • Plan, develop and implement special projects and initiatives that help support continued growth that is manageable and secure while complying with regulatory needs
  • Developed and implemented a secure IM communications initiative which helped in the reduction of international toll charges
Candidate Info
5
years in
workforce
2
years
at this job
BS
Bachelor of Science
MA
Master of Arts
2

IT Security Analyst

Achieved "Certified Information Security System Professional" (CISSP) designation.

  • Managed IT Security projects such as implementing laptop encryption and use of personal firewall.
  • Created policies, standards, guidelines and security awareness campaigns for associates to follow related to IT Security and protecting corporate assets.
  • Conducted and participated in annual disaster recovery exercises. Included significant planning and coordinating among multiple resources
  • Performed Risk Assessments on servers, network and confidentiality of data and potential breaches.
Candidate Info
7
years in
workforce
4
years
at this job
AS
Business / Legal
BA
Organizational Management
3

IT Security Analyst

Provided user provisioning for SAP, Network and Exchange accounts. Managed users on over fifteen applications including; SAP, Active Directory among other in-house third party applications.

  • Managed Active Directory users and groups across corporate office and over 150 external locations, including offices and plants outside the U.S.
  • Managed users and groups across multiple applications, including in-house and third party applications. Interacted with business and Help Desk on a daily basis to provide internal customer support and ensure satisfaction.
  • Documented processes' to manager's satisfaction and cross-trained all team members.
  • Created and Maintained user IDs in the BPC 7.0 system Appsets. Assigned Teams, Member Access Profiles, and Task Profiles. Ran the User and Profile reports.
  • Created and completed tickets within the GRC 5.3 CUP(Compliant User Provisioning) module. Also used the Forward action to reassign tickets to different BPOs.
  • Created and maintained IDs within the Portal UME(User Management Engine). Assigned roles, unlocked IDs and reset passwords.
Candidate Info
24
years in
workforce
3
years
at this job
C
Business Essentials
4

IT Security Analyst

IT Security Professional with [company name], a NASA contractor at Johnson Space Center in Houston, Texas. Applied expertise in information technology and knowledge of National Institute of Standards and Technology (NIST) requirements to ensure that NASA organizations are responsive to all government IT reporting and IT security implementation requirements.

  • Coordinated and directed NASA organizations through required government IT assessment and authorization audits as required by NIST
  • Facilitated two Federal Information Security Management Act (FISMA) audits and one Office of Inspector General (OIG) audit as well as over 15 internal audits under NIST guidelines
  • Analyzed policies and procedures against Federal laws and regulations; provided recommendations for mitigating the gaps in security
  • Handled all aspects of information assurance processes including risk analysis, system certifications, auditing, security documentation, and security testing
  • Responsible for the oversight of the information security program to ensure that proper security controls exist and are enforced
  • Conducted risk assessments of information systems to identify security issues and develop mitigation plans
Candidate Info
21
years in
workforce
9
years
at this job
BBA
Computer Information Systems And Business Administration
5

IT Security Analyst

As a member of customer support center responsible to perform IT security analysis and vulnerability assessment solutions for GE international clients and business partners in a 24/7 environment.

  • Configured translation and access control Microsoft ISA proxy servers at the perimeter level to ensure security and compliance with organizational policies and procedures.
  • Review packet information generated by network sniffers like ethereal and plug-ins which define the actual scripts crafted to run the checks in Nessus.
  • Responsible to complete projects and assigned tasks and ensure on time deliverables to meet the service level agreement and communicate directly with GE international clients and customers across the globe.
  • Awarded "Voice of the customer" for excellent communication and customer service skills.
Candidate Info
2
years in
workforce
2
years
at this job
MS
E-business
6

IT Security Analyst

Sound understanding and experience with NIST Risk Management Framework (RMF) process.

  • Perform Information Systems Security Audits and Certification and Accreditation (C&A) Test Team efforts.
  • Reviewed and updated some of the system categorization using FIPS 199, Initial Risk Assessment, E-authentication, SSP, POA&M, contingency plans (CP), and contingency plan tests (CPT), privacy impact assessments (PIA) and risk assessment (RA) documents per NIST 800 guidelines.
  • Monitor controls post authorization to ensure continuous compliance with the security requirements in accordance to FISMA guidelines.
  • Communicate effectively through written and verbal means to co-workers, subordinates and senior leadership.
  • Review and update System Security Plans (SSP) against NIST 800-18 and NIST 800-53 requirements.
  • Conduct FISMA-based security risk assessments for various assigned application systems - including interviews, tests and inspections; produced assessment reports and recommendations; conducted out-briefings.
Candidate Info
6
years in
workforce
3
years
at this job
7

IT Security Analyst

Documented and update security policies and procedures created by the Information Security Officer

  • Adhered adequate security controls commensurate with risk to the system in accordance with the Federal Information Security Management Act (2002) and National Institute of Standards and Technology
  • Planned, developed, implemented, and maintained programs, polices, and procedures to protect the integrity and confidentiality of systems, networks, and data
  • Reviewed and updated the department's system-related security plans and updated accordingly
  • Automated hard copies of my department's server checklists using NetIQ Security Manager auditing software
Candidate Info
10
years in
workforce
10
months
at this job
HS
Computer Information Systems
BS
Information Management Systems / Cyber Security
MS
Information Technology / Resource Management
8

Senior IT Security Analyst

Subject matter expert in areas of IT processes, risk analysis and threat mitigation, and security architecture. Areas of expertise include: Forensic imaging and analysis, enterprise log management, event correlation/incident detection, infrastructure vulnerability scanning/remediation, end point protection.

  • Increased efficiency to reduce the expense and reduce the time required to incident closure
  • Initiated and achieved the capabilities to detect, correlate, and alert suspicious activity
  • Greatly improved the process of evidence collection and investigations of offenders/incidents
  • Developed and drafted information security policies, standards, and procedures
Candidate Info
6
years in
workforce
2
years
at this job
BS
Law Enforcement
BA
Computer Forensics
MBA
Strategic Management And Information Technology
9

IT Security Analyst

Conducted infrastructure and information assurance assessments to develop INFOSEC requirements for government and commercial customers.

  • Conducted engineering studies and developed and implemented security design for information security requirement (e.g., encryption, access control, identification, and authentication, digital signatures, and etc ).
  • Planned security risk analyses, security evaluations, and audit information system.
  • Performed security penetration test on network systems using ISS software.
  • Presentation on security product for customers.
  • Wrote documentation on Information Security solution (technical writing).
  • Performed software and hardware testing for system developments.
Candidate Info
2
years in
workforce
1
year
at this job
MBA
E-business & Technology
Liberal Arts
10

IT Security Analyst and Project Specialist

Project and logistical analyst integrating PeopleSoft, Identity Management (IdM) and Sun Role Manager 4.1 (Vaau) RBACx systems to implement segregation of duties in an enterprise environment.

  • Performed Risk Management and Assessment Methodology to secure IT systems and critical information.
  • Developed strategic processes and procedures for the migration of legacy information owners and data storage across multiple role based environments and lines of business.
  • Integrated, managed and regulated all user access to Sun IdM /Sun project sensitive documentation and key information utilizing Microsoft SharePoint Server 2007.
  • Establish access levels in accordance to organizational policy and the governance body for audit regulations.
  • Provided metric reporting to validate application access/usage and licensing agreements to justify expenditures for budgeting.
Candidate Info
5
years in
workforce
6
months
at this job
Education
Education
Computer Programming & Networking

Your Resume, Made Easy.

You are looking for your dream job and need a resume? My Perfect Resume is your solution and takes the hassle out of resume writing. Create the perfect job-worthy resume effortlessly in just a few clicks!