Cyber Security Analyst Resume Examples - Page 3

HIGH QUALITY

The best examples from thousands of real-world resumes

EXPERT APPROVED

Handpicked by resume experts based on rigorous standards

DIVERSE EXAMPLES

Tailored for various backgrounds and experience levels

Cyber Security Analysts are in charge for ensuring the security of computers systems and networks. Typical resume examples for this position showcase activities like protecting information, training employees on security issues, collaborating with information technology managers, installing and updating security software, and preparing disaster recovery strategies. Based on our collection of resume samples, the ideal candidate demonstrates computer security expertise, analytical thinking, excellent communication and interpersonal skills, attention to details, and decision making abilities. Successful candidates hold a Bachelor's Degree in information technology or computer science.

For more information on what it takes to be a Cyber Security Analyst, check out our complete Cyber Security Analyst Job Description.

Find out what is the best resume for you in our Ultimate Resume Format Guide.

21

CSIRT Cyber Security Analyst - Federal Deposit Insurance Corporation (fdic) - Client Site

Provided 24/7 incident response for FDIC's nationwide locations ensuring threats and vulnerabilities are quickly addressed and mitigated.

  • Perform thorough investigations of Security Incidents using available tools and resources.
  • Reported impacts of Security Incidents to FDIC executive management.
  • Monitored malware activity on the FDIC network and devised plan for resolving infections.
  • Monitored Intrusion Detection Systems and ArcSight channels for threats and vulnerabilities.
  • Monitored and tracked security vulnerabilities to ensure affected systems are patched.
Candidate Info
4
years in
workforce
2
years
at this job
BS
Business Administration
22

Cyber Security Analyst for The National Science Foundation

  • Analyzed the latest Federal Information Security Management Act (FISMA) cyber security metrics and successfully collaborated with management to ensure the National Science Foundation's compliance with Federal cyber security requirements.
  • Assisted with annual FISMA audit tasks including planning, notification, and evaluation and validation of NSF's IT security evidence.
  • Recipient of team award for NSF's #1 finish in FISMA compliance. NSF achieved a nearly 100% compliance score with Federal cyber security requirements.
  • Assisted in preparing NSF's annual IT Security Awareness Training, to include conducting class room sessions on anti-phishing best practices.
  • Submitted weekly reports to the Chief Information Officer on the latest global cyber threats, system vulnerabilities and remediation efforts.
Candidate Info
5
years in
workforce
1
year
at this job
BA
Political Science
23

Cyber Security Analyst/hbss Administrator

Made a transition back to a support role as an HBSS Administrator; completed multiple HBSS FedVTE courses and training before site shutdown.

  • Engaged with stakeholders of up and coming projects for business expansion.
  • Upheld corporate training policy for compliance, as well as achieved personal academic growth standards.
  • Consistently maintained involvement with the Support team at the client site, using e-mail and teleconferencing correspondence to close the gap as much as possible.
Candidate Info
13
years in
workforce
4
months
at this job
AS
Information Technology Systems
BA
Project Management
MA
Information Technology Management
24

Security Engineer/cyber Security Analyst

Security Engineering & Certification and Accreditation; lead the Department of the Navy (DON) networks including Integrated Shipboard Network System (ISNS), Submarine Local Area Network (SUBLAN), Consolidated Afloat Network Enterprise Services (CANES), Sensitive Compartmented Information (SCI), and Networks and Automated Digital Network System (ADNS).

  • Information System Security Engineer (ISSE); provided lead ISSE and IA Integration support to the Application Integration (AI) effort, ensured secure integration of Naval Afloat Cyber assets into the CANES Common Computing Environment (CCE), and supporting a Systems of Systems concept.
  • Created C&A documentation through all phases for Department of Defense Information Assurance Certification and Accreditation Process (DIACAP), Risk Management Framework, NIST 800- 37 and DCID 6/3.
  • Performed penetration testing and security assessments using Gold Disk, eEye Retina, Windows Automated Security Scanning Program (WASSP), and Security Scanner (SECSCN) automated assessment tools to ensure compliance with DoD 8500 Regulations & DCID 6/3 for SCI systems. Advised Program Managers (PM) on impacts from assessments and potential solutions for the accreditation of Intelligence Community (IC), and General Service (GENSER) afloat and shore based systems.
  • Developed security test plans based upon NSA System Network Attack Center (SNAC) guides and DISA Security Technical Implementation (STIG) guides for VMWare ESX, RHEL, Cisco routers, and Windows XP/7 & Server 2003/2008/2012.
  • Completed annual security assessment to maintain Federal Information System Management Act (FISMA) compliance status for Intelligence Community (IC), and Naval Networks systems through Department of Defense Information Technology Portfolio Repository-Department of Navy (DITPR DON).
Candidate Info
10
years in
workforce
4
years
at this job
BS
Cyber Security
Information Systems
Information Systems
25

Task Lead/senior Cyber Security Analyst

Performed all-source analysis on information related to computer crimes, counterintelligence investigations and operations.

  • Coordinated, and synchronized cyber operations and investigations involving the Department of Defense Criminal Investigative Organizations and other government Law Enforcement and Intelligence entities.
  • Produced cyber technical intelligence assessments for investigations stemming from the intelligence, law enforcement, and computer security communities.
  • Developed new business opportunities, and drafts statements of work, proposals, whitepapers, personnel assessments, and personnel awards.
  • Mentoring all incoming project staff and developed national level cyber security contracts.
  • Coordinated multiple exercises with internal and external DOD agencies to ensure continuity of operations.
Candidate Info
18
years in
workforce
4
years
at this job
BS
Information Systems
26

Cyber Security Analyst

  • Maintained a repository of malicious IP addresses and domain names; created custom intrusion detection signatures; recommended as well as experimented with tools and techniques that helped to prevent future intrusion.
  • Provided Tier 2 Computer Network Defense (CND) services to monitor, analyze, detect, and respond to unauthorized activity within DoED information systems and computer networks.
  • Contributed routinely to situational awareness, attack sensing and warning (AS&W), and indications and warning (I&W).
  • Responded to security incidents (or events) in a timely and proactive manor to ensure proper mitigation of those issues.
  • Preformed network discovery/device management with tools such as RedSeal.
  • Utilized tools such as Bluecoat, EOP, Splunk, to identify suspicious web and email traffic going in or leaving the network.
  • Conducted web scans on a scheduled and adhoc basis with WebInspect.
Candidate Info
6
years in
workforce
6
months
at this job
BS
Information Technology
Military Service
27

Cyber Security Analyst

Perform malware analysis from shell code exploitation, obfuscation methods, and other exploits as defined in the public domain.

  • Use reverse engineering tools and techniques as it pertains to network traffic collection and analysis.
  • Work in a 24 x 7 SOC environment, responsible for performing leading edge intrusion detection and prevention technologies and creating and approving reports for security incidents detected by the world class monitoring solution.
  • Deconstruct cyber-attack event sequences; including performing advanced forensic analysis of, network-based data.
  • Worked with monitoring tools such as Wireshark and McAfee NTR (Network Threat Response).
  • Use Sysanalyzer and Java Decompiler for malware dissecting.
  • Upload data captures to malware scanning sites to detect any suspicious activity such as Trojan malware, password stealers, website redirecting tools and all malware activities to inclugde with the malware report to be submitted to the customer.
Candidate Info
14
years in
workforce
3
years
at this job
28

General Dynamics Cyber Security Analyst

Support the daily operations of the JC3 (Joint Cyber Security Coordination Center) for the U.S. Department of Energy.

  • Ensure the safety of information systems assets and protect systems from intentional or inadvertent access or destruction.
  • Develop approved Standard Operating Procedures (SOP's) including escalation procedures for clearing various hardware and software platforms, as new requirements are identified or arise.
  • Provide technical phone support to government agencies consistent with Tier I/II analysts' support. Answer detailed technical, informational and professional questions, and provide callers with timely resolution for reported incidents and follow up on open tickets and escalate to appropriate response groups.
  • Ensure reporting of information security events and weaknesses associated with information systems in a manner allowing timely corrective action.
  • Generate detailed security incident reports and disseminate the reports in accordance with incident response and reporting standard operating procedures.
Candidate Info
19
years in
workforce
3
years
at this job
BA
Computer Programming & Information Systems
MS
Information Technology Management
29

Cyber Security Analyst

Conducted System Analysis and Incident Response on security events from BlueCoat, Firewall and IDS, then provided recommended course of action for mitigation

  • Actively monitored Classified and Unclassified Networks for suspicious network activity using ArcSight ESM
  • Performed Dynamic and Static analysis on potential Malware samples.
  • SourceFire team member tasked with developing Snort rules to mitigate against emerging threats
Candidate Info
9
years in
workforce
2
years
at this job
HS
High School Diploma
30

Cyber Security Analyst

Applied appropriate information security controls for Federal Information Systems based on NIST 800 Series, 800-37 REV.1, SP 800-53 REV.4, FIPS 199 and FIPS 200.

  • Conducts systems and network vulnerability scans in order to identify and remediate potential risks.
  • Develops Plan of Action and Milestone (POA&M) through Establishment of schedules and deadlines.
  • Held kick-off meetings with the Chief Information Security Officer (CISO), and system owners prior to assessment engagements.
  • Prepares security assessment plans (SAP) for system owners review and approval
  • Develops and updated system security plans.
  • Performs Risk Assessment (RA), Privacy Impact Assessment (PIA), System Security Test Evaluation (ST&E) and Plan of Actions Milestones (POAM).
Candidate Info
4
years in
workforce
2
years
at this job

Your Resume, Made Easy.

You are looking for your dream job and need a resume? My Perfect Resume is your solution and takes the hassle out of resume writing. Create the perfect job-worthy resume effortlessly in just a few clicks!