Cyber Security Analyst Resume Examples - Page 4

HIGH QUALITY

The best examples from thousands of real-world resumes

EXPERT APPROVED

Handpicked by resume experts based on rigorous standards

DIVERSE EXAMPLES

Tailored for various backgrounds and experience levels

Cyber Security Analysts are in charge for ensuring the security of computers systems and networks. Typical resume examples for this position showcase activities like protecting information, training employees on security issues, collaborating with information technology managers, installing and updating security software, and preparing disaster recovery strategies. Based on our collection of resume samples, the ideal candidate demonstrates computer security expertise, analytical thinking, excellent communication and interpersonal skills, attention to details, and decision making abilities. Successful candidates hold a Bachelor's Degree in information technology or computer science.

For more information on what it takes to be a Cyber Security Analyst, check out our complete Cyber Security Analyst Job Description.

Find out what is the best resume for you in our Ultimate Resume Format Guide.

31

Cyber Security Analyst

Conduct security interviews to validate IT system inventory, system ownership, and security compliance data.

  • Perform Risk Management Framework (RMF) gap analysis to identify the actual authorization status, along with areas that require development.
  • Schedule and attend ad hoc meetings with system owners whose systems are being certified and with certifiers who are engaged in performing system certifications.
  • Create, Validate, and Update security artifacts (FIPS 199, E-Authorization, Privacy Threshold Analysis and, if required, Privacy Impact Assessment Security Plans, Contingency Plans, POA&Ms).
  • Oversee system authorization efforts and spot-check compliance.
  • Review final documentation for quality control purposes, present deliverables, respond to customer comments and questions about the deliverables.
Candidate Info
12
years in
workforce
4
months
at this job
BA
Organizational Management
MA
Information Technology Specializing
32

Cyber Security Analyst

Evaluate cyber security solutions for use in Critical Systems Resilience (CSR) architecture based on controls listed in NIST 800-53

  • Draft documentation, test plans and analysis with the end goal of developing a standard, security focused architecture for CSR.
  • Assist with the design and implementation of network simulation environment (sandbox).
  • Continual research and evaluation of current cyber threat environment.
  • Assist the open source intelligence team, and other company projects as directed.
  • Assist with the development of web application.
Candidate Info
6
years in
workforce
7
months
at this job
AAS
Mathematics / Chemistry
BS
Business Management / Finance
33

Cyber Security Analyst

  • Tier 2 analyst at a Cyber Security Operations Center (CSOC) supporting the Tennessee Valley Authority.
  • Primary role was to perform incident response and malware analysis of compromised machines. Conducted malware analysis with the FireEye Malware Analysis System. Mainly used EnCase 6 for forensic investigations (I favor it over v7).
  • Secondary role was to conduct SIEM analysis (McAfee Nitro/ESM) looking for potential compromises either from alerts or manual analysis. Utilized Netwitness for full packet capture when correlating events from the SIEM.
  • Conducted internal investigations on employees who were suspected of using corporate assets for misconduct.
  • Authored standard operating procedures for Windows forensic analysis including memory analysis utilizing Volatility.
  • Researched latest threats using open source intelligence sources (Mandiant, Sophos, Kaspersky, @Kafeine, /r/netsec, etc).
  • FISMA, NERC CIP, and NIST compliances followed.
Candidate Info
11
years in
workforce
5
months
at this job
Depth
Computer Incident Response
Windows Forensic Analysis
34

Cyber Security Analyst /computer Network Defense

Configured and harden(stig) a Windows 7 image to meet all DOD and Marines Corp standards

  • Create Retina Scans for the West Region and report on category 1,2 and 3 for non-compliant systems
  • Perform SCAP scans SCAP Compliancy Checker to perform Group Policy and Registry changes to Operating Systems to DOD requirements.
  • Run HBSS and Hips queries using ePO 4.5
  • Responsible for Engineering, implementing and maintaining system security and configurations of 5 company servers while providing IT support, to include planning, software and hardware configuration to a staff of 2500 end-users.
  • Created a Backup Solution for Servers that did not have a backup solution.
  • Built out lab environments to test servers before putting them in production.
Candidate Info
13
years in
workforce
10
months
at this job
35

Senior Cyber Security Analysts/program Manager

Supervised and assigned work tasks to a small team of analysts focusing on insider threats, fraud, waste and abuse.

  • Developed the internal cyber security program and the operational activities for network monitoring.
  • Conducted hands-on monitoring of network traffic for user violations of acceptable use policy and potential insider threats.
  • Worked closely with the government senior management to manage the cyber program.
  • Built the incident tracking and documentation repository using SharePoint.
  • Worked closely with the government Technical Director to research existing and emerging enterprise enabled cross-domain technologies.
  • Created and built vendor contact database and CDS product lists for cross-referencing requirements with available CDS technologies.
  • Provided technical advice and guidance on emerging CDS technologies based on research and vendor interaction.
Candidate Info
8
years in
workforce
2
years
at this job
BS
Business Management
MS
Computer Information Systems
36

Senior Network Cyber Security Analyst

Supervised a 10 man cyber analysis team responsible for detecting, investigating and reporting computer network exploitations across DoD networks.

  • Created and deployed IDS signatures to detect and alert analysts of malicious activity on two different platforms.
  • Analytically reconstructed network intrusions to provide a chronological explanation of events, attack vectors, damage assessments, and the potential effects on the rest of the DoD networks, through formal reporting.
  • Recommended preventive, mitigating, and compensating controls to ensure further network exploitation is minimized.
  • Briefed various government officials; including flag level officers, on intrusion updates. Provided a presentation at a technical forum on specific intrusions; detailing the analytical process and the effectiveness of collaboration of various organizations.
Candidate Info
12
years in
workforce
4
years
at this job
BS
Information Technology
37

Cyber Security Analyst

Provided IAVA and STIG support to the FURY System within the NAVAIR PMA205 program

  • Provided Information Assurance support to the Tactical Training Range (TTR) department of PMA205
  • Supported the IAO with multiple system accreditation and Cross Domain Solutions (CDS) approvals
  • Generated documentation for the DIACAP process, PIT Determinations, CDS approvals, Risk Assessments, and Mitigation Plans
Candidate Info
7
years in
workforce
3
years
at this job
HS
Certificates
38

Cyber Security Analyst

Coordinating and ensuring technical requirements of cyber security and appropriately evaluated, developed, implemented and integrated into the overall site information technology infrastructure

  • Reviewing and analyzing planned projects and initiatives that may have an impact on the cyber security posture of [company name].
  • Performing analyses to identify threats, vulnerabilities, and assess risk to computing resources
  • Performing tests and assessments on system and/or telecommunications networks to ensure the security configuration and operation is as described in security plans.
  • Monitoring compliance with the organization's security policies and effectiveness of risk mitigation measures; monitoring internal systems to ensure that the appropriate security policies are being properly and effectively implemented
Candidate Info
5
years in
workforce
1
year
at this job
AS
Business Management, Marketing And Administration
BBA
Computer Information Systems
39

Multiple Roles - Currently Master Cyber Security Analyst

Appointed Information Systems Security Officer (ISSO) for classified and unclassified enterprise networks

  • Program-designated Public Key Infrastructure (PKI) Trusted Agent responsible for interfacing with the Certificate Authority (CA), managing certificates for servers and personnel, configuring certificate revocation applications (OCSP, CRL)
  • Implement and manage Assured Compliance Assessment Solution (ACAS - AKA Nessus) on complex enterprise networks to support vulnerability management and help ensure compliance
  • Managed projects within an IT Services & Support environment supporting two Department of Defense (DoD) combatant commands (USEUCOM & USAFRICOM)
  • Managed primary USEUCOM data center containing both classified and unclassified systems
  • Developed ITIL-based processes to support Release Management within an IT Services & Support environment supporting two DoD combatant commands
  • Led a team of 7 in creating DoD Information Assurance Certification and Accreditation (C&A) Process (DIACAP) accreditation packages for USAFRICOM systems
  • Performed Security Assessments based on Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIG) and Information Assurance Vulnerability Alerts (IAVA)
  • Performed Security Test and Evaluation (ST&E) based on National Institute of Standards and Technology (NIST) guidelines
  • Developed corporate Certification and Accreditation (C&A) program based on NIST guidelines
Candidate Info
20
years in
workforce
7
years
at this job
BA
Government & Politics
40

Cyber Security Analyst

Perform and interpret regular vulnerability assessment scans using Retina and Nessus network scanners.

  • Use IBM Endpoint Manager to extract vulnerability reports and determine patch management status
  • Organize weekly meetings with system owners/administrators to formulate strategic approach to securing network and addressing vulnerabilities
  • Conduct, direct, and coordinate responses to cyber-attacks, classified material incidents, virus infections
  • Worked under two different contractors, in my current position
Candidate Info
14
years in
workforce
2
years
at this job
Math And Computer Science

Your Resume, Made Easy.

You are looking for your dream job and need a resume? My Perfect Resume is your solution and takes the hassle out of resume writing. Create the perfect job-worthy resume effortlessly in just a few clicks!