Cyber Security Analyst Resume Examples - Page 5

HIGH QUALITY

The best examples from thousands of real-world resumes

EXPERT APPROVED

Handpicked by resume experts based on rigorous standards

DIVERSE EXAMPLES

Tailored for various backgrounds and experience levels

Cyber Security Analysts are in charge for ensuring the security of computers systems and networks. Typical resume examples for this position showcase activities like protecting information, training employees on security issues, collaborating with information technology managers, installing and updating security software, and preparing disaster recovery strategies. Based on our collection of resume samples, the ideal candidate demonstrates computer security expertise, analytical thinking, excellent communication and interpersonal skills, attention to details, and decision making abilities. Successful candidates hold a Bachelor's Degree in information technology or computer science.

For more information on what it takes to be a Cyber Security Analyst, check out our complete Cyber Security Analyst Job Description.

Find out what is the best resume for you in our Ultimate Resume Format Guide.

41

Cyber Security Analyst

Reconfirmation and initial escalation of High/Medium severity incidents with regard to custom client escalation procedures

  • Meet Ticket SLAs based on ticket classification
  • Live troubleshooting of possible IDS/IPS signature/iptable based involvement on specified traffic with special focus on service ports and host IPs
  • Perform real-time log analysis to provide network and data security
  • Triage and handling of inbound calls, document all client communications
  • Configure and troubleshoot SecureWorks IDS/IPS and associated infrastructure
  • Assess incident severity and escalate to the next level as needed
Candidate Info
4
years in
workforce
2
years
at this job
BA
Business Administration, Management
MS
Computer Science
42

Cyber Security Analyst Jr

Perform system security reviews and DIACAP validation activities on a large scale enterprise system

  • Evaluate design changes for Cybersecurity risk
  • Analyze and review the results of network and system vulnerability scans and be able to validate the implementation of IA Controls in accordance with DoD 8500.2
  • Draft accreditation support documentation to include POA&Ms, Risk Assesment Reports, and Certificate Determinations
  • Support Government lead with C&A impact recommendations for technical changes presented at CSR
  • Assist with Enterprise Risk analysis and validation
Candidate Info
7
years in
workforce
8
months
at this job
Computer Science
43

Cyber Security Analyst

Analyze escalations from end-users and/or US CERT to determine proper remediation.

  • Escalate incidents to appropriate groups to begin remediation.
  • Identify opportunities to improve processes and services delivered to the client, U.S. DOI.
  • Process external sources of threat intelligence to create content for detection of emerging threats and zero-days via use of tools such as Wireshark, ACE live and Tipping Point appliances for analysis.
  • Strong working knowledge of system administration, UNIX and Windows.
  • Perform regular review of existing signatures on customer IPS devices to ensure optimum analysis.
  • Perform backend tuning to intrusion detection and health monitoring event management platforms to ensure optimum analysis
Candidate Info
5
years in
workforce
11
months
at this job
AA
Information Technology / Visual Communications
44

Cyber Security Analyst/security Controls Assessor

Manage the McAfee Endpoint Protection Enterprise Host Based Security Systems (HBSS) for over 5,000 systems to include, Host Intrusion Prevention Systems, Data Lost Prevention, Asset Baseline Monitor, Policy Auditor, and Virus Scan Enterprise

  • Oversee the SEIBEL trouble ticket support web system and resolve or distribute over 100 service request and activities a month
  • Investigate and resolve security incidents, develop incident reports, and aggregate a monthly incident status report
  • Maintain and manage courier system of computer and peripheral to ensure system accountability
  • Evaluate security assessment documentation and provide written recommendations for security authorization to the Authorizing Official (AO)
  • Evaluate threats and vulnerabilities to information systems to ascertain the need for additional safeguards
  • Advise the information system owner concerning the impact levels for confidentiality, integrity, and availability
Candidate Info
21
years in
workforce
4
years
at this job
BS
Computer Science
MS
Technology Management
MBA
Information Security
45

Cyber Security Analyst

Update the controls changes from NIST-800 53 rev 3 to NIST-800 53 rev 4 and control assessment changes from NIST-800 53A to NIST 53A rev4

  • Write GSS & Infrastructure Implementation statements in RiskVision.
  • Review Regional Offices' artifacts and implementation statements in RiskVision
  • Updates & closes regional offices Findings/POA&M
  • Facilitate FISMA Continuous Monitoring Test Cases NIST 800-53 Rev 4 Update.
  • Conduct Security Risk Assessment on all new applications, IT Systems or changes to existing IT systems to verify if they satisfy established security baseline before adoption into VA Regional offices.
  • Conduct Security Risk Assessment on new Vendors and annual Vendor Risk Assessment.
  • Assist management in authorizing the IT Systems for operation on the basis of whether the residual risk is at an acceptable level or whether additional compensating controls should be implemented.
  • Ensure compliance with Baseline security configurations, IT controls and policy standards.
  • Developed and Implemented information security governance processes including policies, procedures, requirements, risk management and RBD SOP.
Candidate Info
7
years in
workforce
10
months
at this job
46

Cyber Security Analyst/technician

  • Serve as the 1st Marine Division Cyber Security Analyst/Technician to ensure assets are updated in accordance with Department of Defense and National Security Agency policies, directives, and best practices
  • Manage patching, assessment scanning, and reporting for the 1st Marine Division
  • Conduct incident management and response on classified and unclassified networks
  • Implement and manage McAfee ePolicy Orchestrator on networks supporting 700+ systems
  • Oversee network planning and advise on security implementation
  • Develop Plans of Action and Milestones to remediate identified vulnerabilities
  • Coordinated lower unit support during September 2013 Defense Information Systems Agency Cyber Command Readiness Inspection to ensure classified material stored and processed properly
Candidate Info
8
years in
workforce
5
years
at this job
BS
Information Science And Technology
47

Junior Cyber Security Analyst (cirt)

Monitor and analyze IDS data signature indicators of known threats and anomalies; investigate callouts and coordinate remediation with personnel worldwide.

  • Extract PCAP and .bin files from Wireshark for use in additional research and analysis on anonymous network.
  • Monitor traffic on CLAN to include information provided by outside Intelligence Agencies.
  • Provide detailed status updates on existing cyber security incidents to include follow up with client/customer to ensure satisfactory resolution.
  • Convey verbal briefings to management on pending cyber incidents as well as coordinate with US-CERT and AV Vendors as necessary to convey incident information.
  • Act as alternate shift lead as necessary, mentor new associates on process and procedure, manage group mailbox, and open tickets for new incidents.
Candidate Info
9
years in
workforce
3
years
at this job
BS
Business Administration And Marketing
Business Administration And Marketing
48

Systems Engineer 4 - Cyber Security Analyst

Conducts Security Test & Evaluations on government systems in support of the Certification and Accreditation process, to ensure systems adhere to DHS 4300A policy, follow NIST guidance, and are FISMA compliant.

  • Collaborates with information system personnel as well as system infrastructure groups to determine validity of server configurations.
  • Supports Vulnerability & Exploit Testing by utilizing scanning tools to complete vulnerability assessments.
  • Participates in team lessons learned meetings as well as technical webinars/seminars, and incorporates improvements to assessment methodologies.
  • Evaluates system demonstrations based on review of system requirements documentation.
  • Provides support to team members for malware and continuous monitoring efforts to prevent system security breaches.
Candidate Info
12
years in
workforce
5
years
at this job
BS
Computer Information Systems
MS
Information Technology

Your Resume, Made Easy.

You are looking for your dream job and need a resume? My Perfect Resume is your solution and takes the hassle out of resume writing. Create the perfect job-worthy resume effortlessly in just a few clicks!