- Featured in:
-
High Quality
The best examples from thousands of real-world resumes
Expert Approved
Handpicked by resume experts based on rigorous standards
Diverse Examples
Tailored for various backgrounds and experience levels
IT Security Analyst Resume Samples
No results found
Candidate Info
years in workforce
years at this job
Bachelor of Science
Master of Arts
IT Security Analyst
Planned, analyzed, developed and deployed an enterprise-wide information security awareness training program to 9500 users worldwide
- Participated in creation of Security Operations Center for the company, which included the formation of an Incident Response Team comprised of selected IT individuals worldwide
- Provide information security support to regional IT teams worldwide
- Provide Incident Response management and remediation assistance to regional IT teams worldwide
- Plan, develop and implement special projects and initiatives that help support continued growth that is manageable and secure while complying with regulatory needs
- Developed and implemented a secure IM communications initiative which helped in the reduction of international toll charges
Candidate Info
years in workforce
years at this job
Business / Legal
Organizational Management
IT Security Analyst
Achieved "Certified Information Security System Professional" (CISSP) designation.
- Managed IT Security projects such as implementing laptop encryption and use of personal firewall.
- Created policies, standards, guidelines and security awareness campaigns for associates to follow related to IT Security and protecting corporate assets.
- Conducted and participated in annual disaster recovery exercises. Included significant planning and coordinating among multiple resources
- Performed Risk Assessments on servers, network and confidentiality of data and potential breaches.
Candidate Info
years in workforce
years at this job
Business Essentials
IT Security Analyst
Provided user provisioning for SAP, Network and Exchange accounts. Managed users on over fifteen applications including; SAP, Active Directory among other in-house third party applications.
- Managed Active Directory users and groups across corporate office and over 150 external locations, including offices and plants outside the U.S.
- Managed users and groups across multiple applications, including in-house and third party applications. Interacted with business and Help Desk on a daily basis to provide internal customer support and ensure satisfaction.
- Documented processes' to manager's satisfaction and cross-trained all team members.
- Created and Maintained user IDs in the BPC 7.0 system Appsets. Assigned Teams, Member Access Profiles, and Task Profiles. Ran the User and Profile reports.
- Created and completed tickets within the GRC 5.3 CUP(Compliant User Provisioning) module. Also used the Forward action to reassign tickets to different BPOs.
- Created and maintained IDs within the Portal UME(User Management Engine). Assigned roles, unlocked IDs and reset passwords.
Candidate Info
years in workforce
years at this job
Computer Information Systems And Business Administration
IT Security Analyst
IT Security Professional with [company name], a NASA contractor at Johnson Space Center in Houston, Texas. Applied expertise in information technology and knowledge of National Institute of Standards and Technology (NIST) requirements to ensure that NASA organizations are responsive to all government IT reporting and IT security implementation requirements.
- Coordinated and directed NASA organizations through required government IT assessment and authorization audits as required by NIST
- Facilitated two Federal Information Security Management Act (FISMA) audits and one Office of Inspector General (OIG) audit as well as over 15 internal audits under NIST guidelines
- Analyzed policies and procedures against Federal laws and regulations; provided recommendations for mitigating the gaps in security
- Handled all aspects of information assurance processes including risk analysis, system certifications, auditing, security documentation, and security testing
- Responsible for the oversight of the information security program to ensure that proper security controls exist and are enforced
- Conducted risk assessments of information systems to identify security issues and develop mitigation plans
Candidate Info
years in workforce
years at this job
E-business
IT Security Analyst
As a member of customer support center responsible to perform IT security analysis and vulnerability assessment solutions for GE international clients and business partners in a 24/7 environment.
- Configured translation and access control Microsoft ISA proxy servers at the perimeter level to ensure security and compliance with organizational policies and procedures.
- Review packet information generated by network sniffers like ethereal and plug-ins which define the actual scripts crafted to run the checks in Nessus.
- Responsible to complete projects and assigned tasks and ensure on time deliverables to meet the service level agreement and communicate directly with GE international clients and customers across the globe.
- Awarded "Voice of the customer" for excellent communication and customer service skills.
Candidate Info
years in workforce
years at this job
IT Security Analyst
Sound understanding and experience with NIST Risk Management Framework (RMF) process.
- Perform Information Systems Security Audits and Certification and Accreditation (C&A) Test Team efforts.
- Reviewed and updated some of the system categorization using FIPS 199, Initial Risk Assessment, E-authentication, SSP, POA&M, contingency plans (CP), and contingency plan tests (CPT), privacy impact assessments (PIA) and risk assessment (RA) documents per NIST 800 guidelines.
- Monitor controls post authorization to ensure continuous compliance with the security requirements in accordance to FISMA guidelines.
- Communicate effectively through written and verbal means to co-workers, subordinates and senior leadership.
- Review and update System Security Plans (SSP) against NIST 800-18 and NIST 800-53 requirements.
- Conduct FISMA-based security risk assessments for various assigned application systems - including interviews, tests and inspections; produced assessment reports and recommendations; conducted out-briefings.
Candidate Info
years in workforce
months at this job
Computer Information Systems
Information Management Systems / Cyber Security
Information Technology / Resource Management
IT Security Analyst
Documented and update security policies and procedures created by the Information Security Officer
- Adhered adequate security controls commensurate with risk to the system in accordance with the Federal Information Security Management Act (2002) and National Institute of Standards and Technology
- Planned, developed, implemented, and maintained programs, polices, and procedures to protect the integrity and confidentiality of systems, networks, and data
- Reviewed and updated the department's system-related security plans and updated accordingly
- Automated hard copies of my department's server checklists using NetIQ Security Manager auditing software
Candidate Info
years in workforce
years at this job
Computer Forensics
Law Enforcement
Strategic Management And Information Technology
Senior IT Security Analyst
Subject matter expert in areas of IT processes, risk analysis and threat mitigation, and security architecture. Areas of expertise include: Forensic imaging and analysis, enterprise log management, event correlation/incident detection, infrastructure vulnerability scanning/remediation, end point protection.
- Increased efficiency to reduce the expense and reduce the time required to incident closure
- Initiated and achieved the capabilities to detect, correlate, and alert suspicious activity
- Greatly improved the process of evidence collection and investigations of offenders/incidents
- Developed and drafted information security policies, standards, and procedures
Candidate Info
years in workforce
year at this job
E-business & Technology
Liberal Arts
IT Security Analyst
Conducted infrastructure and information assurance assessments to develop INFOSEC requirements for government and commercial customers.
- Conducted engineering studies and developed and implemented security design for information security requirement (e.g., encryption, access control, identification, and authentication, digital signatures, and etc ).
- Planned security risk analyses, security evaluations, and audit information system.
- Performed security penetration test on network systems using ISS software.
- Presentation on security product for customers.
- Wrote documentation on Information Security solution (technical writing).
- Performed software and hardware testing for system developments.
Candidate Info
years in workforce
months at this job
Computer Programming & Networking
Education
Education
IT Security Analyst and Project Specialist
Project and logistical analyst integrating PeopleSoft, Identity Management (IdM) and Sun Role Manager 4.1 (Vaau) RBACx systems to implement segregation of duties in an enterprise environment.
- Performed Risk Management and Assessment Methodology to secure IT systems and critical information.
- Developed strategic processes and procedures for the migration of legacy information owners and data storage across multiple role based environments and lines of business.
- Integrated, managed and regulated all user access to Sun IdM /Sun project sensitive documentation and key information utilizing Microsoft SharePoint Server 2007.
- Establish access levels in accordance to organizational policy and the governance body for audit regulations.
- Provided metric reporting to validate application access/usage and licensing agreements to justify expenditures for budgeting.
Candidate Info
years in workforce
years at this job
Applied Science
Information Technology Management
Air Force
IT Security Analyst
Provided direct IT Security support for [company name] for CSC.
- Developed and maintained SharePoint Tracking site for Change request
- Tracked, and approved changes to network assists for security issues.
- Oversaw AD on 5 separate domains. Allowing, and removing access for users
- Reviewed, and provided feedback on security audits for 5 domains.
- Used Citrix, AD, SharePoint, Linux, and Unix to maintain network security
Candidate Info
years in workforce
years at this job
Information Technology
Business Administration
IT Security Analyst
Electronically secured critical cyber assets essential to power generation through computer and network hardening, intrusion detection, and log surveillance
- Created and maintained documentation for compliance with NERC security regulations
- Utilized vulnerability scanning and network exploration tools such as Nessus, NMAP, Wireshark, and MBSA
- Conducted firewall request and policy exception reviews
- Configured, updated, and managed antivirus and WSUS servers
- Assessed security patches for several Windows operating systems and other vendor software
- Developed, maintained and trained users on Disaster Recovery, Business Continuity and Cyber Incident Response Plans.
- Created and managed IT budget guidance for 50+ power plants
Candidate Info
years in workforce
years at this job
B / Finance
IT Security Analyst
Conducted FISMA-based security risk assessments for various government contracting organizations and application systems - including interviews, tests and inspections; produced assessment reports and recommendations; conducted out-briefings.
- Documented and reviewed System Security Plan (SSP), Security Assessment Report (SAR), Security Plan of Action and Miles tones (POA&M), Authorization letter/memorandum (ATO).
- Assisted with review of policy, security alerts, guidance, regulations and technical advances in IT Security Management
- Utilized processes within the Security Assessment and Authorization environment such as system security categorization, development of security and contingency plans, security testing and evaluation, system accreditation and continuous monitoring.
- Contributed to initiating FISMA metrics such as Annual Testing, POA&M Management, and Program Management.
- Communicated effectively through written and verbal means to co-workers, subordinates and senior leadership.
Candidate Info
years in workforce
months at this job
Management Info Systems
Paralegal Studies
Siebel Essentials 80 Crm
IT Security Analyst
- Lead Analyst with responsibility for formal IT Security analyses and assessments in accordance with Industry Standard security guidelines and operating procedures
- Developed security target lists and protection profiles based on intelligence analysis
- Engineered technical IT security documentation based on knowledge and detailed research
- Improved customer relationships through customer-focused initiatives and significantly improved communication by designing and implementing improved concepts & processes
- Successfully designed and built suite of test equipment for execution of security tests across multiple functional support and customer areas
Candidate Info
years in workforce
years at this job
Technology
Associate of Science
Senior IT Security Analyst
Demonstrated the ability to manage multiple project time lines effectively, including the security representative for the TRICARE West (US-Government Health Care) program.
- Enjoyed being the PacifiCare and UMR/Fiserv project representative for merger/ acquisitions in Cypress, CA.
- Led training program to integrate the users and software systems for newly acquired companies into the corporate systems: AtYourService, SATS, and United Support Center Knowledge Management.
- Quickly learned new systems without supervision. Became a SME in customized software and trained operations staff on how to provision security on ADUC, Windows, Unix, AS/400, and Mainframe platforms.
- Implemented multiple process improvements based on collaboration with business segments. Result: cost savings in the RSA SecureID project where 60,000 tokens were replaced and new provisioning process implemented in under 90 days.
- Created and revised technical documentation on over two hundred document sets.
Candidate Info
years in workforce
years at this job
Sociology
IT Security Analyst
Provision access for new users across over 60 applications including but not limited to: Active Directory, Exchange Console, Epic Hyperspace, Epic Reflections, Picis, Radiology Information Systems, Res-Q, Lawson User Interface, and UNIX
- Troubleshoot issues and modify user access via requests in Vantive and HP Service Manager ticketing systems
- Work with other IT teams to ensure issues are resolved in timely manner as well as to streamline processes and procedures
- Managed and owned new employee on-boarding process
- Provided on-call support on evenings and weekends on a rotation basis for all Park Nicollet users with Security issues
- Supported go-live of Epic EMR system in July of 2011 by supporting user set-up, access/security issues, and providing customer support to users with issues
Candidate Info
years in workforce
years at this job
IT Security Analyst - Corporate Responsibility and Compliance
Performed assessments of current security technology and authentication systems.
- Evaluated assessment results against HIPAA, Federal and State information protection and privacy regulations, corporate security policies and other relevant regulations and best practice controls pertaining to the protection of Enterprise information assets with respect to information security.
- Consulted, advised and collaborated with personnel in IT departments to coordinate data and security related activities and architecture.
- Developed and advanced IT security policies, standards and procedures.
- Performed risk assessments and reviews to identify key corporate security vulnerabilities, and ensure adequate levels of control are in place.
- Consulted and advised IT in the design of suitable vulnerability and threat management systems in order to safeguard assets.
Candidate Info
years in workforce
years at this job
IT Security Analyst
Audit control and compliancy for Gaming Regulation, MIC's, SOX, PCI and PAR requests.
- Supported and troubleshoots interactions of the Identity and Access Management systems.
- Quality Assurance for on-shore and off-shore analysts.
- Provisioning and de-provisioning accounts for all MGM properties.
- Maintained accurate records of system security baseline policies.
- Troubleshoot and resolved tier 1 and 2 Remedy tickets.
- Documented all access requests and validation as records for internal and external security audits.
Candidate Info
years in workforce
years at this job
IT Security Analyst
Worked with the Systems Management Security Sub-domain, Corporate Information Protection Group, Corporate Audit, and multiple client and server teams to define computing security requirements and helped develop new policies and procedures in accordance with regulatory, industry and corporate information protection standards.
- Researched (RFI/RFP/Pilot activities) and created formal recommended cross-platform server related security tools considered to address current unmet or emerging requirements.
- Provided day-to-day support for vulnerability scanning, anti-virus, and personal firewall tools.
- Participated in resolving security breaches such as fraud, viruses, and system compromises.
- Supported core infrastructure of security tools.
Candidate Info
years in workforce
years at this job
Computer Science
Philosophy
IT Security Analyst
Process (Improvement) Reengineering.
- Saved a failed pilot by developing and documenting new installation procedures for SafeBoot laptop encryption software.
- Installed, configured and supported SAML federation services for several Software as a Service (SaaS) providers.
- Single sign-on for external business partners.
- Wrote global IT Security policies and standards based on ISO 27002.
- Summarized 3M's compliance requirements with 21 CFR Parts 11, 210, 211, 820, Scope & Application Guidance, FDA Principles of Validation, C-TPAT, and PCI DSS.
Candidate Info
years in workforce
years at this job
Information System Management Minor: Economics
Concentration: Science, Field Of Study: Engineering Mathematics
IT Security Analyst
Worked with the Chief Information Securities Officer in leading the company to a perfect "no exceptions" SAS 70 audit report during tenure of employment. Analyzed system generated audit trails, reports, and other forms of raw, server-side data.
- Performed audits of the information technology environments, operating systems, and applications to ensure compliance with policies and procedures.
- Provided support and worked closely with the Security Architect in dealing with security incidents. Identified policy violations and escalated them for investigation by appropriate technology teams.
- Managed 300+ servers in three locations on the east coast via the Tripwire Web Console installed on a Level-1 UNIX based
Candidate Info
years in workforce
year at this job
Financial Management
IT Security Analyst
- Supported clients, using RSA/Ace Server/ Remote Access administration including MCI/Fiberlink functions, Active Directory, Oracle Security, and RACF security packages. Experienced in Using Vanguard, ETFA, TSO, ISPF, SDSF, IOF, JCL, SAS, CICS, IMS and DB2.
- Managed multiple projects and reporting results to ensure the effectiveness and reliability of security on OS390/ZOS lpars.
- Assisted system programmers with integrating operating system upgrades.
- Designed and implemented reporting processes to collect and provide access and password violations for management and client review.
Candidate Info
years in workforce
years at this job
Information Technology-security
IT Security Analyst
Monitored IDS/IPS (Snort/ISS), and provided incident response support for various incidents (Policy violation [P2P], Malware, attack on DMZ [SQL injection, XSS], and more.
- Performed malware diagnostic using HBGary.
- Created help desk tickets for security remediation (e.g. removing objects that threatened security postures like malware/rootkit, p2p program, etc.)
- Developed IT security policies, guidelines, baselines, and procedure for the Redskins organization to reflect IT governance adherence (SOX).
- Assisted in the writing and review of organizational security policies to support internal control (access management, contingency planning & testing, Security Awareness, intrusion detection, Patch Management, Anti-Virus, etc.)
- Developing IT security internal control for SOX environment (section 302 & 404). Auditing for Internal control for IT governance project (FISMA/SOX). Auditing domains such as Change Management, Access Management, and Operations for SOX [section 404]
Candidate Info
years in workforce
years at this job
Systems Integration
Information Systems Management
Region It Security Analyst
Assured strict compliance to corporate IT security policies for several business units within U.S. and offshore. Performed regular audits and vulnerability assessments. Wrote and maintained security policies and procedures for a variety business units within the organization. Worked with business units to prepare for 3rd party SAS-70 and PCI DSS audits.
- Wrote security standards documentation for several business units.
- Brought several business units from 20% to 100% security compliance.
- Organized a region-wide security awareness training program for various levels of employees (managers,development staff, networking).
- Worked with the office of the Chief Information Security Officer on roll-outs of new security initiatives.
Candidate Info
years in workforce
year at this job
Information Technology
IT Security Analyst I
Responsible for assuring the integrity of end-user access profiles
- Analyzed information within a variety of end-user access profile databases (using IBM LOTUS Notes) to locate discrepancies
- Modified/changed/added needed information for the preservation of consistent end-user data resulting in integral activity at the production front
- Utilized SQL scripting (using MS Access) for data filtering and the creation of reports from database source data dumps
- Generated final reports (using MS Excel) of end-user access profile data for the company's defense during auditing sessions
- Communicated with management across all divisions in a timely manner to ensure the proper provisioning of application access for reporting employees
- Developed and researched new methods to ensure that residual user accounts in the production front were thoroughly removed with compliance to auditing purposes
Candidate Info
years in workforce
year at this job
Business Administration
IT Security Analyst
- Performed as a liaison to project teams within the IT Infrastructure of Express-Scripts.
- Built Cross-Company Processes aligned with corporate strategy and goals.
- Assisted in development, review and finalization of presentations and training modules through SharePoint.
- Constructed system access playbooks to help guide business users through the company integration.
- Executed root cause analysis of complex business issues and collaborated with team members to develop possible solutions.
- Calculated Daily Metrics for the Security Administration department - Open & Past Due Tasks, Requests and Incident Tickets utilizing Excel Pivot tables.
Candidate Info
years in workforce
years at this job
Graphics And Design
Voice
Senior IT Security Analyst
Developed executive summaries for end-to-end e-mail encryption and enterprise digital rights management. Developed monthly status reports for service interruptions, SPAM statistics, and other IT related issues.
- Created policies and procedures for hospital's HIPAA and SOX compliance.
- Project leader for PostX end-to-end e-mail encryption implementation. Successfully developed and trained pilot group for implementation.
- Advised organizational executives on complex IT issues such as anti-spam, anti-virus, and disaster recovery plans.
- Configured and secured Cisco and Microsoft firewalls. Created ACLs for private, public and DMZ networks.
- Configured LAN-to-LAN and client VPNs for medical professionals and CNMC business partners.
- Monitored wide area network, access controls, event log activities, and end-users for IT security policy enforcement. Assisted Security Operations Center with monitoring and alert creation for security monitoring devices.
- Installed and configured e-mail anti-spam, anti- malware and web based vulnerability security servers. Created mail rules to reduce SPAM and route messages to Exchange and encryption servers. Monitored for Denial of Service attacks.
- Prepared RFPs for information technology procurement.
Candidate Info
years in workforce
years at this job
Vocational Degree
IT Security Analyst
- Selected to serve as one of initial team members of newly launched Security Access Team, with full accountability for Western Region systems security access.
- Partnered with System Administrator and Application Developers to successfully assume responsibility for 5 systems within a 3-year time frame.
- Innovatively developed, produced and documented user ID setup/access and removal process and delivered comprehensive Security Analyst team training program.
Candidate Info
years in workforce
years at this job
Computer Programming
Associate It Security Analyst
Managed program and compliance of Security Access and User Certifications across multiple locations. Reported to Manager of Information Security.
- Provided user access data reports on regular and as needed basis to Database team, IT Security & Compliance, Service Desk, System Administrators, Finance, and Human Resources departments.
- Prepared for and participated in compliance audits, and maintained quality controls.
- Contributed reporting information, data analysis and summaries, and supplied data conversions in response to information requests. Monitored data performance and provided validations.
- Pro-actively analyzed processes and procedures, identified gaps and inefficiencies, initiated improvements.
- Initiated and implemented new MS Access HR database that integrated MVP and Preferred Care post-merger which tracked non-employee data (contractors, consultants, vendors) to a centralized location. Overcame initial barriers, reached out to HR across locations and attained participation. Gathered user and business requirements. Built front-end tools and application for users. Achieved successful adoption of system, utilized by Legal department (training compliance) and Finance (payroll) department.
- Involved in RFP review and decision to purchase SailPoint IdentityIQ, a$500K software Enterprise Identity Management Software solution. As application owner and administrator, coordinated with consultants to set up and install software to pull in reporting data from all other systems in company. Helped configure new system and associated servers, began system implementation, and worked across departments (Operations, Database, and Service Desk) to facilitate install. Partnered with Project Manager to set milestones, and facilitated meetings. Gathered customer requirements and published a Solutions Requirements Document (SRD). Worked as Business Analyst to ensure the application met business requirements for end users.
Candidate Info
years in workforce
years at this job
Certificate
Sr. IT Security Analyst
Deployment, support and management of Enterprise Anti-Virus, Anti-Spyware, Anti-Spam, Email Security, Monthly Vulnerability Assessment, Secure File Transfer (SFTP) Full Disk Encryption, and Password Reset Self-Service solutions.
- Integral part of the team which performed the evaluation, selection and deployment of numerous enterprise security solutions; including, but not limited to full disk encryption, vulnerability scanners, HIP/NIP solutions, and E-Mail encryption.
- Demonstrated to leadership and business unit representatives the need for numerous security solutions, and presented the proposed solutions to same.
- Represent Information Security Services during Corporate New Employee Orientation presentations.
- Administer and support Windows 2003, 2008, SQL 2008, and Linux based security systems and appliances, including patch management, utilizing WSUS for windows based systems.
- Interface with vendors and vendor support staff. Conduct meetings and set expectations for solution proof of concept engagements.
Candidate Info
years in workforce
year at this job
Information Technology - Information Security Specialist
Information Technology – Network Specialist
IT Security Analyst
- Worked as a member of the security operations team providing level two support for technologies and processes that have officially been transitioned through a plan, build, run model.
- Worked with engineering to deploy new security solutions and provide process improvements for solutions already deployed.
- Displayed leadership skills by assisting with the on-boarding of two new employees
- Spearheaded several process improvements within the team that resulted in efficiency and reduced incident count.
Candidate Info
year in workforce
months at this job
Biomedical Engineering
IT Security Analyst
Performed reconciliations on various documents
- Organized monthly reconciliation extracts with vendors
- Designed various Excel formulas to perform multiple functions
- Produced monthly user activity reports
- Monitored user activity abnormalities
Candidate Info
years in workforce
years at this job
Security Management
IT Security Analyst
Selected monthly samples of Security tasks performed by Security Administrators for review and performed analysis of the tasks selected.
- Investigated findings and notified SA of discrepancies found deviating from documentation for resolution.
- Escalated to management as required.
- Directed to proper team for documentation clarification and enhancements as necessary.
- Moved Dept. from a behind status to a current status with processes documented and findings recorded.
Candidate Info
years in workforce
year at this job
Computer Information Systems
Master of Arts
IT Security Analyst
- Demonstrated working knowledge of information technology and security, including scanning tools and computer systems analysis
- Performed independent research and evaluation of emerging security-related technologies
- Created presentations on the benefits of DADS Security Management and presented them to both upper and lower level staff
- Assisted in establishing direction for the agency-wide security function at DADS
Candidate Info
years in workforce
years at this job
Computer Information Systems
IT Security Analyst/supervisor
Provided 2nd Level Tripwire support, including installation, upgrade and administration
- Monitored, analyzed and remediated firm wide correlations
- Built and deployed a Bastion Host on hardened Red Hat Linux server for out of band device management
- Specifically handled UDP packet forwarding for SNMP and SYSLOG
- Configured Netscreen Firewall to process Port Address Translation (PAT) and NAT
Candidate Info
years in workforce
years at this job
Clinical Nurse
IT Security Analyst
Perform Security Categorization using FIPS 199 and NIST 800-60 as implementation guild, Privacy Threshold Analysis (PTA), E-Authentication with business owners and selected stakeholders.
- Develop, maintain, and communicate a consolidated risk management activities and deliverables calendar.
- Work with business owners to ensure timely identification and remediation of jointly owned risk related issues and action plans.
- Perform comprehensive Security Control Assessment (SCA) / ST&E according to NIST SP 800-53A and prepare report on management, operational and technical security controls for audited applications and information systems.
- Review audit logs and provide documentation guidelines to business process owners and management.
- Work with IT system sponsors to document security weaknesses in Plans of Action and Milestones (POAMs), as well as to initiate and support and provide quarterly report on corrective action.
Candidate Info
years in workforce
year at this job
IT Security Analyst
Information Security (INFOSEC)
- Performed systems analysis, security analysis, controls reviews or certification and accreditation afpnet.org.
- Researched INFOSEC solutions and INFOSEC policies and procedures.
- Provided technical support for secure software development.
- Development of the SSAA and the POA&M.
- For the Pentagon Federal Credit Union, performed scanning reviews of internal hosts utilizing Nessus, IIS review, SQL script/review, and ANTLERS, a [company name] proprietary tool.
- Provided analysis and reporting of scanning results, developed work papers and assessments for the client.
Candidate Info
years in workforce
years at this job
Economics
Doctor of Philosophy
Business Admin
IT Security Analyst
Established a set of change management procedures that complemented the day-to-day activities of IT operations unit-performing daily monitoring and auditing.
- Supported the development of a new Siebel data warehouse for Blue Cross-Blue Shields
- Examined and discussed options of existing business models and data flows with clients, and helped in designing appropriate solutions from both technical and business suitability perspective. Protection of assets worth more than $ 4.8 Million USD
- Identified compliance issues for financial services clients, documenting and monitoring technical issues concerning infrastructure and emergency preparedness.
- Led and guided governance projects, designing, building and integrating operational IS security processes using ITIL. Supported the implementation of business continuity plans and disaster recovery, analyze emergency procedures and business disruption scenarios.
Candidate Info
years in workforce
years at this job
Business Administration
Information Systems Management
Master of Arts
Senior IT Security Analyst
Review [company name]'s information technology infrastructure for compliance with PCI, COBIT, HIPAA, NIST, and ISO
- Prepare and present information technology internal control improvement opportunities to executive management
- Developed 35 information technology policies/standards based on regulations, control frameworks, and industry best practices
- Assisted with the remediation of 169 information technology control gaps
Candidate Info
years in workforce
months at this job
Criminal Justice
Science / Information Systems
Science / Computer Information Systems
Sr. IT Security Analyst
Handled successful SOX audit within designated time frames
- Called upon to develop new IT Security policies for the entire organization
- Performed a formal audit of Active Directory and completed report on recommendations
- Attended training on Bit9 and trained the team on proper administration
- Conducted investigations on security breaches and compiled a detailed report that was presented to executives
- Assisted in the remediation of a major virus outbreak
- Audited Exchange EOP and made suggestions to reduce viruses, phishing attempts, and spam
- Created monthly security awareness publications
- Monitored Bit9 and Palo Alto's for potential security issues
- Evaluated new products for possible addition to our security tools
- Worked with vendors to fine tune current security configurations.
Candidate Info
years in workforce
years at this job
Computer And Information Science
Senior IT Security Analyst
- Architected and managed a 3-year, $0.5M enterprise “data security” initiative
- Developed and engineered enterprise data loss prevention (DLP) tools and processes
- Technical program manager for a 2-year, $0.3M PC encryption effort with Credant
- Matured enterprise encryption and key management policies, processes, and tools
- Designed DBMS security strategy with hardening, logging, monitoring, and encryption
- Informed end-users with creatively targeted messages, graphics, surveys, and feedback
- Created 15 information security policies for emerging technologies
Candidate Info
years in workforce
year at this job
Liberal Arts And Sciences
Information Technology
IT Security Analyst
Determined and provided appropriate security access for users in Windows AD, PDMLink, and SAP environments
- Assisted in creation of job templates in SAP enviroments
- Assisted users in access related problems, i.e. password and technical issues
- Assisted in updating of security processes
- Participated in team oriented goals within SAP environment
Candidate Info
years in workforce
year at this job
Business Administration
IT Security Analyst
- Conducted gap analysis between SOP-90-47 and NIST SP 800-53.
- Conducted gap analysis between SBA SSP Template and NIST SP 800-53
- Created a fast C&A approach using data call questionnaire for undiscovered systems to bring in FISMA compliance
- Created several high level handbooks for SBA, Small Business Administration
- Developed vulnerability assessment matrix template per DHS system
- Serve as an Advisor, Interconnected Security Agreements, member for DHS ICE Systems
Candidate Info
years in workforce
year at this job
Mathematics
Mathematics
IT Security Analyst
- Conducted security assessments of management, operational and technical security controls for information systems at the NASA Glenn Research Center.
- Supported the system owners and supporting personnel at NASA Glenn with evaluating and documenting general and information system controls and business processes.
- Documented and monitored weaknesses discovered during security assessment, risk assessment and annual continuous monitoring activities.
Candidate Info
years in workforce
months at this job
Education
Information Technology Systems
Computer Science
Contractor-it Security Analyst
Monitored and enforced compliance with documented and distributed agency system security policies and standards in a team environment. Analyzed TCP/IP network traffic as well as network port traffic for abnormal activity. Protected agency assets by anticipating and leading the response to potential computer-related threats and vulnerabilities.
- Resolved client issue with the confines of the Acceptable Usage Policy & S.S.A. Security Policy
- Monitoring Intrusion Detections and Prevention Systems via Enterasys Dragon, SourceFire & Arcsight Security Information Event Management for active alerts and determine priority of responses.
- Identified possible intrusion attempts or other anomalies.
- Filtered non-threatening network traffic via Bluecoat Proxy SG for enhanced reporting accuracy.
- Incident handling of new threats. Occasionally required to initiate and assist in drafting remediation strategies.
Candidate Info
years in workforce
year at this job
Information Security
Computer Science
IT Security Analyst
Receive and resolve helpdesk tickets and calls in a fast paced environment
- Troubleshoot all issues ranging from network infrastructure, servers, software, and end user equipment for 120
- Assist in implementing SharePoint 2013 into the business environment
- Maintain access controls and security groups
- Implement network security measures to maintain a hardened environment
- Maintain patch management for all software in the business
Candidate Info
years in workforce
years at this job
Information Systems
IT Security Analyst
Supporting the IT Security needs of PPG's global workforce of 39,000 employees and contractors. Support
includes Active Directory administration: user account and security group creation, deletion and administration.
- Exchange 2007/2010 mailbox creation, mailbox/quota management, rights management.
- Unix, Linux and Oracle administration
- Assisted in the design, QA testing and implementation of a globally deployed application for managing
- Lead on quarterly audit of Off-Shore remote access users
Candidate Info
years in workforce
years at this job
It Networking
Information Technology - Security Emphasis
IT Security Analyst Team Lead
Employed for global implementation of a new company-wide smart-card based encryption schema for use in all of the storage devices utilized through the organization (SAN, Clusters, NAS, Backup devices, etc). This included all administrative and technical duties (such as network design, user and security key management, appliance image creations, etc), required clearance, and adherence to all corporate policies and procedures with respect to internal security.
- Team leader for one of the deployment teams.
- Worked varying shifts on a 24/5 basis, to accommodate offices located in different countries.
- Worked with multiple groups across the globe to roll out, troubleshoot and implement the solution.
- Completed the deployment of over 600 DECRU security appliances globally ahead of a hard deadline by over 60 days.
- Administration and Level 1&2 support of DECRU appliances, encryption data forts.
- Entrust, VeriSign, Secure FTP and Citi SFT account administration and support.
Candidate Info
years in workforce
months at this job
Mass Communications
IT Security Analyst
- Daily completion of auto generated tickets.
- Daily maintenance of employee login database for various software systems.
- Troubleshooted dial-in capabilities for employees nationwide.
- Part of the rotation for on-call assistance, available 24/7.
- Resolved issues via inbound calls regarding ticketing system and completion of these issues.
- Emailed correspondence with users on a daily basis regarding issues with dial-in capabilities. Worked on special projects.