We provide IT Staff Augmentation Services!

Information Security Analyst Ii Resume

3.00/5 (Submit Your Rating)

PROFESSIONAL SUMMARY:

  • Competent IT professional with successful track record of s in delivering business improvement solutions. A reliable and honest individual who is highly motivated and thrives on challenges. Able to prioritize and set high standards for self, works well under pressure, a good listener and a good team player. A self - motivated and capable person who enjoys the challenge of learning new skills. Equipped with more than 9 years of proven experience in cybersecurity, data management, and threat assessment. Skilled leader with background managing teams to measurable revenue and business targets. Demonstrated track record of cultivating and sustaining relationships with clients in the public and private sectors across multiple organizations.

PROFESSIONAL EXPERIENCE:

Information Security Analyst II

Confidential

Responsibilities:

  • Oversee SIEM service operations, support the deployment, configuration and baselining of SIEM solutions.
  • Part of a group in reviewing security alerts across various client implementations of SIEM systems in a multi-tenant environment.
  • Advice clients on security best practices and participate in monthly service delivery calls. Actively participate in industry events act as an advisor to internal technical resources.
  • Work on communicating and report security incidents to clients as per SLA’s. Improve on current security policies and procedures.
  • Develop scripting, configuration, and deployment of web application security tools.
  • Developed new organizational SOP and organized informational gathering techniques now used throughout our current SOC.
  • Developed SOP communication guidelines for client communications.
  • Deploy XDR application to end-points, monitor XDR deployment across multiple client environments.
  • Perform remediation task dealing with XDR applications, SentinelOne.
  • Perform Vulnerability assessments for multiple client environments and produced reports related to compliance requirements.
  • Perform monthly Threat Hunting tasks to determining possible threat vectors within client environments.

Data Center Architect and Cyber Specialist

Confidential

Responsibilities:

  • Coordinate remotely and in-person full-time with four staff member team to manage enterprise environments, offer system support, asset handling, and product assurance.
  • Involved with team building exercises, formulating action plans and development of improved client interactions with a client satisfaction rating increase of 90% and increase profit margin from support ticket handling by 100%.
  • Educating Clients on IPMI system administration utilities; HPE iLO, HPE OneView, Dell iDRAC. System Administration of virtual environments dealing with ESXi, Hyper-V, Windows Server, and Linux Distributions.
  • Working with both Federal and Commercial clients dealing with installation, configuration, and optimization of enterprise servers, storage, networking components on dark site locations, SCIFs and SOC locations.
  • Ensuring regulatory compliance of enterprise systems.
  • Strengthened network security from external exploitation from known and unknown risks, resulting in zero successful breaches across government and private client accounts.
  • Assessed and reduced department vulnerabilities by 30% through system hardening including active directory, access control list implementation, system monitoring, and health assessments, installation of system firmware and configurations.
  • Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
  • Prepare incident reports of analysis methodology and results.
  • Share information with fellow analysts to improve the efficiency and response capabilities of the SOC organization and services.

Incident Handler/ Operations Agent

Confidential

Responsibilities:

  • Utilizing binary exclusion to improve and streamline Hardware and Software troubleshooting. Improved troubleshooting ticket system and resolving problems efficiently by 30%.
  • Hardware component replacement, upgrades, and system configuration; Software installation and Operating System configuration with system optimization.
  • Performing complex data transfers, backups, and migrations; improved asset assurance handling and data retrieval from client systems.
  • Utilizing virus and malware removal tools; Norton Power Eraser, Webroot Scanner, Anti-Malware Bytes, McAfee Endpoint Security Tool, MSRT, Panda Removal Tool, TrendMicro Scanner.
  • Configured SAF (software-based firewalls), OS optimization; improved base performance of client systems by 10%.
  • Client facing communication, establishing detailed notes of potential issues clients faced with systems.
  • Created clear technical outlines with clients and creating troubleshooting tickets, educating clients on proper usage of their computer systems and mobile devices for both Windows, OSX, and Android devices.
  • Providing clients with world class customer support and ensuring their questions and concerns were addressed in a timely matter. Educating clients on best practices for their computer system as well as providing about internet security and safe on-line practices. Improved customer satisfaction levels to an all-time high of 98% customer satisfaction rate.
  • Experience with current cyber threats and the associated tactics, techniques and procedures used to exploit computer networks.
  • Research, analysis, and response for alerts; including log retrieval and documentation.
  • Analyze malicious campaigns and evaluate effectiveness of security technologies.
  • Identify gaps in IT infrastructure by mimicking an attacker’s behaviors and responses.
  • Review alerts generated by detection infrastructure for false positive alerts and modify alerts as needed.
  • A passion for research and uncovering the unknown about internet threats and threat actors.

We'd love your feedback!