Malware Analyst Resume
5.00/5 (Submit Your Rating)
SUMMARY:
- Cyber Security analyst with many years of experience performing incident response leveraging various different tools to help during the triage of an event/incident.
- I am looking for an opportunity to enhance my overall cyber security experience in a challenging environment. Focused on enhancing cyber security posture, based on proactive measures meanwhile expanding my skillset.
- Provided changes to the interface of an internal tool which made it more efficient and ensure quicker incident response technique for clients
- Improved team efficiency by suggesting shift changes for better coverage for overnight and weekend shifts
- Trained team members on using open source intelligence to better determine malicious activity
- Received employee recognition from company managers for client satisfaction due to thorough explanations of incidents
- Promoted to after - hours on call team for emergency alerts & incidents
PROFESSIONAL EXPERIENCE:
Confidential
Malware Analyst
Responsibilities:
- Monitored and responded to security events/incidents for clients in a 24 by 7 environment
- Analyzed malicious traffic to identify network based Confidential using various Confidential analysis tools
- Analyzed initial attack vectors for various incidents to identify delivery mechanism for the malicious payload
- Investigated and identified recon activity related to security scans using various open source information including GeoIP, Virustotal, Whois information and many others
- Blacklisted domains & IP addresses that were identified during incidents
- Notified clients of alerts & incidents when malware was found on client endpoint
- Responded to clients with in depth analysis of malicious incidents including initial attack vector and network based forensics to identify the various Confidential
- Flagged malware strings within malicious content to create rules for capturing malware within future scans
- Analyzed/flagged hosts and IP addresses carrying malicious content
Confidential
TAC Analyst
Responsibilities:
- Pushed security updates/patches/anti-virus agents utilizing Confidential on users workstations
- Review & responded to Confidential alerts
- Review & monitored Confidential alerts
- Conducted log searches using Splunk based on open and close source threat intelligence
- Review & monitored SourceFire alerts
- Setup mobile device encryption to allow corporate email setup on company/personal devices
- Reviewed/monitored spam/phishing emails
- Managed encryption recovery for full disk encryption accounts through Confidential
- Troubleshot and repaired company machines requiring reimages due to malware infections or hardware upgrades
- Performed backups/transfers from infected/faulty machines/drives
- Managed administrative rights for workstations and desktop applications to remain compliant within security measures
- Setup network drives for thin client users
- Managed user accounts in Active Directory (disable/enable, terminate, move, add to groups)
- Managed workstations in Active Directory (move, add to groups, enable/disable rights)
- Setup Remote Access tokens for users including key fob and software based tokens for applications and sites requiring dual factor authentication
- Installed/Setup/Troubleshot VPN software/connections for users working offsite (Pulse Secure, CISCO)
- Pushed software installs/updates using Confidential to users workstations
- Provided over the phone support and troubleshot VPN/network issues for remote users
- Managed Lync conferencing accounts for users through Microsoft Server
- Worked alongside teams company-wide to promote security awareness and technical efficiency
Geek Squad Agent
Confidential
Responsibilities:
- Used troubleshooting skills to quickly identify complex software and hardware issues on computers, mobile devices, networking equipment, and peripherals.
- Monitored and removed various types of malware infections including Adware, Spyware, Ransomware, Trojan viruses from client machines.
- Installed and setup Antivirus and Internet Security software for clients
- Setup secure networks enabling WPA/WPA2 for devices at client sites including modems/routers/extenders
- Performed repairs and maintenance on a wide variety of operating systems including, Windows XP, 7, Vista, 8, Mac OS X.
- Replaced various hardware components including hard drive, memory, processor, video card, and motherboard on desktops, notebooks, and netbooks.
- Used internal ticketing system to document and manage the lifecycle of the repair.
- Extensively collaborated with various manufactures to resolve unknown software and hardware issues.
- Performed data transfer onto new computers and performed data recovery on faulty hard drives.
- Provided detailed documentation of repairs throughout the entire process.
- Followed up with clients to increase client retention and maintain resolution.