Cyber Security Analyst Resume
4.00/5 (Submit Your Rating)
SKILLS/ EXPERIENCE:
- Oracle
- Microsoft
- UNIX
- IBM
- Network Engineer
- Adobe Acrobat
- MS Office
- Vulnerability Management / Response and/or Remediation
TECHNICAL SKILLS:
RMF, FISMA, NIST 800 - 53, NIST 800-37, Tenable Nessus Scanner, Microsoft Office 2010/2013, Microsoft Windows 7/8/10, Microsoft Windows, Splunk.
PROFESSIONAL EXPERIENCE
Confidential
Cyber Security Analyst
Responsibilities:
- Conducted vulnerability scanning( using nessus), system hardening, security assessment, and penetration testing(using nmap)
- Interpreted and communicated scan results ( often customized as needed) verbally and written to stake holders
- Strong knowledge of NIST 800-53 Revision 3/4, NIST 800-37, FISMA, HIPAA, Risk Management Framework (RMF), and additional cyber security standards and policies.
- Performed and presented vulnerability assessments
- Quantitatively and qualitatively identified risks to organizational assets, based on scan results
- Conducted documents analysis; assisting with privacy complaints and incidents in accordance with federal privacy policies and procedures
- Firm understanding of networking basics
- Ensure compliance with annual FISMA deliverables and reporting.
- Assisted in proactively developing patch and vulnerability management procedures and processes within the security operations center (Using SCCM)
- Working knowledge of bash shell scripting language and linux
- Provided remediation strategies for vulnerabilities impacting network devices, servers, workstations, etc
- Validated security configurations to ensure they are implemented in accordance with Cybersecurity policies, requirements, and directives, including compliance with Security Technical Implementation Guidance (STIG), Security Requirements Guides (SRGs), and checklists.
- Worked with engineering/architectural teams to assist with privacy assurance protocols.
- Reviewed new security solutions designs and specifications to validate they are ready for existing security operations environment
- Familiarity operating in cloud based environments (AWS/Virtual Systems)
- Operated configuration management tools to support configuration identification, control, reporting, and auditing.
- Documented and analyzed deficiencies in Plans of Actions and Milestones (POA&Ms) or requests prepared for Acceptance of Risk (AoR)
- Develop and maintain SSPs and all other system security documentation, reviewing and updating them at least annually for all assigned systems
- Working knowledge of use of Security Event and Information Management (SIEM) tools for signs of malicious or suspicious activity
- Working knowledge and use of tools including Tenable Security Center, SCCM/WSUS,
- Experience with standards such as Open Web Application Security Project( OWASP), Common Vulnerability Scoring System(CVSS), DISA STIGs, Center for Information Security (CIS) benchmarks, Common Vulnerabilities and Exposures (CVEs)