- Featured in:
Find out what is the best resume for you in our Ultimate Resume Format Guide.
Additional Data Systems Administration Resume Samples
Network Security Analyst Resume Samples
No results found
0-5 years of experience
Provided security administration services to the bank’s most sensitive operational divisions.
- Managed security administration services for the human resources, audit, and information technology divisions.
- Generated Active Directory and Lotus Notes user accounts for multiple business units and resolved over 100 incoming calls by System Administrators on a daily basis.
- Improved the Virtual Tech/Request ticketing system availability from 89% to 99% and completion of core job processes from 85% to 97%.
- Reduced the average number of open Lotus Notes tickets by 85% by improving the ticketing application’s user interface design, creating a dedicated Lotus Notes ticket queue, and implementing staff training.
- Verified system activity events intercepted by the TEARS auditing system to ensure compliance with the bank’s policies and procedures, enforcing system usage guidelines, managerial approvals and auditing requirements where appropriate.
- Enhanced Lotus Notes procedures defining the guidelines for career promotion of multiple team members.
- Achieved a 50% increase in customer-satisfaction by expediting requests, ensuring they were completed within a two-day time frame, and improving troubleshooting methodologies.
- Consistently exceeded department goals year-over-year by implementing continuous process and technical improvements in the ticketing system as requested by users.
- Recipient of [company name] Corporate Operations and Technology RAVE Program Award for delivering quality customer service and performance excellence.
6-10 years of experience
Managed network system and application security policies and provided enterprise-wide technical support.
- Demonstrated a high degree of competency in performing network security duties in successfully preventing breaches to the enterprise’s networks, systems, corporate files and patient data during a nine-year tenure.
- Administered corporate security standards and policies across a wide variety of Novell Directory, Active Directory, Mainframe RACF, Lotus Notes, IDX/GE Centricity and McKesson PAC’s systems.
- Responsible for managing and monitoring individual security policies for 30,000+ end-user clients.
- Recognized by management team on multiple occasions for exceptional performance in carrying out duties.
0-5 years of experience
Served as primary systems security for customers in various industries including financial, healthcare, and energy industries utilizing tools like tcpdump, ngrep, nessus, and Invision SIEM
- Monitored, tuned, configured, and supported 1800+ Snort IDS and log sensors
- Analyzed, investigated, and escalated security incidents to customers
- Conducted analysis of network traffic and event management on average of 15 incidents per hour
- Used Debian and Redhat Linux for support, pcap analysis, Parature ticketing system, and bash scripting
- Interfaced, supported, and suggested solutions for over 1,000 unique customers and provided support and attack mitigation within 30 minute SLA
- Received certifications equivalent to the Department of Defense 8570 IAT Level III and CND Handler
0-5 years of experience
Managed a team which was responsible for providing analysis and support to Department of Defense entities.
- Project lead responsible for standing up an analytical team that provided quick reaction analysis for high priority missions.
- Personally trained 12 personnel on incident handling procedures, analysis techniques, and reporting guidelines.
- Developed a robust training plan that included college-level courses, professional certifications, standardized on-the-job training requirements, and periodic reviews of knowledge.
0-5 years of experience
Monitored and managed all systems and data access requests requiring review and approval. Created, modified, and deleted user profiles and other access controls. Worked closely with technical support teams to coordinate security database system maintenance.
- Improved efficiency by investigating and documenting security incidents.
- Facilitated productivity growth by assisting with creation of cross-training documents and procedures.
- Contributed to increased issue resolution by assisting with escalated trouble tickets from helpdesk.
0-5 years of experience
Overall responsibility are to provide information assurance services for 2500 workstation users, more than 200 enterprise servers, 250 network devices, data and applications critical to the safety and success of the HA/TMA mission. My primary function as a Security Analyst consisted of organizing and managing the processes and tasks related to the security of IT systems within the HA/TMA environment. Coordinated the required security efforts in support of the network operations center and collaborated with the end client and customer to their satisfaction. Instrumental is using DoD VMS (Vulnerability Management System) for all information assets and ensure that they are compliant per STIG (DoD Security Technical Information Guides) consensus and baseline standards for software, equipment and devices in a distributed environment.
- Verified event analysis from event log data, firewall and proxy log reviews for incident response purposes.
- Monitored Intrusion Prevention System (McAfee Intrueshield) for all real-time alerts detected on the HA/TMA network.
- Provided Incident Response on all managed network devices, workstations and Servers.
- Worked directly with the Network Operations Center (NOC) Engineering Group to assist with implementation of security related controls.
- Created proactive processes, trend analysis, and threat detection operating procedures per NIST (National Information Standards of Technology).
- Provided recommendations to the government customer on best practices for defense in depth from a security perspective.
- Evaluated and assessed compliance with established information assurance policies and revised Security Operation Center procedures and desktop guides.
- Performed security assessments and evaluation for software and equipment and supported security analysts in a team of technically diverse personnel.
0-5 years of experience
Managed and maintained anti-spam and Internet access servers, including monitoring & managing user accounts and system updates.
- Supported a mixed Windows & AD environment, including light Exchange Server support.
- Managed and maintained citywide anti-virus/anti-spyware system.
- Assisted with light Cisco firewall/IDS/IPS and VPN monitoring and configurations as needed.
- Provided support and training to users with various Microsoft Office & Outlook issues.
- Assisted with policy creation, documentation and implementation as needed.
0-5 years of experience
Sorted, filed, and organized approx. 80-150 documents on a daily basis
- Sent and reviewed approx. 500-650 Compliance emails per week
- Resolved a minimum of 30 customer service calls per week
- Utilized MS Office, WebEx and USD on a daily basis
- Analyzed & initiated approx. 30-50 helpdesk requests per week
- Designed report layouts on a monthly basis
- Compiled and organized over 750 pieces of software into Excel database
0-5 years of experience
Coordinated day-to-day computer network defense reports.
- Updated the ANSOC network Information Assurance documentation to ensure compliance with the Army Networthiness Security program.
- Reviewed and edited Certification & Accreditation documents for the ANOSC staff to ensure compliance with FISMA and OMB regulations.
- Monitored 190 computer terminals for intrusion detection and user violations at DISA Headquarters using UNIX OS.
- Served as a HOCNET Help Desk Technician at DIA trouble-shooting hardware and software problems for a Global Area Network
0-5 years of experience
Insured that the SOC is operating with exceptional response times as expected by the customer.
- Informed engineering and management of critical systemic GUI and functional errors.
- Trained multiple staff members during night shifts.
- Documented device health issues.
- Audited firewalls for SAS70 compliance.
- Wrote security articles for use with company website and publications.
0-5 years of experience
Performed analysis of threats and network anomalies in a 24×7 environment and responded to security threats during on-call rotation
- Created string based filters for Snort intrusion detection systems
- Provided support for computer security incidents, active monitoring, and preventative activities
- Participated in periodic audits, regular monitoring, and performed vulnerability assessments
- DOD Secret Clearance, granted June 2002
0-5 years of experience
- Monitored Securas internal network for intrusion using Reflex IPS
- Provided Level 2 support for client computers and networks by monitoring client networks, cleaned viruses/spyware from Windows XP/Vista workstations, troubleshot loss of internet connectivity and a range of other computer issues.
- Wrote training manual/FAQ for Network Security Analyst team to enable them to troubleshoot client computer issues that occurred during evening and weekend hours.
- Led team effort in expanding Network Operations Center to increase client base.
0-5 years of experience
Conducted vulnerability assessments on US Naval information systems using Nmap, Fport, Scanline Vulnerability Scanners and provided computer/ network security incident reporting along with packet level analysis.
- Conducted Blue Team Training exercises for Naval Ships worldwide on Network Security vulnerabilities.
- Conducted White Box, Grey Box and Black Box penetration testing on Navy Networks using a variety of techniques / processes to exploit potential weaknesses systems, applications on Shipboard platforms.
- Coordinated with various shipboard administrators and personally facilitated swift corrective action to fix assessment discrepancies noted during vulnerability assessments.
- Utilized Information Assurance tool kit on the LINUX operating system to penetrate shipboard networking systems.
- Provided Computer and Security Network training, assistance, and incident handling support to U.S. Navy Fleet units and Military Sealift Commands.
- Performed Intrusion detection analysis with Snort and Real Secure while monitoring intrusion detection sensor for malicious activity.
- Performed password auditing assessments using Passfilt, Pwdump2&3, and Nutcracker for Naval ships involved in USS WASP Expeditionary Strike Group
0-5 years of experience
Conducted vulnerability assessments on US Naval information systems using Nmap, Fport, Scanline Vulnerability Scanners and provided computer/ network security incident reporting along with packet level analysis.
- Conducted Blue Team Training exercises for Naval Ships worldwide on Network Security vulnerabilities.
- Conducted White Box, Grey Box and Black Box penetration testing on Navy Networks using a variety of techniques / processes to exploit potential weaknesses systems, applications on Shipboard platforms.
- Coordinated with various shipboard administrators and personally facilitated swift corrective action to fix assessment discrepancies noted during vulnerability assessments.
- Utilized Information Assurance tool kit on the LINUX operating system to penetrate shipboard networking systems.
- Provided Computer and Security Network training, assistance, and incident handling support to U.S. Navy Fleet units and Military Sealift Commands.
- Performed Intrusion detection analysis with Snort and Real Secure while monitoring intrusion detection sensor for malicious activity.
- Performed password auditing assessments using Passfilt, Pwdump2&3, and Nutcracker for Naval ships involved in USS WASP Expeditionary Strike Group
0-5 years of experience
Identified, troubleshoot, and resolve issues related to firewall rules.
- Created, tested and maintains new and existing firewall rules.
- Consulted with users to determine requirements, and provide security solutions to meet needs.
- Supported Wide Area Networking, DNS, DHCP and Proxy server technology.
- Interact with technical and non-technical business users to provide understanding, interpretation and documentation requirements.
- Performed and assisted in development of risk assessments and risk mitigation framework.
- Provided risk assessment analysis for the protection of systems and data.
0-5 years of experience
Created assessment of client’s current network topology and security design.
- Developed documentation and diagrams of as-built data network.
- Redesigned architecture for improved security and availability using multiple VLANs and Cisco ASA firewalls.
- Implemented pilot deployment of Cisco ASA 5510’s for firewall and VPN services.
- Contract completed.
0-5 years of experience
Provided tier 2 support of both the Secret Defense Engineering Network (SDREN) and the High Performance Computing Modernization Program (HPCMP) Netscreen firewall suites
- Completed initial configuration and installation of DREN Security stacks to include NetScreen firewalls, Foundry switches, and NID Collectors at various sites.
- Constructed baseline and full configurations of Juniper routers, Foundry Switches and TACLANE encryptors in support of the expansion of the SDREN II Network
- Provided 24X7 DREN Firewall support assisting customers with policy change requests and troubleshooting network issues
0-5 years of experience
Monitored and analyzed security alerts (primarily from IDS, Firewall, Windows, Web, Antivirus, etc.) using security tools and escalated them to local support personnel
- Logged event correlation Security Information Management (SIM) tools such as, ArcSight, Niksun, Websense, Wireshark, HBSS, and McAfee to analyze network traffic for malicious intrusions
- Escalated events that warranted immediate attention for in-depth analysis to Intrusion Responders
- Maintained system hardening, vulnerability assessment and management, antivirus, firewalls, and techniques for analyzing TCP/IP network traffic and event logs
- Reported the daily IDS numbers from automated predefined reporting tools
- Contributed to simplifying explanations of exploits within the daily report
- Followed incident instructions in problem resolution in accordance within the established troubleshooting procedures and Standard Operation Procedures created for the US Courts security and system administration program
0-5 years of experience
Analyzed, designed, implemented and maintained directory services and network security across the enterprise
- Developed and maintained information security policy, training, and awareness
- Monitored compliance with university’s security policy, coordinated investigations and reported security incidents
- Performed network penetration tests, application vulnerability assessment scans and risk assessment review
0-5 years of experience
Planned infrastructure development for perimeter systems that comply with IT Policy Manual (ITPM)
- Interfaced with infrastructure teams implementing best practices for security and controls
- Planned changes and upgrades, and administered customer facing systems
- Reviewed and planned system deployments to comply with company standards
- Consulted system and application owners on application security rating and compensating controls
- Developed network change controls to implement newly architected solutions and applications
- Planned and reviewed change controls in change management meetings to facilitate changes
- Coordinated moves of various infrastructures to newly deployed hardware
0-5 years of experience
- Conducted real-time investigations into Air Force computer network assets for Emergency Response Team.
- Mastered specialized software to identify malicious coding in IP packet data.
- Facilitated computer network defense operations thru examination and communication of possible network compromises.
- Provided early detection and expedited resolution against dataflow anomalies in Air Force gateway devices and connectors.
0-5 years of experience
Responsible for developing and implementing security system in coordination with management and administrators for IT related agents. In-depth knowledge of secure network design concepts, network protocols, encryption tools, firewalls and intrusion detection/prevention systems Performed network security monitoring, event analysis, remediation, incident escalation and impact analysis.
- Provide backup for effective implementation and qualysguard programs and initiate necessary security measures.
- Administer activation and Splunk network security systems, maintain reports, and validate of network service security.
- Perform different duties like checking and overseeing operating systems with proper maintenance of Microsoft activation methods.
- Created tickets using qualyguard remedy to document all troubleshooting and changes performed on devices.
- Prioritized workload to ensure that Service Level Agreements were always met and improve efficiency and service excellence.
0-5 years of experience
Provided support to enterprise IT management staff in the areas of practice and policies of security and network engineering.
- Performed security review of networks, systems and applications to assess compliance with enterprise information security standards.
- Developed and evaluated system security documentation, performed analysis of security accreditation documentation, developed and evaluated security policy requirement compliance, and evaluated risk mitigation strategies.
- Performed automated vulnerability testing and scanning, performed business continuity planning and risk mitigation practices.
0-5 years of experience
Analyzed site/enterprise Computer Network Defense policies and configurations and evaluate compliance with regulations and enterprise directives.
- Assisted with the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems, and processes).
- Conducted and/or support authorized penetration testing on enterprise network assets.
- Conducted required reviews as appropriate within environment (e.g., Technical Surveillance Countermeasure Reviews (TSCM), TEMPEST countermeasure reviews).
- Maintained deployable Computer Network Defense audit toolkit (e.g., specialized Computer Network Defense software/hardware) to support Computer Network Defense audit missions.
- Maintained knowledge of applicable Computer Network Defense policies, regulations, and compliance documents specifically related to Computer Network Defense auditing.
- Performed technical (evaluation of technology) and non-technical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (i.e., local computing environment, network and infrastructure, enclave boundary, and supporting infrastructure).
- Prepared audit reports that identify technical and procedural findings and provide recommended remediation strategies/solutions.
0-5 years of experience
Analyzed and implemented security policies for mainframe, Novell, and NT users. Developed procedures for terminated users as well as expired accounts. Worked with 22 Novell admin groups in order to create user/admin account standards.
- Consolidated user accounts from various Novell servers into an Access database for account management
- Helped to standardize user ids and passwords across multiple systems
- Monitored audit reports for unauthorized use
0-5 years of experience
Answer phone calls to the security monitoring center and handle requests and calls.
- Coordinate with system administrators to ensure system integrity by testing and troubleshooting alarm and physical access control devices.
- Monitoring application, CCTV monitoring, access control systems and or security surveillance/monitoring systems.
- Conducted network systems security auditing.
- Managed Active Directory (created accounts, reset passwords, and allowed access to different directories).
- Perform system backups and restorations & Perform onsite security assessment.
- Identify and create processes for tracking and measuring alarms, calls, emails, Remedy, and system issues to be evaluated and monitored systematically for escalation.
0-5 years of experience
Supported the NASA Security Operations Center
- Monitored agency sensors and SOC systems for security incidents
- Provided incident handing and response support for the agency
- Performed packet analysis and identified malformed packets
- Created rules and modified filters in various software
0-5 years of experience
Managed a team of 5 network security analyst for the Navy/Marine Corps Intranet.
- Detected and interpreted various network threats to include malware, viruses and intrusive applications.
- Detected malicious and harmful software on client/network servers and workstations.
- Assembled, installed and administered Cisco IDS appliances and Symantec ManHunt IDS.
- Interpret DoD security guidelines and instructions
- Performed technical security training for newly hired security analyst.
- Performed network troubleshooting techniques to determine network latency and outages.
- Performed system risk analysis and developed risk assessments reports.
0-5 years of experience
Analyze host and ownership details provided for network assets as records in IP Control IPAM software.
- Work with regional data engineers to inventory and correctly identify properties of hosts within their regions
- Wrote queries to produce reports daily and monthly as requested by data engineers
- Analyze data for accuracy and improved data efficiency to 90 percent.
- Used pivot tables to show efficiency progress on a weekly basis to the regional directors.
Network Security Analyst Duties and Responsibilities
To accomplish their primary goal of protecting computer and telecommunication systems, Network Security Analysts perform many tasks. We analyzed several job listings to identify these core Network Security Analyst duties and responsibilities.
Monitor Networks Network Security Analysts conduct periodic network monitoring and intrusion detection analysis to determine if there have been any attacks on the system. They analyze network traffic to identify anomalies, and test the information security controls for weaknesses.
Respond to Threats If malicious activity has been detected in the system, the Network Security Analyst takes mitigating actions to contain the activity and minimize damage. They may also facilitate forensics analysis to determine the source of the threat.
Design and Implement Safeguards Network Security Analysts design and implement new safeguards to protect the system. They work with other IT teams to implement the new safeguards, whether it is in the form of software, hardware, or new operating procedures.
Communicate Security Issues to Management The Network Security Analyst works with stakeholders at all levels of the organization to communicate the state of information security, inform of possible risks, and suggest ways to improve security.
Research Emerging Threats Network Security Analysts must stay on top of emerging threats and vulnerabilities in IT security. They conduct research, and attend conferences, professional association meetings and technical symposia to gain awareness of the latest information security technological developments.
Network Security Analyst Skills
Self-driven and able to work well as part of a team or individually, a successful Network Security Analyst is an analytical thinker with a drive to solve problems. They think well on their feet and can be proactive in challenging situations. In addition to these general skills and personality traits, employers are seeking Network Security Analyst candidates with the following skills. Core skills: Based on job listings we looked at, employers want Network Security Analysts with these core skills. If you want to work as a Network Security Analyst, focus on the following.
- Professional experience developing and implementing new security systems, security programs, protocols and maintenance of existing systems
- Excellent project management and planning skills
- Strong written and oral communication skills, and the ability to communicate technical information to a non-technical audience
- In-depth knowledge of data communications and network experience of operating systems and tools
- Knowledge of a variety of current and emerging technologies
- Knowledge of information security solutions, including data loss prevention, intrusion detection and prevention, network security monitoring and vulnerability management
- Understanding of current threats and trends in Information Security
Advanced skills: While most employers did not require the following skills, multiple job listings included them as preferred. Add these to your Network Security Engineer toolbox and broaden your career options.
- Knowledge of PERL or other shell scripting language
- Familiarity with database construction and analysis.
- Security or network certification
- Privacy certification such as CIPP, CIPM, or CIPT
Network Security Analyst Resources
We searched the Web to find the best industry resources to help you continue exploring a career as a Network Security Analyst. From thought leaders to industry groups, this list is packed with opportunities to learn, connect and engage. On the Web
Krebs on Security – Keep up to date on the latest in information security with this blog from a former Washington Post report.
Security Bloggers Network – Find out just about anything from this network of blogs and podcasts from over 300 IT security experts.
Naked Security – An informative blog from a respected name in IT security. Industry Groups
National Cyber Security Alliance – A public/private partnership with the Department of Homeland Security, NSCA aims to spread awareness of cyber threats.
Information Systems Security Association – Learn, engage and network with this large national organization of information security professionals. Network Security Analyst Books
Network Security: A Beginner’s Guide – An introduction into the basics of network security.
Applied Network Security Monitoring: Collection, Detection, and Analysis – A guide to monitoring a system for security threats, a key aspect of a Network Security Analyst’s job.
Network Security Hacks – Tips and tricks to improve network security against modern threats.