- Featured in:
Looking for cover letter ideas? See our sample Security Analyst Cover Letter.
Find out what is the best resume for you in our Ultimate Resume Format Guide.
Additional Safety Security Resume Samples
Security Analyst Resume Samples
No results found
6-10 years of experience
Planed, designed, and implemented security measures to protect user data from hackers.
- Redesigned recovery sequences and saved over $4.2M in IT man hours.
- Monitored, assessed, and fine- tuned IT business continuity and disaster recovery program
- Performed network penetration tests, application assessment scans and risk assessment reviews.
- Improved security systems with in-depth programming in UNIX systems.
- Knowledge of information security standards, network penetration testing, and application vulnerability assessments.
- Monthly training of security education which includes risk analysis and updated systems.
0-5 years of experience
Provided Security authorized and approved access to internal and external clients/users, by adhering and enforcing Security policies and procedures.
- Provided Administration and Product Support to internal and external clients/users as required
- Ensured the integrity, confidentiality and security of information are maintained and retained according to [company name].
- Identified and processed dormant IDs from all applicable system/applications
- Resolved and or supported application and user maintenance issues
- Coordinated and managed User Maintenance projects
- Met or exceeded Service Level Agreements
10+ years of experience
Proven experience in design, installation and management of computer security systems in a large mainframe environment. Broad exposure to the pharmaceutical and consumer products industries.
- Project lead for MVS/CICS ACF2 to RACF mainframe security conversion.
- Primary contact for all security-related communications between Kodak, IBM, all contractors, and Sterling. Reviewed and resolved ACF2 and RACF security violation reports.
- Provided Novell Netware, Microsoft NT, and ccMail/GroupWise e-mail security and administration.
- Developed and executed a plan to decentralize mainframe security administration between two major manufacturing divisions of Sterling Drug.
- Coordinated with internal and external auditors on security procedures and policies.
0-5 years of experience
Served as an Information Security Analyst on the UNIX subject matter expert team.
- Created or deleted security policies in a UNIX environment.
- Edited access controls to UNIX user groups and host groups, preventing any unauthorized access.
- Coordinated with clients locally and internationally to ensure proper ownership was delegated to UNIX user groups and host groups.
- Provided technical assistance to clients experiencing access issues any UNIX amenity in a rapid manner, using on-call or share screen technologies.
- Analyzed raw data to ensure no discrepancies were found with UNIX resource ownership or UNIX user groups or host groups.
- Assisted in migration over 7,000 critical servers to new frames.
0-5 years of experience
Splunk administrator, providing strong security intelligence, rapid incident response, and seamless log management across 300+ applications
- Created internal website and working group with 40+ members to promote Splunk and mentor new users
- Performed 30+ comprehensive vulnerability assessments of client facing websites, resolved hundreds of vulnerabilities
- Increased security posture for over 300 web applications with reverse-proxy integrations during SDLC
- Internal and external PKI administrator – distributed certificates providing 802.1x authentications for thousands of devices
- Automated security review process using SharePoint and InfoPath forms services, scripting
0-5 years of experience
Member of the SRA Security Team supporting the United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Program Office.
- Managed Certification and Accreditation (C&A) activities related to accreditation of US-VISIT core mission and support systems and the development of system releases.
- Conducted system security assessments based on NIST 800-53.
- Generated security documentation, including: security assessment reports; system security plans; contingency plans; and disaster recovery plans.
- Supported security tests and evaluations (ST&Es).
- Provided security support and evaluation to development teams in order to integrate information assurance/security throughout the System Life Cycle Development of major and minor application releases.
- Created and tracked POA&Ms using TrustedAgent FISMA (TAF).
- Developed E-Authentication and FIPS-199 worksheets.
0-5 years of experience
Member of Access Management team that provides support for LAN, Mainframe, and Application support to over 4000 members of a Medicare Contractor.
- Managed and provides technical support for wireless access application for over 1000 user computers.
- Provided input on the revising of Standard Operating Procedures that assisted the company during FISMA and 912 audits.
- Monitored Local Administrator accounts to verify that users were in compliance with business Standard Operating Procedures.
- Manages the quality control of domain user accounts.
0-5 years of experience
Responsible for day to day support of technical SAP R/3 security role issues and end user administration
- Designed and developed SAP R/3 security roles
- Developed solutions for securing custom transactions, tables, and programs in SAP R/3
- Reviewed and revised application security roles to accommodate the changing business needs
- Documented, maintained, and communicated corporate information security policies, procedures, and standards
0-5 years of experience
Execute PCI-DSS 3.0 audits addressing security threats, security risk assessments, process improvement initiatives, regulatory requirements, compliance initiatives or other risk analysis requests from the Business Units.
- Lead testing of the assigned PCI-DSS requirements and support the continuous compliance requirements throughout the year.
- Subject Matter Expert and source of security compliance knowledge to provide advisory services to business units and assistance in understanding regulatory and compliance requirements pertaining to security risk.
- Ensure the protection of Symantec data by identifying areas of non-compliance or security threats within reviewed control environments.
- Participate in multiple projects and reviews concurrently ensuring quality deliverables, managed expectations and timely results.
0-5 years of experience
Member of the Information Security team at [company name]. that supported data analysis, security tool administration, and assisted with incident response as needed.
- Administered and supported the Symantec Endpoint Protection environment for over 6,000 clients and servers.
- Responded to alerts generated by Mandiant Intelligent Response that required in-depth analysis to determine threats.
- Supported analysis of Palo Alto Next-Generation Firewall logs on a daily basis to determine anomalies and malicious behavior.
- Conducted forensic investigations pertaining to policy infractions, malicious software, and potential foreign national threats.
0-5 years of experience
Administered an ICD 503 migration of over 700 systems/projects consisting of several mission critical highly complex entities.
- Testing and implementing customized software templates for various environments and customers.
- Deploying software and tools within enterprise systems and ensuring efficiency and effectiveness of the these tools by continuously monitoring and User awareness/training.
- Demonstrated Technical IA leadership in the planning and implementation of over 300 requirements/safeguards tailored specifically for each Mission purpose and risk assessment
- Successfully analyzed over 800 security Questionnaire responses and completed ICD 503 documentation within a 45 day period in compliance with NIST 800-53 rev 4
- Transferred over 200 Projects within Xacta Risk Management tools to meet stringent deadlines and constraints while ensuring data integrity.
- Subject matter expertise in integrating various Security controls, policies & procedures, Workflow enforcement, Access permissions, reverse engineering business process to facilitate enterprise compliance and efficiencies.
- Development/implementation of automated web based applications for enterprises.
0-5 years of experience
I worked directly with internal staff to establish and enforce information security best practices, protect internal systems, and improve processes and information security controls. Some of my responsibilities included:
- Created and updated security policies, procedures, standards, and guidelines as necessary
- Assisted with compliance activities for SOX or other audits. This includes activities such as quarterly access reviews
- Updated security awareness training, communications, and resources
- Resolved internal questions related to security issues, vendors, solutions, or applications
- Patched vulnerabilities on servers and systems
- Provided tier two desktop support
6-10 years of experience
Manage/Engineered/Architect Cisco VPN Concentrators and RSA Token Authentication servers witch allows secure access to our production and remote environments.
- Architected/Implemented S1 in becoming there own Public Root Certificated Authority. Generates over two hundred thousand in revenues per year.
- Implemented and manage Policy Compliance servers for SOX compliance.
- Engineered, implemented and managed all aspect for Physical Security for S1 including: Badge access systems, BIO hand scanners, facial recognition systems, video surveillance, policies and procedures.
- Managed relationship with Barton Security for our 24×7 data centers physical security.
- Conducting penetration testing within our infrastructure to determine possible vulnerabilities that could be exploited by unauthorized users.
- Responsible for the development of an Intrusion Detection strategy; testing and selection of solutions; and implementation.
0-5 years of experience
Created and directed the Global Computer Security Incident Response Team.
- Developed and implemented solutions to respond to computer security incidents worldwide for Altria and its subsidiaries: Philip Morris USA, Philip Morris International, Nabisco, and Kraft Foods Global.
- Architected, designed, and deployed NetIQ Security and Vulnerability manager VigilEnt Agents for over 8000 servers (AIX, iSeries, UNIX, and WinTel).
- Standardized procedures to support the Incident Response and Management Policy, as well as compliance with Sarbanes Oxley (SOX 404) and other government regulations.
- Identified failures and gaps in internal controls and corrected security vulnerabilities.
- Created important metrics for monitoring threats, intrusions, violations, and any potentially serious risks. Prepared monthly Security Executive Report.
0-5 years of experience
- Analyzed clearance data to determine appropriate expeditious processing actions
- Researched and resolved escalated security clearance tickets
- Administered Remedy system processing, searches, and modification
- Provided efficient customer service to employees, security representatives, and managers
- Conducted Joint Personnel Adjudication System (JPAS) and Security Information Management System (SIMS) administration procedures
- Obtained an interim Secret clearance to confidentially and effectively handle sensitive employee Information
0-5 years of experience
Responsible for the review of role redesign, implementation strategy of ECC 6.0 roles and authorizations based on business direction.
- Communicated security and risk-related concepts to technical and non-technical audiences.
- Analyzed potential impact on company systems and informed management of actions needed or other recommendations Completes priorities as assigned.
- Created a 30 character naming convention.
- Prepared Security strategy document.
- Communicated effectively both horizontally with peers and customers, and vertically with management.
0-5 years of experience
Implemented and maintained a continuous process improvement work environment while executing security risk assessments in accordance with NIST 800 series standards and best practices.
- Install SecurDocs on each user workstation or laptop after configuring user IS.
- Use SMS to push security patches and software updates to user Information Systems
- Consult with clients to determine hardware, software or system functional specifications, perform vulnerability and risk assessments, document recommendations.
- Conduct business impact analyses and assist OCIO office in determining critical business processes, identify acceptable recovery time periods, and establish resources required for the successful resumption of business operations in the event of a disaster.
- Developed long-range plans for OCIO IT security systems for clients and anticipated, identified, evaluated, mitigated, and minimize risks associated with their IT system vulnerabilities.
- Prepared and presented risk assessment reports and recommendations to reduce information security risks to system owners and business units.
- Collaborated with other Information Security teams including Access Management, Operations, Engineering and Architecture teams, to provide effective solutions to information security issues within OCIO.
0-5 years of experience
Assisted Security Administrator of BCA (Bureau of Criminal Apprehension) in daily duties.
- Developed operation plans for backup/disaster recovery.
- Establish data file backup and restore protocol and created data extraction procedures.
- Ensured that security standards are being followed and drafted documentation for security-related processes and projects.
0-5 years of experience
Audit control and compliancy for Gaming Regulation, MIC’s, SOX, PCI and PAR requests.
- Supported and troubleshoots interactions of the Identity and Access Management systems.
- Quality Assurance for on-shore and off-shore analysts.
- Provisioning and de-provisioning accounts for all MGM properties.
- Maintained accurate records of system security baseline policies.
- Troubleshoot and resolved tier 1 and 2 Remedy tickets.
- Documented all access requests and validation as records for internal and external security audits.
0-5 years of experience
Information Security Intern responsible for working with system administrators and network engineers to coordinate logging efforts.
- Assisted in other data collection and reporting activities related to the overall mission of Enterprise Technology Risk Management as directed.
- Researched and analyzed new malware incidents relating to Enterprise threats.
- Opened service requests as appropriate to facilitate the tracking of logging efforts related to individual systems.
- Responsible for being familiar with all aspects of security to facilitate tracking and reporting on activity.
- Managing email abuse box for suspected phishing emails targeting bank employees as well as client and non client accounts.
- Effectively communicated the status of financial events with top level management.
0-5 years of experience
- Conducted Integrated Risk Assessments on twenty-four U.S. Air Force Installations.
- Conducted probabilistic assessments of physical security systems utilizing adversary sequence diagrams and Sandia’s Systems Effectiveness Assessment (SEA) methodologies.
- Conducted performance-based assessments and designed integrated security systems protecting the highest level military assets.
- Provided conceptual designs for integrated security systems to protect significant national security assets.
- Conducted Explosive Blast analysis of critical structures utilizing BLAST FX modeling.
- Modeled terrorist attacks with Chemical, Biological, Radiological, and Nuclear weapons utilizing HPAC and Cameo modeling tools.
- Composed briefing materials and accurately presented findings to flag and senior staff officers.
0-5 years of experience
Served as Security SME for twelve major applications
- Created and updated Certification and Accreditation documents including: System Security Plan (SSP) and Contingency Plans (CP), Risk Assessment (RA), Privacy Impact Assessments (PIA)
- Facilitated and participated in contingency plan tabletop exercises
- Insured that applications are being developed to meet FISMA requirements
- Documented and tracked ST&E findings until completion
- Performed vulnerability scans on new and updated applications using SAINT
- Served as project lead in the deployment of Whole Disk Encryption for all corporate systems
- Developed deployment plan for the deployment of FDCC settings for all corporate systems
0-5 years of experience
Maintained, reviewed and updated Information Security System documentations that include but not limited to System Security Plan (SSP), (POA&M), Risk Assessment (RA), policies and procedures, Security control baselines in accordance with NIST guideli ne and security practices.
- Involved with reviewing, maintaining, and ensuring all Assessments and Authorizations (A&A) documentation are included in system security package.
- Ensured Implementation of appropriate security control for Information System based on NIST Special Publication 800-53 rev 4, FIPS 200, and System Categorization using NIST 800-60, and FIPS 199.
- Reviewed and updated remediation on (POAMs), in organization’s Cyber Security Assessment and Management (CSAM) system. Worked with system administrators to resolve POAMs, gathering artifacts and creating mitigation memos, residual risk memos and corrective action plans to assist in the closure of the POA&M.
- Applied appropriate information security control for Federal Information System based on NIST 800-37 rev1, SP 800-53 rev4, FIPS 199, FIPS 200 and OMB A-130 Appendix III.
- Worked with stakeholders and system application teams to conduct testing, interviews, and collection of artifacts relevant to assessment of security controls.
- Performed configuration management reviews.
- Updated system Inventory.
- Managed vulnerabilities with the aid Nessus vulnerability Scanners to detect potential risks on a single or multiple assets across the enterprise network.
0-5 years of experience
- Accomplished as a Web Risk Assessment Analyst (WRA) with Cryptologic Technician Networks and Information Technology personnel; maintained fleet intrusion of network vulnerabilities and Incident Response/ Reconstruction, network traffic analysis and maintenance.
- Conducted Blue Team Training exercises for Naval Ships worldwide on Network Security vulnerabilities
- Performed Intrusion Detection Analysis with Snort, Nutcracker, Grappler, NetLog and Real Secure while monitoring intrusion detection sensors for malicious activity
- Responsible for the overall assessment of over 3,600 Naval websites, registration, and enforcement compliance IAW SECNAV and Department of Defense Directives
- Provided Computer and Security Network training, assistance, and incident handling support to more than 400 Naval Fleet units and Military Sealift Commands
- Provided Blue/Red Team summary/evaluation reports to senior command officials
0-5 years of experience
Developing Cyber Security Incident Response Protocol and creating communication plans.
- Interfaces with Chief Executives and Senior Directors on ITS policies.
- Simulate cyber attacks to discover system vulnerabilities & implement recovery plans.
- Research breach notification requirements both Domestic and International.
- Conducted a gap analysis for PCI DSS compliance & created standards for implementing security controls outlined in NIST 800-53, FERPA, & HIPAA.
- Configure networks, resolve tickets, imagining of desktops & servers, upgrade hardware & software.
- Perform server and security audits, system backups, and recovery on Active Directory and Unix Directory security.