100% found this document useful (2 votes)
107 views5 pages

Security Analyst Resume

The document discusses the services offered by BestResumeHelp.com to help job seekers secure career success through professional resume writing. It highlights the company's expert resume writers who craft tailored and industry-specific resumes, as well as additional services like cover letter and LinkedIn profile optimization. The summary emphasizes that BestResumeHelp.com aims to help clients present themselves in the best light to increase their chances of landing desired jobs.

Uploaded by

idyuurvcf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
107 views5 pages

Security Analyst Resume

The document discusses the services offered by BestResumeHelp.com to help job seekers secure career success through professional resume writing. It highlights the company's expert resume writers who craft tailored and industry-specific resumes, as well as additional services like cover letter and LinkedIn profile optimization. The summary emphasizes that BestResumeHelp.com aims to help clients present themselves in the best light to increase their chances of landing desired jobs.

Uploaded by

idyuurvcf
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Ensuring Career Security with Top-notch Resumes from BestResumeHelp.

com

In today's competitive job market, securing the perfect job requires more than just skills and
experience—it demands a compelling resume that stands out from the crowd. BestResumeHelp.com
understands the importance of a well-crafted resume in achieving career goals and offers
professional resume writing services to help individuals make a lasting impression on potential
employers.

Why Choose BestResumeHelp.com ?

1. Expert Resume Writers: Our team of experienced and skilled resume writers understands
the intricacies of various industries. They craft resumes tailored to showcase your unique
strengths and accomplishments.
2. Customized Approach: We recognize that every individual is unique. Our experts work
closely with clients to understand their career goals, ensuring that each resume is
personalized to maximize its impact.
3. Industry-Specific Resumes: Whether you're in technology, healthcare, finance, or any other
industry, our writers are well-versed in creating resumes that resonate with hiring managers
and highlight your expertise.
4. ATS-Friendly Resumes: Many companies use Applicant Tracking Systems (ATS) to
streamline the hiring process. Our resumes are optimized to pass through ATS scans,
increasing your chances of landing an interview.
5. Timely Delivery: We understand the urgency of job searches. BestResumeHelp.com ensures
timely delivery of well-crafted resumes, allowing you to apply for opportunities promptly.
6. Satisfaction Guarantee: We are committed to your satisfaction. If you are not satisfied with
the initial draft of your resume, we offer revisions until you are confident in the final result.

Our Services:

1. Professional Resume Writing: Crafted by industry experts, our professional resumes


showcase your skills and accomplishments to leave a lasting impression on potential
employers.
2. Cover Letter Writing: Complement your resume with a compelling cover letter that
introduces you and highlights your motivation for applying.
3. LinkedIn Profile Optimization: Leverage the power of LinkedIn with a professionally
optimized profile that enhances your online presence and attracts recruiters.
4. Executive Resume Writing: Tailored for senior-level professionals, our executive resumes
emphasize leadership skills and achievements to secure top-tier positions.

Order from BestResumeHelp.com Today!

Invest in your career by choosing BestResumeHelp.com for top-notch resume writing services. Our
commitment to excellence ensures that you present yourself in the best light possible, increasing your
chances of landing the job you desire. Order now and take a significant step towards securing your
career success.
Documents security alerts according to SOC procedures. Strong written, verbal, interpersonal skills,
emotional intelligence, and a positive attitude to interface effectively with all levels within the
organization. Team Leadership experience, taking initiative; providing and following through on
solutions. Incident Response (IR) activities, including investigating and escalating security events.
Ability to analyze data using spreadsheets, databases, scripts, etc. Must be flexible and able to
respond to rapid change to meet business needs. Demonstrated ability to analyze large data sets and
unstructured data for the purpose of identifying trends and anomalies indicative of malicious
activity. Install, maintain, monitor, troubleshoot, and decommissions sensor devices. Possess strong
written and verbal communication skills to include the ability to render concise reports, summaries,
and formal oral presentations. Strong interpersonal and leadership skills; ability to work effectively in
dynamic environment with a broad range of end-user configurations; ability to participate in a team
environment and build strong and effective working relationships throughout the company.
Bachelor's degree in Computer Science, Computer Engineering, Information Technology or
Information Assurance. Background in Desktop Security Management, Audit, Remediation.
Candidate will support teams within a performance-based environment with pre-determined
Acceptable Levels of Performance (ALP’s). Cyber Security self-assessments and risk assessments.
Act as a coach (subject matter expert) to the rest of the team on any network security related issues.
Experience with Remedy service management systems and working in a collaborative service desk
environment would be an asset. In addition to required education or equivalent experience; -
Minimum four (4) years IT experience. A successful resume for this role should demonstrate your
relevant coursework, internships, or certifications and highlight your problem-solving skills.
Understanding of automated threat intelligence feed technologies and protocols, such as STIX and
TAXII. This position could be a salary grade 3 or 4 depending on combined level of education and
work experience. Ability to handle high-pressure situations in a productive and professional manner.
Provide alert monitoring, investigation and analysis across all SOC security tools. Contribute to the
continuous monitoring for threats and protection of information systems, including the execution of
procedures such as periodic recertification of information systems. Looks for and seizes
opportunities to do more or to do things better. Follow pre-defined actions to handle BAU and High
severity issues including escalating to other support groups. Perform social engineering tests and
analyzes technical security weaknesses. Provide new rule sets to security tools not managed by our
team. Ability to translate technical and complex information into business terms for management.
The ability to convey the risks to IT and business stakeholders. Simply enter your job title and let
artificial intelligence help you get started.
Implementation and maintenance of SIEM (ArcSight, IBM Qradar, McAfee NitroSecurity, etc.).
Provide an example that demonstrates your expertise in this area. New application installation on
secure server environment. Creating comprehensive security write-ups which articulate security
issues, analysis and remediation techniques. During incidents, the position require work outside or
normal business hours including weekends. Produce operational security metrics as required (daily,
weekly, and monthly) and coordinates the monthly metrics review with information security
leadership team, enhances and improves metrics reporting processes and identifies new metrics to be
reported. Security Conference Speaker Invited to speak at a major cybersecurity conference about
modern threat landscapes. Advanced organizational skills and conflict resolution skills. Develops
reports and other documentation in support of business needs, audit and compliance testing. Assist in
the development of advanced detection and monitoring content for Sony’s global infrastructure,
systems, and applications. ISSO: As the Information System Security Officer (ISSO) for classified
stand-alone cyber systems within your center, coordinate, prepare and maintain one-page classified
cyber security plans. Bachelor’s Degree in Math, Science, Engineering or Computer Science and 8
years previous experience with security configurations of Windows, Linux, and Cisco operating
systems in an enclave. 4 additional years of experience can be substituted for the degree. Capture
test findings, communicate repeatable process steps. Review commercial products available to
enhance corporate hardware, platforms, applications and data. Collected operation and maintenance
artifacts on an ongoing basis so that security control assessment (sca) is seamless. Position requires
strict adherence to confidentiality as well as protecting the identity of callers, clients as well as
company assets. Work with developers in assuring new applications adhere to approved security
policies. Bachelor’s Degree or equivalent in computer science, management information systems or
equivalent discipline from an accredited college or university required. Coordinated with the team to
maintain and troubleshoot server issues, improving system uptime by 15%. EDUCATION. Ability to
demonstrate effective partnering skills with different technology teams. High School Diploma or
GED from an accredited institution is required. Knowledge of advanced threat actor tactics,
techniques and procedures (TTP) Understanding of software exploits. Review of security tool
outputs, alerts, alarms, and reports. Knowledge of research, development, and acquisition functions
and the ability to identify critical program information. Develop comprehensive plans, goals and
objectives that cover the entire cyber security life cycle of a project and integrates with the GSIRT’s
mission. Expertise in the design, configuration, tuning and customization of various IPS technologies
required. Participate in regular meetings with teams to determine appropriate actions required to
address new developing security threats. Analyze, correlate, and data mine network traffic and event
logs to identify malicious activity. Ability to interface effectively with all levels within the
organization. Experience using statistical, quantitative and qualitative analysis techniques.
Advanced college coursework in Computer Science or Information Technology, or equivalent
experience. Perform Third-Party Security Program (TSP) review procedures and analyze results to
ensure that WSP Global information security standards and policies are understood and followed by
third-party organizations providing services to WSP Global. Categorize incidents and implement
corresponding escalation procedures. Advanced capability to analyse malware, including: worms,
viruses, trojans, rootkits and bots. With networking, system administration and security best
practices. Finally, note that we’ll need to use a cookie to remember your cookie preferences.
Demonstrated on-the-job experience coordinating program remediation plans for addressing
vulnerability findings. Monitor for potential compromise, intrusion, deficiency, significant event or
threat to the security posture and security baseline. Configuration and maintenance of security tools
and of security event management tools. Performs comparative analysis on results collected against
threats, vulnerabilities and other malicious technological programs launched through the internet.
Demonstrate timely task completion involving solid organizational skills, task tracking, follow-up,
and productive peer interaction. Basic understanding of a cloud environment and infrastructure.
Analyze, monitor and tune of various SIEM technologies. Good understanding of cyber security
principles like; cyber security architecture, defense in depth, default deny, least privilege,
compartmentalization, privileged initiation, RBAC, etc. Identify service inadequacies and contribute
to the Customer Service Improvement Plan. Bachelor's degree preferably in a Technical Computer
Field (Computer Science, Management Information Systems, Information Technology, Networking).
8 years applicable experience may be considered in lieu of degree. This position requires heavy
tactical execution, strategic thinking, as well as metrics and reporting experience. Security Team
Lead Led a team that was awarded 'Best Security Team' two years in a row. Experience in a
network engineering, endpoint protection, monitoring and analytics. Participate in technical meetings
and working groups to address issues related to malware security, vulnerabilities, and issues of cyber
security and preparedness. Understanding of business continuity elements and considerations such
as power, data redundancy and emergency readiness. Troubleshoots complex security issues with
impact across multiple systems. Maintain and develop appropriate security policies and procedures.
Understanding of risk management practices and security program development including change
management, access control, and physical security. Performs detailed security evaluations associated
with designing and installing owned and third party software, systems, components, and hardware.
Level 4: Minimum 8 years (in excess of degree requirements stated above) of progressively
responsible experience in IT security. Intrusion detection and prevention systems operations.
Experience performing code review across a variety of programming languages. Highly disciplined
and motivated, able to work independently, under direction, or as a member of a team. Must be able
to read and understand DoD Cyber Security orders, policies and procedures.
Develops and applies organization-wide information models for use in designing and building
integrated, shared software and database management systems. Analysis of Windows log files for
the purpose of finding artifacts related to malicious activity. Strong Microsoft Active Directory
experience essential. Experience with Open Source Intelligence Products (OSINT) and sources.
Previous experience with social network analysis tools and methods. Basic experience with analytical
tools (i.e. spreadsheet, word processing, database). New application installation on secure server
environment. Candidate should have at least one other IA certification completed, i.e., SSCP, CSIH,
GCIA, GCIH or CEH. Perform the duties of Navy Validator for all NNSY accreditation submissions
and assist other Naval Shipyards and the corporation on these duties when required. Follows
existing processes and procedures, and propose updates to such. Demonstrated on-the-job experience
providing guidance and direction on the maintenance of security configuration control of hardware,
systems, and application software where needed. Ability to think “outside the box” and identify
opportunities to improve current processes. Knowledge of operating system internals (virtual
memory, paging, etc.) and techniques employed by malware to evade detection. Develop and
maintain documentation for supported processes and procedures. International experience or
experience working for a global organization. Security monitoring and monitoring the environment
for alerts. Communicate and escalate issues and security incidents. Confers with users to discuss
issues such as computer data access needs, security violations, and programming changes. Possess a
good working knowledge of Verizon legacy and web-based applications. Extensive knowledge and
experience in configuring content filtering and anti-spam policies. Strong communication skills (both
written and verbal). Assess performance and maturity of detection and monitoring architecture, tools,
and processes, and make recommendations for improvements. Enterprise audit aggregation, logging,
and analysis experience. Directs and monitors program system administrators on security matters.
Bachelor's degree program or equivalent degree in a field of study related to the job. Experienced
with Cybersecurity or CND in a DoD environment. Working Knowledge of data security, network
security, systems and applications security. Team Collaboration Led a team of 5 analysts in a project
that improved network security by 30%. Define and assist Operational team with proper GPO
process for bulk Vulnerability and Compliance related resolutions. Demonstrated ability to work
independently without day-to-day supervision.

You might also like