Cyber Analyst Resume Sample
Work Experience
- Collaborate with Citi’s Cyber Security Fusion Center participant members in support of ongoing threat intelligence analysis and collection plans
- Coordinate risk, vulnerability and threat reporting from Fusion Center participant members to create a common operating picture for Citi assets, thus reducing Citi’s attack surface or risk exposure and minimizing damage and recovery time
- Enumerate adversary’s tradecraft to address asymmetrical capabilities and enhance Citi’s cyber tradecraft
- Active/Current TS/SCI security clearance verifiable in JPAS
- Identity – to assure with confidence access to information is only given to the right people
- Access to information and resources – actively control who can use our information and resources
- Protection of GSK business and information – irrespective of location, limit the damage to GSK when things go wrong
- Coordinate and disseminate the best course of action for the IC enterprise during cybersecurity events, incidents, outages, threats and technical vulnerabilities with IC-IRC fusion analysis team
- Coordinate individual organizational actions to reduce overall shared risk to the IC Information Environment (IC IE)
- Maintain personnel accountability systems
- Provide analytic and technical assessments of adversaries’ capabilities, intent, and strategic threat implications, and integrate comments from within the Intelligence Community
- Review, analyze and report to test director status of Systems Program Office (SPO), and developmental contractor’s systems documentation
- Analyze subsystem’s technology readiness levels
- Monitor, investigate, analyze both raw and normalized network traffic, correlate connected sequences of events, detect incidents, reconstruct into timelines for analysis, identify malicious network activity, and generally assist in conducting defensive cyberspace operations to protect our organization’s network infrastructure and intellectual property
- Monitor the global threat and vulnerability landscape. Participate in Verizon’s weekly intelligence calls and intelligence summary reports
- Optimised Security Services - use a set of robust and integrated foundation security services
- Governance, Analysis and Reporting – to know how well the controls work and plan improvements
- Provide intelligence support for the USSTRATCOM’s Cyber Mission Force (CMF), including the Combat Mission Team(s) (CMT) and Cyber Protection Teams (CPT)
- Position is shift work with varying schedules by week
- As required, brief senior leadership daily on emerging threats, high profile incidents, and upcoming events
- Collaborate between CIRT elements as necessary during incident detection and response stages
- Respond promptly to all request for support whether telephonic, via e-mail or instant messenger
- Maintain incident case management database for all reported incidents
- Review incidents and events captured in the Case Management Database after closure for investigative sufficiency and timeliness
Education
Professional Skills
- Targeting and analytic skills with a strong understanding of classified research tools and websites
- Strong SPLUNK analytics and configuration skills
- Experience of how to structure and operate an efficient Incident Response process
- Understanding and validating NIST 800-53 Security Controls; CNSSI 1253 Security Controls and Overlays
- Working knowledge and experience with vulnerability scans
- Several years of experience tracking and characterizing APT groups
- Experience writing reports, based on own analytic initiative and using multi-source intelligence and narrative analysis, which lead to a supported conclusion
How to write Cyber Analyst Resume
Cyber Analyst role is responsible for technical, government, research, analysis, interpersonal, software, reporting, security, communications, editing.
To write great resume for cyber analyst job, your resume must include:
- Your contact information
- Work experience
- Education
- Skill listing
Contact Information For Cyber Analyst Resume
The section contact information is important in your cyber analyst resume. The recruiter has to be able to contact you ASAP if they like to offer you the job. This is why you need to provide your:
- First and last name
- Telephone number
Work Experience in Your Cyber Analyst Resume
The section work experience is an essential part of your cyber analyst resume. It’s the one thing the recruiter really cares about and pays the most attention to.
This section, however, is not just a list of your previous cyber analyst responsibilities. It's meant to present you as a wholesome candidate by showcasing your relevant accomplishments and should be tailored specifically to the particular cyber analyst position you're applying to.
The work experience section should be the detailed summary of your latest 3 or 4 positions.
Representative Cyber Analyst resume experience can include:
- Network Forensic skills such as proficiency in packet-level analysis to identify threats within the network
- Experience testing and implementing new security technologies in a complex high available environment
- Experience with technical writing and editing of technical documentation
- Experience developing packages and maintain compliance under the Risk Management Framework
- · 3+ years of management consulting or relevant industry experience
- Prior work supporting ATOs
Education on a Cyber Analyst Resume
Make sure to make education a priority on your cyber analyst resume. If you’ve been working for a few years and have a few solid positions to show, put your education after your cyber analyst experience. For example, if you have a Ph.D in Neuroscience and a Master's in the same sphere, just list your Ph.D. Besides the doctorate, Master’s degrees go next, followed by Bachelor’s and finally, Associate’s degree.
Additional details to include:
- School you graduated from
- Major/ minor
- Year of graduation
- Location of school
These are the four additional pieces of information you should mention when listing your education on your resume.
Professional Skills in Cyber Analyst Resume
When listing skills on your cyber analyst resume, remember always to be honest about your level of ability. Include the Skills section after experience.
Present the most important skills in your resume, there's a list of typical cyber analyst skills:
- Strong organizational skills, good attention to detail, and strong written and verbal communication skills
- Possession of excellent interpersonal skills, including working with multi-agency government personnel
- Possession of excellent interpersonal skills, working with multi-agency government personnel
- Skilled in balancing tasks based on priorities
- Demonstrated experience with at least one of the following cyber security standards NIST, FISMA, ISO, NERC or others
- Knowledgeable on FIPS and NIST guidelines, with experience related to security control testing and validation
List of Typical Experience For a Cyber Analyst Resume
Experience For Senior Cyber Analyst Resume
- Demonstrated experience performing penetration testing services as follows
- Experience with scripting, parsing and query development
- Experience managing Windows SQL Server 2014.
- Experience developing a complete RMF package
- Hands on IT or networking experience
- Experience with conducting market research and analysis on IT industry best practices, tools, applications, and systems
Experience For Technical / Cyber Analyst Resume
- Experience in working with accreditation agencies
- Experience with Cybersecurity technologies, systems engineering, requirements management, solicitation, and analysis
- As required, operate, and maintain security information/event management software tools
- Experience conducting CI Source operations
- Manage, utilise and ensure the most appropriate and effective use of available Internet based OSINT investigation strategies
Experience For Red Team Cyber Analyst Resume
- Manage, utilise and ensure the availability of resources to support effective overt and covert Internet based OSINT investigative deployment
- Networking or Security Certification, including Network+, CCNA, or equivalent
- Understanding of modern technologies used to detect malware and vulnerabilities and protect assets
- Knowledge of the following areas is required: RMF package development, writing/assisting with SOPs, and understanding scan results
- Document the technical details of suspected network incidents to support incident response and reporting requirements
- Assesses CS architecture using the RMF
Experience For VP Cyber Analyst & Investigations Resume
- Assist in cyber incident response, planning, and management activities
- Learns common hacking techniques employed by cyber actors
- Learns techniques to support planning and implementation of incident management
- Provides support for testing, investigations, and maintenance of system accreditation.
- Performs hands on upgrades and patching for Windows based systems.
- Runs STIGs and security scanning tools to understand the cyber security posture of the system.
- Assists with obtaining certification and accreditation of systems.
- Provide support and training for vulnerability tools, and works with vendors to find resolution for identified issues.
- Obtain relevant certifications, including government directed certifications, within six months of hire (i.e. Security + or equivalent)
Experience For Senior Insider Threat Cyber Analyst Resume
- Apply originality and creativity to problem solving
- Originality and creativity to problem solving
- Obtain a DoD 8570 Certification, including Security+, CASP, and CISSP
- DoD 8570 IAM Level II Certification, including Security+
- Moderate knowledge of TCP/IP networking, switches, routers, firewalls, VPNs, and encryption
- Use one or more scripting languages (Python, Perl, JavaScript, Bash, etc.)
- Moderate understanding of Python (pandas, Scikit-learn, Numpy, theano)
Experience For Lead Insider Threat Cyber Analyst Resume
- Analyze reports from Enterprises security tools, including EVSS, HBSS, and ArcSight
- Knowledge of NRO systems engineering processes and NRO Communications Directorate
- Knowledge of functional and security testing or reports
- Analyze reports from enterprise security tools, including EVSS, HBSS, and ArcSight
- DoD 8570 Certification IAM level 1, including CompTIA Security+
- Knowledge of NRO systems engineering processes and the NRO Communications Directorate
Experience For Junior Cyber Analyst Resume
- Knowledgeable in the areas of: real-time security situational awareness, operational network systems, and security monitoring
- Proficiency with Microsoft Office, especially Excel data analysis and reporting
- Knowledge of network fundamentals, including the OSI model and TCP/IP protocol suite
- Familiarity with vulnerability scanners/reporting and patch management
- Possesses detailed and functional knowledge of DoD Cyber, Joint and Service MISO Planning
- Possess one or more of the following certifications: CFCE, CCE, EnCE, ACE, GCFA, CISSP, CFE or similar IT security certifications
- Knowledge in a scripting language highly desirable
- Further the design and maturation of TIAA’s Insider Threat program
Experience For Forensic Cyber Analyst Resume
- Analysts provide analysis and recommendations on all cyber defense issues
- Uses the latest tools and techniques to develop and present training on monitoring the network and supporting systems to detect security compromise events (including intrusions and virus incidents).
- Identifies where systems/networks deviate from acceptable configurations, enclave policy, or local policy.
- Provides standard support for processes, investigations and maintenance of system accreditation
- Assists in conducting basic audits to ensure information systems security policies and procedures are being implemented as defined in security plans and best practices.
- Provides routine support of program control processes and accreditation of systems.
Experience For Cyber Analyst, Mid Resume
- Provide remote incident handling support such as forensics collections, intrusion correlation tracking, threat analysis and direct system remediation tasks to on-site EITS personnel
- Execute incident response COAs to recover, contain, eradicate, and restore DSS ISs
- Develop and recommend detailed solutions for network defense improvements to reduce or mitigate incidents
- Ensures there is an acceptable level of risk for the configuration of the system to meet the following Cyber Security and RMF policies and guidelines: DoDD 8500.1, DoDI 8500.2, DoDI 8510.01, DoD 8570.01-M, AR 25-2, NIST SP800-53, and Army Best Business Practices (BBPs).
- Runs scans using ACAS and SCAP to determine current security posture of the system
Experience For Intermediate CI Cyber Analyst Resume
- Periodic assessment on incident trending to guide the strategy
- Perform periodic assessments of attack and incident trending to inform cyber defense strategy
- Uses eMASS to support the Risk Management Framework (RMF) process
- Leads development of the RMF package to achieve an ATO
- Assists in the development of the Security Plan and required artifacts/documentation under RMF
- Coordinates with all CS roles (ISSO, ISSM, etc.) as required until achievement of the ATO
- Tune the Splunk security policy with use cases, threat libraries, and watch list details for better threat detection and threat recognition
- Support proactive detection and analysis of security incidents
- Monitor networks for security events and alerts clients to potential (or active) threats, intrusions, and compromises
List of Typical Skills For a Cyber Analyst Resume
Skills For Senior Cyber Analyst Resume
- Prior experience utilizing vulnerability tools including ACAS
- Multi-task, work effectively with limited supervision, and respond to short-notice tasking
- Experience with presenting, briefing, or communicating technical analysis research findings
- Experience with technical writing and editing technical documentation
- Experience with a diversity of hardware/software/Operating Systems (Windows,Linux, server focused Operating Systems)
- Relevant targeting experience, including
- Production and delivery of executive reporting to define strengths and development areas in relation to process, capabilities and effectiveness
- Strong knowledge of Cyber Threat Intelligence principles to include indicators of compromise (IOC) types, indicator pivoting and indicator attribution
Skills For Technical / Cyber Analyst Resume
- Hands on experience with user activity monitoring tools such as ObserveIT, Veriato 360 or similar product
- Synchronizes and implements targeting methodologies and prioritization methods with stakeholders
- Experience performing S&TI or equivalent analysis within the IC
- Strong operational/technical understanding of foreign cyber capabilities and TTPs
- At least five (5) years’ experience in Enterprise Computing or IT solutions
- Experience in Targeting in direct support to operations (military or government)
- Identify and analyze problems and generate recommended solutions based upon experience working with various elements of DoD
Skills For Red Team Cyber Analyst Resume
- Experience conducting CI Source operations
- Management experience with focus on Systems Engineering Plans, Test and Evaluation Master Plans, and Critical Program Information identification
- Experience with DoD weapons systems engineering
- Experience and proficiency with any of the following: Anti-Virus, HIPS, IDS/IPS, FPC, Host-Based Forensics, Network Forensics Continued in Additional
- Experience and proficiency with any of the following: Anti-Virus, HIPS, IDS/IPS, FPC, Host-Based Forensics, Network Forensics
- Experience using eMASS
- Experience with XACTA, DIACAP, Risk Management Framework (RMF), NIST, eMASS, SCAP Scanning, IAVA's methodologies, STIG's and ACAS
- Hands on experience maintaining Windows 7 and Windows Server 2008 R2
Skills For VP Cyber Analyst & Investigations Resume
- Network+CE or equivalent networking experience
- Hands on experience maintaining Windows 10 and Server 2012 R2
- Hands on experience maintaining Windows SQL Server 2014
- Experience transitioning Windows 7/Server 2008 R2 networks to Windows 10/Server 2012 R2
- Relevant 3+ years of experience
- Significant experience in Security Operation Centre (SOC) processes
Skills For Senior Insider Threat Cyber Analyst Resume
- Experience with SANS GIAC GCIA, SANS GIAC GCIH, CISSP, CCNA and / or MCSE
- Developing and presenting professional targeting products
- Working knowledge of conducting a forensics investigation
- Working in highly dynamic and challenging environments
- Facilitating information exchange amongst Verizon, the customer, and the customer’s third parties (if applicable) during an incident
- Understanding and ability to perform within a fast-paced, dynamic, collaborative working environment
- Working knowledge of Data Loss Prevention controls (e.g. Symantec, McAfee, Websense)
- Understanding of modern network and cloud technologies
Skills For Lead Insider Threat Cyber Analyst Resume
- Working as part of multi-discipline teams
- Basic networking theory – IP addressing, subnetting, TCP/UDP details, firewall theory, wireless
- Work independently, including conducting research to obtain necessary information to develop training course materials
- Participates in CVPA test planning and execution efforts. Crafts new testing methodologies and creates useful analytic tools to support operational test
- Supports OCO target nomination, de-confliction, and planning throughout the Joint Operation Planning Process (JOPP)
- Prepares, coordinates, and disseminates Electronic Targeting Folders (ETFs), mission packages, and supporting documentation
- Provides advice to leadership on all aspects of joint targeting and all principles of the Joint Targeting Cycle ·
- Acts as a liaison between Fires and Intel regarding the targeting process
- Work independently, conducting research to obtain necessary information to develop training course materials
Skills For Junior Cyber Analyst Resume
- Make containment decisions and facilitate decision making by other parties using established escalation process
- Penetration Testing utilizing Kali Linux and/or comparable tool suite
- Monitors the network and supporting systems to detect security compromise events (including intrusions and virus incidents).
- Assist in executing the goals and objectives laid out in the Remote Sensing Cybersecurity Strategic Vision and RS Cyber Campaign Plan documents
- Desire to search for answers to threat-related problems where information is lacking
- Working with Active Directory and other Microsoft products (Office 365, Sharepoint, Hyper-V, Azure AD Delivery, MFA, etc’)
- Managing Web Gateway (Forcepoint)
Skills For Forensic Cyber Analyst Resume
- Managing DLP (Forcepoint)
- CompTIA Advanced Security Practitioner (CASP) Continuing Education (CE)
- Capable of producing technical documents
- NIST Federal Information Processing Standards (FIPS)
- Knowledge of device hardening, familiarity with Cisco, Palo Alto, McAfee SIEM
- Expert knowledge of Windows Operating Systems XP, 7 and Windows Server 200, 2003, 2008 and 2012 R2
- Monitors and facilitates targeting lists at the basic and intermediate level
Skills For Cyber Analyst, Mid Resume
- Possess a working knowledge of S&TI within DoD to include S&TI production centers and responsibilities
- Understands systems and network architecture; network design and administration, as well as management of operating systems, networks, and virtual software
- Proficiency in programming languages such as Java, C/C++, C# (.NET)
- Knowledgeable in the use of Modernized Integrated Database (MIDB) interfaces such as National Production Workshop (NPW) and Joint Targeting Toolbox (JTT)
- Cyber data types, flows, processing, and analysis
Skills For Intermediate CI Cyber Analyst Resume
- Responsible for administering security activities within assigned security programs
- Performs control assessments as part of the systems’ Continuous Monitoring Plan
- Report overarching cybersecurity observations and trends for inclusion in the Director’s Annual Report to Congress
- Lead go-to-market, customer acquisition, branding, and channel partner strategies for Siemens’ industrial cyber business
- Provides network and security operations technical analysis, assessment, and recommendations both for operations and for training events
- Involved in conducting audits to ensure information systems security policies and procedures are implemented as defined in security plans and best practices.
- Provides basic support for testing, investigations, and maintenance of system accreditation.
- Responsible for analyzing the system for CS requirements
List of Typical Responsibilities For a Cyber Analyst Resume
Responsibilities For Senior Cyber Analyst Resume
- Work independently and effectively under pressure to meet deadlines
- Experience with Splunk as well as experience with Enterprise Security
- Experience defining/documenting business processes with consideration for assessing risk, both business and technical
- Experience with centralized authentication solutions such as Active Directory
- Experience with DoD security policy
- Strong technical background in Networks, Infrastructure, Security, Forensics or related
- Incident Response and intrusion detection (ID) experience
- Capacity to coordinate international cross-functional teams to fulfill long-term objectives in a timely and effective manner
- Data science analytics experience
Responsibilities For Technical / Cyber Analyst Resume
- Experience with Risk Management Framework (RMF)
- Experience with assessment and authorization
- Experience with Amazon Web Services and Cloud security
- · Cyber experience within industry, government, or non-profit
- Assist in tracking and scheduling all vulnerability assessments
- Participates in creating and editing changes to network access control lists on specialized computer network defense systems
- Have a passion for and a willingness to provide verbal and written security related advice, mentoring and education to other staff
- Supports formal testing requirements through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports.
Responsibilities For Red Team Cyber Analyst Resume
- Deploy, configure, manage and tune network monitoring appliances such as IDS, SEIM, Flow Processors, Web Content Filters.
- Assist in verifying all deliverables are thorough and complete
- Involved in preparing the IT security tools systems security plan (SSP).
- Deliver regular reporting to security leadership on remediation efforts.
- Verify remediation of identified issues using automated tools, and manual techniques.
- Stay abreast of cutting-edge network technologies
Responsibilities For VP Cyber Analyst & Investigations Resume
- Provide systems administrator support including hardware and software maintenance
- Assists in the implementation of the required government policy (i.e., NISPOM, DCID 6/3), and makes recommendations on process tailoring
- A background in IT and networking
- Participates in and conducts reviews and structured walk-throughs of events, operation orders and plans, and information gathering requirements
- Identified information security related events/incidence and document through to resolution
- Analyze data provided from other departments/ Business Unit customers to evaluate the severity/magnitudes of events to determine if an incident occurred and formulate an appropriate and calibrated response in the event of a confirmed incident
- Responsible for understanding the global threat landscape and tracking changes in this area, as well as understanding the direct or indirect impact to the enterprise
- Review third party intelligence reports to compare “The Clients” network security conditions against known/suspected threats. Craft communications and develop proactive measures to assist in defending the corporate network
- Perform analysis as needed to support routine business functions in support of project/task activities
Responsibilities For Senior Insider Threat Cyber Analyst Resume
- Provide afterhours On-Call Support for cyber security events
- Maintains current knowledge on the latest security policies, processes, and guidelines
- Provides network and security operations technical analysis, assessment, and recommendations to senior personnel.
- Conducts audits to ensure information systems security policies and procedures are implemented as defined in security plans and best practices.
- Performs passive evaluations (compliance audits) and/or active evaluations (vulnerability assessments).
- Participates in response teams to ensure any anomalies are corrected in accordance with government or industry standards
- Performs forensic analysis of network traffic, network monitoring systems events, memory captures, event logs and system files in support of cyber incident investigations.
Responsibilities For Lead Insider Threat Cyber Analyst Resume
- Performs malware analysis (including reverse engineering, disassembly, and decompiling) in a sandbox environment to gather IOCs and understand the scope of impact from infected hosts.
- Deploy, configure, and manage systems such as Forensic Analysis and Malware Analysis Sandbox.
- Author activity and incident reports, as-built, and process documentation.
- Performs analysis of network diagrams, network topologies, hardware and software lists to determine level of effort required for vulnerability assessments
- Performs collection, analysis and dissemination of information relative to cyber threats, cyber-attacks of a terrorist or criminal nature within and against the State of Georgia, its citizens, or critical infrastructure within a law enforcement or intelligence community framework
- Performs research and collect information thru open and classified sources
- Assist in the production of reports, research papers, and presentations
Responsibilities For Junior Cyber Analyst Resume
- As required, interface with various state, federal and private sector organizations and agencies
- Assist in the evaluation of cyber threat, vulnerabilities, potential impacts and trends
- Assist in the development of strategic mitigation recommendations to plans, projects and initiatives
- Learns to research current trends and development in the information security industry
- Assists in conducting audits to ensure information systems security policies and procedures are being implemented as defined in security plans and best practices.
Responsibilities For Forensic Cyber Analyst Resume
- Responsible for managing, and overseeing Assessment and Authorization (A&A) efforts as part of a team under the direction of the Marshall Space Flight Center (MSFC) Assessment & Authorization Official (AAO)
- Provide support to System Owners, administrators, and security plan preparers in planning, creation, update, and review of security plans per National Institute of Standards (NIST) Special Publication (SP) 800-53 requirements
- Participate in cyber security incident response activities, including investigation, coordination, and reporting
- Compilation and analysis of trending cyber threats
- Implementation, rollout and monitoring of security administration tools
- Provide content for cyber training programs
- Penetration testing and self-assessments
- Track, monitor, and report on all activities related to security plan A&A efforts
Responsibilities For Cyber Analyst, Mid Resume
- Daily multi-tasking and managing changing priorities that include review and approval of Change requests, performing multiple system assessments/reviews, and providing ongoing status reporting
- Work with Customer Management to develop and document new IT Security processes and standards
- Supports internal investigations as a Cyber Analyst SME
- Appropriate collection, preservation and documentation of forensics data
- Follow agency’s Cyber Security Policies, Procedures and Standards for incident response
Responsibilities For Intermediate CI Cyber Analyst Resume
- Act as a core technical member in a cyber-security incident response team
- Manage the enterprise’s Anti-Virus capabilities
- Upgrades systems from Windows 7 to Windows 10.
- Upgrades systems from Windows Server 2008 R2 to Windows Server 2012 R2.
- Provides network and security operations technical analysis, assessment, and recommendations.
- Conducts site surveys to ensure information systems security policies and procedures are implemented as defined in security plans and best practices.