Quantcast

Cyber Security Analyst Resume Edison, NJ
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Cyber Security Analyst
Target Location US-NJ-Edison
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Cyber Security Analyst Linden, NJ

Geopolitical and Cyber Security Threat Researcher and Analyst New York City, NY

Network Engineer, Cyber Security Analyst, Penetration Tester Brooklyn, NY

Cyber Security Analyst Paterson, NJ

Cyber Security Analyst Franklin Park, NJ

Cyber Security Analyst Manhattan, NY

Cyber Security Analyst West Orange, NJ

Click here or scroll down to respond to this candidate
    Candidate's Name
    Cyber Security Engineer
    Location: Edison, NJ   Street Address  | Email: EMAIL AVAILABLE | Phone: PHONE NUMBER AVAILABLE | Linkedin

    Summary:
    3+ years of hands-on experience in the field of Information Technology, specializing in Cyber Security, and Software
    Quality Assurance with both Mobile and Web-based applications.
    Expertise in conducting Vulnerability assessments using tools like Metasploit to profile an app for vulnerabilities
    and then exploit those vulnerabilities.
    Configure mechanisms on a virtual network, deploy them to the cloud, and investigate cloud security risks.
    Good knowledge of writing bash scripts to automate security and operating system tasks.
    Quality-driven, positive team player who always looks for efficiency and accuracy.
    Enjoy learning new technologies and challenging concepts and Passionate about Cyber Security.
    Skilled Cyber Security Analyst with expertise in risk management of unauthorized access viruses and a wide range
    of vulnerabilities and threats.
    Develop and implement a toolkit using Bash.
    Proficient with various operating systems like Linux (Kali) with Windows.
    Experience working with network security monitoring tools using SIEM or IDS/IPS technologies (Splunk, Wireshark,
    Metasploit, Kibana, etc.)
    Expertise in Cybersecurity & Information Assurance with a good understanding of Cryptography, Vulnerability
    Assessment, Cloud Security & Virtualization, and Identity Access Management.
    Creating/editing Bash scripts to automate tasks.
    Management of Cloud security, Vulnerability assessment, and Security audits.
    Great written/oral communication, asset ownership, policies, procedures, data management, DLP & zero trust model.
    Expert in Vulnerability Assessment using Nessus tool to evaluate attack vectors, identify system vulnerabilities and
    develop remediation plans and security procedures.
    Skills:
     Languages              Bash Scripting, Shell Scripting, Splunk Processing Language (SPL) and Python
     Framework              NIST and HIPPA
     Tools                  Nessus, Splunk, Nmap, Firewalls, Wire shark, CSAM, Microsoft Office Suite, VLANs, DNS,
                            DHCP, TCP/IP, IPV4/IPV6, IDS/IPS, CSAM and EMASS
     Security Information & SIEM tools, Splunk Enterprise Security, McAfee Web proxy, IronPort, Cisco Sourcefire,
     Management Tools       Splunk, McAfee DLP, Symantec DLP, Google DLP, Nessus Security Center, Wireshark,
                            Palo Alto and Crowd Strike
     Others                 Azure Cloud, Zero Trust, Networking (Routers & Switches), Encryption, Scanning web
                            vulnerability, Network defenses Network security monitoring, and Detecting network
                            intrusions
     Operating System       Windows, Mac OS, UNIX and Linux (Kali and Ubuntu)

    Experience:
    ACL Digital, USA
    Cyber Security Analyst                                                                   | Jan 2022 to Present
    Analyze daily reports, generated by Wireshark and Nessus.
    Monitoring and interpretation of threats using the IDS and SIEM.
    Document all activities during an incident and provide support and status updates during the life cycle incident.
    Investigate malicious phishing emails, domains, and IPS using open-source tools and recommend proper blocking-
    based analysis.
    Provide day-to-day operational guidance to the team to ensure required tasks & service requests are completed.
    Develop after-action reports including root cause analysis.
    Monitoring security controls using SRD and Splunk.
    Experience implementing/architecting cloud-based Active Directory solutions for Azure
    Worked on projects moving to cloud services such as Azure, Office 365
    Downloading weekly security vulnerability reports from Tableau, analyzing data using Excel, and presenting it to
    the team.
    Implemented security ACL, IP Sec, VPN, TACACS+, and RADIUS+.
    Provided Tier 1 and Tier 2 incident analysis and response support for real-time events generated by security devices,
    as well as possible post-incident support.
    Worked in a 24x7 Security Operations Center.
    Monitoring and analysis of security events to determine intrusion and malicious events.
    Identify suspicious/malicious activities or codes.
    Maintain & modify hardware/software components, content & documentation. Azure O365 Advance Threat Protection.
    Extensive experience in Cloud and On-Prem (Hybrid) environments, Azure Cloud security experience.
    Responsible for incident response work including analyzing security events, identifying false positives vs. real
    threats, identifying host involvement, comparing scan results, analyzing Splunk logs & prioritizing incidents/events.
    Research new and evolving threats and vulnerabilities with the potential to impact the monitored environment.
    Ensure integrity and protection of networks, systems, and applications by technical enforcement of organizational
    security policies, through monitoring of vulnerability scanning devices.
    Consulted security architecture using the Zero Trust model on Azure and on-premises by using least privilege across
    these applications.
    Recognize potential, successful, and unsuccessful intrusion attempts, compromises thorough reviews & analyses of
    relevant event detail and summary information.
    Assist with the development of processes and procedures to improve incident response times, analysis of incident,
    and overall SOC functions.

    At-Bay, USA
    SOC Analyst                                                                             | Jun 2020 to Dec 2021
    Analyzed, investigated & processed Malicious/Phishing Email alerts from IronPort & FireEye following standard
    operation procedure.
    Worked closely with other teams to support incident management processes.
    Provided Incident Response (IR) support when analysis confirms actionable incident.
    Monitored systems and networks for intrusions or security breaches.
    Reviewed and processed accidental disclosure requests following standard operating procedures.
    Partake in the Composition of security alert notifications and other communications.
    Used Cisco Source fire to monitor network traffic to ensure malicious network traffic is dropped.
    Reported and coordinated with external organizations and authorities.
    Coordinated and distributed directives, vulnerability, and threat advisories to identified consumers.
    Collaborated with lead investigators into breaches that occur.
    Process Web Site Review Requests using McAfee Web Gateway GUI to grant temporal Web Access to users within
    the Company to websites that are being blocked for security.
    Block malicious domains, Hashes, Files, and IPs following the company's Standard Operating Procedures.
    Trained or educated network users on information security.
    Continually developed new use cases for automation and tuning of security tools.
    Led, performed, reviewed, or tracked security incident investigations to resolution.
    Used McAfee DLP Manager to protect intellectual property and ensure compliance by safeguarding sensitive data.
    Led, performed, or reviewed root cause analysis efforts following incident recovery.
    Developed follow-up action plans to resolve reportable issues and communicate with other Analysts to address
    security threats and incidents.
    Contributed to security strategy & security posture by identify security gaps, and evaluate & implement enhancements.
    Prioritized and differentiated between potential intrusion attempts and false alarms.

    Education:
    Bachelor of Science: Information Technology from William Paterson University of New Jersey, NJ
    CompTIA Security+ Certificate
    AWS Developer Certificate

Respond to this candidate
Your Email «
Your Message
Please type the code shown in the image:
Register for Free on Jobvertise