Quantcast

Cyber Security Analyst Resume Cedar rapi...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Cyber Security Analyst
Target Location US-IA-Cedar Rapids
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Cyber Security Iowa City, IA

Telecom / Call Center Analyst Cedar Rapids, IA

Support Analyst Technical Cedar Rapids, IA

Data Analyst Power Bi North Liberty, IA

Director IT, BI Analyst, Project Manager Cedar Rapids, IA

Financial Analyst Sales Palo, IA

Salesforce Administrator Customer Support Coralville, IA

Click here or scroll down to respond to this candidate
Candidate's Name
EMAIL AVAILABLE Phone: PHONE NUMBER AVAILABLE LinkedIn: Candidate's Name
PROFESSIONAL SUMMARY:Over 4+ Years of Experience in Cyber Security, A highly passionate cybersecurity professional driven by a strong desire tolearn and grow. Possessing exceptional problem-solving and analytical abilities. Dedicated to continuous learning anddevelopment. Proven track record of implementing security solutions, introducing data privacy, and analyzing security risks.Experience in SIEM (Security Information and Event Management) solutions on Splunk and IDS/IPS (IntrusionDetection/Prevention Systems) to proactively identify and mitigate security threats.Experience in testing using various tools like Burp Suite, Nmap, OpenVAS, Confidential Appscan enterprise, Linux andknowledge on OWASP Top 10 based Vulnerability assessment of web applications.Vulnerability Assessment includes analysis of bugs in various applications by using manual and automation tools.Knowledge on network security such as Firewalls, TCP/IP, IDS/IPS and Routing Active Directory.Developed playbooks and automation actions, workflows for incident response using SOAR products, Python Scripting.Demonstrated proficiency in managing and optimizing Endpoint platforms such as CrowdStrike, Symantec Endpointprotection to safeguard against malware, ransomware, and other advanced threats.Good experience in Network security, penetration testing, and vulnerability assessment tools such as Nessus, Qualys,Splunk, Burp Suite, Wireshark, Nmap, NGFW and WAF.EDUCATION:Master of Science, Cyber Security University of Missouri Kansas City May - 2023CERTIFICATIONS:Certificate of Completion - CompTIA Security+ by EC CouncilCertificate of Completion - Microsoft Azure Engineer AZ-500Certificate of Completion - NSE 1 Threat Landscape by FortinetCertificate of Completion - NSE 2 Evolution of Cyber Security by Fortinet.Certificate of Completion - Introduction to Cybersecurity by CISCO.Certificate of Completion - Getting started with AWS Machine learning by AMAZON WEB SERVCIES.PROFESSIONAL EXPERIENCE:Cyber Security Analyst,Salesforce, Indianapolis May 2022 PresentResponsible for threat detection and response for security events and incidents with global fortune 500 client networks.ArcSight, Splunk, Qualys, Tenable, Firewall, FireEye, IPVOID, Wireshark etc. gather and present forensic evidence ofcyber malware and intrusions.Provided expert guidance and support to internal teams on information security best practices, compliance requirements andgovernance principles.Strong Knowledge of Intrusion Detection systems (IDS) and Intrusion prevention system (IPS) tools and applications.Assist with vulnerability scans and reporting to clients and IT Departments, use of Nessus scan and report view.Implemented and Maintaining AD infrastructure as a service in Microsoft Azure Cloud Platform.Analyzed security breaches to n identify the root cause of Smokescreen and tested various techniques like Deception,Honey pot and used Falcon Crowd Strike for threat hunting.Spearheaded the development and implementation of security protocols in accordance with ISO 27001, NIST, and CISstandards ensuring comprehensive protection of organizational assets.Responsible for detection and response to security events and incidents within global clients, utilizing Arc sight, Splunk,Tipping point, virus total, IPVOID, Wireshark etc. to gather, analyze and present forensic evidence of cyber malware andintrusions.Understanding of regulatory compliance standards NIST, HIPPA, CJIS.Conducted regular risk assessments to identify emerging risks and evaluated their potential impact in the organization sobjectives.Experience in cyber threats, Data Leakage Prevention (DLP) vulnerabilities and risk management processes.Participated in security audits and compliance assessments to ensure adherence to industry standards and regulations.Conducted regular security reviews and assessments of third-party vendors and partners to ensure compliance withcontractual security requirements and mitigate supply chain risks.Monitored security tools and correlated reporting and other appropriate information sources to identify incidents, issues,threats, and vulnerabilities.Conducted in depth investigations using Microsoft Defender ATP to analyze security incidents, identity root causes.Staging firewall rules in checkpoint smart dashboard during the daytime to install during window time..Cyber Security Analyst,Sutherland Global, July 2020 June 2021Assisted in the development and implementation of security policies, standards, and procedures to ensure the confidentialityand integrity of information assets.Conduct kickoff meetings with stakeholders prior to assessment to gather documentation and evidence about their controlenvironment.Used Splunk for monitoring/metric collection for applications in a cloud-based environment, maintaining all shared resourcesand monitor free and utilized disk space, setting up projector, audio/video devices for meetings and lectures.Conduct risk assessments regularly, ensure measures raised in assessments are implemented in accordance with the riskprofile and causes or risks are fully addressed following NIST 800-30 and NIST 800-37.Served as POC for projects requirements regarding Information Security and Data Protection, providing expert advice andguidance to ensure compliance with regulatory requirements.Conducting Vulnerability scanning (using Nessus), system hardening, security assessment and penetration testing(Nmap)..Actively participated in the configuration and fine-tuning of security tools and enhanced the organization's overall securityposture.Documented all risk management activities, audit findings, and corrective actions to maintain a comprehensive audit trail.Perform vulnerability scan with Nessus for improper configurations, missing patches, hosts, network, and insecurecredentials and accounts.Involved in Vendor evaluations for Multi Factor Authentication (MFA).Managed and maintained Linux/Unix servers, ensuring high availability and security.Maintain strong working relationships with individuals and groups involved in managing information risks.Cyber Security Intern,Sutherland Global, August 2019 June 2020Review and assist with developing and documenting approach, for learning activities surrounding data, analysis acrosssystems.Technologies include Symantec Endpoint Protection, DLP, NIST, Splunk.Aide in identifying and review redundant monitoring tasks, security event analysis or duplication, overall process optimization.Good Understanding and hands on Experience of multiple technologies like Cisco Routing, Switching, Firewalls.Maintained documentation of network configurations, security protocols, and incident response procedures.Worked on creating and removing files and directories in Linux servers.Identified opportunities for Unix system automation and process improvement.Installed and maintained Unix security patches on the development systems.Created scripts using windows PowerShell to automate identity Lifecycle management, including, but not limited to, thecreation, managing and decommissioning of user accounts.SKILLS ADND TECHNOLOGIESSkills Policy and Standards: Cyber Security, Information Security, DLP, NIST, NIST ISO 27001, CIS, CIA, SIEM,Security Policy Implementation, Azure Security, AWS Security, Incident response, IDS/IPS, Zero Trust, JiraTools: Tenable Nessus, Microsoft Sentinel, Crowd Strike, Qualys, Azure AD, Log Analytics, Splunk, AlienVault.Endpoint Protection: Symantec (SEP), Carbon, DarktraceCND/CNE methodologies: Session hijacking, DDOS, packet filtering.Cloud Platform: Azure, AWSProgramming Languages: Python, SQL, RDMS, PowerShellOperating Systems: Windows, LinuxACCOMPLISHMENTS:PLATFORMS: Windows 8/9/10/11, Windows Server 2012 R, Linux/Red Hat/, Plans of Action and milestones (POA&M), MSOffice,SharePoint, Authorization to Operate (ATO), Nessus Vulnerability.Special Initiative Award (by Sutherland Global): In Appreciation of outstanding contribution to the organization.Participated in Entrepreneurship Conducted by All India Council.Orientation leader, University of Missouri Kansas City lead a small group of 20 international students throughout the orientationprogram. Facilitated conversations on transition issues. Role model appropriate academic and social behavior to incomingstudents (Fall 2022 & Spring 2023).Worked as ISA (International Student Association) member.

Respond to this candidate
Your Message
Please type the code shown in the image:

Note: Responding to this resume will create an account on our partner site postjobfree.com
Register for Free on Jobvertise