Quantcast

Cyber Security Threat Analyst Resume Mck...
Resumes | Register

Candidate Information
Name Available: Register for Free
Title Cyber Security Threat Analyst
Target Location US-TX-McKinney
Email Available with paid plan
Phone Available with paid plan
20,000+ Fresh Resumes Monthly
    View Phone Numbers
    Receive Resume E-mail Alerts
    Post Jobs Free
    Link your Free Jobs Page
    ... and much more

Register on Jobvertise Free

Search 2 million Resumes
Keywords:
City or Zip:
Related Resumes

Cyber Security Analyst Dallas, TX

Cyber Security United States Richardson, TX

Soc Analyst Cyber Security Rockwall, TX

Cybersecurity Analyst Security Allen, TX

Incident Response Cyber Security Grand Prairie, TX

Incident Response Cyber Security Irving, TX

Incident Response Cyber Security Arlington, TX

Click here or scroll down to respond to this candidate
                                     Candidate's Name  Jr.
                           Street Address
                                   Mobile: PHONE NUMBER AVAILABLE
                               EMAIL AVAILABLE
                                         SUMMARY

With over 10 years  experience in the technology industry, I have a strong foundation in complex
projects, assessing client needs, and building credible relationships with all levels in an
organization.

WORK EXPERIENCE

2022-2024: June T-Mobile
Frisco, Texas 75033
CTI Risk & Compliance Sr Analyst
As a Cybersecurity Incident Response Handler, I am responsible for the response to security
incidents, threats and vulnerabilities. Within the Global Threat Management & Response
organization, this role requires the ability to analyze event logs, computer artifacts, and other
data sources to contain and resolve incidents or events, provide recommendations for
remediation and determine the root cause. Research, develop, and maintain proficiency
regarding Cyberspace strategies, capabilities, groups, individuals, organizations, tools, tactics,
and procedures. Real-time monitoring of third-party security feeds, forums, and mailing lists to
gather information on vulnerabilities and exploits related to the client. Review threats for SIM
cards related to customer activity.

2017-2022 PepsiCo
Plano, Texas 75024
CTI Risk & Compliance Sr Analyst
As a Cybersecurity Incident Response Handler, I am responsible for the response to security
incidents, threats and vulnerabilities. Within the Global Threat Management & Response
organization, this role requires the ability to analyze event logs, computer artifacts, and other
data sources to contain and resolve incidents or events, provide recommendations for
remediation and determine the root cause.
Responsibilities:
  Monitors SIEM and logging environments for security events and alerts to threats,
intrusions, and/or compromises  Responsible for understanding the global threat landscape of the
cyber threat intelligence
(CTI) team
  Escalates cyber security events according to runbooks and standard operation procedures
(SOPs)
  Acts as a participant during Cyber Hunt activities at the direction of one or more Incident
Response Analysts
  Documenting event analysis and writing comprehensive reports of incident investigations
  Proactively provide feedback on SOC operational processes and procedures
  Maintain a professional communicative relationship with clients and management to
provide information throughout the incident, problem, and change management cycles
  Proactive monitoring of internal and external-facing environment using specialized
security applications
  Routinely develop and update incident response playbooks to ensure response activities
align with best practices, minimize gaps in response and provide comprehensive
mitigation of threats.
  Participate in after hours on-call rotation when required

2017-2017 DXC Technology
Plano, Texas 75024
Cyber Threat Intel
I am responsible for the collection of cyber threat information and sending Advisories and
detailed reports. Research, develop, and maintain proficiency regarding Cyberspace strategies,
capabilities, groups, individuals, organizations, tools, tactics, and procedures. Real-time
monitoring of third-party security feeds, forums, and mailing lists to gather information on
vulnerabilities and exploits related to the client.
 Transition threat actor intelligence into hunting operations at a network level.
 Produce intelligence reports to provide an accurate depiction of the current threat
landscape and associated risk through the use of customer, community, and open source
reporting.
 Participate in formal technical briefings and provide assessment of Cyber threat profiles
to MSS leadership or customers.

2014-2017 Hewlett-Packard
Plano, Texas 75024
(GCS) Cyber Threat Intelligence Analyst
I am responsible for the harvesting/collection of cyber threat intelligence data from internal
groups, open-source solutions and 3rd party service providers, then assessing the potential threat
impact to the pan-HP environment. Upon completion of the assessment, I was responsible for
communication of the results to applicable parties. Communication mechanisms included:written
communications, blog entries, participating in threat briefings, etc. Collect/harvest cyber
threat detail from internal sources (e.g. vulnerability scanning, security events, etc.) open source
solutions (e.g. Pastebin, internet news sources, etc.) and 3rd party service providers, and
document the functional business requirements for the EVDB environment. Assess collected/
harvested threat details and the potential impact it may have on the pan-HP computing
environment. Understand the defense in depth model that is in place within the pan-HP
environment, and how it may mitigate against cyber threats. Take cyber threat details and
convert it to actionable activities that can be leveraged by the applicable groups (technical and
non-technical). Effectively communicate threat details leveraging the following vehicles
written communications (emails, presentations, etc.), blog sites, verbal communications
(Presentations, threat briefings,  brown bag  sessions, etc.

2004-2014 Bank of America
Dallas, Texas 75202
Officer; Sr. Analyst-Sys/Data Security
I direct and control the activities of a significant part of the information security staff in the
development, implementation, communication, monitoring and maintenance of the information
security policies and procedures. I am responsible for the development and implementation of
security standard, procedures, and guidelines. I participate in the establishment of the
corporation s information security policy. I provide state of the art technical expertise and
support to client and IT management and staff in risk assessment and the implementation of
appropriate data security procedures and products. I oversee execution of security controls to
prevent hackers from infiltrating company information or jeopardizing e-commerce programs. I
research attempted efforts to compromise security protocols. I help set security policies to
control access to systems and maintain company firewall. I manage the reporting, investigation
and resolution of data security incidents. I maintain contact with industry security standard
setting groups, and the awareness of State and Federal legislation and regulations pertaining to
information security.

Analyst II-CCO/Data Transmission Support
I analyze user requirements, procedures, and problems to automate processing or to improve
existing computer system: Confers with personnel of organizational units involved to analyze
current operational procedures, identify problems, and learn specific input and output
requirements, such as forms of data input, how data is to be summarized, and formats for
reports. I also utilize Mainframe systems such as JCL, SAR, CA7/11, TSO, ISPF and
Changeman. Systems, applications and protocols consist of Lpar, ARP, ACH, IAR, HTTP,
SHFTP and FTP/PGP encryption. System protocols consist of BISYNC, ASYNC, SNA, TCP/IP
and Connect:Direct (NDM). I write detailed description of user needs, program functions, and
steps required to develop or modify computer program. I review computer system capabilities,
workflow, and scheduling limitations to determine if requested program or program change is
possible within existing system. I study existing information processing systems to evaluate
effectiveness and develop new systems to improve production or workflow as required. I also
prepare workflow charts and diagrams to specify in detail operations to be performed by
equipment and computer programs and operations to be performed by personnel in system. I also
direct and coordinate work of others to develop, test, install, and modify programs.

Officer; Sr Analyst-Sys/Data Security
I direct and control the activities of a significant part of information security staff in the
development, implementation, communication, monitoring and maintenance of the information
security policies and procedures. Systems and applications consist of Control SA, LAN network
support F-Secure and Peregrine. I have administered and been responsible for the audit process
of over five thousand servers, including, AIX, Sun-Solaris, Linux and HP. My duties have
included adding or deleting group access, providing  root  access to all approved end users, and
routine troubleshooting. I am responsible for the development and implementation of security
standards, procedures, and guidelines. Participate in the establishment of the corporation's
information security policy. Provide state of the art technical expertise and support to client and
IT management and staff in risk assessment and the implementation of appropriate data security
procedures and products. Oversee execution of security controls to prevent hackers from
infiltrating company information or jeopardizing e-commerce programs. Researches attempted
efforts to compromise security protocols. Helps set security policies to control access to systems
and maintains the company's firewall. Manage the reporting, investigation and resolution of data
security incidents. Maintain contact with industry security standard setting groups, and an
awareness of State and Federal legislation and regulations pertaining to information security.
2002-2004 IBM
Dallas, Texas 75025
Systems Management Professional
My typical roles/positions include, but are not limited to, the following: console operations,
production control, print operations, change/problem management, facility management, medial
library management, deskside support, software distribution, IO/IAS/Security administration. I
have utilized AS/400 servers using OS/400. I also provided services to install, operate and
maintain complex centralized and/or distributed computer systems in a multi-vendor operating
environment. Activities may include designing, implementing and coordinating solutions to
ensure acceptable performance levels with proven and advanced systems technologies. Overall,
works on professional level projects; work is often reviewed for developmental purposes.

1996-2002 American Express Financial Advisors
10 IDS Tower
Minneapolis, Minnesota 55402
Distributed Operations
Responsibilities include distribution initiatives being implemented in the Distributed Operations
Center to meet operational standards and mainframe production support. Evaluate, analyze,
develop and trouble-shoot applications on Personal Computers (NT and Wds 95), RS6000, Sun
Microsystems, Tandem, Unix, AS/400, Trimark and mainframe environment. Managing multiple
projects, including co-ordination with American Express Trust Operations and business partners
to deliver documentation, training, define and document best practices and procedures for
application support and operational tools to Global Production Control. I also perform duties
that include tracking on going issues and their resolutions.

Customer Service Representative
Serviced institutional retirement plan participants via phone. Some of my major duties included
account/plan inquires transaction set up and/or implementation using Lotus Notes 4.5.
Administrative duties that included forms generation, account research, completing various
department reports, acted as a liaison between account team and phone group.

1996-1996 First Bank
St. Paul, Minnesota 55101
Credit Analyst
Serviced applicants of First Bank for home equity loans and other lines of credit via phone.
Major duties included verification of credit history for final authorization of denial or
acceptance. Administrative duties included forms generation, research of applicant s credit
history, data entry of applicant s forms and acting as liaison between bank loan officer and phone
group.
EDUCATION
1997-1999 Brown Institute
Minneapolis, Minnesota
Coursework: COBOL, C, C++, Assembly, Visual Basic and RPG
 Certified Computer Programmer
1993-1994 Southern University of New Orleans
New Orleans, Louisiana
 Majored in Criminal Justice
 Worked with and planned events for prominent organizations and services for event
participants.
      1990-1992 United States Armed Services
 Completed Military Police Academy and earned various certificates on Army policy.
 Trained to perform all patrolman functions on the military base and surrounding
community.
1987-1990 University of New Orleans
New Orleans, Louisiana
 Majored in Criminal Justice
REFERENCES
Available upon request

Respond to this candidate
Your Email «
Your Message
Please type the code shown in the image:
Register for Free on Jobvertise