SOC Analyst, Cybersecurity Analyst, Information Security Analyst Resume
Location Status
Somerset, NJ
Work Environment
Target Salary
Negotiable
Category
Information Technology
Endpoint Security AdministrationThreat AnalysisSecurity Monitoring and DetectionRegulatory ComplianceIncident ResponseRisk and Vulnerability ManagementConflict ResolutionSecurity Tools: SOARSplunkQualysNessusCrowdStrikeSymantec Endpoint ProtectionNetwork Security Tools: OpenVPNNmapWiresharkFirewallIDS/IPSNetwork Protocols: HTTP/HTTPSFTP/FTPSDNSSSHUDPTCPFrameworks: ISO 27001NISTGDPRHIPAAMITRE FRAMEWORKPCI DSSSOC2
Candidate Pitch:
Innovative and results-driven professional, with years of experience delivering advanced IT and cybersecurity analysis across diverse industries. Adept at enhancing securities postures, reducing vulnerabilities, and aligning practices with industry standards and frameworks. Well-versed at performing comprehensive assessments, implementing security controls, and streamlining processes that improve security efficiency and resilience. Recognized for driving measurable improvements in risk reduction, response times, and organizational security initiatives. AMAZON | Somerset, NJ Cybersecurity Analyst 08/2022–Present Keenly track, assess, and resolve security events and incidents, identifying the difference between benign and malicious activities Complete threat hunting and rapid incident response using various tools such as security information and event management (SIEMs), security orchestration, automation, and response (SOARs), and endpoint detection systems Administered the vulnerability processes for over 100 systems, upholding security throughout the expansive IT infrastructure Key Accomplishments: Conducted comprehensive vulnerability assessments, identifying over 20 critical security issues and mitigating risks by 30% using SIEM tools such as Splunk Enhanced threat detection and remediation by managing and optimizing vulnerability scanning tools, including Qualys and Nessus, improving response efficiency by 30% Developed and implemented robust data protection policies, strengthening organizational compliance with GDPR and NIST standards by 25% Promoted a culture of security awareness by collaborating with over 10 cross-functional teams to drive adherence to compliance and cybersecurity best practices ADVANCE AUTO PARTS | Dayton, NJ IT Security Analyst 10/2021–07/2022 Employed endpoint detection and response (EDR) and intrusion detection system/intrusion detection system (IDS/IPS) tools in finding and preventing advanced threats Operated Qualys and Nessus for vulnerability assessments to provide actionable risk mitigation recommendations Maintained strict adherence to different frameworks such as general data protection regulations (GDPR), risk management frameworks (RMF), and payment card industry data security standards (PCI DSS) through audits and risk assessments Key Accomplishments: Tracked and examined security events using various SIEM tools such as Splunk and QRadar, resolving over 200 security incidents annually and minimizing mean time to repair (MTTR) by 20% Upgraded network security by 35% through the implementation of Firewall, virtual private network (VPN), and IDS/IPS systems Strengthened the organizational security posture through the development and update of incident response playbooks Provided substantial contribution to business continuity and disaster recovery which reduced potential downtime by 50% AMAZON | Somerset, NJ Junior Security Analyst 03/2021–09/2021 Inspect, discover, and address security incidents using SIEM tools Conducted detailed threat analysis, vulnerability assessments, risk mitigation Facilitated numerous incident response activities such as triage, containment, eradication, and recovery Determined and delivered actionable insights by assessing various cybersecurity threats such as malware and phishing Drafted detailed reports and presentations about incident findings and security trends Developed and enhanced security controls to improve organizational security posture SOFTARIQUE | Woodbridge, NJ Security Risk Assessor 01/2020–03/2021 Adhered to the NIST 800-53 controls in conducting security risk assessments as well as numerous frameworks such as NIST RMF SP 800-37, NIST CSF, and FedRAMP Examined the security posture of information systems to deliver actionable recommendations that mitigate vulnerabilities Managed internal and external resources for successful security initiatives, applying detailed project plans and performance metrics in monitoring progress Key Accomplishments: Provided assistance to the Information Security Risk Management Team in finding and resolving cyber risks and threats, thus strengthening organizational resilience Spearheaded the plan of action and milestones (POA&M) processes, which upheld a 95% compliance rate and allowed for prompt remediation through the effective use of Nessus and Qualys Analyzed over 50 security and vulnerability assessments, over 30 security plans, and 15 security assessment plans which optimized risk management strategies and reduced vulnerabilities Associate of Applied Science – Computer Specialist in Network Technology, In Progress (Expected Completion: 12/2024) Lehigh Carbon Community College | Schnecksville, PA Endpoint Security Administration Threat Analysis Security Monitoring and Detection Regulatory Compliance Incident Response Risk and Vulnerability Management Conflict Resolution Security Tools: SOAR, Splunk, Qualys, Nessus, CrowdStrike, Symantec Endpoint Protection Network Security Tools: OpenVPN, Nmap, Wireshark, Firewall, IDS/IPS Network Protocols: HTTP/HTTPS, FTP/FTPS, DNS, SSH, UDP, TCP Frameworks: ISO 27001, NIST, GDPR, HIPAA, MITRE FRAMEWORK, PCI DSS, SOC2 Operating Systems: Windows, Linux, MacOS Cloud Security: AWS Certified Information Systems Auditor (CISA), In Progress (Expected Completion: 02/2025) Information Systems Audit and Control Association (ISACA) CompTIA Cybersecurity Analyst (CySA+), In Progress (Expected Completion: 12/2024) CompTIA Security +, 09/2024 CompTIAWhat is a Privacy Pitch Resume?
This candidate has opted to keep their Personally Identifiable Information (PII) secure while actively searching for new opportunities. You are viewing their core qualifications and requirements. If their profile aligns with your needs, click Contact Candidate Securely below. We will route your message directly to their private inbox.