Information Security Analyst Resume Sample

An information security analyst is responsible for assessing and reducing the amount of risk to which a company is exposed. Duties include collecting, evaluating, and analyzing data on systems security, identifying possible risks and effective countermeasures, recommending solutions to possible problems, and conducting impact analyses after potential problems have been resolved. The top skills for this position are customer service skills, computer/technical knowledge, problem-solving/decision-making skills, time management skills, and communication skills. A bachelor’s degree in computer science or engineering is required for this position along with experience working as a network administrator or supporting system technician.

The Best Information Security Analyst Resume Samples

These are some examples of accomplishments we have handpicked from real Information Security Analyst resumes for your reference.

Information Security Analyst

  • Proficient in writing ArcSight queries, dashboards, and reports for DLP Incident metrics.
  • Installation, configuration, and setup of ArcSight and relevant components.
  • Customizing correlation searches, alerts, reports, and dashboards using Arcsight loggers and Connectors.
  • Familiar with IDM solutions such as Provisioning, Review, SoD (Segregation of Duties), and PDM (Profile Data Mapping).
  • Daily responsibilities included design, implementation, support, and administration of multiple security products running Check Point Provider-1, Source Fire.

Information Security Analyst

  • Drafted various policies, procedures, standards, and guidelines to promote security and uninterrupted operations.
  • Monitored compliance with the organization’s information security policies and procedures.
  • Conducted regular threat and vulnerability assessments, risk assessments on all operational systems.
  • Identified vulnerabilities, recommend corrective measures, ensure the adequacy of existing information security controls, and presented reports to the CIO.
  • Actively participated in designing, implementing, and monitoring local and corporate information security policies.

Information Security Analyst

  • Support business and work with System administrators, developers, and analysts with troubleshooting issues related to CA Siteminder / LDAP and Federation technologies.
  • Perform change management and incident management utilizing documented procedures.
  • Participate in fail over-testing, disaster recovery testing, and other readiness efforts.
  • Manage encryption keys, install certificates and maintain components required to support secure file transmissions.
  • Reviewed system design, programming, and operation to ensure conformance to existing regulations.

Information Security Analyst

  • Make sure that risks are assessed, evaluated and proper actions have been taken to limit their impact on the Information and Information Systems.
  • Created standard templates for required security assessment and authorization documents, including risk assessments, security plans, security assessment plans and reports, contingency plans, and security authorization packages.
  • Conducted I.T controls risk assessments that included reviewing organizational policies, standards, and procedures and provided advice on their adequacy, accuracy, and compliance with the Payment Card Industry Data Security Standard.
  • Evaluated employee actions for potential vulnerabilities using a risk assessment process.
  • Developed security policies and procedures for an online real-estate marketplace with an expected profit in excess of $2 billion.

Information Security Analyst

  • Evaluates and provide recommendations to the IT development teams and third parties on how to address areas of security non-compliance.
  • Develops and maintains working knowledge of applications utilized at SDMC with a focus on security.
  • Assists in the development of SDMC information security policies, standards, and procedures.
  • Works with key IT managers in conducting periodic system audits and assists in the development of procedures to support IT policies.
  • Coordinated the information security architecture and design with compliance to HIPAA regulations, PCI DSS, FFIEC, SOX, and other applicable regulations.

Information Security Analyst

  • Assisted the Global Application Security Certification Team in maintaining integrity and confidentiality for client information by ensuring PCI DSS compliance.
  • Conducted security reviews for First Data browser-based applications and web services.
  • Performed technical security work using application vulnerability scanners and intercepting proxies to identify significant security weaknesses.
  • Assisted in analyzing the business impact of security issues, and provided documented guidance to developers and management which defined the needed remediation to ensure security.
  • Managed a team of security analysts for 24/7 monitoring and alerting on system issues.

Information Security Analyst

  • Participating in investigations into any alleged computer or network security compromises, incidents, or problems and recommend corrective actions.
  • Staying up to date with relevant security information and best practices through membership in special interest groups or professional forums.
  • Participate in developing and managing information security programs, including, but not limited to; information security awareness, vulnerability management, change management.
  • Actively participate in the maintenance and development of the Information Security Management System.
  • Developed a SIEM tool and set up correlation rules to detect a cyber intrusion by using multiple threat feeds from around the globe and across the Internet; then coordinated the incident response plan and escalated threat findings to the management team for immediate remediation.

Information Security Analyst

  • Designed and updated training materials, visitor management system manual, and information security reminder email announcements to increase security awareness throughout the organization in a timely manner and shared with remote offices.
  • Information security training: performed training for new hires every other week.
  • Information security tool management and troubleshooting: PC Plus, WWScan, I-Fax, and Security Portal.
  • Building access management: administrate and maintain access control system, ID badge issuance/replacement/termination, monitor and export access log / CCTV camera upon requests, monthly system checkup for any malfunction of equipment (access card readers, CCTV cameras), and implemented new visitor management kiosk system.
  • Designed and implemented a high-level encryption system for anti-hacking of a large, national company in order to protect from loss of privacy and illegal gain.

Information Security Analyst

  • Monitored Security Management Console for Security Operation Centre (SOC) for ensuring confidentiality, Integrity, and Availability of Information systems.
  • Provided leadership in architecting and implementing security solutions towards Qualys and SIEM tools like Splunk, Solutionary, and LogRhythm.
  • Managed Cyber Security threats through prevention, detection, response, escalation, and reporting in an effort to protect Enterprise IT Assets through Computer Security Incident Response Team (CSIRT).
  • Responsibilities for CSIRT included SIEM, Context Filtering, Web Security, Incident Tracking, IPS/IDS, and Malware Analysis.
  • Worked closely with the Vice President amidst the 40-employee IT department to devise a system that would enhance the efficiency of daily operations.

Information Security Analyst

  • Conduct WebInspect application security testing and assessment on complex web applications before they can be moved to production.
  • Conduct QualysGuard scan on the test as well as production servers, and identify the security threats that make attacks possible.
  • Generate Enterprise Configuration Manager (ECM) reports to provide visibility of the IT infrastructure, manage and measure compliance.
  • Responsible for the risk analysis of all lost information, also conduct an interview to discuss the type of data lost, do the final risk classification, and inform the respective segment CISO.
  • After experiencing an unsolicited intrusion by outside hackers, I devised an intrusion detection system embedded in the security protocol to prevent such invasions in the future.

Information Security Analyst

  • Written and oral communication skills including the ability to communicate complex technical issues to non-technical staff.
  • Experience applying, analyzing, and assessing information systems and security controls (SP800-53, Rev3 & Rev 4).
  • Knowledge of and experience with applying Common Weakness Enumeration (CWE) and Common Vulnerability Scoring System (CVSS).
  • Experience working with perimeter technologies (e.g., firewalls, proxies, NIDS) and vulnerability management tools.
  • Consulted with five out of nine branches on how to install and operate new computers, phone lines, and software.

Information Security Analyst

  • Designed, developed, and innovated solutions to meet security compliance requirements.
  • Conduct Security Control Assessment on General Support Systems (GSS), Major Applications, and Systems to ensure that such Information Systems are operating within a strong security posture.
  • Reviewed and updated some of the system categorization using FIPS 199.
  • Develop and modify Organization’s Security Policies, Standards, Processes, and Procedures.
  • Demonstrated knowledge of and ability to perform computer-based functions, including system diagnosis and repair, setup, monitoring, support, diagnostics, and testing of all computer hardware including peripherals.

Wrap Up

Resumes are a crucial aspect of any job search. In order to make a good first impression, it is important that your resume be formatted and written professionally.

Hope these samples gave you an idea of what your resume should look like and some tips on how to make sure that your resume stands out from the rest.

Leave a Comment