resume

Not in love with this template? Browse our full library of resume templates

boy

Build your resume in 15 minutes

Use professional field-tested resume templates that follow the exact resume rules employers look for.
6

information security analyst

  • Create, modify, revoke, unlock and password resets in 100+ in-house applications
  • Ensuring requests and incidents are processed within specified service level targets
  • Completion of day to day activities which involves request system i.e. ticketing tools including Service now and mailbox monitoring
  • Manage the Major Incidents (Situations) until resolution • Provide initial incident support • Prioritize incidents based on impact and urgency • Investigate and diagnose incidents • Resolve incidents and recover service per agreed service levels • Close incidents • Maintain ownership, monitoring and tracking about incident
  • Update Key Operating Procedures (KoPs), request systems, service catalog, NAR portal etc
  • Participate in both internal and external audit queries pertainingto recertification process and evidences
  • Manage GAMA, gatekeeper recertification, leavers and SoD (Segregation of duties) violation checks
7

information security analyst

  • Monitor the security of critical systems (Example: Email servers, database servers etc).
  • Performed hard drive forensics looking for information containing Unclassified across the bank.
  • Wrote batch files to force check in and updates for 200 laptop computers.
  • Application of preventive measures during WannaCry Virus attack in July 2017.
8

information security analyst

  • Analyzing security incidents through Splunk which are detected by different security tools (log analysis and events Monitoring).
  • Maintain up-to-date documentation of SOP’s, update tracker & incident follow up tracker. 
  • Investigate, document, and report on information security issues and emerging trends. 
  • Provide Incident Response (IR) support when analysis confirms actionable incident. 
  • Analysis of phishing emails through Phishme triage for email security. 
  • Conduct network vulnerability assessments using Qualys guard tool to evaluate attack vectors, identify system vulnerabilities and develop remediation plans and security procedures. 
  • Handling endpoint security through TrendMicro office scan for proactive monitoring against malware attack. 
9

information security analyst

  • Monitor security breached alerts on SEIM tools like ArcSight, SPLUNK, cofense triage.
  •  Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated. 
  • Conducted security audits to identify vulnerabilities
  • Recommend improvements in security systems and procedures
10

information security analyst

  • Update tickets,write security Incidents
  • Server communications through Slashnext protection system
  • Threat Hunting through Hexadite AIRS ,Tanium  for EDM 
  • Monitoring and protecting critical data of organization across cloud applications through cloudapp security