

Not in love with this template? Browse our full library of resume templates
Related Resumes & Cover Letters
6
information security analyst
- Create, modify, revoke, unlock and password resets in 100+ in-house applications
- Ensuring requests and incidents are processed within specified service level targets
- Completion of day to day activities which involves request system i.e. ticketing tools including Service now and mailbox monitoring
- Manage the Major Incidents (Situations) until resolution • Provide initial incident support • Prioritize incidents based on impact and urgency • Investigate and diagnose incidents • Resolve incidents and recover service per agreed service levels • Close incidents • Maintain ownership, monitoring and tracking about incident
- Update Key Operating Procedures (KoPs), request systems, service catalog, NAR portal etc
- Participate in both internal and external audit queries pertainingto recertification process and evidences
- Manage GAMA, gatekeeper recertification, leavers and SoD (Segregation of duties) violation checks
7
information security analyst
- Monitor the security of critical systems (Example: Email servers, database servers etc).
- Performed hard drive forensics looking for information containing Unclassified across the bank.
- Wrote batch files to force check in and updates for 200 laptop computers.
- Application of preventive measures during WannaCry Virus attack in July 2017.
8
information security analyst
- Analyzing security incidents through Splunk which are detected by different security tools (log analysis and events Monitoring).
- Maintain up-to-date documentation of SOP’s, update tracker & incident follow up tracker.
- Investigate, document, and report on information security issues and emerging trends.
- Provide Incident Response (IR) support when analysis confirms actionable incident.
- Analysis of phishing emails through Phishme triage for email security.
- Conduct network vulnerability assessments using Qualys guard tool to evaluate attack vectors, identify system vulnerabilities and develop remediation plans and security procedures.
- Handling endpoint security through TrendMicro office scan for proactive monitoring against malware attack.
9
information security analyst
- Monitor security breached alerts on SEIM tools like ArcSight, SPLUNK, cofense triage.
- Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated.
- Conducted security audits to identify vulnerabilities
- Recommend improvements in security systems and procedures
10
information security analyst
- Update tickets,write security Incidents
- Server communications through Slashnext protection system
- Threat Hunting through Hexadite AIRS ,Tanium for EDM
- Monitoring and protecting critical data of organization across cloud applications through cloudapp security