Cyber security

Cyber security
Resume examples

Resume Examples Objectives and summaries Templates
Cyber security
Cyber security
Resume examples

13Cyber security resume examples found

All examples are written by certified resume experts, and free for personal use. Copy any of the Cyber security resume examples to your own resume, or use one of our free downloadable Word templates. We recommend using these Cyber security resume examples as inspiration only, while creating your own resume.

Learn more about: how to write a perfect resume

System analyst

Experienced

Provided the highest level of technical expertise in the analysis, installation, configuration, testing, and maintenance of Enterprise Technology Architecture. Supported all phases of projects, programs, and initiatives to facilitate requirement elicitation for application servers and content management.

  • Developed highly scalable business and technical solutions – requirements, dataflow diagrams, as-is analysis and comparison, solution design, assessment, validation, implementation, and control initiatives.
  • Provided technical consultation on technical projects including Simple Object Access Protocol (SOAP), Web Services, and Extensive Markup Language (XML) and data integration points
  • Conducted requirements gathering sessions, developed and published a request for information (RFI) and the Request for Proposal (RFP).
  • Designed key metrics to assess which vendors would formally present their solution for a cloud-based scalable system; first cloud-based system solutions that were scaled throughout all city departments.

Copy to clipboard 0

Cyber security analyst

Experienced

Managed a $10M budget to operate and defend 3 unique networks for client engagement in accordance with SOW, exceeding KPIs. Supported 1K users; overseeing 10 direct reports including 4 division managers executing vulnerability management, cyber protection, incident response, and cyber forensics analysis as well as protection management, cyber intelligence, and reporting. Rebuild client trust and course‐corrected program after winning mismanaged contract.

  • Developed key relationships, assess client needs, identify pain points, and replaced incorrectly utilized technology in existing inventory, and built a high‐performing team to earn a client for program turnaround.
  • Spearheaded development of advanced cyber forensics capability, pinpointing appropriate technology, and integrating technology into the enclave, resulting in a profound surge of in‐house detection of cyber incidents across national field sites and a secure evidence chain of custody.
  • Provided end-to-end leadership from discovery to problem resolution for cross‐functional problems related to vulnerability management, data management, cybersecurity, application management, customer service, hardware/software.
  • Presented actionable insights related to human cyber risk measures to an audience of security professionals.

Copy to clipboard 4

Information security analyst

Experienced

Developed technology roadmaps for security tools in alignment with the company’s business objectives while partnering with the executive team and cross-functional global teams. Functioned as a key strategic member of the Security Steering Committee and Security Governance team. Supervised 7 direct reports. Managed up to $30M in project budgets and $5M in IT P&L.

  • Accountable for implementing strategy, planning, and delivery of the IAM, and Crypto capabilities.
  • Oversaw multiple areas and personnel including a team of Sr Managers, Architects, Engineers, and PMs to deliver business IAM capabilities to key retail areas including POS, Order Management, and corporate systems for over 12K users.
  • Implemented an extensive and complex encryption solution to protect transactions on POS systems.
  • Architected a world-class onshore and offshore team to support a fast pace and dynamic Security Engineering and Operations environment.
  • Deployed Office 365 Exchange online to 170,000 users along with the development of architecture, authentication, and provisioning controls.
  • Led a significant point-to-point encryption solution.
  • Managed overall contract renewals for the company (EAS, Premier & Office 365) and versed in MS UR and licensing.

Copy to clipboard 2

Network security engineer

Experienced

Direct and implement IT initiatives; built credibility, established rapport, and maintained communications with customers and cross-functional groups including sales, marketing, product management, engineering, quality assurance, and fee-services.

  • Established remote support and support automation for CSN products; provided automated fixes for system issues and enabled product design to support automated functionality.
  • Selected to be a member of various SWAT teams to solve Class-level product Quality problems; managed the customer experience for issue resolution and implemented risk mitigation strategies.
  • Communicated with business team stakeholders including manufacturing, the supply chain, and customer service to implement supportability across the enterprise.
  • Directed security vulnerability reporting for CS Networking (CSN) products in the field while working with various CSN labs to resolve security vulnerability and implement solutions.
  • Led partnership with Corel, E-Ware, Avid, and Software Secure as part of the CS Network E-System (NES) product alliance to determine call flow, service level agreements, and escalation paths for NES products.

Copy to clipboard 0

System analyst

Experienced

Directed a broad range of IT initiatives for a diversified education and media company. Provided incident/situation management and ongoing technical training to over 500 users while resolving issues promptly with ITIL methodologies. Supported over 130 licensed users annually.

  • Managed all facets of the system development cycle including analysis, design, specification, development, testing, training, documentation, and implementation of technical solutions.
  • Oversaw applications and server usage; administered applications during roll-out and planned and prepared standard procedures, support, and enhancement for the ongoing administration of advertising systems.
  • Spearheaded SAP ERP administration, upgrades, testing, and troubleshooting for 165 users; configured and maintained accounts, ensured adherence to Sarbanes Oxley guidelines.
  • Coordinated Service Level Agreement (SLA) documentation for external technology vendors; organized weekly meetings with vendors to ensure adherence to SLAs and prompt incident resolution.
  • Primary technical contact and administrator for client-based website; provided exceptional service during the online ordering process by interfacing with clients and internal development teams to resolve problems.
  • Supported $5M in annual advertising revenue from a client-server-based platform to a web application while maintaining the system, configuring users, coordinating training, and escalating issues to vendors.
  • Managed the full project lifecycle including product development, integration implementation, scheduling, training, and service delivery.
  • Designed and completed a cutting-edge project allowing small-mid size businesses to directly place their display advertising online significantly reduced cost and improved customer experience.
  • Researched the business impact of migrating CMS tools to Drupal.

Copy to clipboard 0

Cyber security analyst

Entry level

Demonstrated ability to work on multiple tasks and respond to rapidly changing priorities under the direction of the IT Manager. Formulated, organized, and effectively presented ideas while serving as the company’s official representative in technical forums and panel discussions.

  • Supported all cyber security and IT programs reporting to the cyber security lead and regularly interacted with all levels of contractor management.
  • Researched, documented, and implemented software application requirements specifications and worked with the system end users to ensure effective use of applications.
  • Ensured all changes to systems are performed according to configuration control standards and company policies.
  • Developed and maintained user guides, manuals, and other types of software application documentation.
  • Participated in the development of database architectures, coding standards, quality assurance policies, and procedures.

Copy to clipboard 2

Information security analyst

Entry level

Developed, installed, and monitored security software and hardware components for the company’s network. Assisted with the configuration and optimization of IT tools, and performed vulnerability scans, web applications, penetration tests, and security assessments.

  • Collaborated with corporate compliance and security teams across enterprise networks to identify and resolve technical issues and threats.
  • Documented and reported technical requirements to the leadership team for review and approval of security updates.
  • Assigned to troubleshoot large, complex, and cross-functional challenges and provide suggestions for updated risk management tools.
  • Evaluated numerous security applications including Okta, Mimecast, Zscaler, and Sentinel One to identify network improvement needs.
  • Served as a consultant on the long-term vision for security design for the company’s ability to make enhancements as potential threats evolve.

Copy to clipboard 1

Network security engineer

Entry level

Responsible for managing firewalls and network security components and devices to provide timely, accurate, and planned completion and implementation of security services for the organization. Supported clients with data protection, the internet of things, and overarching cloud capabilities.

  • Provided primary day-to-day support for network security infrastructure interactions with project and cybersecurity teams.
  • Analyzed tactical network security architecture and topology to determine security risks and make recommendations to the lead IT Director.
  • Delivered and maintained IT security objectives in cost-effective and time-efficient manners while monitoring risks and vulnerabilities.
  • Conducted bi-weekly network vulnerability and risk tests to create emergency patches and identify long-term solutions.
  • Recommended security solutions to improve architecture and controls for security infrastructures for authentication and authorization processes.

Copy to clipboard 0

System analyst

Entry level

Trained staff to efficiently and accurately use computer software, wrote instruction guides and manuals, and consulted the management team on necessary software and hardware updates. Conducted regular tests to ensure quality and functionality while brainstorming methods of improvement.

  • Analyzed network systems, defined problems, and created and proposed solutions that were cost-effective and aligned with the organization’s goals and initiatives.
  • Researched and selected a new database management system by reviewing design, feasibility studies, cost estimates, and impact analysis.
  • Tested the acceptance of system changes and performed analysis on system and process measurements.
  • Installed and configured data management software for the organization and maintained upgrades, patches, and tools.
  • Provided required organizational technical support for both production and project-related activities.

Copy to clipboard 0

Cyber security analyst

Senior

Conducted regular surveys and audits of cyber security programs and provided assistance and consulting services to all departments. Oversaw firewall, email security systems, web security systems, and IDS/IPS. Maintained a current understanding of all applicable DOE and Federal regulatory requirements.

  • Coordinated investigative activities with appropriate management and formulated written reports and presented verbal and written briefings.
  • Performed cyber security incident triage to determine the scope, urgency, and potential impact as well as identify the specific vulnerabilities and threats.
  • Ensured project teams complied with enterprise and IT security policies, industry regulations, and best practices.
  • Conducted and monitored performance tests on new and existing software and databases to identify security threats and vulnerabilities.
  • Collaborated with functional architects and third-party security specialists to ensure adequate solutions were in place to identify and deter cyber risks.

Copy to clipboard 1
View all

Free resume templates

  • Free for personal use
  • Direct download as a Microsoft Word document
  • Created by a CPRW certified resume expert
  • Optimized for applicant tracking system (ATS) screening

Choosing a correct resume format and template

Resume examples

Resume template

Download our American style resume template. Chronological resume format. Download a functional resume template.

resume chronological

Learn more about the differences between a resume and a CV.

CV template

Download our British/European style cv template. Similar to a resume but more commonly used in Europe, Asia and Africa.

cv template