CYBER SECURITY ANALYST RESUME EXAMPLE

Published: May 27, 2025 - The Cyber Security Analyst implements and monitors security measures to protect cyber systems, networks, and information from breaches and viruses. This position monitors logs and security alerts, enables identification of threats and the provision of actionable recommendations for resolution. This role involves reporting and documentation support risk assessment, policy effectiveness, and incident management to maintain a strong security posture and operational continuity.

Tips for Cyber Security Analyst Skills and Responsibilities on a Resume

1. Cyber Security Analyst, Apex Cyber Defense Solutions, Plano, TX

Job Summary:

  • Assist in technical advice to business or customers in the day-to-day delivery of services, including responding to user problems and rectifying faults.
  • Assist in implementing projects under direction from the Project Manager within a defined schedule and budget.
  • Assist in the effective operation of security infrastructure including antivirus, firewall, network and host IPS and device control technologies across multiple platforms and environments of workstations, servers and exchange environments.
  • Assist in the Security Administration of day-to-day administration of network security infrastructure including intrusion protection systems, security event correlation systems, email gateways, firewalls and VPN appliances to ensure effective and efficient operation.
  • Identify process improvement to optimise service delivery and cost benefit to the business or customer.
  • Assist in reviewing all security documentation and procedures meet compliance requirements.
  • Building relationships with teams across the company and introducing better security practices within those teams.
  • Monitoring CDN solution, as well as updating and implementing WAF and Rate Limiting.
  • Generating reports that provide detailed coverage on Security within CtM's estate.
  • Providing valuable advice to colleagues with complex security-based questions.
  • Understanding phishing and the common phishing techniques used to infiltrate corporate networks
  • Training and informing colleagues about the dangers of phishing.
  • Keeping up to date with emerging cyber news and vulnerabilities.


Skills on Resume: 

  • Technical support (Hard Skills)
  • Project implementation (Hard Skills)
  • Security infrastructure (Hard Skills)
  • Network administration (Hard Skills)
  • Process improvement (Hard Skills)
  • Compliance review (Hard Skills)
  • Relationship building (Soft Skills)
  • Cyber awareness (Soft Skills)

2. Cyber Security Analyst, Sentinel Tech Services, Richmond, VA

Job Summary:

  • Support BASF’s global Cyber Security Defense Center in the handling of cybersecurity incidents
  • Support the global incident response team and act as a capable point of contact within the area of IT security at the BASF Group.
  • Work on complex IT security incidents with a focus on remediating and closing the incident.
  • Establish and maintain relations to APAC and especially Chinese Cyber Security interest groups and institutions.
  • Collaborate with non-IT domain experts in materials and process R&D for defining the domain-specific rules for setting alarm thresholds and identification of abnormal behavior.
  • Continuously improve and update dashboards including statistical analysis.
  • Support and development of security concepts for the containment and prevention of cyber attacks and the protection of data and IT systems
  • Documentation of the IT infrastructure and assessment of risks in compliance with security standards
  • Drafting and documenting solutions for handling and monitoring security incidents
  • Supporting IT management in conducting SOX audits and monitoring SOX controls
  • Cooperation with American colleagues


Skills on Resume: 

  • Incident handling (Hard Skills)
  • Incident response (Hard Skills)
  • Relationship management (Soft Skills)
  • Cross-functional collaboration (Soft Skills)
  • Data analysis (Hard Skills)
  • Security concepts (Hard Skills)
  • Documentation skills (Hard Skills)
  • Audit support (Hard Skills)

3. Cyber Security Analyst, Guardian Network Security, Spokane, WA

Job Summary:

  • Applying Risk Management Framework (RMF) in support of achieving Authorization to Operate (ATO)
  • Analysis to ascertain RMF certification authorization
  • Perform continuous system monitoring and reporting on the architecture's readiness state
  • Use COTS/GOTS tools to perform vulnerability scans to identify cyber defense weaknesses
  • Develop tools, scripts, or processes to automate tasks and improve efficiency
  • Provide SME skills to evaluate system and site certification authorizations
  • Identify and implement Information Assurance Vulnerability Alerts (IAVA) to support continuous ATO
  • Identify and implement Security Technical Implementation Guides (STIGs)
  • Penetration testing oversight and SME solution provider
  • Assess Information Assurance Vulnerability Management (IAVM) reports for system applicability
  • Review and respond to Cyber Task Orders (CTO) for systems of interest


Skills on Resume: 

  • Risk management (Hard Skills)
  • System monitoring (Hard Skills)
  • Vulnerability scanning (Hard Skills)
  • Automation development (Hard Skills)
  • Subject matter (Hard Skills)
  • Security implementation (Hard Skills)
  • Penetration testing (Hard Skills)
  • Report assessment (Hard Skills)

4. Cyber Security Analyst, Fortify Information Systems, Naperville, IL

Job Summary:

  • Analyse network, application and system events in order to identify any potentially abnormal system behaviours and raise them as incidents for investigation
  • Perform and lead proactive analysis and threat hunting across client networks from knowledge of current threats and trends
  • Ensure all operational incidents, on-going tickets and relevant information is handled correctly in line with the Incident Handling processes
  • Ensure all tickets are quality checked before release to the customer
  • Produce operational reporting to support both customer and internal information exchanges and briefing and awareness requirements
  • Maintain a broad and current understanding of evolving threats and vulnerabilities to ensure the maintenance of the security of client networks
  • Continually assess and maintain the SOC use cases and playbooks for the Archangel SOC to maintain excellence within the service
  • Act as a protective monitoring and SIEM SME during normal operations and as part of project teams looking to develop new solutions and capabilities
  • Provide continuous SME support, updates and recommended courses of action for on-going incidents raised within the SOC
  • Provide continuity to the service as part of the operations team.
  • Ensure sufficient staffing levels are available to meet the minimum staffing requirements of the shifts to maintain 24/7/365 operations, advising the Lead Analyst/Head of Service Operations of any shortfalls at the earliest opportunity.
  • Manage analyst training, user awareness, mandated security education or specified and promote additional professional furtherance amongst the ProMon team
  • Sustain and manage the direct line management, coaching and mentoring of ProMon Analysts
  • Maintain and update the training plans for all security event analysts


Skills on Resume: 

  • Threat analysis (Hard Skills)
  • Incident handling (Hard Skills)
  • Operational reporting (Hard Skills)
  • Security monitoring (Hard Skills)
  • Use case management (Hard Skills)
  • SME support (Hard Skills)
  • Team management (Soft Skills)
  • Training development (Soft Skills)

5. Cyber Security Analyst, SecureNet Consulting, Madison, WI

Job Summary:

  • Perform ongoing analysis of security tools and evaluate available technology capabilities against the security needs of the company
  • Provide daily data displaying the overall security coverage for specific platforms which shall be reported in appropriate manner.
  • Provide network defense system architecture, installation and configuration support by identifying, developing and facilitating implementation of initiatives and programs designed to enhance the security of the network and data assets.
  • Ensure network security access and protect against unauthorized access, modification, or destruction of data that is critical to enable the achievement of information security program goals and objectives.
  • Reviews, develops, tests, and implements security plans, products, and control techniques as well as documents security policies and procedures.
  • Update existing documentation to include tactics, techniques and standard operating procedures and security controls for all hardware/software used on the network.
  • Provide technical expertise in the development and support of Information Security and operational activities, processes, and tools for protecting technology-based information.
  • Assist with enterprise-wide establishment and maintenance of data, security-related infrastructure, applications, and processes.
  • Participate, and at times lead, response and investigation efforts in data security incidents and design corrective actions.
  • Works with Information Security and Enterprise Architecture teams to design security services and recommend security architecture improvements.
  • Creation and maintenance of detailed process documentation
  • Ongoing collaboration with global SOC and global security teams


Skills on Resume: 

  • Security analysis (Hard Skills)
  • Data reporting (Hard Skills)
  • Network security (Hard Skills)
  • Access control (Hard Skills)
  • Policy development (Hard Skills)
  • Technical expertise (Hard Skills)
  • Incident response (Hard Skills)
  • Collaboration skills (Soft Skills)

6. Cyber Security Analyst, Ironclad Cyber Solutions, Little Rock, AR

Job Summary:

  • Review IT Security Policy, Standards and Guidelines in line with best practice, providing recommendations for improvement
  • Work closely with IT Operations to ensure critical business assets are adequately protected from cyber-related threats using appropriate technical controls.
  • Support the design of enterprise solutions to ensure security is applied effectively
  • Participate in technical impact assessments, identify security risks and issues, and how to mitigate them
  • Engage with relevant teams to gather evidence of the controls that are currently in place and report on the effectiveness of each control.
  • Support the design of enterprise solutions to ensure security is applied effectively
  • Participate in technical impact assessments, identify security risks and issues, and learn how to mitigate them
  • Support the wider team in assessing risk in IT change and recommending and designing security controls
  • Participate in architectural discussions to ensure solutions are designed for successful deployment, security, and high availability in the cloud
  • Participate in Business Continuity, Disaster Recovery and IT Service continuity planning


Skills on Resume: 

  • Policy review (Hard Skills)
  • Technical controls (Hard Skills)
  • Solution design (Hard Skills)
  • Risk assessment (Hard Skills)
  • Evidence gathering (Soft Skills)
  • Security architecture (Hard Skills)
  • Change management (Hard Skills)
  • Continuity planning (Hard Skills)

7. Cyber Security Analyst, BlueShield Cybersecurity Group, Tucson, AZ

Job Summary:

  • Monitor firewall activity and take actions to protect the network.
  • Analyze reports of suspicious email messages and determine if they contain malicious attachment or links.
  • Develop criteria for blocking or quarantining of email messages. 
  • Monitor quarantines and analyze if messages should be released or deleted.
  • Configure and tune intrusion prevention systems.
  • Investigate antivirus system notification alerts and take appropriate action.
  • Interact with corporation personnel who report suspicious or unusual network or system activity.
  • Develop cybersecurity notices for distribution to all personnel based on cybersecurity events.
  • Ensure that the proper level of risk is managed to prevent unacceptable, adverse impact on information and information systems, recommending modifications to cybersecurity measures to management.
  • Ensure that periodic cybersecurity assessments are conducted and documented.
  • Maintain current knowledge of threats that can affect information systems.
  • Participate in cybersecurity inspections, certifications, tests, and reviews.


Skills on Resume: 

  • Firewall monitoring (Hard Skills)
  • Email analysis (Hard Skills)
  • Quarantine management (Hard Skills)
  • IPS configuration (Hard Skills)
  • Antivirus investigation (Hard Skills)
  • Communication skills (Soft Skills)
  • Risk management (Hard Skills)
  • Security assessment (Hard Skills)

8. Cyber Security Analyst, Titan Security Services, Baton Rouge, LA

Job Summary:

  • Engineers, configures, deploys, and maintains F5 Web Application Firewall solutions.
  • Analyzes requests from subscriber sites for blocked web application traffic.
  • Coordinates with subscriber sites for Web Application Firewall tuning.
  • Coordinates with subscriber sites for onboarding of new Web Applications through the WAF.
  • Coordinate with other teams on deployment and maintenance of F5 WAF systems.
  • Engineers, configures, deploys, and maintains IDS infrastructure for subscriber sites.
  • Write and deploy custom Suricata and Snort style signatures.
  • Analyze network traffic and IDS/IPS alerts to configure Suricata/Snort style signatures.
  • Coordinate with other teams on deployment and maintenance of IDS systems.
  • Install and configure IT security agents
  • Support IT security project implementation
  • Participate in user acceptance and recovery tests
  • Work with vendors to perform assessments and fixes
  • Provide support for IT security tools


Skills on Resume: 

  • WAF engineering (Hard Skills)
  • Traffic analysis (Hard Skills)
  • Team coordination (Soft Skills)
  • IDS configuration (Hard Skills)
  • Signature writing (Hard Skills)
  • Security agent (Hard Skills)
  • Project support (Hard Skills)
  • Vendor management (Soft Skills)

9. Cyber Security Analyst, Quantum Secure Networks, Des Moines, IA

Job Summary:

  • Respond to alerts and investigate security events
  • Regularly interact with and educate customers who report suspected security threats
  • Recognize successful and unsuccessful intrusion attempts through analysis of relevant event information
  • Perform incident response, analysis, and recovery actions
  • Research and evaluate security tools and attacker tactics, techniques and procedures to improve NREL's ability to detect and respond to malicious activity
  • Perform forensic tasks to collect, preserve and analyze evidence collected during incidents and investigations
  • Assist with the implementation of technical counter-measures and monitoring tools
  • Administer security systems for defense-in-depth measures
  • Assess risks to the security of NREL's computing systems
  • Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies


Skills on Resume:  

  • Alert response (Hard Skills)
  • Customer education (Soft Skills)
  • Intrusion detection (Hard Skills)
  • Incident recovery (Hard Skills)
  • Threat research (Hard Skills)
  • Forensic analysis (Hard Skills)
  • Countermeasure implementation (Hard Skills)
  • Risk assessment (Hard Skills)

10. Cyber Security Analyst, Vanguard Cyber Protection, Boise, ID

Job Summary:

  • Security monitoring including detecting, investigating and analyzing events
  • Perform log analysis on various security/network devices
  • Handle and investigate suspicious and/or malicious emails reported by internal users
  • Perform analysis on threat indicators and intelligence insight on a daily basis
  • Contributing to Cyber Security, Internal Intelligence building
  • Analyze the latest security news and social media posts
  • Participate in incident handling including identification, containment, eradication and recovery
  • Prepare an incident report for the critical incident for management
  • Create and maintain playbooks for security incidents
  • Provide recommendations on cybersecurity information technology solutions in support of business operations, primarily focused on Public Key Infrastructure (PKI)


Skills on Resume: 

  • Security monitoring (Hard Skills)
  • Log analysis (Hard Skills)
  • Email investigation (Hard Skills)
  • Threat analysis (Hard Skills)
  • Intelligence gathering (Hard Skills)
  • Incident handling (Hard Skills)
  • Report preparation (Hard Skills)
  • PKI knowledge (Hard Skills)

11. Cyber Security Analyst, Sentinel Cyber Technologies, Fargo, ND

Job Summary:

  • Monitor patch progress, evaluate vulnerabilities, and analyze penetration testing results, identify challenges, and assist the IT organization with resolution
  • Monitor and analyze security events from various security tools such as endpoint protection and mobile device management
  • Partner with the incident response team and helpdesk to investigate security incidents, prepare possible mitigations, and document root-cause analysis
  • Prepare risk assessments of new projects and vendors, and evaluate mitigating controls using group assessment procedures
  • Work with the Internal Control department and to help demonstrate Information Security compliance to Group standards and local regulations, as well as internal and external audits
  • Create reports to summarize the results of monitoring and assessment activities, and highlight security issues
  • Develop recommendations to address or mitigate security issues, review recommendations with system and application owners, document action plans, and track remediation activities
  • Partner with the infrastructure team to maintain a strong security posture, reviewing firewall policies and changes and network segmentation, and troubleshooting filtering problems
  • Partner with the rest of the IT organization to ensure effective implementation and ongoing management of security tools, systems, and processes
  • Assist in the evaluation, selection and deployment of security tools
  • Assist the Director of Cybersecurity with ongoing cybersecurity operations and aligning local strategy with the global direction


Skills on Resume: 

  • Vulnerability evaluation (Hard Skills)
  • Security monitoring (Hard Skills)
  • Incident investigation (Hard Skills)
  • Risk assessment (Hard Skills)
  • Compliance auditing (Hard Skills)
  • Report creation (Hard Skills)
  • Security remediation (Hard Skills)
  • Team collaboration (Soft Skills)

12. Cyber Security Analyst, ShieldWave Security, Springfield, MO

Job Summary:

  • Timely analysis of information systems to identify risks
  • Identification, review and specification of security technologies needed to protect Jaguar Land Rover and customers
  • Working with a range of stakeholders to understand and model information flows and the properties of these flows
  • Collaborate with local and wider teams to deliver Jaguar Land Rover’s overall objectives in an agile way
  • Delivering a cybersecurity assurance case meeting emerging regulations for the connected products in areas of responsibility
  • Engaging with cybersecurity and functional safety experts across the business to improve the overall cybersecurity posture of the company and drive towards the overall cybersecurity strategy
  • Advises on functionality, benefits, and implementation requirements of Multi-factor authentication and authorization solutions
  • Provide policy guidance, implementation, and operational process analysis in support of the PKI, Common Access Card, Information Assurance, and Identity Management activities in the Air Force
  • Independently determines and develops an approach to identify appropriate solutions for AF customers
  • Coordinates and hosts meetings with various levels of AF personnel and leadership on Public Key Enabling (PKE) efforts
  • Maintain and track progress of all PKE efforts assigned using the Oracle Customer Relationship Management tool
  • Provide metrics and reports as requested by various levels of AF leadership


Skills on Resume: 

  • Risk analysis (Hard Skills)
  • Security technologies (Hard Skills)
  • Stakeholder collaboration (Soft Skills)
  • Agile delivery (Soft Skills)
  • Cyber assurance (Hard Skills)
  • Strategy development (Soft Skills)
  • Policy guidance (Hard Skills)
  • Progress tracking (Hard Skills)

13. yber Security Analyst, GuardianEdge Security, Reno, NV

Job Summary:

  • Regularly monitors Cyber Security related issues and requests, while providing first tier resolution.
  • Maintains and monitors operations of Cyber Security technologies for efficiency, availability and security.
  • Assists with functional or technical delivery of Cyber Security solutions to end users as an individual contributor or team member based on guidance from team leadership.
  • Assists with the analysis and technical implementation of Nationwide Children’s Hospital Cyber Security initiatives, including requirements gathering and translation between business terms and technical requirements.
  • Serves as an escalation point for operational issues related to the Cyber Security infrastructure and processes, including occasional after-hours support.
  • Contributes to the evaluation and determination of software tools and operational feasibility of solutions.
  • Works with vendors to optimize software configurations while ensuring high availability and ease of use.
  • Develops training material for primary support roles as well as system documentation, including DR plans.
  • Builds and maintains positive relationships with immediate team members, project teams, other internal IT departments, customers, end-users and external contacts.
  • Serving as technical lead in supporting the creation and ongoing maintenance of Splunk SIEM use cases for the reporting and alerting of security threats and the integration and correlation of threat intelligence within the CFC.
  • Developing threat detection logic and rules, content management, rule tuning, reporting and alert creation.
  • Working with Incident Detection & Response to identify and recommend new internal and external data sources to develop additional threat detection logic
  • Operationalizing Indicators of Compromise from intelligence feeds by developing, testing, deploying, monitoring and alerting rules into the SIEM


Skills on Resume: 

  • Issue monitoring (Hard Skills)
  • Operations management (Hard Skills)
  • Technical implementation (Hard Skills)
  • Escalation handling (Hard Skills)
  • Vendor management (Soft Skills)
  • Training development (Soft Skills)
  • Threat detection (Hard Skills)
  • SIEM expertise (Hard Skills)

14. Cyber Security Analyst, Fortress Cyber Defense, Charleston, SC

Job Summary:

  • With the use of software tools, continuously monitor the customers’ infrastructure to identify security incidents
  • Provide timely response to security alerts and incidents
  • Identification and triage of security alerts
  • Investigate, document, and report security problems and emerging security trends
  • Gather essential and necessary data and information to facilitate SOC Level 2 analysts in investigations
  • Coordinate with other Level 1 and Level 2 analysts regarding system and network security to respond to incidents
  • Comprehend exploitation activities and how these activities expose the Firm to risks
  • Liaise with internal and external partners to drive analytic development to detect suspected malicious activity
  • Work with very large amounts of network and host-based log data
  • Analyze analytic output and improve analytic performance.
  • Troubleshoot data quality and standardization issues and adapt very quickly to new technologies, threats and development needs


Skills on Resume: 

  • Incident monitoring (Hard Skills)
  • Alert response (Hard Skills)
  • Alert triage (Hard Skills)
  • Security reporting (Hard Skills)
  • Data gathering (Hard Skills)
  • Analyst coordination (Soft Skills)
  • Risk comprehension (Hard Skills)
  • Partner liaison (Soft Skills)

15. Cyber Security Analyst, SecurePath Technologies, Anchorage, AK

Job Summary:

  • Analysing and investigating security incidents and phishing alerts as first responders
  • Daily data monitoring checks to ensure only authorised data movements take place and taking appropriate action when this is not the case
  • Maintain the integrity of the email security system
  • Assist with the creation and maintenance of security incident response documentation
  • Create, modify and review reports and dashboards from security reporting tools
  • Maintain/troubleshoot issues with the data loss prevention security infrastructure
  • Maintain up-to-date data protection industry awareness and trends and be able to understand how emerging threats may potentially impact Greene King
  • Keep up to date with the latest security, vulnerability and technology developments
  • With other IT teams, ensure that system patching is at the correct level
  • Assist with the rollout of new security technologies
  • Provide support to broader security-related responsibilities as part of a cutting-edge security team


Skills on Resume: 

  • Incident investigation (Hard Skills)
  • Data monitoring (Hard Skills)
  • Email security (Hard Skills)
  • Documentation creation (Hard Skills)
  • Report generation (Hard Skills)
  • DLP maintenance (Hard Skills)
  • Threat awareness (Hard Skills)
  • Team collaboration (Soft Skills)

16. Cyber Security Analyst, CyberCore Protection Services, Rochester, NY

Job Summary:

  • Perform scheduled and targeted vulnerability and other technical scans against authorised NSW government infrastructure.
  • Analyse and assess the results of scans to produce timely and actionable reporting for stakeholders.
  • Manage systems to track the remediation of discovered vulnerabilities.
  • Identify stakeholder requirements, prioritise workload and manage team portfolios to meet agreed outcomes and timeframes.
  • Use systems to collect, document and report on identified targets and architectures.
  • Produce architecture products to assist in incident management, investigations and planning.
  • Ensure security of tools and information within the team.
  • Maintain current knowledge of IT and security vulnerabilities and exploits.
  • Perform Triage analysis, forensic investigation on suspected compromised assets to determine what occurred.
  • Collaborate with the broader response team to create adversary eviction and incident remediation plans.
  • Improve the triage and forensic program through expertise, collaboration, and influence.


Skills on Resume: 

  • Vulnerability scanning (Hard Skills)
  • Report analysis (Hard Skills)
  • Remediation tracking (Hard Skills)
  • Portfolio management (Soft Skills)
  • Documentation skills (Hard Skills)
  • Incident support (Hard Skills)
  • Knowledge maintenance (Hard Skills)
  • Forensic investigation (Hard Skills)

17. Cyber Security Analyst, IronGate Cybersecurity, Tulsa, OK

Job Summary:

  • Respond to enquiries regarding new and emerging cyber risks that are raised by AZ IT functions and business areas
  • Conduct NIST Cyber Security Framework aligned risk assessments (covering processes, infrastructure, and applications) to identify and report on cyber security risk exposures
  • Work with AZ IT functions and business areas to identify appropriate risk owners and ensure that appropriate risk mitigation activities are defined and delivered in accordance with the agreed time frames consummate with the risk profile
  • Produce reporting on high-risk areas that clearly and concisely communicate the risk profile
  • Maintenance of cybersecurity risks and associated mitigation/acceptance plans within the AZ enterprise risk register
  • Contribute to the maintenance of AZ's IT Security Policy Framework, including reviews and updates to security and risk policies and standards
  • Work with a wider team of security professionals delivering services to teams across AZ IT functions and business areas to support compliance with AZ's IT Security Policy Framework
  • Work across all areas of Cyber Security and other key partners to ensure consistently high-quality communications
  • Automate response and forensic functions through coding and scripting.
  • Evaluate security risks and impact on the Microsoft Cloud platform and its online services.
  • Create technical documentation for other analysts and other teams to follow.


Skills on Resume: 

  • Risk response (Hard Skills)
  • Risk assessment (Hard Skills)
  • Risk mitigation (Hard Skills)
  • Risk reporting (Hard Skills)
  • Policy maintenance (Hard Skills)
  • Team collaboration (Soft Skills)
  • Automation scripting (Hard Skills)
  • Technical documentation (Hard Skills)

18. Cyber Security Analyst, Nexus Cyber Solutions, Hartford, CT

Job Summary:

  • Evaluate and follow up on vendor responses to security questionnaires to verify whether third-party vendors and IT solutions meet security requirements
  • Make recommendations regarding the overall security level of vendors and IT solutions
  • Business impact and risk assessments across a broad range of different systems and processes
  • Assist in periodic reviews of privileged users on critical IT systems
  • Participate the planning and implementation of security awareness initiatives and campaigns
  • Responding to security questions and requests from end users
  • Advise colleagues on security issues and procedures
  • Assessment and approval of security requests from end users
  • Performing day-to-day security administration and operational tasks in line with defined processes
  • Drafts weekly updates and situational awareness items for SOC Management
  • Reports metrics and KPI’s to SOC Management 


Skills on Resume: 

  • Vendor evaluation (Hard Skills)
  • Security recommendations (Hard Skills)
  • Risk assessment (Hard Skills)
  • User review (Hard Skills)
  • Awareness campaigns (Soft Skills)
  • User support (Soft Skills)
  • Security advising (Soft Skills)
  • Security administration (Hard Skills)

19. Cyber Security Analyst, Redline Security Systems, Mobile, AL

Job Summary:

  • Ensure daily operational processes and procedures are effective and support cyber monitoring and analysis operations, objectives and modify
  • Assist the Cyber Security Analyst with security events
  • Develop and measure hunting initiatives to discover potential breaches or undiscovered cyber threats
  • Develop actionable use cases based on new and emerging threats
  • Assists with patching recommendations and workarounds for zero-day threats
  • Coordinate after-action items or various levels of awareness with stakeholders or supporting teams
  • Communicates challenges and opportunities to SOC management
  • Assist the content development team with tuning false-positive security events
  • Document analytical steps and findings associated with security events or incidents
  • Represent the Security Operations Center at internal/external meetings
  • Liaison with the Incident Response team
  • Leads weekly Security Analyst meetings


Skills on Resume: 

  • Operational processes (Hard Skills)
  • Threat hunting (Hard Skills)
  • Use case development (Hard Skills)
  • Patching recommendations (Hard Skills)
  • Stakeholder coordination (Soft Skills)
  • Communication skills (Soft Skills)
  • Documentation skills (Hard Skills)
  • Team leadership (Soft Skills)

20. Cyber Security Analyst, Blackhawk Cyber Defense, Wichita, KS

Job Summary:

  • Develop and maintain the risk assessment framework and risk register, in line with standards such as ISO27005 and NIST CSF.
  • Support the identification of risks and the development and implementation of mitigating controls and strategies.
  • Develop a security policy and process in accordance with ISO27001.
  • Advising the business on the implementation of policy and process and recommending improvements
  • Auditing business compliance with policy and process and recommending improvements
  • Identify and report on threats to NATS and advise on mitigating actions.
  • Participate in a wider security awareness program, creating ideas and content, and providing orientation, educational programs, and ongoing communication
  • Build relationships across all NATS business units and support security needs in a manner that both drives compliance with, and develops, corporate security standards.
  • Plan, implement and monitor cybersecurity measures for the protection of on-premises and cloud-based networks and information systems.
  • Monitor security dashboards and review security logs on a regular basis


Skills on Resume: 

  • Risk framework (Hard Skills)
  • Control implementation (Hard Skills)
  • Policy development (Hard Skills)
  • Business advising (Soft Skills)
  • Compliance auditing (Hard Skills)
  • Threat reporting (Hard Skills)
  • Relationship building (Soft Skills)
  • Security monitoring (Hard Skills)

21. Cyber Security Analyst, Sentinel Secure Technologies, Fargo, ND

Job Summary:

  • Review the overall IT risk analysis
  • Understand the IT architecture
  • Interview all the IT actors (Run, Software, Data)
  • Update the risks analysis matrix and action plan with IT management
  • Review, analyze, and remediate network, system, and application data/telemetry, malware, and other cybersecurity and incident response-related data on a regular basis.
  • Perform regular systems security scans, analyze results, and maintain records of such scans and analysis.
  • Review cybersecurity controls and ensure compliance with specific regulatory frameworks and standards such as NIST 800-171, CMMC, and Risk Management Framework (RMF)
  • Test and evaluate the effectiveness of current systems, tools and plans used to protect information systems and develop and implement plans to address any deficiencies.
  • Review and evaluate software, hardware and network tools that can enhance the overall cybersecurity posture of the organization.
  • Work with system owners and other stakeholders to manage cybersecurity requirements while minimizing disruption to business operations.
  • Stay up-to-date with evolving regulatory and compliance requirements as well as advances in the cybersecurity industry and contribute to the improvement of the cybersecurity program.


Skills on Resume: 

  • Risk analysis (Hard Skills)
  • IT architecture (Hard Skills)
  • Stakeholder interviewing (Soft Skills)
  • Incident remediation (Hard Skills)
  • Security scanning (Hard Skills)
  • Compliance review (Hard Skills)
  • System evaluation (Hard Skills)
  • Regulatory awareness (Hard Skills)

22. Cyber Security Analyst, SafeGuard Cyber Solutions, Salem, OR

Job Summary:

  • Implement, upgrade, and/or monitor security measures around cyber systems, networks, and information.
  • Monitor and respond to security emails from staff and members
  • Ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure.
  • Respond to computer security breaches and viruses.
  • Monitor logging across devices, looking for breaches and suboptimal activity and provide recommendations for resolution
  • Generate reports for fellow Analysts and Business Managers to report and remediate the efficacy of the security policies and controls in place.
  • Assist with maintaining vulnerability, threat and risk posture assessment reports
  • Create, facilitate and maintain proper documentation to aid continuity efforts as part of secure and efficient technical management, document security breaches and assess the damage they cause.
  • Participate in on-call support, which includes after-hours
  • Maintain a high degree of integrity and accountability


Skills on Resume: 

  • Cybersecurity Implementation (Hard Skills)
  • Network Monitoring (Hard Skills)
  • Incident Response (Hard Skills)
  • Security Reporting (Hard Skills)
  • Vulnerability Assessment (Hard Skills)
  • Documentation Management (Hard Skills)
  • After-hours Support (Soft Skills)
  • Integrity Accountability (Soft Skills)

23. Cyber Security Analyst, TitanGuard Security, Albany, NY

Job Summary:

  • Work closely with all internal stakeholders/departments to ensure efficient working processes
  • Create positive working relationships with suppliers with issues and the demand for orders and deliveries
  • Follow the process and identify continuous improvements to create time to spend analyzing
  • Contribute to team meetings with summaries of day-to-day findings or ad hoc tasks
  • Day-to-day management of products being ordered and managing any products unable to be delivered to maintain a high service level
  • Update/translate (English) the main security documents
  • Organizing the Access/ID review process
  • Design and validate the relevant procedure
  • Organize the process (meeting, action plan)
  • Monitor, detection, and management of threats across IT infrastructure
  • Support the investigation of cybersecurity-related incidents


Skills on Resume: 

  • Stakeholder Collaboration (Soft Skills)
  • Supplier Relations (Soft Skills)
  • Process Improvement (Hard Skills)
  • Team Communication (Soft Skills)
  • Order Management (Hard Skills)
  • Document Translation (Hard Skills)
  • Threat Detection (Hard Skills)
  • Incident Support (Hard Skills)

24. Cyber Security Analyst, CyberFortress Consulting, Lincoln, NE

Job Summary:

  • Recommend regular information security operations and assist with implementation
  • Analyze vulnerability reports and suggest priorities and corrective measures to implement
  • Assist with the assessment of risks and potential threats in the company’s evolving infrastructure and projects
  • Supervise and participate in vulnerability and patch management
  • Supervise and manage all security incidents according to the incident response process with operational teams
  • Help draft and apply the Information Security Policy and all other related policies and directives
  • Offer direct security support to the administrative team and IT staff
  • Monitor and update security systems configurations
  • Contribute to continually improving the cybersecurity processes and systems in operations
  • Provide technical assistance on security-related tasks and projects


Skills on Resume: 

  • Security Operations (Hard Skills)
  • Vulnerability Analysis (Hard Skills)
  • Risk Assessment (Hard Skills)
  • Patch Management (Hard Skills)
  • Incident Management (Hard Skills)
  • Policy Development (Hard Skills)
  • Technical Support (Hard Skills)
  • Process Improvement (Hard Skills)

25. Cyber Security Analyst, BlueWave Cyber Defense, Eugene, OR

Job Summary:

  • Emphasize vulnerability management, remain informed and engaged in the current threat and vulnerability landscape and be prepared to apply best practice and industry-standard knowledge to improve and maintain the Bank’s security posture
  • Have frequent contact with departments, and promptly escalate concerns while being able to translate requirements into actions that control providers and technical facilitators can act upon
  • Provide creative solutions to security problems while being creative enough to help establish an information security strategy.
  • Support strategic cyber goals in relation to endpoint security and basic and foundational security controls (asset management, vulnerability management, and others) and influence the direction of District and System IT programs
  • Analyze vulnerability and asset management lifecycles in the interest of finding gaps (and improving the security posture of the Bank), threat intelligence reports to identify vulnerabilities, different types of vulnerabilities and discovers exploitability, quantifies the potential impact(s) to an information system (or the Bank in general), and tooling and process, 
  • Resolve underlying factors that inhibit the remediation of vulnerabilities
  • Determine the applicability of vulnerabilities to information systems and validate successful remediation of vulnerabilities
  • Devises and executes on KRI and KPI metrics that keep team members informed and aid in ongoing process improvements
  • Liaison to departments and other areas of IT in relation to the implementation, functionality, and improvement of foundational security controls
  • Participate and influence teams to create, engineer, and implement improvements


Skills on Resume: 

  • Vulnerability Management (Hard Skills)
  • Threat Analysis (Hard Skills)
  • Security Strategy (Hard Skills)
  • Endpoint Security (Hard Skills)
  • Asset Management (Hard Skills)
  • Process Improvement (Hard Skills)
  • Cross-functional Liaison (Soft Skills)
  • Creative Problem-solving (Soft Skills)