DATA SECURITY ANALYST RESUME EXAMPLE

Published: October 7, 2024 – The Data Security Analyst plans and executes information protection on computers and networks while educating employees on security protocols. This role involves auditing compliance with NIST 800-171 and CMMC, developing security procedures, and maintaining a secure network through firewalls and encryption. Additionally, the analyst troubleshoots escalated data security issues and provides quality customer support for effective security management.

Tips for Data Security Analyst Skills and Responsibilities on a Resume

1. Data Security Analyst, TechSolutions Inc, Austin, TX

Job Summary: 

  • Conducting Data Security Audits
  • Author risk assessment statements, remediation guidance, and status reports
  • Partner with product teams across Amazon to develop scalable solutions to security vulnerabilities
  • Own and coordinate vulnerability assessment with subject matter experts across AWS
  • Own workstreams during large-scale remediation.
  • Identifies opportunities to improve designed Amazon product based on customer feedback, data analysis, and feature gaps with competitive products.
  • Coordinate the work related to the daily operations of the Identity and Access Management team
  • Drive the enhancement process for the Identity and Access Management policies
  • Perform access, licenses, and entitlement reviews following established processes and timelines
  • Perform Identity and Access Management related initiatives, including activity coordination, communication, and implementation
  • Manage Identity and Access Management technologies such as Lifecycle Management, Privileged Access Management, SSO, Multi-Factor Authentication, Mobile Device Management and Vaulting Services
  • Involvement in the New Client Implementations, to ensure IAM requirements are met or provided to the client


Skills on Resume: 

  • Data Security Audits (Hard Skills)
  • Risk Assessment (Hard Skills)
  • Vulnerability Coordination (Hard Skills)
  • Identity Management (Hard Skills)
  • Policy Enhancement (Hard Skills)
  • Access Reviews (Hard Skills)
  • Client Implementation (Hard Skills)
  • IAM Technologies Management (Hard Skills)

2. Data Security Analyst, SecureData Corp, Denver, CO

Job Summary: 

  • Support strategy delivery through current system analysis, data profiling, data collection, etc.
  • Analyze data to validate business needs, and understand gaps, quality concerns, etc.
  • Utilize data and analytics abilities to deliver high-quality information solutions
  • Create test scenarios, develop test plans, and test/validate data.
  • Analyze results and reconcile multiple data sources.
  • Work with large sets of data that require analysis, validation and cleansing using various tools such as SQL queries, Microsoft Excel
  • Review, document and resolve data issues with the team.
  • Convey problems, solutions, updates and project status to peers and management.
  • Develop and maintain clear and succinct documentation.
  • Participate in data quality reviews and resolve data quality problems.
  • Provide strong support in cultivating an environment that encourages the use of data to support problem-solving, critical thinking, and innovation.


Skills on Resume: 

  • System Analysis (Hard Skills)
  • Data Validation (Hard Skills)
  • Information Solutions (Hard Skills)
  • Test Planning (Hard Skills)
  • Data Reconciliation (Hard Skills)
  • Data Cleansing (Hard Skills)
  • Documentation Management (Hard Skills)
  • Data Quality Review (Hard Skills)

3. Data Security Analyst, CyberGuard Systems, Nashville, TN

Job Summary: 

  • Conducts Security vulnerability assessments of Web, Desktop Applications, and Web Services
  • Track threat actors, their tactics, techniques, and procedures (TTPs), and their associated Indicators of Compromise (IOCs)
  • Capture intelligence on threat actor TTPs/IOCs and coordinate with SecOps to develop countermeasures
  • Conduct host forensics, network forensics, and log analysis in support of incident response investigations
  • Develop advanced queries and alerts to detect adversary actions
  • Effectively investigate to identify root cause, including attack vector, exploitation, and other techniques utilized to bypass security controls
  • Provide oversight and support for first-level monitoring and triage to ensure effective operations and mitigation of lower-impact incidents
  • Handle escalations from internal and external sources to quickly triage and respond to threats
  • Utilize technology platforms and security tools to conduct large-scale investigations and collect endpoint and network-based evidence
  • Develop and present comprehensive reports for both technical, executive and non-security stakeholder audiences
  • Provide technical subject matter expertise related to strategic projects and initiatives that advance the maturity and capability of the Incident Response team
  • Develop and follow detailed operational processes and procedures to appropriately analyze, escalate and assist in the remediation of information security-related incidents


Skills on Resume: 

  • Vulnerability Assessments (Hard Skills)
  • Threat Intelligence Analysis (Hard Skills)
  • Incident Response Forensics (Hard Skills)
  • Root Cause Investigation (Hard Skills)
  • Security Monitoring (Hard Skills)
  • Threat Triage (Hard Skills)
  • Report Development (Hard Skills)
  • Operational Process Development (Hard Skills)

4. Data Security Analyst, DataShield Technologies, Orlando, FL

Job Summary: 

  • Assist with the management of multiple data loss prevention platforms using different technologies (e.g. Microsoft and Symantec)
  • Assist with the management of an outsourced triage service that reviews all alerts and removes any false positives
  • Use the different platforms to review all alerts to identify any incidents and escalate as defined by the process
  • Assist with reviewing the performance of the rules as defined to identify areas of improvement
  • Suggest process improvements and changes.
  • Assist with the running of regular user access reviews across all line managers in the business to agreed SLAs including engagement with the business to ensure that managers complete their review.
  • Assist with the review of all application entitlements to identify and resolve any orphan accounts.
  • Assist with the collation of evidence for regular audits including for 52-109 compliance.
  • Keep abreast of trends in user management and suggest process improvements and changes.
  • Support on other access management processes
  • Escalate compliance and security issues to the Team Leader and if appropriate to business owners.


Skills on Resume: 

  • Data Loss Prevention Management (Hard Skills)
  • Alert Review and Triage (Hard Skills)
  • Incident Escalation (Hard Skills)
  • Performance Evaluation (Hard Skills)
  • Process Improvement (Hard Skills)
  • User Access Reviews (Hard Skills)
  • Audit Compliance Support (Hard Skills)
  • Security Issue Escalation (Hard Skills)

5. Data Security Analyst, InfoSecure LLC, Salt Lake City, UT

Job Summary: 

  • Demonstrate a consistent sense of urgency on high-priority open issues to ensure timely resolution
  • Ensure timely follow-up to all assigned support issues and data requests
  • Provide training to other team members
  • Participate in special projects
  • Provide after-hours on-call support as scheduled
  • Analyze findings from security monitoring systems such as Qualys Scanning, and TEM, to identify and direct a response to all potential security incidents and data breaches.
  • Review current and existing vulnerability scanning processes for ways to streamline and make them more efficient.
  • Respond to relevant requests received from stakeholders, or representatives of stakeholders, for investigation of potential reporting issues.
  • Design, create, test and implement scripted processes that improve the ability to respond to IRM and other business partners quickly and efficiently during an incident or post-incident review.
  • Assisting in the development of procedures around data management and data access within Azure to comply with Lexmark data policies
  • Driving organizational and behavioral changes as it relates to data, through services-oriented training programs customized to the needs of each line of business
  • Partnering with Business and Technical Data Stewards to identify, define and maintain data definitions and corresponding metadata across business functions and data domains.


Skills on Resume: 

  • Urgency Management (Soft Skills)
  • Follow-up Coordination (Soft Skills)
  • Team Training (Soft Skills)
  • Project Participation (Soft Skills)
  • On-call Support (Soft Skills)
  • Security Incident Analysis (Hard Skills)
  • Vulnerability Process Improvement (Hard Skills)
  • Data Management Procedures (Hard Skills)

6. Data Security Analyst, GuardTech Innovations, Richmond, VA

Job Summary: 

  • Securing sensitive data at rest and in transit
  • Leveraging centralized Key Vaults to safeguard cryptographic keys and secrets
  • Documenting various sensitive data access patterns to cover Lexmark-specific business use cases
  • Ensuring that data custodians and data stewards are identified, and information responsibilities are monitored using proper governance controls
  • Educating data custodians and data stewards
  • Maintaining the integrity of data access approval workflows
  • Coordinating routine assessments of users, reports, and data in the Azure Data Lake
  • Coordinating with Lexmark IT Security and Data Privacy to ensure compliance with Lexmark data policies
  • Managing the data life cycle in Azure
  • Helping Lexmark to control long-term data costs


Skills on Resume: 

  • Data Security Management (Hard Skills)
  • Key Vault Utilization (Hard Skills)
  • Access Pattern Documentation (Hard Skills)
  • Governance Control Monitoring (Hard Skills)
  • Data Steward Education (Soft Skills)
  • Workflow Integrity Maintenance (Hard Skills)
  • User Assessment Coordination (Hard Skills)
  • Data Life Cycle Management (Hard Skills)

7. Data Security Analyst, Shielded Networks, Seattle, WA

Job Summary: 

  • Engages business partners & other internal stakeholders, performing a gap analysis of existing access & data security controls
  • Identify available tools in the market & perform a cost-benefit analysis against existing tooling
  • Help devise & recommend data security strategy, roadmap & program-related items with leaders across the organization, based on results of gap analysis
  • Collaborates with the GRC team on the implementation & maturation of security controls against industry-recognized security frameworks & standards such as NIST CSF, NIST 800-53 and ISO 2700x
  • Updates leadership on current data security risks as they pertain to enterprise-sensitive data
  • Creates & presents business case proposals for investment
  • Supports IT & Cybersecurity efforts to monitor user authentication & access behavior to detect unusual or at-risk behaviors
  • Works with the Cybersecurity CISO Program Office to identify useful data for collection & tracking/reporting on cybersecurity metrics
  • Delivers metrics-driven scorecards/dashboards to keep executive leadership apprised of business cybersecurity health
  • Identify access & data security gaps throughout the Information Lifecycle & recommend techniques & tools to improve data security & prevent data loss
  • Assess & recommend enhanced logging & monitoring capabilities to better track/monitor the usage of sensitive data as it lives & moves throughout structured & unstructured repositories


Skills on Resume: 

  • Gap Analysis (Hard Skills)
  • Cost-Benefit Analysis (Hard Skills)
  • Data Security Strategy Development (Hard Skills)
  • Security Controls Implementation (Hard Skills)
  • Risk Reporting (Hard Skills)
  • Business Case Development (Soft Skills)
  • User Behavior Monitoring (Hard Skills)
  • Metrics Reporting (Hard Skills)

8. Data Security Analyst, ProtectIT Solutions, Minneapolis, MN

Job Summary: 

  • Plan and execute the protection of information found on computers and the data network
  • Work with employees to make sure they are educated on security protocols
  • Audit and perform compliance for NIST 800-171 and CMMC
  • Develop security procedures and train the IT staff
  • Ensure that the network is free of security breaches
  • Install firewalls, data encryption and other security measures
  • Recommend security enhancements and purchases
  • Review and troubleshoot escalated data security and network issues, ensuring problems are properly defined, documented, and either resolved or escalated further for management review
  • Troubleshoot network and data security applications to provide solutions using specific product knowledge, system utilities, and other available resources
  • Follow established policies, procedures, operating instructions and processes to provide quality customer support to clients via email, telephone and in-person contact in conjunction with the established Help Desk
  • Maintain working knowledge of network and data security applications, related policies, procedures, application installations, system configurations, current hardware, and network configuration practices through ongoing training and self-initiated research and study


Skills on Resume: 

  • Information Protection (Hard Skills)
  • Security Education (Soft Skills)
  • Compliance Auditing (Hard Skills)
  • Security Procedures (Hard Skills)
  • Network Security (Hard Skills)
  • Security Recommendations (Hard Skills)
  • Issue Troubleshooting (Hard Skills)
  • Customer Support (Soft Skills)