Cyber Incident Response Resume Samples
4.6
(101 votes) for
Cyber Incident Response Resume Samples
The Guide To Resume Tailoring
Guide the recruiter to the conclusion that you are the best candidate for the cyber incident response job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.
Craft your perfect resume by picking job responsibilities written by professional recruiters
Pick from the thousands of curated job responsibilities used by the leading companies
Tailor your resume & cover letter with wording that best fits for each job you apply
Resume Builder
Create a Resume in Minutes with Professional Resume Templates
CHOOSE THE BEST TEMPLATE
- Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS
- Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES
- Instantly download in PDF format or share a custom link.
KL
K Lesch
Katlynn
Lesch
14591 Torphy Shoals
New York
NY
+1 (555) 179 1759
14591 Torphy Shoals
New York
NY
Phone
p
+1 (555) 179 1759
Experience
Experience
New York, NY
Cyber Incident Response Analyst
New York, NY
Franecki Inc
New York, NY
Cyber Incident Response Analyst
- Works closely with the Security Operation Center, Legal and Loss Prevention teams to support tier 1 and 2 security incident management
- Provide investigation findings to relevant business units to help improve information security posture
- Proactively manage incidents to minimize customer impact and meet SLA’s
- Compile and analyze data for management reporting and metrics
- Use threat intelligence to initiate investigations and identify malicious activity not otherwise identified by Managed Security Services
- Perform system and network analysis of suspected or potential security incidents
- Provide leadership/mentorship to junior analysts and serve as the "escalation" point for them to assist with performing a detailed analysis of potential threats
Houston, TX
Cyber Incident Response & Threat Analyst
Houston, TX
Hoppe, Schmeler and Dibbert
Houston, TX
Cyber Incident Response & Threat Analyst
- Perform Network Security Monitoring
- Perform malware reverse engineering and behavioral analysis
- Improve the detection, escalation, containment and resolution of incidents
- Collect, assess, and catalogue threat indicators
- Enhance existing incident response methods, tools, and processes
- Maintain knowledge of threat landscape by monitoring OSINT and related sources
- Investigate cyber security incidents and threats
present
Boston, MA
Senior Cyber Incident Response Manager
Boston, MA
Ebert, Stanton and Kris
present
Boston, MA
Senior Cyber Incident Response Manager
present
- Actively participate in large scope high impact cyber breaches and manage Incident Response workflow and activities to support response and remediation
- Attracts, retains, and leads a team of employees by educating, developing and managing them to deliver strong results
- Enhance workflow and processes driving incident response and mitigation efforts
- Provides Training and Mentoring of all IR team members
- Communicate incident response actions to both technical and non-technical management
- Guide and influence the development and implementation of automation and application logic for security correlation purposes
- Provides incident response and ownership based on escalation and handoff procedures from junior or mid-career team members
Education
Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Columbia University
Bachelor’s Degree in Computer Science
Skills
Skills
- Ability to develop and maintain professional contacts in the security community
- Knowledge of multiple operating systems (Windows, Linux, OSX)
- Enterprise Security knowledge
- Intrusion analysis and knowledge of IDS systems
- Computer security incident investigation and response experience
- Experience with network packet analysis
- Experience in web site and web application security assessment or pentest
- Log analysis and experience reviewing Security Events
- Host and Network Forensics
- Experience investigating common types of attacks
15 Cyber Incident Response resume templates
Read our complete resume writing guides
1
Cyber Incident Response & Threat Analyst Resume Examples & Samples
- Perform Network Security Monitoring
- Enhance existing incident response methods, tools, and processes
- Computer security incident response
- Security product assessments
2
Cyber Incident Response Resume Examples & Samples
- Investigate cyber security incidents and threats
- Act as escalation point for Level-1 and Level-2 Analysts
- Experience investigating common types of attacks
- Experience in web site and web application security assessment or pentest
- Develop correlation rules within an enterprise SIEM
3
Cyber Incident Response Lead Resume Examples & Samples
- Follow-up on potential security events in coordination with firm’s security operations centers
- Liaise with the Firm’s SOC to respond to emerging incidents in a timely manner; triage details and provide support to both the SOC and Business Managers
- Analyze events from a response perspective: apply skill and judgment to determine if escalations are warranted
- Work with either HR and/or the Firm’s Fraud Investigations Teams, providing additional details for escalated cases, as appropriate
- Gather data for monthly activity reporting; maintain historical records and prepare monthly metrics and reporting for Senior Management review
- Perform data analysis, reviews and reporting to support business aligned risk management. Investigate potential deviations to determine the root cause. Where appropriate, work with business/operations Teams to help them adjust their procedures to eliminate exceptional security events
- Maintain a solid “currency awareness” of the emerging threats and issues for this activity sector; be aware of developments associated with malware, phishing, external attacks and associated threats to the Firm’s Information Assets
- Other duties as deemed commensurate with the grade and scope of the post
- Current, relevant experience of working in a large Technology and/or Security Operations function
- The ability to work at speed, under pressure; to make decisions in real time and with reliable accuracy
- Able to work in a global, federated environment and drive change
- Solid focus on accuracy, productivity, teamwork and excellent customer service
- Excellent written and verbal communication skills, working with all levels of
- Management, to leverage the resources of a very large multinational quickly and effectively
- A professional and ethical approach with a strong desire to succeed
- Continual enhancement of the confidentiality, integrity and availability of data and systems through a robust information security agenda is a key strategic objective of JP Morgan Chase and of the Corporate & Investment Banking division
- Experience working in Information Security, Compliance, Data Loss Prevention, Technology Operations and/or Data Protection
- “Big Four” and/or experience with a major Financial Services provider
- Subject Matter Expertise in the Information Security space, incorporating both technical and process/operational elements
- Experience of the following technologies an advantage
4
Cyber Risk Resilience Cyber Incident Response Manager Resume Examples & Samples
- 7+ years IT experience
- 3+ years business development, proposal support, sales experience
- BA/BS in computer science, management information systems or related field or significant industry experience required. Masters degree preferred
- Strong knowledge of host and network forensic tools and techniques
- Strong knowledge of information security, client/server architectures, and networking
- Strong knowledge of current and evolving cyber threat landscape
- Experience with malware analysis and understanding attack techniques
- Experience working with network, host, and user activity data, and identifying anomalies
- Minimum of three years of information security experience in one or more of the following areas: IT security, incident handling and response, exploit analysis, network intelligence gathering, vulnerability management, digital forensics methods and procedures
- Must have Linux/Unix technical experience including creation and modification, administration, troubleshooting, and/or forensic and Incident Response experience
- Experience with at least two of the following tools: EnCase Forensic, EnCase Enterprise, AccessData FTK, HBGary, Volatility, SANS SIFT, Bit9, Internet Evidence Finder
- Excellent verbal and written communication including the ability to document and explain technical details in a concise, understandable manner
- Must have strong organizational skills with the ability to multi-task various initiatives and activities
- BA/BS in information technology, computer science, engineering, or related field preferred
- CISSP, CISM, EnCE, CEH, GCFA, GCFE, or GCIH certification required
- Willingness to travel extensively is required
5
Cyber Incident Response Analyst Resume Examples & Samples
- Data Loss Prevention and SIEM tool and process experience a must
- Ability follow processes and suggest improvements
- Ability to build and automate efficient and effective scripts from scratch is preferred
- Experience with system administration and network configuration
- Big Data experience (e.g. Hive, Hadoop, Pig, Presto, Elastic Search) preferred
- Forensic experience and malware reversing (disk/memory/network forensics) preferred
- 1 to 3 years with DLP operations
- 1 to 3 years in the IT Security field where daily activities included hands-on technical work
- Some experience with data mining / correlation & log analysis
- 1 year industry experience in intrusion analysis or security relevant troubleshooting for large-scale enterprise environment
- Working knowledge of security operations: perimeter defense, forensics, incident response, kill chain analysis, risk assessment and security metrics
6
Cyber Incident Response Team Lead Resume Examples & Samples
- 15+ years of experience in a SOC management role, leading functional Cybersecurity and forensic teams in a large scale government or commercial environment
- Experience with working in the MENA region with executive leadership to provide executive briefings and reports and managing Cyber hunt, pen test, and mitigation teams
- Ability to perform Cyber forensic analysis or Cyber fusion
- Ability to build and manage information security incident handling processes, policies, and procedures required
- Ability to demonstrate leadership in previous roles, including financial leadership and strong functional leadership in diverse technical security operations and military operational environments
- MS degree, PhD degree, or post graduate work in Cyber Security, CS, or Engineering
- CISSP, CISM, CEH, CISA, CCIE, CCSP, or MCSE Certification
7
Cyber Incident Response Specialist Resume Examples & Samples
- 6+ years of experience with computer network exploitation, vulnerability assessments, penetration testing, incident response, and network and host forensics
- Experience with conducting and leading network vulnerability assessments and using and customizing SIEM products
- Experience with performing digital forensics and incident response using HX, Mandiant Intelligent Response, FireEye Redline, RedSeal, Encase, or other enterprise tools
- Experience with network intrusion detection and analysis tools, including Bro, Suricata, Sourcefire, Snort, and Wireshark
- Experience with log analysis, administering enterprise log aggregation systems, including Splunk, ELSA, and Logstash, and in solving problems with scripting languages, such as Perl, Python, PowerShell, or Bash
- Knowledge of security monitoring and incident response requirements and conducting security investigations
- Knowledge of network protocols and architecture and advanced malware technologies
- BS degree in CS, IT, or Engineering
- CEH, CISSP, SANS GSEC or GCIH, CCSP, CCNP, CCIE, MCSE, or Linux Certification
- MS degree in CS, Engineering, Cyber Security, or Information Systems
8
Cyber Incident Response Analyst Resume Examples & Samples
- Four or more years of technical experience in the information security field, preferably in the AEC (Architecture, Engineering or Construction) industry preferred
- Four or more years of practical experience in an incident response role
- Demonstrated knowledge of systems configuration and management of firewalls, IDS, servers and work stations
- Ability to correlate incident data to identify specific vulnerabilities and make recommendations that enable remediation
- Knowledge of incident categories, incident responses, and timelines for responses
- Experience collecting data and reporting results; handling and escalating security issues or emergency situations appropriately; providing incident response capabilities to isolate and mitigate threats to maintain confidentiality, integrity, and availability for protected data
- Demonstrated experience supporting external investigations
- Ability to effectively manage conflict, and affect adequate solutions
- Familiarity with software development and network operations concepts and methodologies
- Advanced knowledge of information systems security concepts and technologies; network architecture; general database concepts; document management; hardware and software troubleshooting; intrusion tools; and computer forensic tools such as EnCaseR and open source alternatives
- Working knowledge of and experience in investigating malicious code
- Demonstrated ability to apply technical and analytical skills in a security environment
9
Cyber Incident Response Analyst Resume Examples & Samples
- Excellent writing and presentation skills are required in order to communicate findings and status
- Computer security incident investigation and response experience
- Intrusion analysis and knowledge of IDS systems
- Scripting (Python, BASH, Perl, or Powershell)
10
Cyber Incident Response Analyst Resume Examples & Samples
- Conduct platform or operating system vulnerability scans to assess exposure of system to attacks or hacking. Respond to questions regarding viral activity, concerns about spam/phishing etc. Produce reports
- Serve as organization's POC for the third party certification of security procedures and use of cyber security protections. Ensure that system's security controls, policies and procedures examined, measured and validated against third party standards
- Design, plan and implement test strategies to support the core infrastructure in the contingency environment for all critical business applications to ensure business continuity in the event of a major business interruption or disaster
- Lead projects as related to technology refresh/evaluation such as Load Balancing and SSL technology. Research corrective measures (long term solutions) needed for any chronic issues identified that compromise security of particular systems or platforms
- Participate in developing and testing of new methodologies and systems for recovery of the critical core business processes and the enterprise infrastructure
- Serve as technical lead or project lead in projects involving testing defenses against hacking, Denial of service, spam, break-ins, or related attacks. Provide technical guidance to less senior staff or applications developers/systems administrators
- 6+ years of related experience
- Familiarity with information security technology such as firewalls, IDS, IPS, HIPS, WAF, and proxies
- Experience in troubleshooting in a technical environment
- Must have proficiency in hardware, software and networking
- Needs to be proficient in one or more scripting languages such as perl, python, bash, go
- Must have experience with end point threat detection tools such as Tanium or Carbon Black
- Experience in one or more of the following disciplines: computer forensics, network forensics, malware analysis and memory analysis
- Needs to have a keen understanding of threat vectors as well as exfiltration techniques
- Experience with large data analysis using tools such as Splunk, ELK, or other similar tools
- Experience coordinating incident response involving several analysts
- Experience hunting proactively for threats within an enterprise
- Ability to assist SOC analysts with threat detection
- Ability to write incident or forensic reports
11
Cyber Incident Response Analyst Resume Examples & Samples
- Bachelor’s Degree with a minimum of 9 years related technical experience required
- Experience working cyber incident management
- Threat/network defense and troubleshooting experience required
12
Cyber Incident Response Analyst Resume Examples & Samples
- Thorough understanding of the Information and Incident Response using vulnerability assessment tools
- Understanding of NIST/CNSS Risk Management processes, Controls Application/ Test, Incident Response, Forensic and related guides
- Hands on experience with Network Architectures, Microsoft Domains/Protocols and UNIX network environments, Microsoft OSs, UNIX/Linux based OSs, Network IOSs and other operating systems (e.g. Mainframe, CDS, SAN Fabrics Custom configurations, etc.)
- Hands-on experience applying operational characterization and variance detection; Incident Detection Techniques including Network data collection and message analysis
- Knowledge of Network, host, security device and application log analysis to include: WEB/Mobility Log Analysis, Wireless, VoIP and POTs Log Analysis, HIDS, NIDS and Security Appliances, Firewalls and UTMs, SIEM and Event Correlation Tools and their use
- Hands-on experience performing data collection management and analysis including Root kit/malware characterization and analytics
- Experience with Incident Containment methodologies
- Any of the following certifications: GCIA, CEH, GCED, CRISC, CISSP
- US citizenship
- Strong problem solving and organizational skills
- Strong presentation and communication skills to communicate effectively and clearly technical approaches and findings
- Demonstrated ability to quickly understand new technologies and concepts
- Experience with product security vulnerability management, responsible disclosure, publishing CVEs, and experience working with security research community
13
Cyber Incident Response Analyst Resume Examples & Samples
- Bachelor’s Degree in a technical discipline with a minimum of 5 years related technical experience required for the level 3 role
- Bachelor’s Degree in a technical discipline with a minimum of 9 years related technical experience required for the level 4 role
- Practical experience in network forensics or a related field
- Practical experience in digital forensics or a related field
- A professional certification such as GCFA, GNFA, GREM, or GCIH is highly desirable
14
Cyber Incident Response Analyst Resume Examples & Samples
- A Bachelor’s Degree and a minimum of 5 years related technical experience required for the level 3 role
- A Bachelor’s Degree and a minimum of 9 years related technical experience required for the level 4 role
- Active or ability to obtain a Top Secret Security Clearance with the ability to obtain a TS/SCI is required. In addition, selected candidate must be able to obtain and maintain a favorably adjudicated DHS background investigation (EOD) for continued employment
15
Cyber Incident Response Analyst Resume Examples & Samples
- A Bachelor’s Degree in a related technical field and a minimum of 2 years related technical experience required
- Active Top Secret Security Clearance is required. In addition, selected candidate must be able to obtain and maintain a favorably adjudicated DHS background investigation for continued employment
- Experience working incident management
- Experience developing and/or deploying mitigation techniques for defending either ICS or corporate networks
- Experience working with classified documents
- Active DHS Suitability at the SCI level
- Qualified as an ICS-CERT incident responder
- Experience working in or with two or more critical infrastructure sector or with a control systems vendor/integrator
- Proficiency in the foundations of technology and cybersecurity to understand general ICS-CERT concepts
- Understanding of cybersecurity as it relates to the detection and defense of intrusions on corporate IT and ICSs networks
- Experience and training in triaging an incident from an initial report to resolution
- Experience analyzing network topologies for security vulnerabilities
- Experience in analyzing firewall and system logs
- Experience analyzing network flow and packet captures
- An understanding of ICS, network topologies, and deployments and the differences between securing IT systems and real time systems
- An understanding of the differences or challenges that exist in securing ICS across all 16 sectors
- An understanding of the tactics, techniques, and procedures of various criminal, insider, hactivist, and nation state threat actors
- A basic understanding of malware analysis and reverse engineering
- Understanding of the concepts used in examining hardware level forensic artifacts
- Experience in at least one of the following tools Mandiant Intelligent Response platform (and supporting tools), Sophia, SiLK, Sourcefire, ArcSight, Palantir, RTIR, Remedy, CSET
- Experience in at least one programming language such as Python, C, C++, C#, Java, ColdFusion, PHP, ASP.net
- DOD 8570 CND Analysts
- DOD 8570 IAT Level 3 compliant
- Certified Digital Media Collector (CDMC), Certified Digital Forensic Examiner (CDFE), Certified Computer Crime Investigator (CCCI), DOD 8570 CND-SP Incident Responder (CND-IR)
16
Cyber Incident Response Specialist Resume Examples & Samples
- Analyze potential network security incidents to identify security breaches
- Completes varied complex/non-standard tasks in an area of responsibility
- Understanding of SIEM solutions
- Security analysis skills, including ability to analyze logs to detect required information and patterns
- Above average problem-solving skills
17
Cyber Incident Response Senior Analyst Resume Examples & Samples
- Investigate security breaches and make qualified decisions and recommendations for corrective action
- Interface with other teams and organizations as necessary
- Create content and operate a SIEM solution
- Operate “Endpoint Detection & Response” solutions
- Leverage extensive knowledge of communication technology to provide business value for the IT organization
- Experience in IT security, network security or related experience
- Understanding of intrusion prevention/detection technologies
- Understanding of network protocols & architecture
- Understanding of computer incident response
- Understanding of computer operating systems, including server operating systems (Windows & Linux)
- Ability to manipulate and present data
- Strong sense of ethics & values, ability to handle confidential situations with discretion
18
Cyber Incident Response Manager, Assistant VP Resume Examples & Samples
- Bachelor's degree in Computer Science or technology-related field (or equivalent work experience)
- Financial services experience - Top 10 banking (Strongly preferred)
- Minimum of 3 years in Information Security or 5 years in the other Information Technology fields
- Experience creating trending, metrics, and management reports
- Experience across the following technical concentrations
19
Cyber Incident Response Analyst Resume Examples & Samples
- Review and analyze incidents escalated from Monitoring Analyst Team
- Validate risk and priority scoring of incident from the Monitoring Analyst Team
- Perform investigation and analytics of network and host based payloads and artifacts in relation to the incident
- Correlate additional context from Threat Intelligence team for incident during investigation and analysis
- Create recommendations and requirements for content detection and response
20
Manager Cyber Incident Response Resume Examples & Samples
- 3+ year experience in Cyber Incident Analysis and Handling
- 3+ years of management/supervisory experience
- Knowledge of and experience adhering to CJCSM 6510.01B, “Cyber Incident Handling Program"
- Must have within 120 days after start: DoD 8570 IAT Level 3 Certification (CISA, or GCIH, or GCED, or CISSP, or CASP CE)
- Must have within 120 days after start: DoD 8570 CND Incident Responder Certification (GCIH, or CSIH, or CEH, or GCFA, or SCYBER)
- Experience supporting US Marine Corps network environments
- Having completed one or both of the DoD 8570 required certifications
21
Cyber Incident Response Analyst Resume Examples & Samples
- Three or more years of technical experience in the information security field
- Three or more years of practical experience in an incident response role
- Strong analytical writing skills to articulate complex ideas clearly and effectively; experience creating and presenting documentation and management reports
- Strong communication skills such as planning and leading effective meetings, conducting structured interviews to collect information, interpersonal and negotiation skills, and presenting to a variety of audiences
22
Cyber Incident Response Analyst Resume Examples & Samples
- Respond to security escalations and co-ordinate with internal, external and vendor support in order to provide initial analysis, containment, remediation, after action analysis and reporting of security events and incidents with full root cause analysis and security recommendations
- Provide leadership / mentorship to level 1 analysts
- Use threat intelligence to initiate investigations and identify malicious activity not otherwise identified by Managed Security Services
- Support / lead capability enhancement planning
- Maintains operational services across Cyber Response and Cyber Security
- Assists coordination and implementation of security services across Group
- Foster and maintain relationships across the global response team and its stakeholders
- Bachelor’s Degree in a technical field or equivalent experience
- 3-4 years professional experience
- Qualified or working towards certification like CISSP or CISA
- Experience in Information Security operations
- Incident Response, Malware Analysis, and Digital Forensics experience a plus
- Keen analytic skills
- Good understanding of IT Security practices, methodologies, tools mechanisms and trends
- Able to communicate and write high quality reports in English
- Strong integrity and highly ethical
- Ability to breakdown complex problems into smaller parts and quickly identify a solution
- Good understanding of security operations and technologies
- Experience with Security operations and Incident Response functions
23
Cyber Incident Response Team Regional Lead-americas Resume Examples & Samples
- Bachelors Degree and 7 or more years of experience in the Security area
- Understanding of the insurance or financial industry preferred
- Understanding of a broad range of information security tools, techniques and controls
24
Senior Cyber Incident Response Manager Resume Examples & Samples
- Responsible for leading the tactical and strategic components of the Incident Response function within the TMC to include people, process, and technology
- Actively participate in large scope high impact cyber breaches and manage Incident Response workflow and activities to support response and remediation
- Guide and influence the development and implementation of automation and application logic for security correlation purposes
- Maintain and enforce adherence to corporate and TMC standards, processes and procedures
- Communicate incident response actions to both technical and non-technical management
- Enhance workflow and processes driving incident response and mitigation efforts
- Provides incident response and ownership based on escalation and handoff procedures from junior or mid-career team members
- Ensure IR analysts execute the Incident Response Lifecycle to drive threat remediation and identify strategic countermeasures improving future defenses
- Provide leadership and guidance to advance the defensive capabilities of the Threat Management Center (TMC) and its subsequent ability to defend the Verizon Enterprise
- Reviews technical articles for knowledge sharing
- Provides Training and Mentoring of all IR team members
- Responsible for all aspects of their team’s performance management activities including goal setting, conducting reviews, check-ins and disciplinary action, as needed
25
Cyber Risk Resilience Cyber Incident Response Specialist Master Resume Examples & Samples
- Familiarity with threat intelligence and applied use within incident response and forensic investigations
- 5+ years of experience with malware analysis and understanding attack techniques
- BA/BS in computer science, management information systems or related field or significant industry experience required
- Willingness to travel extensively and/or on short notice is required
26
Cyber Incident Response Analyst Resume Examples & Samples
- Respond to security escalations and coordinate with internal, external and vendor support in order to provide initial analysis, containment, remediation, after action analysis and reporting of security events and incidents with full root cause analysis and security recommendations
- Use threat intelligence to initiate investigations and identify malicious activity
- Provide leadership/mentorship to junior analysts and serve as the "escalation" point for them to assist with performing a detailed analysis of potential threats
- Support the capability enhancement planning
- Bachelor degree holder of relevant discipline with minimum 3 years of professional experience in Information Security
- Qualified or working towards certification like CISSP
- Experience in Information Security operations, Incident Response, Malware Analysis and Digital Forensics is definitely an advantage
- Excellent communication skills in both verbal and written in English
27
Cyber Incident Response Analyst Resume Examples & Samples
- Proactively manage incidents to minimize customer impact and meet SLA’s
- Identify trends to optimize incident processes and monitoring tools
- Works closely with the Security Operation Center, Legal and Loss Prevention teams to support tier 1 and 2 security incident management
28
Cyber Risk Cyber Incident Response Senior Consultant Resume Examples & Samples
- 3+ years of information security experience in one or more of the following areas: IT security, incident handling and response, exploit analysis, network intelligence gathering, vulnerability management, digital forensics methods and procedures
- Actual technical skills. Should be able to conduct an investigation from start to finish given a wide variety of available tools and resources
- 3+ years of experience with at least two of the following tools: X-ways Forensics, Forensic Explorer, EnCase Forensic, EnCase Enterprise, AccessData FTK, Volatility, SANS SIFT, Carbon Black, Internet Evidence Finder
- 3+ years of experience with malware analysis and understanding attack techniques
- Experience interpreting, searching, and manipulating data within enterprise logging solutions
- Ability to demonstrate an investigative mindset. Not just being able to execute a task, but being able to understand the reason for that task, and determine next steps depending on the results while maintaining a firm grasp of the overall goals of the entire process
- Demonstrable personal interest in computing, security, and digital communications
29
Cyber Incident Response Analyst, Mid Resume Examples & Samples
- 4+ years of experience with planning or performing defensive Cyberspace operations
- Experience with incident analysis and response methodology in investigations and the groups behind targeted attacks and tactics, techniques, and procedures (TTPs)
- Ability to lead and serve on a team to complete the mission and work well under pressure to rapidly scope and investigate incidents
- Ability to tactfully guide non-subordinate incident responders through precise mitigation processes
- DoD 8570 IAT II Certification and CND Duty Role Certifications, including CEH, GCIA, or GCIH
30
Cyber Incident Response Engineer Resume Examples & Samples
- Three or more years of practical Cyber Incident Management and Threat Hunting experience
- Advanced knowledge of information systems security concepts and technologies; SIEM technologies; network architecture; general database concepts; document management; hardware and software troubleshooting; intrusion tools; malware remediation; and computer forensic tools such as EnCase and open source alternatives
- Familiarity with security regulatory requirements and standards (such as PCI, HIPPA, FFIEC, etc.)
- Advanced knowledge and experience with the Windows and Linux operating systems
- Experience with operations processes, such as Six Sigma and a strong understanding of incident, problem, and change management is preferred. Experience implementing compliance standards, such as FFEIC, PCI and HIPAA
- Ability to work extremely well under pressure while maintaining a professional image and approach
- Exceptional information analysis abilities; ability to perform independent analysis and distill relevant findings and root cause
- Team player with proven ability to work effectively with other business units, IT management and staff, vendors, and consultants
- Advanced skills to present information to stakeholders and/or decision makers in an effective and professional deliverable
- Experience in the following tools; IBM QRadar SIEM, McAfee ePO, Check Point Next Generation Appliances, McAfee IPS, Damballa Failsafe, Rapid 7/Qualys Vulnerability Management, Wireshark, Riverbed Cascade, Encase, and coding languages such as Perl or Python