Cyber Threat Resume Sample

4.6
23 votes
Resume Create

The Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Elinor Connelly
630 Nader Common,  Philadelphia,  PA
+1 (555) 258 8901

Work Experience


Cyber Threat Specialist, Associate
02/2017 - PRESENT
Los Angeles, CA
  • Working knowledge of threat exchange protocols (STIX/TAXII/OpenIOC)
  • Experience in people and process leadership
  • Assist and Provide all Active Defense Analysts in triage, identification, and analysis of threat events for escalation to potential security incidents, escalating security incidents to Security Incident Management team and providing Security Response support as needed
  • Provide actionable intelligence to iSOC Security Analysts, Threat and Vulnerability Management, Global Physical Security, Global Business Units, and Industry Partners on Cyber Security related matters
  • Collaborate with SOC Analysts, Security Engineering, and Security Architecture, Threat and Provide documentation to maintain, develop and create runbooks and SOPs for CTI and iSOC
  • Analyze malicious traffic and IOCs hits for attributing to threat actors
  • Research, analyze, and provide reports on attacker campaigns as required
  • Analyst develops, documents, and presents general and technical presentations on security threats to business units and Information Security Risk Management personnel
Cyber Threat Hunter
02/2010 - 08/2016
Phoenix, AZ
  • Provide the leadership, analysis skills, and innovative thinking necessary to enhance and carry out the Company’s Enterprise-wide Risk Management (ERM) Cybersecurity Policy and Risk Framework
  • Background in risk management, information technology; IT audit or a related role for a large-scale business, preferably in the banking industry or risk consulting
  • Knowledge of risk and control concepts including how they apply to information technology functions
  • Present information to regulators, senior management, and the Board of Directors; exceptional analytical skills with the ability to bring together large amounts of data into succinct reports
  • Experience requirement can be partially offset by post-graduate education and/or applicable certifications (e.g., CISA, CISSP, PMP etc.)
  • Performs assessments of the Agency’s security posture
  • Experience with threat assessment, vulnerability analysis, risk assessment, information gathering, correlating and reporting
  • Understanding of "attacker" methodologies and tactics, including kill-chain analysis Familiarity with Advance Persistent Threat groups and Hacker activity
Cyber Threat Intel Standards Intern
10/2003 - 12/2009
Dallas, TX
  • Develop, distribute or share detective measures and ideas with other BU’s to increase their detection effective
  • Assisting AM’s CISO in developing the AM Information Security organization
  • Creation Business Case development in collaboration with Account Manager
  • Reporting on launch, monitoring of project deliverables
  • Responsible for E2E Delivery (full scope, in time, within budget)
  • Status reporting and financial updates
  • SDLC principles / standards

Education


Heidelberg University
1999 - 2003
Bachelor's Degree in Computer Science

Professional Skills


  • A visionary leader, able to see anticipate trends/changes and appropriately communicate this vision in a way that encourages the business to operate efficiently or differently
  • Drives excellent through others to achieve organizational performance and change. Able to align teams and resources to fit the overall strategy of the function and the enterprise
  • Strong analytical skills, strong communication and leadership skills
  • Use strong TCP/IP networking skills to perform network analysis and understand detected threats
  • Technical Skills proficiency: encryption technologies/standards, basic malware analysis or digital computer forensics experience
  • Research new techniques for analysis and developing technical analysis skills
  • Good communication(written and oral) and interpersonal skills

How to write Cyber Threat Resume

Cyber Threat role is responsible for security, analysis, research, analytical, digital, training, integration, database, compensation, architecture.
To write great resume for cyber threat job, your resume must include:

  • Your contact information
  • Work experience
  • Education
  • Skill listing

Contact Information For Cyber Threat Resume

The section contact information is important in your cyber threat resume. The recruiter has to be able to contact you ASAP if they like to offer you the job. This is why you need to provide your:

  • First and last name
  • Email
  • Telephone number

Work Experience in Your Cyber Threat Resume

The section work experience is an essential part of your cyber threat resume. It’s the one thing the recruiter really cares about and pays the most attention to.
This section, however, is not just a list of your previous cyber threat responsibilities. It's meant to present you as a wholesome candidate by showcasing your relevant accomplishments and should be tailored specifically to the particular cyber threat position you're applying to. The work experience section should be the detailed summary of your latest 3 or 4 positions.

Representative Cyber Threat resume experience can include:

  • Develop and maintain relationships across EGSO, the security industry, peer organizations and other entities as necessary to benchmark Experian’s program and keep current in vulnerability management best practices
  • Engage and develop trusted relationships with colleagues in peer financial institutions, law enforcement and government agencies, trade associations and other relevant external organizations
  • Engage and develop close and effective working relationships with all relevant internal Citi stakeholders, to ensure all relevant cyber-intelligence requirements are discussed, captured and acted upon
  • Prior intelligence community experience (military, law enforcement or government)
  • Experience with a common scripting or programming language, including Perl, Python, Bash or Shell, PowerShell, or batch
  • Experience with researching and incorporating Cyber Threat Intelligence (CTI) findings into a threat hunting workflow

Education on a Cyber Threat Resume

Make sure to make education a priority on your cyber threat resume. If you’ve been working for a few years and have a few solid positions to show, put your education after your cyber threat experience. For example, if you have a Ph.D in Neuroscience and a Master's in the same sphere, just list your Ph.D. Besides the doctorate, Master’s degrees go next, followed by Bachelor’s and finally, Associate’s degree.

Additional details to include:

  • School you graduated from
  • Major/ minor
  • Year of graduation
  • Location of school

These are the four additional pieces of information you should mention when listing your education on your resume.

Professional Skills in Cyber Threat Resume

When listing skills on your cyber threat resume, remember always to be honest about your level of ability. Include the Skills section after experience.

Present the most important skills in your resume, there's a list of typical cyber threat skills:

  • Experience within Information Technology (networking, development, or systems). Experience managing projects
  • Relevant cyber security experience in IT Security, Incident Response or network security with strong knowledge working in a SOC
  • Strong experience with Digitial forensics on host or network from malware perspective, ability to identify anomalous behavior on network or endpoint devices
  • Scripting experience in one or more languages
  • Experience conducting analysis and creating content for IDS, Firewalls, SIEM and other security monitoring tools
  • Experience with collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources to document results and analyze findings

List of Typical Experience For a Cyber Threat Resume

1

Experience For Cyber Threat Hunter Resume

  • Experience with writing and implementing custom signatures for IDS, including Snort, Suricata, or Bro
  • Experience of working within the intelligence lifecycle and familiarity with analysis methodologies, technologies and frameworks
  • Experience converting intelligence into actionable mitigation and technical control recommendations
  • Analyze malicious campaigns and evaluate effectiveness of security technologies
  • Knowledge of the underlying logic that security alerts are built upon and them when analyzing raw logs and creating new dashboards and alerts
  • Engage with peers in Citi’s Cyber Security Fusion Centers (CSFC) to share information and collaborate on threats impacting the Citi franchise in EMEA
  • To act as the liaison between the Citi Tel Aviv Cyber Security Innovation Lab and the Cyber Intelligence Center, to introduce innovative and advance capabilities to support CIC mission
  • Design and build custom tools for investigations, hunting, and research
2

Experience For Cyber Threat Engineer Resume

  • Identify gaps in IT infrastructure by mimicking an attacker’s behaviors and responses
  • Document best practices with the TMC staff using available collaboration tools and workspaces
  • + 3 years working in a cyber threat-intelligence function
  • A deep understanding of the cyber threat landscape, attack methods and vectors, actors and countermeasures
  • To support and assist the CIC Intelligence Analysts, in their analysis and production of threat-intelligence products
3

Experience For Cyber Threat Intel Analyst Resume

  • To support and assist the CIC intelligence vendor management team, in their search for, and interactions with, prospective new cyber threat-intelligence vendors
  • To meet regularly with regional Business Information Security Officers and SIM/SIRT team to review intelligence requirements, review intelligence feeds, discuss intelligence gaps and best practices for developing external networks, and provide information approved for external sharing
  • Track threat actors and associated tactics, techniques, and procedures (TTPs)
  • Capture intelligence on threat actor TTPs and develop countermeasures in response to threat actors
  • Analyze network traffic, IDS/IPS/DLP events, packet capture, and FW logs
4

Experience For Cyber Threat Specialist, Associate Resume

  • Develop advanced queries and alerts to detect adversary actions
  • Coordinate threat hunting activities across the network leveraging intelligence from multiple internal and external sources, as well as cutting-edge security technologies
  • Assist in the design, evaluation, and implementation of new security technologies
  • Lead response and investigation efforts into advanced/targeted attacks
  • Perform Root Cause Analysis of security incidents for further enhancement of alert catalog
  • Participate in "hunt missions" using threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect an eradicate threat actors on the TSYS network
5

Experience For Cyber Threat Resistance Analyst Resume

  • Proven ability to document and teach team members how to apply advanced analytic techniques to solve complex problems
  • Two years’ of experience in intelligence or technical analysis with a focus on cyber threat analysis
  • Provide thought leadership beyond current computer network defense technologies and apply innovative, effective solutions in real settings
  • Continuously improve processes for use across multiple detection sets for more efficient TMC operations
  • Evaluate offensive and intelligence-based threat actors based on motivation and common TTPs
  • Experience with gathering open-source and controlled intelligence to develop predictive understanding of adversarial strategies, priorities, and overlapping interests
6

Experience For Cyber Threat Manager Resume

  • Function at a Tier III level to determine the extent of the compromise, attributes of any malware and possible data ex-filtrated based on network and email indicators
  • Develop solutions in an ad-hoc environment when long-term solutions are not feasible. For example, writing Python scripts to accomplish a task while a long-term solution is in-development
  • Support client mitigation efforts – bring fresh ideas to the table while being mindful of limitations from operating in restricted environments. This includes leveraging threat intelligence to identify correlations in alert data and inform mitigation strategies
  • Maintain awareness of the current threat environment and possible impact of newly discovered vulnerabilities and exploits. Cultivate current knowledge of tools and best-practices in advanced persistent threats; tools, techniques, and procedures of attackers; and forensics and incident response best practices
  • Develop custom reports based on data from multiple sources, including FireEye appliances, FireEye threat intelligence, network sensors, and outside intelligence feeds
  • Perform hunting activities to identify, analyse and report on malicious activities and trends that could be indicative of a risk
  • Develop and deploy tools to support Threat Intelligence collection and tracking and malware analysis
7

Experience For Cyber Threat Specialist, Expert Resume

  • Introduce cyber defense abstractions beyond predictive approaches
  • Provide mentorship and instruction to partners and junior analysts
  • Top Secret / SCI with Polygraph required
  • Familiarity with Snort and Yara signatures
  • Experience conducting analysis of packet capture, log data, and network device syslog in support of intrusion analysis or enterprise level information security operations
  • Experience with advanced computer exploitation methodologies and data correlation through the use of System Information and Event Management (SIEM) and cloud tools
  • Experience with FireEye products highly desired
8

Experience For Cyber Protection Team Cyber Threat Emulator Resume

  • Familiarity with common forensics tools and capabilities (i.e., EnCase, Forensic Toolkit [FTK])
  • Respond to Information Security related queries
  • Analyse network packet captures to obtain relevant data for further investigation
  • Collate and analyse relevant events from network device and host log files and calculate their correlation and causality
  • Act upon threat intelligence provided by Cyber Threat Intelligence function
9

Experience For Cyber Threat & Development Analyst Resume

  • Apply data analysis and visualization techniques to gain insights into cyber security data sets
  • Respond to cyber security related queries
  • Integration of data analysis tools, network defense systems and external data feeds
  • Support analysis of threats and current security controls to identify gaps in current defensive posture
  • Ensure that operational, security incident trends and observations are considered with regard to the evolution of the Platform's information security services and capabilities
  • Work in active partnership with cross company stakeholders to understand business and technical requirements
  • Respond to regulatory audit requests with regard to information security services, mechanisms, and safeguards
  • Participate in 'hunt missions' using threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect an eradicate threat actors on the TSYS network
  • Analyze escalated, complex cases involving a pattern of security events from firewalls, IDS, IPS, SIEM, Web Application Firewall (WAF), and other security data sources
10

Experience For Cyber Threat Analysis Engineer Resume

  • Resolve intractable technical problems within managed security solutions as part of a sustained improvement project
  • Configure, manage, and upgrade Intrusion Detection Systems (IDS), Intrusion Protection Systems (IPS), and Security Information and Event Monitoring (SIEM) platforms
  • Baseline threat detection devices for unique customer environments
  • Test and improve signature-based and other detection methods
  • Take responsibility for customer satisfaction and overall success of managed services

List of Typical Skills For a Cyber Threat Resume

1

Skills For Cyber Threat Hunter Resume

  • Experience with a scripting language such as Perl, Python, or other scripting language used in an incident handling environment
  • Experience implementing and using a CTI data repository for storing historical IOCs about attacks for attribution to campaigns and specific threat actors
  • Experience analyzing emerging technologies for potential attach vectors and developing mitigation strategies
  • Experience in automating cyber threat intelligence into security monitoring toolsets
  • Experience identifying Tactics, Techniques and Procedures (TTPs) of attackers and attributing those TTPs to campaigns and specific threat actors
  • A “talent magnet”, who attracts the best in the industry and has a proven track record of building best in class teams
2

Skills For Cyber Threat Engineer Resume

  • Strong understanding of network traffic analysis
  • Experience working in a Security Operations Center or Computer Network Defense organization
  • Experience in writing IOCs, STIX/TAXXI, and YARA rules
  • First Citizens Bank or banking/financial services experience
  • Experience using Splunk Query Language (or a similar query language)
  • Experience working in this area
  • Experience working in this area (data analyst/business analyst)
  • Strong understanding of TTP's
3

Skills For Cyber Threat Intel Analyst Resume

  • ) Experience working with data in the "millions" of records size
  • Validate threat feeds into high confidence alerts/reports and integrate that into existing or new tool sets
  • Experience setting up Cyber Threat Intelligence repository for historical IOC and attacks analysis
  • Experienced in analysing IDS/IPS, FW logs, forensic and other common security industry tools
  • Experience in malware reversing both static and dynamic
  • Experience in Information Security or Networking
4

Skills For Cyber Threat Specialist, Associate Resume

  • Good working knowledge of cyber threat analytics
  • Previous experience working in cross functional and interdisciplinary project teams to achieve tactical and strategic objectives
  • Solid understanding of enterprise IT cybersecurity operational environments
  • Experience writing contract deliverables such as Event Bulletins, Cyber Digests, and Quarterly Summary Reports
  • Four or more years’ experience in a hands-on technical role functioning as an incident responder, network forensic analyst, or malware analyst
  • Demonstrated ability to make decisions on remediation and counter measures design for challenging information security threats
  • Experience with malware analysis and reverse engineering highly desired
  • Strong abilities to interface between multiple departments
  • Experience with Malware, digital forensics techniques and various commercial and open source tools
5

Skills For Cyber Threat Resistance Analyst Resume

  • Technical hands-on experience with security compliance and vulnerability scanning tools
  • Experience and familiarization with HUMINT, SIGINT, GEOINT, OSINT, Deep/Dark Web, MASINT, MILINT, and IMINT
  • Experience with creating automated log correlations in Splunk, ELK, or a similar tool to identify anomalous and potentially malicious behavior
  • Hunting for indicators of compromise, using various toolsets, based on intelligence gathered
  • Understanding of modern operating system technologies to include server and endpoint
6

Skills For Cyber Threat Manager Resume

  • Understanding of modern cybersecurity instrumentation to include threat and vulnerability tools
  • Understanding of current cybersecurity maturity models, i.e. NIST Cybersecurity Framework
  • Network-based monitoring/analysis to include, but not limited to IDS/IPS, content filtering, sandboxing, anomaly, and behavioral tools
  • In technical writing, developing technical documents, and incident response reporting
  • Abilities to measure, report, and present metrics that show performance of the Cyber Security Forensics, Reverse Engineering & Threat Hunting Team
  • Tune devices for blocking and reporting based on customer business need
  • Host-based monitoring/analysis tools to include, but not limited to forensic, anti-virus, endpoint detection, and cyber threat actor hunting tools
  • Discover and categorize enterprises assets by creating and continuously maintaining a database of all IP devices attached to the network
7

Skills For Cyber Threat Specialist, Expert Resume

  • Design, build, and test new detection models using statistics and machine learning algorithms
  • Deep knowledge of networking (TCP/IP, design, traffic flow, protocols, sessions), operating systems (Windows / nix), and web technologies
  • Advanced forensics and data carving capabilities from memory images, host images, and traffic captures for analysis
  • Find evil and kick it out of the Thomson Reuters environment by leading hunt engagements
  • Work with incident response and digital forensics, security engineering, security operations, computer network operations, information operations
  • Participate in mentoring with peers and senior team members
  • Successfully pass a background screening
  • Automate common tasks and create run-books for iSOC analysts supporting CTI
  • Create, improve, and document processes for the management and monitoring of security solutions
8

Skills For Cyber Protection Team Cyber Threat Emulator Resume

  • Cyber threat tooling workbench architecture
  • Collaborate with Trustwave team members in contributing intellectual capital
  • Knowledge of adversary activities in cyberspace with an understanding of intrusion set tactics, techniques, and procedures (TTP)
  • Business understanding sufficient to correlate attackers’ motives to business impacts for risk management
  • Pecialized training in cybersecurity
9

Skills For Cyber Threat & Development Analyst Resume

  • This is an on-call position and can require working nights weekends and holidays
  • Specialized training in cybersecurity – 1 year
  • Threat actor TTP and indicator identification using large data sources
  • Network communication using TCP/IP protocols, basic system administration
  • Basic understanding of malware
  • Knowledge of one or more scripting languages for automation and complex searches
10

Skills For Cyber Threat Analysis Engineer Resume

  • One or more of the following: CCTH, CEH, CISSP, GCIH, GCIA
  • CISSP, CISM, CISA, or other leading information security certification
  • High-level understanding of major industry and regulatory controls such as PCI-DSS and HIPAA and the relationship to information security
  • Develop methodologies, training, and processes for use by other team members in managed services
  • Identify assets based on business risk by isolating critical assets that have a direct impact on business risk
  • Perform hunting activities to identify, analyse and report on malicious activities and trends that could be indicative of risk
  • Define requirements for new projects; perform product evaluations and recommendations such as selecting security products and services to implement

List of Typical Responsibilities For a Cyber Threat Resume

1

Responsibilities For Cyber Threat Hunter Resume

  • HUMINT experience
  • Intelligence community experience (military, law enforcement or government)
  • Experience with the incident response process, including detecting advanced adversaries, log analysis using Splunk, ELK, or similar tools, and malware triage
  • Information Technology experience
  • An ability to help create and maintain effective internal and external, cross-functional teams and work-groups
  • A passion for innovation and excellence combined with proven ability to execute and deliver
  • Relevant experience in a highly regulated industry (e.g. Energy and Utilities, Healthcare etc.)
  • Prioritize vulnerabilities based on previously defined critical assets, exploit types, and business risk, among other things, can help reduce this overload
2

Responsibilities For Cyber Threat Engineer Resume

  • Understanding of Tactics, Techniques, and Procedures (TTPs) utilized by threat actors in campaigns
  • Maintains relevancy by researching modern attacker tactics, tools, procedures, and exploits (TTPE)
  • In incident response with extensive knowledge of the inner-workings of the windows\linux\osx operating systems
  • SUMMARY OF JOB DESCRIPTION
  • Formal IT Security/Network Certification such as Comp TIA Security +, Cisco CCNA, SANS GIAC Certified Intrusion Analyst (GCIA) or ability to obtain via self-study within one year of hire date
  • Information Technology experience, with at least 2 years of experience in information security working within security operations, security intelligence or equivalent functions
3

Responsibilities For Cyber Threat Intel Analyst Resume

  • Experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs, or intrusion prevention logs
  • Experience in global delivery operations support model (e.g. 24 7/16 8)
  • Experience with automated configuration and change management tools e.g. voyence is desired
  • Experience with Cybersecurity analysis, incident response, or a related field
  • Information Technology experience, with at least 6 years of experience in information security working within security operations, security intelligence or equivalent functions
4

Responsibilities For Cyber Threat Specialist, Associate Resume

  • Computer Incident Response Team (CIRT),Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC) experience
  • Formal IT Security/Network Certification such as CompTIA Security +, Cisco CCNA, SANS GIAC Certified Intrusion Analyst(GCIA)
  • Information Technology experience, with at least 6 years of experience in information security working within security operations, security intelligence or equivalent functions
  • Computer Incident Response Team (CIRT), ComputerEmergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC) experience
  • Formal IT Security/Network Certification such as CompTIA Security +, Cisco CCNA, SANS GIAC CertifiedIntrusion Analyst (GCIA) or ability to obtain within one year of hire
5

Responsibilities For Cyber Threat Resistance Analyst Resume

  • Knowledge of the underlying logic that security alerts are built upon and apply them when analyzing raw logs and creating new dashboards and alerts
  • Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or aSecurity Operations Center (SOC) experience
  • Experience in a technical security role in one of the following areas: network security, operating system security, Internet or Web security, or endpoint security
  • Knowledge of typical behaviors of both malware and threat actors and how common protocols and applications work at the network level, including DNS, HTTP, and SMB
  • Experience with system administrator roles
  • + 4 years of additional cyber-security experience
  • Travel extensively up to 75% of the time
  • The ability to assess cyber threats within context of business and operational impact
  • The ability to communicate technical details in a clear manner, with all internal and external stakeholders
6

Responsibilities For Cyber Threat Manager Resume

  • A self-starter self-motivated and can work independently - in a global & local team and in a fast-paced environment
  • Experience with the incident response process, including detecting advanced adversaries, log analysis using Splunk or similar tools, and malware triage
  • Experience and knowledge of packet flow, TCP/UDP traffic, firewall technologies, IDS technologies, proxy technologies, and antivirus, spam and spyware solutions
  • Experience with computer exploitation methodologies
  • Overall relevant experience required
  • Experience with software code development
  • Experience with Cybersecurity analysis and incident response
  • Experience with security assessments against network, application, host, databases, virtual infrastructure, and cloud environments and services
  • A relevant security certification (CISSP, GCIA, GCIH, GREM, CEH, etc.)
7

Responsibilities For Cyber Threat Specialist, Expert Resume

  • Computer network defense technologies and Cyber Kill Chain
  • Knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch)
  • Monitor and analyze logs and alerts from a variety of different technologies, including IDS or IPS, firewall, such as a Web Application Firewall, proxies, and antivirus across multiple platforms
  • Overall IT Infrastructure experience, 4+ years of recent operational security experience (SOC, Incident Response, Malware Analysis, IDS/IPS Analysis, etc.)
  • Relevant Technical Security Certifications (GCFA, GCFE, GREM, GNFA, OSCP, etc.) highly desirable
  • Experience with managing assessment projects from initiation to completion and interface with project teams to determine assessment scope, documentation, and provide information security guidance throughout the assessment process
  • Proven vulnerability management experience, with an understanding of the vulnerability management lifecycle and how it is applied in large, complex enterprise environments
8

Responsibilities For Cyber Protection Team Cyber Threat Emulator Resume

  • Experience with NIST 800-53, FISMA and DFARS cybersecurity regulation and controls
  • Experience with security architecture analysis
  • Exposure to intelligence community or intelligence analysis experience
  • Hands-on experience with cyber security tools such as Nessus, Burp Suite, IBM Appscan, Nmap
  • Able to deliver both deep technical and executive level reports and briefings related to cybersecurity threat management and detection initiatives
  • Review assessment findings, risks, and associated impacts to the company
9

Responsibilities For Cyber Threat & Development Analyst Resume

  • One or more of the following technical certifications is desired: GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), GIAC Reverse Engineering Malware (GREM), or equivalent certifications in these areas
  • Certified Cyber Threat Hunter, or Certified Ethical Hacker
  • Responsible for the collection and analysis of security intelligence data
  • Optional Certification(s): CISSP, CISA, CISM, or GIAC
  • Work with Federal clients to mitigate cyber risk and threats
  • Certified in multiple security related industry, vendor or professional certifications
  • Additional language proficiency in Spanish, Portuguese, Japanese, Mandarin, Korean, German, or French
  • Experience performing cyber threat intelligence analysis, profiling attacks, and attributing attacks to specific campaigns and threat actors utilizing the Diamond Model and Kill Chain
10

Responsibilities For Cyber Threat Analysis Engineer Resume

  • Experience with activities involving APT Threats - Ability to describe and recognize Advanced Persistent Threat (APT) tools, techniques, and procedures
  • Utilization and knowledge of the Diamond Model and Kill Chain for attributing attacks to threat actors and campaigns
  • Knowledge and use of MISP, Maltigo, OSINT techniques
  • Productize Cyber Threat Intelligence into non-biased reports for consumption
  • Understand and be proficient in common cyber threat terminology, methodologies, possess basic understanding of cyber incident and response, and related current events
  • Manages a team of Cyber Threat Analysts and Engineers responsible for the following activities
  • Cyber threat detection and response maturity analysis
  • Threat detection and response roadmap development and presentation

Related to Cyber Threat Resume Samples

Cyber Analyst Resume Sample

Work Experience

  •  Collaborate with Citi’s Cyber Security Fusion Center participant members in support of ongoing threat intelligence analysis and collection plans   •  Coordinate risk, vulnerability and threat reporting from Fusion Center participant members to create a common operating picture for Citi assets, thus re...
Professional Skills

  •  Targeting and analytic skills with a stron...
  •  Strong SPLUNK analytics and configuration ...
  •  Experience of how to structure and operate...
4.7
22 votes

Cyber Threat & Intelligence Resume Sample

Work Experience

  •  Production of, or contribution to, tactical assessments and guidance in response to threats   •  Contribution to long range Strategic threat assessment reports for leadership   •  Assist Cyber Defense team members on research and resolution of incidents   •  Kno...
Professional Skills

  •  Strong time management skills and ability ...
  •  Strong interpersonal and communication ski...
  •  Extensive, proven experience working on la...
4.7
29 votes

Cyber Threat Analyst Resume Sample

Work Experience

  •  Engage stakeholders across DoD, collect and assimilate data, define business rules, and communicate the analysis to clients   •  Three (3+) years of experience with threat intelligence, incident handling, or supporting computer network defense   •  Three (3+) years of experience wi...
Professional Skills

  •  Hold strong skills in cyber threat intelli...
  •  Excellent presentation skills with the abi...
  •  Programming / scripting skills desired
4.9
13 votes

Senior Cyber Resume Sample

Work Experience

  •  Demonstration of deep technical understanding of Cyber/Network Security & Privacy, an Commercial and Technology Errors & Omissions, and Media. Utilizing risk expertise and knowledge of industry and insurance market place, reviews clients’ exposures and loss experience and develops solutions for complex clients’ n...
Professional Skills

  •  Passion for all things information technol...
  •  Project and case management skills
  •  Experience of using common security tools ...
4.9
22 votes

Consultant CRM Resume Sample

Work Experience

  •  Identify the appropriate stakeholders for your area of work, considering the impact of your work and the broader cross-functional dependencies. Manage these relationships to meet stakeholders’ business needs and align expectations. Always strive to improve business partner satisfaction   •  Implemente...
Professional Skills

  •  Strong Influencing skills and communicatio...
  •  Global team player, effective and reliable...
  •  Experience managing global CRM teams and w...
4.7
19 votes

Lead SAP Resume Sample

Work Experience

  •  Application life cycle management for all Tate & Lyle’s application landscape including roadmaps and Software Asset Management where needed   •  Comprehensive understanding of SAP’s customizing toolset   •  Work independently as well as a part of a global team   •&nbs...
Professional Skills

  •  Experience in strong background in formal ...
  •  Business Analyst experience in functional ...
  •  Min of 6 to 8 years of experience required...
4.9
17 votes
Resume Builder

Create a Resume in Minutes with Professional Resume Templates