Cyber Info Assurance Analyst Resume Sample
Work Experience
- Perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations such as compliance audits and active evaluations such as vulnerability assessments
- Includes support of process, analysis, coordination, security certification test, security documentation, as well as investigations, software research, hardware introduction, and release, emerging technology research inspections and periodic audits
- Assists in the implementation of the Risk Management Framework (RMF), through the required government policy (i.e. NISPOM, JSIG, ICD etc., make recommendations on process tailoring, participate in and document process activities
- Performs analysis to validate established security requirements and to recommend additional security requirements and safeguards
- Supports the formal security test and evaluation (ST&E) required by each government accrediting authority through pretest preparations, participation in the tests, analysis of the results and preparation of required reports
- Examine potential security violations to determine if the Network Environment has been breached, assess the impact, and preserve evidence
- Support, monitor, test, and troubleshoot hardware and software IA problems pertaining to the Network environment
- Perform IA related support functions including installation, configuration, troubleshooting, assistance, and /or training, in response to agency requirements for the network environment
- Analyze patterns of non-compliance and take appropriate administrative or programmatic actions to minimize security risks and insider threats. Manage accounts, network rights, and access to network environment systems and equipment
- Analyze system performance for potential security problems. Assess the performance of IA security controls within the network environment
- Install, test, maintain, and upgrade network operating system software and hardware to comply with IA requirements
- Ensure that hardware, software, data, and facility resources are archived, sanitized, or disposed of in a manner consistent with system security plans, and requirements
- Perform system audits to assess security related factors within the Network environment
- Implement applicable patches including IAVAs, IAVBs, and TAs for their network environment
- Adhere to IS security laws and regulations to support functional operations for the Network environment
- Responsible for ensuring that appropriate security controls are defined and for assisting the government in their efforts to assess risk and implement adequate information technology security measures
- Provide engineering support to security/certification test and evaluation activities; ensure security deficiencies identified during security/certification testing have been mitigated, corrected, or a risk acceptance has been obtained by the authorized representative
- Discuss with management and the ISSM/ISSO the governments major risk exposures and review the steps Management/CCB/CRB/PE has taken to monitor and control such exposures, including the governments risk assessment and risk management policies
- Review existing security standards and practices among the various DODI policies to determine whether those standards and practices are enforced and meet FISMA NIST and DODI wide security requirements
- Compliance verification of Defense Information Systems Agency (DISA) Secure Technical Implementation Guides (STIGs), Service security alerts and bulletins, and DISA/DoD standards
- Identify, assess, and recommend IA or IA-enabled products; Ensure recommended products are in compliance with the DoD evaluation and validation requirements
- Document system security design features and provide input to implementation plans and standard operating procedures
- Provide input to Risk Management Framework process activities and related documentation (e.g., system life-cycle support plans, concept of operations, operational procedures, and training materials)
- Experience as a network defender or functional area
- Working experience implementing and performing Risk Management Framework (RMF) assessments on classified systems/networks
Education
Professional Skills
- Working experience maintaining classified systems audits and corrective actions (POA&Ms) and direct experience with system security plans and documentation
- Proven knowledge of computer security principles and DoD security protocols
- Experience with Risk Management Framework
- Experience in an Intel-related program
- Active CompTIA Security + Certification
How to write Cyber Info Assurance Analyst Resume
Cyber Info Assurance Analyst role is responsible for security, software, government, travel, research, education, analysis, firewalls, engineering, compliance.
To write great resume for cyber info assurance analyst job, your resume must include:
- Your contact information
- Work experience
- Education
- Skill listing
Contact Information For Cyber Info Assurance Analyst Resume
The section contact information is important in your cyber info assurance analyst resume. The recruiter has to be able to contact you ASAP if they like to offer you the job. This is why you need to provide your:
- First and last name
- Telephone number
Work Experience in Your Cyber Info Assurance Analyst Resume
The section work experience is an essential part of your cyber info assurance analyst resume. It’s the one thing the recruiter really cares about and pays the most attention to.
This section, however, is not just a list of your previous cyber info assurance analyst responsibilities. It's meant to present you as a wholesome candidate by showcasing your relevant accomplishments and should be tailored specifically to the particular cyber info assurance analyst position you're applying to.
The work experience section should be the detailed summary of your latest 3 or 4 positions.
Education on a Cyber Info Assurance Analyst Resume
Make sure to make education a priority on your cyber info assurance analyst resume. If you’ve been working for a few years and have a few solid positions to show, put your education after your cyber info assurance analyst experience. For example, if you have a Ph.D in Neuroscience and a Master's in the same sphere, just list your Ph.D. Besides the doctorate, Master’s degrees go next, followed by Bachelor’s and finally, Associate’s degree.
Additional details to include:
- School you graduated from
- Major/ minor
- Year of graduation
- Location of school
These are the four additional pieces of information you should mention when listing your education on your resume.
Professional Skills in Cyber Info Assurance Analyst Resume
When listing skills on your cyber info assurance analyst resume, remember always to be honest about your level of ability. Include the Skills section after experience.