Cyber Security Analist
- Collaborated with IT teams to integrate security measures into the development and deployment of new applications.
- Conducted security audits to identify vulnerabilities.
- Analyzed security incidents post-resolution, identifying areas for improvement in both technical controls and incident response processes.
- Reduced risk of cyber attacks by conducting regular vulnerability assessments and penetration testing.
- Improved incident response times by developing and maintaining cybersecurity playbooks for common attack scenarios.
- Performed regular reviews of user access rights, minimizing the risk posed by insider threats or compromised accounts.
- Evaluated emerging technologies, providing recommendations on their potential benefits or risks to organizational security posture.
- Performed risk analyses to identify appropriate security countermeasures.
- Streamlined communication during incidents by establishing clear protocols for reporting potential threats or breaches in a timely manner.
- Assisted in the design and implementation of secure cloud environments, ensuring proper controls were in place to protect sensitive data from unauthorized access.
- Authored security incident reports, highlighting breaches, vulnerabilities and remedial measures.
- Optimized security monitoring processes by implementing automated tools for real-time threat detection and analysis.
- Collaborated with third-party payment card industry (PCI) compliance partners.
- Maintained an up-to-date understanding of current threat landscape, tailoring defensive strategies accordingly for maximum effectiveness against evolving tactics employed by adversaries.
- Executed penetration testing to identify security weaknesses and develop disaster recovery plans.
- Educated and trained users on information security policies and procedures.
- Developed plans to safeguard computer files against modification, destruction, or disclosure.
- Encrypted data and erected firewalls to protect confidential information.

