Summary
Overview
Work History
Education
Skills
Certification
Military Service
Clearance
Timeline
Work Availability
Work Preference
Languages
Software
Accomplishments
Quote
SoftwareEngineer
Michael Shaver

Michael Shaver

Senior Cybersecurity Analyst
Bentonville,AR

Summary

Dynamic cybersecurity professional with over 20 years of IT experience, including more than 15 years in security operations, incident response, and threat analysis. Recently transitioned into a leadership and operational role focused on team coordination, process improvement, and audit readiness to drive organizational success. Expertise in guiding Security Operations Center (SOC) teams through tool and process transitions ensures consistent operations and effective incident management. Recognized for fostering collaboration, mentoring analysts, and implementing robust policies that significantly enhance the overall security posture, complemented by an active Public Trust Level 3 clearance.

Overview

20
20
years of professional experience
3
3
Certifications

Work History

Senior Cyber Security Analyst

Oracle Health & AI
02.2022 - 08.2025
  • Oversaw SOC operations, providing direction, prioritization, and coordination to ensure timely and effective incident handling.
  • Led the SOC's operational transition from Avaya to Genesys phone systems, overseeing training schedules, monitoring queue readiness, and ensuring uninterrupted escalation capabilities during the cutover.
  • Supported the SOC through multiple enterprise tool transitions, including Splunk to Griffin (SIEM), Panorama to OpenSearch (firewall log analysis), Archer to XSOAR (case management), Wiki to OraDocs to SharePoint (documentation), and adoption of Cortex XSOAR workflows, ensuring procedural alignment and uninterrupted monitoring during changes.
  • Built and maintained 24/7 paging schedules in xMatters and OCEAN to ensure full analyst coverage, and smooth handoffs between shifts.
  • Served as the primary point of contact for SOC compliance audits, collecting and providing audit artifacts that contributed to a 100% pass rate, with no major findings.
  • Mentored analysts by sharing investigative techniques, forensic methodologies, and tool best practices, including endpoint analysis using Tanium, CrowdStrike Falcon RTR, Trellix, and Microsoft Defender.
  • Guided analysts in log analysis using Splunk, LogScale, OpenSearch, and Palo Alto Panorama to investigate anomalies, correlate events, and validate potential threats.
  • Conducted ticket reviews to ensure investigation quality, documentation accuracy, and readiness for audit.
  • Authored and maintained SOC policies, procedures, and documentation standards to improve consistency and onboarding.
  • Onboarded a counterpart SOC team in a separate region, ensuring secure access provisioning, and smooth operational integration.
  • Assisted in the screening and interviewing of new SOC analysts, contributing to team growth and capability.
  • Promoted team engagement by addressing concerns, fostering collaboration, and encouraging open communication.
  • Analyzed security incidents post-resolution, identifying areas for improvement in both technical controls and incident response processes.

Sr. Security Analyst

J.B. Hunt Transport Inc.
08.2019 - 08.2022
  • Investigated security incidents by collecting and analyzing system logs, reviewing configurations, and correlating data across multiple tools to determine root causes, and potential impact.
  • Utilized SIEM and intrusion detection/prevention systems to monitor network traffic, detect malicious activity, and escalate high-priority events for containment.
  • Prepared detailed incident reports with remediation recommendations, ensuring clear communication to stakeholders, and aiding in post-incident reviews.
  • Maintained and improved SOC process documentation, helping to ensure procedural consistency and knowledge sharing across shifts.
  • Collaborated closely with IT teams to ensure the secure configuration and implementation of systems, applications, and network components.
  • Participated in regular tool usage and platform changes, assisting in analyst readiness and process alignment during transitions to new security monitoring, or ticketing solutions.
  • Supported cross-team efforts to strengthen the organizational security posture, providing feedback on detection rules, investigation workflows, and incident response playbooks.
  • Evaluated emerging technologies for potential adoption into existing infrastructure, optimizing resources while maintaining high levels of protection.

Operational Technology Technician

George's Inc.
08.2017 - 08.2019
  • Installed, configured, and maintained operating systems, software, and network components to support plant operations and production systems.
  • Diagnosed and resolved hardware, software, and connectivity issues across a variety of platforms, ensuring minimal downtime in critical environments.
  • Provided direct technical support to end users, troubleshooting issues, and guiding them through resolutions.
  • Resolved network connectivity problems involving routers, switches, and other networking equipment.
  • Managed and tracked spare parts inventory for timely repair operations.
  • Set up equipment for new employees, including hardware installation, cabling, and software configuration, ensuring compliance with internal setup standards.
  • Collaborated with other IT staff to maintain secure and stable operational technology systems, contributing to the protection of production networks from disruption.

Senior Security Analyst

Sony Interactive Entertainment
06.2014 - 07.2017
  • Monitored and responded to DDoS attacks and other platform-impacting security incidents, coordinating mitigation efforts to minimize service disruption.
  • Investigated fraud cases and account compromises, analyzing activity patterns and system logs to identify malicious behavior, and recommend corrective actions.
  • Provided guidance and mentorship to junior analysts, reviewing investigation steps and reports to ensure quality and adherence to SOC procedures.
  • Collaborated with cross-functional teams to strengthen incident response processes, and improve detection capabilities.
  • Documented investigation steps, attack details, and outcomes contribute to incident knowledge bases and future prevention strategies.
  • Trained junior analysts on industry best practices, fostering a strong team dynamic that resulted in increased efficiency.

Cyber Defense Engineer

Wal-Mart (HP-ArcSight)
10.2010 - 11.2013
  • Utilized HP ArcSight SIEM to monitor, detect, and escalate potential security breaches and anomalous activity across enterprise systems.
  • Performed intrusion analysis by correlating event data, reviewing packet captures, and identifying indicators of compromise.
  • Developed and refined SOC processes and custom scripts to streamline alert triage and investigation workflows.
  • Collaborated with engineering teams to enhance threat detection rules, improving the accuracy and timeliness of security alerts.
  • Supported incident response teams by providing detailed analysis and log data to assist in containment and remediation efforts.

Education

Bachelor of Science (B.S.) - Computer Information Systems

University of Arkansas At Monticello
Monticello, AR

Skills

Security Operations

undefined

Certification

GIAC GCIH

Military Service

USMC Reserves, Lance Corporal, 1999-05-01, 2004-06-30

Clearance

Public Trust Level 3 (Active)

Timeline

Senior Cyber Security Analyst

Oracle Health & AI
02.2022 - 08.2025

Sr. Security Analyst

J.B. Hunt Transport Inc.
08.2019 - 08.2022

Operational Technology Technician

George's Inc.
08.2017 - 08.2019

Senior Security Analyst

Sony Interactive Entertainment
06.2014 - 07.2017

Cyber Defense Engineer

Wal-Mart (HP-ArcSight)
10.2010 - 11.2013

Bachelor of Science (B.S.) - Computer Information Systems

University of Arkansas At Monticello

Work Availability

monday
tuesday
wednesday
thursday
friday
saturday
sunday
morning
afternoon
evening
swipe to browse

Work Preference

Work Type

Full Time

Work Location

Remote

Important To Me

Work-life balanceCompany CultureHealthcare benefitsWork from home optionPaid time off401k matchStock Options / Equity / Profit SharingCareer advancement

Languages

English

Software

Splunk

Crowdstrike

Tanium

ArcSight

Trellix

Panorama

OpenSearch

RSA Archer

Cortex XSOAR

Sharepoint

Wiki

Confluence

Accomplishments

  • Supervised team of 12 staff members.

Quote

Whether you think you can or whether you think you can’t, you’re right!
Henry Ford
Michael ShaverSenior Cybersecurity Analyst
Resume profile created at Zety.com