Resume Service

The Following Text Is An Unformatted Professional Resume Sample

From The Writers At The Resume Writing Group, Inc.

This Resume Has Not Been Formatted


ORDER YOUR OWN LETTER-PERFECT, JOB-WINNING RESUME AND IT WILL BE COMPLETED AS SOON AS YOU NEED!
Click HERE!



Yyyyyy x. yyyyyy

Dynamic, Results-Focused Security Consultant / Analyst

 

1150 Chapman Lane, Unit 16 Xxxxxx, OH xxxxxx (xxx-xxx-xxxx abc@xyz.com

 

  • Goal-Oriented Leader who offers a background in Security Consulting / Analysis, Network Security, Incident Response, Security Monitoring Technologies, Investigations, Research, and Incident Testing.
  • Top Performer who uses sharp organizational, management, technical, and interpersonal relations skills to work within dynamic environments to align IT solutions with client needs for maximum success.
  • Ambitious Self-Starter who exhibits talent in continually researching security-related issues and leveraging experience with diverse technologies to secure networks and optimize client satisfaction.
  • Excellent Communicator who applies critical thinking skills to make sound decisions to reflect positively on IT / operational well-being in alignment with a client s and / or company s vision, value, and goals.

 

Professional Synopsis

 

Security Risk Advisors, Philadelphia, PA 2015 Present

 

Security Consultant

  Capitalize on the opportunity to work with Incident Response within an Advanced Threats Defense practice, including facilitating state-of-the-art security monitoring technologies to detect malware and hackers, as well as performing essential investigations to confirm wide-ranging security breaches.

  Drive IT success by drafting recommendations to resolve issues and communicate with teams / clients.

 

  Comprehensively reviewed new security incidents and performed investigations.

  Applied talents with various tools to investigate and test security incidents (see below).

 

Computer Services, Networks & Security, Xxxxxx, OH 2014 2015

 

IT Consultant Certified Ethical Hacker President

  Utilized broad scope of industry knowledge and dynamic business acumen toward planning, reviewing, and implementing forward-thinking network- and security-related projects at client sites, along with developing solutions to complex network and security issues on clients networks.

  Delivered results-focused network security assurance to both small- and medium-sized businesses.

  Contributed sharp analytical abilities toward planning, implementing, upgrading, and / or monitoring network and security measures for the optimal protection of computer networks and key information.

  Spearheaded information security risk assessments, vulnerability assessments, wireless network security assessments, and security research, and maintained documentation related to overall work.

  Consulted with clients to determine IT systems role in their organizations, along with making valuable recommendations to clients regarding specific ways to secure all systems and resolve security issues.

  Led targeted preparation of analysis of costs and benefits for computing infrastructure upgrades.

  Installed, configured, and updated network and security devices, including Windows-based servers.

 

  Successfully responded to computer security breaches and viruses on the client s behalf.

  Designed and developed new systems by choosing and configuring hardware and software.

  Actively recommended security best practices and system configuration standards to clients.

  Designed and implemented disaster recovery solutions; network-level WAN and LAN connectivity, routers, firewalls, and security; and hosted and Cloud solutions for customers using technologies that met comprehensive requirements.

 

 

Yyyyyy x. yyyyyy Page Two (xxx-xxx-xxxx

 

Bitboyz, Rocky River, OH 2014

 

Technical Support Network Administration

  Strategically steered set-up, configuration, support, and troubleshooting for Office 365 users, including assisting and performing troubleshooting on Windows Server 2008 and 2012 systems.

  Exhibited solid multitasking proficiencies toward providing services using VPN and Remote Desktop, along with facilitating Active Directory configuration and management; configuring Group Policy; supporting Exchange Server; and adding and / or removing users, groups, and / or permissions.

  Expertly supported end users on software applications and provided training as required, along with resolving technical issues involving workstations, servers, printers, networks, and hardware / software.

  Performed email migrations, and configured, supported, and performed troubleshooting as required.

 

  Improved overall processes by researching, analyzing, and recommending new technologies.

  Resolved connectivity issues, including configuring IP addresses, wireless routers, and access points, along with removing viruses, malware, spyware, and adware and installing software.

  Configured, supported, and performed troubleshooting duties on Windows XP, 7, 8, and 8.1 operating systems for direct clients, including small businesses, and provided support via telephone, hands-on, and remote access software using different connection tools.

 

Education & Professional Development

 

Colorado Technical University

 

Master of Science in Information Technology (Information Security Management Emphasis, 3.95 GPA)

 

Colorado Technical University

 

Bachelor of Science in Information Technology (Network Management Emphasis, 3.76 GPA)

 

Six Sigma Yellow Belt Certified Six Sigma Lean Green Belt IT

Sarbanes-Oxley Trained Professional Lean Six Sigma White Belt Certified

Certified Ethical Hacker (CEH) Certified Incident Handler (CIH) EC- Council

CIW Site Development Associate Certification Network Technology Associate Certification

Certified Security Analyst (In Progress) Licensed Penetration Tester (In Progress) EC-Council

CompTIA Security+ CIW (Certified Internet Worker) Internet Business Associate Certification

Continuing Education Windows Git Bash Windows PowerShell Windows Sysinternals Wireshark

 

Technical Summary

 

Kali Linux Nmap Wireshark Cyberreason Tanium

Active Directory VPN Remote Desktop Exchange Server

McAfee Enterprise Security Suite Resolution 1 CarbonBlack

Office 365 Windows Server 2008 / 2012 Windows XP / 7 / 8 / 8.1

WAN / LAN Connectivity Routers Firewalls Hosted / Cloud Solutions

Network Security Monitoring (NSM) Tools FireEye Threat Analytics Platform Splunk

Security Information Event Management (SIEM) Tools Endpoint Detection / Response (EDR) Tools

Yyyyyy x. yyyyyy

Dynamic, Results-Focused Security Consultant / Analyst

 

1150 Chapman Lane, Unit 16 Xxxxxx, OH xxxxxx (xxx-xxx-xxxx abc@xyz.com

 

Date

 

Hiring Agent Name

Company Name

Address

City/State/Zip Code

 

Dear__________________:

 

I am seeking a challenging [ Insert Job Title ] role, and am submitting my resume for your review. I am excited to build a rewarding career with your company, and can offer experience in Security Consulting / Analysis, Network Security, and Incident Response. I am also well-versed in Security Monitoring Technologies, Investigations, Research, and Incident Testing, among other areas.

 

To complement my background, please note that I attained a Master of Science in Information Technology (Information Security Management Emphasis, 3.95 GPA) and a Bachelor of Science in Information Technology (Network Management Emphasis, 3.76 GPA) from Colorado Technical University. I am Six Sigma Yellow Belt Certified, Six Sigma Lean Green Belt in IT, and Lean Six Sigma White Belt Certified. I am also a Certified Ethical Hacker (CEH), Certified Incident Handler (CIH), and Certified Internet Worker (CIW), among other credentials. I am in the process of attaining my Certified Security Analyst and Licensed Penetration Tester credentials.

 

Currently, as a Security Consultant with Security Risk Advisors, I expertly work with Incident Response within an Advanced Threats Defense practice, including facilitating state-of-the-art security monitoring technologies to detect malware and hackers. I also perform essential investigations to confirm wide-ranging security breaches. Furthermore, I drive IT success by drafting valuable recommendations to resolve issues and communicate with teams and / or clients. During my employment with Security Risk Advisors, I also:

 

  Applied talents with various tools to investigate and test security incidents.

  Comprehensively reviewed new security incidents and performed key investigations.

 

[ Suggestion! Address Here Any ADDITIONAL Qualifications / Achievements Relevant to the Job Posting Per Your Discretion]. As this is just a sampling of my job history, please refer to my enclosed resume for additional experience.

 

I look forward to speaking with you personally, as I believe the sum of these aforementioned reasons will prove me to be an incredible asset to your company. Thank you for your consideration.

 

Sincerely,

 

 

 

Yyyyyy x. yyyyyy

<< Previous           Back to Sitemap           Next >>

Remember: Hire Us To Write YOUR New Resume
And We GUARANTEE That If You’re Not Working In 60 Days Or Less,
We’ll Revise Your Resume, Refund Your Money,
AND Give You $50 EXTRA!

Click HERE!

Members Of The Following Resume Writing Associations:


BBB Rating : A+


Proud Sponsors Of:
 

 


 

For General Customer Service, Call Us Toll Free At 1-800-466-3076 Or Email Our Writers By Clicking HERE

 Resume Writing Group © 2005-.   All graphics & text on ResumeWritingGroup.Com are either owned or licensed by our company and may
not be reproduced without expressed, written consent.  Terms of service and rules for guarantees may be reviewed here...
*our resume writing Guarantee requires clients to save receipts as proof that they've submitted COPIES OF their NEW resume to a minimum of 40 employers USING OUR ADVICE.   REFUNDS ARE LIMITED TO RESUMES AND DO NOT INCLUDE ADDITIONAL SERVICES SUCH AS COVER LETTERS.REFUNDS CAN BE CLAIMED UP TO 90 DAYS AFTER PURCHASE.