Resume Service
The Following Text Is An Unformatted Professional Resume Sample
From The Writers At The Resume Writing Group, Inc.
This Resume Has Not Been Formatted
ORDER YOUR OWN LETTER-PERFECT, JOB-WINNING RESUME AND IT WILL BE COMPLETED AS SOON AS YOU NEED!
Click HERE!
Yyyyyy x. yyyyyy
Dynamic, Results-Focused Security Consultant / Analyst
1150 Chapman Lane, Unit 16 │ Xxxxxx, OH xxxxxx │ (xxx-xxx-xxxx │ abc@xyz.com
- Goal-Oriented Leader who offers a background in Security Consulting / Analysis, Network Security, Incident Response, Security Monitoring Technologies, Investigations, Research, and Incident Testing.
- Top Performer who uses sharp organizational, management, technical, and interpersonal relations skills to work within dynamic environments to align IT solutions with client needs for maximum success.
- Ambitious Self-Starter who exhibits talent in continually researching security-related issues and leveraging experience with diverse technologies to secure networks and optimize client satisfaction.
- Excellent Communicator who applies critical thinking skills to make sound decisions to reflect positively on IT / operational well-being in alignment with a client s and / or company s vision, value, and goals.
Professional Synopsis
Security Risk Advisors, Philadelphia, PA 2015 Present
Security Consultant
Capitalize on the opportunity to work with Incident Response within an Advanced Threats Defense practice, including facilitating state-of-the-art security monitoring technologies to detect malware and hackers, as well as performing essential investigations to confirm wide-ranging security breaches.
Drive IT success by drafting recommendations to resolve issues and communicate with teams / clients.
Comprehensively reviewed new security incidents and performed investigations.
Applied talents with various tools to investigate and test security incidents (see below).
Computer Services, Networks & Security, Xxxxxx, OH 2014 2015
IT Consultant │ Certified Ethical Hacker │ President
Utilized broad scope of industry knowledge and dynamic business acumen toward planning, reviewing, and implementing forward-thinking network- and security-related projects at client sites, along with developing solutions to complex network and security issues on clients networks.
Delivered results-focused network security assurance to both small- and medium-sized businesses.
Contributed sharp analytical abilities toward planning, implementing, upgrading, and / or monitoring network and security measures for the optimal protection of computer networks and key information.
Spearheaded information security risk assessments, vulnerability assessments, wireless network security assessments, and security research, and maintained documentation related to overall work.
Consulted with clients to determine IT systems role in their organizations, along with making valuable recommendations to clients regarding specific ways to secure all systems and resolve security issues.
Led targeted preparation of analysis of costs and benefits for computing infrastructure upgrades.
Installed, configured, and updated network and security devices, including Windows-based servers.
Successfully responded to computer security breaches and viruses on the client s behalf.
Designed and developed new systems by choosing and configuring hardware and software.
Actively recommended security best practices and system configuration standards to clients.
Designed and implemented disaster recovery solutions; network-level WAN and LAN connectivity, routers, firewalls, and security; and hosted and Cloud solutions for customers using technologies that met comprehensive requirements.
Yyyyyy x. yyyyyy │ Page Two (xxx-xxx-xxxx
Bitboyz, Rocky River, OH 2014
Technical Support │ Network Administration
Strategically steered set-up, configuration, support, and troubleshooting for Office 365 users, including assisting and performing troubleshooting on Windows Server 2008 and 2012 systems.
Exhibited solid multitasking proficiencies toward providing services using VPN and Remote Desktop, along with facilitating Active Directory configuration and management; configuring Group Policy; supporting Exchange Server; and adding and / or removing users, groups, and / or permissions.
Expertly supported end users on software applications and provided training as required, along with resolving technical issues involving workstations, servers, printers, networks, and hardware / software.
Performed email migrations, and configured, supported, and performed troubleshooting as required.
Improved overall processes by researching, analyzing, and recommending new technologies.
Resolved connectivity issues, including configuring IP addresses, wireless routers, and access points, along with removing viruses, malware, spyware, and adware and installing software.
Configured, supported, and performed troubleshooting duties on Windows XP, 7, 8, and 8.1 operating systems for direct clients, including small businesses, and provided support via telephone, hands-on, and remote access software using different connection tools.
Education & Professional Development
Colorado Technical University
Master of Science in Information Technology (Information Security Management Emphasis, 3.95 GPA)
Colorado Technical University
Bachelor of Science in Information Technology (Network Management Emphasis, 3.76 GPA)
Six Sigma Yellow Belt Certified │ Six Sigma Lean Green Belt IT
Sarbanes-Oxley Trained Professional │ Lean Six Sigma White Belt Certified
Certified Ethical Hacker (CEH) │ Certified Incident Handler (CIH) EC- Council
CIW Site Development Associate Certification │ Network Technology Associate Certification
Certified Security Analyst (In Progress) │ Licensed Penetration Tester (In Progress) EC-Council
CompTIA Security+ │ CIW (Certified Internet Worker) Internet Business Associate Certification
Continuing Education Windows Git Bash │ Windows PowerShell │ Windows Sysinternals │ Wireshark
Technical Summary
Kali Linux │ Nmap │ Wireshark │ Cyberreason │ Tanium
Active Directory │ VPN │ Remote Desktop │ Exchange Server
McAfee Enterprise Security Suite │ Resolution 1 │ CarbonBlack
Office 365 │ Windows Server 2008 / 2012 │ Windows XP / 7 / 8 / 8.1
WAN / LAN Connectivity │ Routers │ Firewalls │ Hosted / Cloud Solutions
Network Security Monitoring (NSM) Tools │ FireEye Threat Analytics Platform │ Splunk
Security Information Event Management (SIEM) Tools │ Endpoint Detection / Response (EDR) Tools
Yyyyyy x. yyyyyy
Dynamic, Results-Focused Security Consultant / Analyst
1150 Chapman Lane, Unit 16 │ Xxxxxx, OH xxxxxx │ (xxx-xxx-xxxx │ abc@xyz.com
Date
Hiring Agent Name
Company Name
Address
City/State/Zip Code
Dear__________________:
I am seeking a challenging [ Insert Job Title ] role, and am submitting my resume for your review. I am excited to build a rewarding career with your company, and can offer experience in Security Consulting / Analysis, Network Security, and Incident Response. I am also well-versed in Security Monitoring Technologies, Investigations, Research, and Incident Testing, among other areas.
To complement my background, please note that I attained a Master of Science in Information Technology (Information Security Management Emphasis, 3.95 GPA) and a Bachelor of Science in Information Technology (Network Management Emphasis, 3.76 GPA) from Colorado Technical University. I am Six Sigma Yellow Belt Certified, Six Sigma Lean Green Belt in IT, and Lean Six Sigma White Belt Certified. I am also a Certified Ethical Hacker (CEH), Certified Incident Handler (CIH), and Certified Internet Worker (CIW), among other credentials. I am in the process of attaining my Certified Security Analyst and Licensed Penetration Tester credentials.
Currently, as a Security Consultant with Security Risk Advisors, I expertly work with Incident Response within an Advanced Threats Defense practice, including facilitating state-of-the-art security monitoring technologies to detect malware and hackers. I also perform essential investigations to confirm wide-ranging security breaches. Furthermore, I drive IT success by drafting valuable recommendations to resolve issues and communicate with teams and / or clients. During my employment with Security Risk Advisors, I also:
Applied talents with various tools to investigate and test security incidents.
Comprehensively reviewed new security incidents and performed key investigations.
[ Suggestion! Address Here Any ADDITIONAL Qualifications / Achievements Relevant to the Job Posting Per Your Discretion]. As this is just a sampling of my job history, please refer to my enclosed resume for additional experience.
I look forward to speaking with you personally, as I believe the sum of these aforementioned reasons will prove me to be an incredible asset to your company. Thank you for your consideration.
Sincerely,
Yyyyyy x. yyyyyy
<< Previous Back to Sitemap Next >>
Remember: Hire Us To Write YOUR New Resume
And We GUARANTEE That If You’re Not Working In 60 Days Or Less,
We’ll Revise Your Resume, Refund Your Money,
AND Give You $50 EXTRA!