Cyber Security Analyst Resume Sample

thumbnail

About this resume

Industry
Carrer Level Professional
Written by Dua Khan
Order Similar Download Sample

Cyber Security Analyst Resume Example

Jason Walters

[email protected] • + 1 (437) 988-2235

Cyber Security Analyst

GitHub• LinkedIn • Toronto, ON M5S 1A1

Highly analytical professional with a solid background in monitoring, investigating, and mitigating cyber threats within complex government and enterprise environments. Skilled at conducting security assessments, developing robust security policies, and executing advanced security measures aligned with federal regulations (DCID, ICD 503, NIST). Proficient in utilizing SIEM tools like Splunk, performing network traffic analysis, and enhancing system security through innovative solutions and technology integrations. Expert in enabling strategic security enhancements, guiding incident response efforts, and ensuring compliance with stringent security standards. Known for delivering technical leadership, increasing system performance, and training junior team members. Committed to safeguarding critical infrastructure and driving continuous improvement in cyber security practices.

Areas of Expertise

  • Cyber Threat Monitoring & Analysis
  • Security Operations Center Control
  • Network Security Architecture
  • Security Assessment/Authorization
  • Vulnerability/Risk Management
  • Security Audits & Compliance
  • Business Continuity Planning
  • Network Ports & Protocols
  • Information Assurance
  • Effective Communication
  • Process Improvement
  • Relationship Building

Technical Proficiencies

Network Infrastructure: Cisco, Juniper, TACLANE, LAN/WAN, IPAM, QoS, Circuits
Security: DISA STIGs, NIST, TEMPEST, RMF, POA&Ms, MITRE ATT&CK, ATO/ATC
Tools and Technologies: ISE, TACACS, SIEM, Wireshark, Splunk, CENTRIX-K, Zeek, Snort, TTTP, Autopsy, ACAS, Kali Linux, Metasploit, Python, Java, IDA, Caldera

Career Experience

Canadian Air Defence Command (CADC)                                                    Aug 2017 – Present

Cybersecurity Operations Specialist                                                                            Aug 2021 – Present

Implement robust network security policies and disaster recovery plans aimed at minimizing cyber threats. Ensure strategic management of complex network infrastructure and 250+ long haul circuits across five geographic locations. Enhance cyber resilience of Indo-Pacific communication systems by integrating secure technologies. Conduct risk assessments in compliance with DISA STIGs. Evaluate and improve network engineering team capabilities through the development of a GNS3 training lab.

Key Accomplishments

  • Uncovered and minimized complex network issues for a $50, 000 SATCOM facility, enabling optimal reliability.
  • Secured $50K investment to establish a virtual training environment; trained a team of 40 cybersecurity professionals.
  • Streamlined operations for a $20,000,000 SATCOM and TCF system through process automation and improvement.
  • Achieved compliance and received the “Best Facility in the Pacific” award by restructuring an IT program; assisted a larger facility in meeting and exceeding defined compliance standards.

Network Management Supervisor                                                                           Aug 2020 – Aug 2021

Strengthened the cybersecurity framework for a high-priority system. Implemented security upgrades and improvements in line with industry best practices. Identified and addressed vulnerabilities to protect the network infrastructure. Oversaw a sophisticated multi-network system supporting collaborative operations. Handled IP address management for both static and dynamic assignments. Configured network infrastructure, including Cisco Nexus switches, Cisco Identity Services Engine (ISE), SolarWinds monitoring, TACLANE encryption, GEM One management, Quality of Service (QoS), and Voice over IP (VoIP) systems.

Key Accomplishments

  • Resolved critical network issues affecting two essential radio systems used for air-to-ground communications.
  • Developed continuity of operations plans for 13 communication hubs, ensuring network resilience and reliability.
  • Spearheaded and completed a major network overhaul, upgrading 11 devices, resolving 8,000 network faults, and safeguarding a $56 million system supporting over 85,000
  • Contributed to successful joint interoperability testing by designing network infrastructure and IP addressing scheme, earning team recognition with the Pacific Air Forces’ Verne Orr Award.

Cyber Transport Technician                                                                                      Aug 2017 – Aug 2020

Oversaw the security and compliance of complex network infrastructures, adhering to stringent security standards (DISA STIGs). Conducted comprehensive security assessments and implemented robust security measures to minimize vulnerabilities and enhance system defenses. Developed and executed disaster recovery plans for minimal business disruption in case of cyber incidents. Managed and maintained a diverse network environment including routers, switches, firewalls, and security systems.

Key Accomplishments

  • Enhanced network security by optimizing firewall configurations, reducing the attack surface by 50%.
  • Deployed a standardized login script across 1,200 wing networking systems worth $970,000.

Education

Master of Science in Information & Cyber Security

Institute of Technology Ontario – 2023

  • Developed expertise in cybersecurity management and offensive security through a focused curriculum.
  • Gained in-depth knowledge of critical areas like risk management, secure architecture implementation, computer forensics, advanced network forensics, malware analysis, and cyber threat intelligence.

Bachelor of Science in Computer Science

Institute of Technology Ontario – 2022

  • Established a strong foundation in software development while strategically incorporating security fundamentals.
  • Developed proficiency in x86 Assembly language, essential for understanding malware analysis, web programming for web security concepts, and database programming for security applications.

Licenses & Certifications

Cisco Certified Network Professional (CCNP) – ongoing

Certified Ethical Hacker (CEH)

CompTIA Security+

CompTIA Network+

CompTIA A+

Juniper Networks Certified Associate (JNCIA)

A fresh, original, and uniquely structured resume writing guide for cyber security analysts, inspired by Jason Walters’ background, crafted by a professional computer science resume writing service, and tailored to help candidates communicate both their technical edge and their strategic value.

Building an Elite Cyber Security Analyst Resume

For the Analyst Who Wants to Lead, Not Just Defend

Are you ready to make your mark in the world of cyber security? Whether you’re aiming for a government role, a private sector promotion, or a shift into a highly regulated environment, you need more than just technical skills on your resume. Jason Walters’ example shows how to highlight not only expertise, but also leadership, compliance, and problem-solving. Here’s how to put your story in the spotlight:

1. Lead With a Focused, Strategic Headline

Go beyond “Cyber Security Analyst.” Add a tagline that hints at your unique blend of skills:

Free resume critique
from certified writers!

Cyber Security Analyst | Strategic Threat Detection | Federal Compliance Specialist

Start your profile section by capturing both technical mastery and a mindset of vigilance:

“Highly analytical professional with a solid background in monitoring, investigating, and mitigating cyber threats within complex government and enterprise environments…”

2. Profile: Show Problem Solving and Leadership

Don’t just list your technical skills, demonstrate how you think and what you deliver:

“Expert in enabling strategic security enhancements, guiding incident response efforts, and ensuring compliance with stringent security standards. Known for delivering technical leadership, increasing system performance, and training junior team members. Committed to safeguarding critical infrastructure and driving continuous improvement in cyber security practices.”

Highlight your ability to lead, communicate, and grow others, not just follow processes.

3. Areas of Expertise: Make Them ATS and Reader-Friendly

Cluster your skills into themes so both recruiters and applicant tracking systems can find you:

  • Threat Monitoring & Analysis: Cyber Threat Monitoring, SIEM, Network Security Architecture
  • Compliance & Governance: Security Assessment/Authorization, Vulnerability/Risk Management, Audits & Compliance (NIST, DISA STIGs, RMF)
  • Resilience & Response: Business Continuity, Incident Response, Process Improvement
  • Communication & Leadership: Training, Effective Communication, Relationship Building

4. Technical Proficiencies: List What Sets You Apart

Show fluency in both foundational and cutting-edge tools:

Need a career boost? get LinkedIn profile makeover
Hire Experts
image

Network: Cisco, Juniper, TACLANE, LAN/WAN, QoS
Security: DISA STIGs, NIST, MITRE ATT&CK, TEMPEST
Tools: Splunk, Wireshark, Zeek, Snort, Kali Linux, Metasploit, Python, Java, ACAS, Autopsy

If you use specialized tools (like GNS3 training labs or virtual environments), call those out, especially if you created or deployed them yourself.

5. Professional Experience: Prioritize Leadership and Impact

For every job, lead with the challenge and finish with the result. Use language that demonstrates both hands-on work and team or process improvement.

Example for Security Operations Specialist:

“Implement robust network security policies and disaster recovery plans aimed at minimizing cyber threats. Ensure strategic management of complex network infrastructure and 250+ long haul circuits across five geographic locations…”

Key Accomplishments:

  • “Uncovered and minimized complex network issues for a $50,000 SATCOM facility, enabling optimal reliability.”
  • “Secured $50K investment to establish a virtual training environment; trained a team of 40 cybersecurity professionals.”
  • “Achieved compliance and received the ‘Best Facility in the Pacific’ award by restructuring an IT program…”

Note: Be specific about budgets, scope, or recognition. If you saved money, streamlined processes, or were honored with an award, it should stand out.

6. Show Progression and Initiative

When you’ve earned promotions or taken on more responsibility, highlight this as a story of trust and growth:

“Promoted from Network Management Supervisor to Cybersecurity Operations Specialist based on performance in managing multi-network systems and leading incident response improvements.”

7. Quantify and Contextualize Your Achievements

Numbers = credibility. Use metrics to show scale and impact:

  • “Streamlined operations for a $20,000,000 SATCOM and TCF system through process automation and improvement.”
  • “Oversaw a major network overhaul, upgrading 11 devices, resolving 8,000 network faults, and safeguarding a $56 million system supporting over 85,000 users.”

8. Education and Training: Highlight Specialization and Relevance

Start with your most advanced degree and specify any cyber security-focused coursework or research:

Master of Science in Information & Cyber Security (2023), Institute of Technology Ontario
– “Developed expertise in cybersecurity management and offensive security…malware analysis, forensics, cyber threat intelligence.”

Don’t forget relevant undergraduate studies, especially if you focused on security, software, or networks.

9. Certifications: Keep Them Visible and Current

List high-value certifications up front:

  • Certified Ethical Hacker (CEH)
  • CompTIA Security+
  • Cisco Certified Network Professional (CCNP) – ongoing
  • Juniper Networks Certified Associate (JNCIA)

If you’re working toward a certification, note it as “ongoing” or “in progress”, this shows drive and dedication.

10. Formatting and Final Touches

  • Use strong, active verbs and avoid generic buzzwords.
  • Organize sections for maximum clarity: Profile, Areas of Expertise, Technical Proficiencies, Career Experience, Education, Certifications.
  • Keep formatting clean, professional, and modern, use bullet points and bold for readability.
  • If you have a GitHub or LinkedIn, include links at the top.

In Summary:

At Resume Writing Lab, we believe a cyber security resume should reflect not only your technical fluency but also your leadership, strategic insight, and measurable impact. Let your resume show that you don’t just guard the perimeter, you elevate the entire organization’s cyber resilience, just like Jason Walters.

Need help tailoring your tech resume for a specific agency, private sector role, or international move? Reach out, our certified IT resume writers here to secure your next opportunity.

Ready to write your resume? Get started
Want a free resume analysis? Review my resume