Security Operations Center (SOC) Analyst Resume
Create Free Resume
Your resume is only 30 seconds away from being done.
Charles Bloomberg
PROFESSIONAL SUMMARY
Results-driven Security Operations Center (SOC) Analyst with extensive experience in monitoring, detecting, and responding to cybersecurity threats. Proven expertise in leveraging advanced security tools and providing strategic guidance to ensure robust protection.
PROFESSIONAL Experience
Senior SOC Analyst | Company A
May 2021 — Present, San Jose, USA
• Led the investigation and response to over 500 security incidents annually, utilizing tools such as Splunk, QRadar, and Carbon Black to mitigate potential threats.
• Implemented advanced threat hunting techniques, resulting in a 35% increase in the early detection of sophisticated cyber threats within the first year.
• Designed and rolled out automated incident response workflows, reducing incident response time by 40% using SOAR platforms such as Cortex XSOAR.
• Provided training and mentorship to a team of 10 junior analysts, enhancing team capability and knowledge on cutting-edge cybersecurity practices.
• Prepared and delivered detailed security reports to executive management, offering strategic insights and actionable recommendations to fortify the organization's security posture.
• Implemented advanced threat hunting techniques, resulting in a 35% increase in the early detection of sophisticated cyber threats within the first year.
• Designed and rolled out automated incident response workflows, reducing incident response time by 40% using SOAR platforms such as Cortex XSOAR.
• Provided training and mentorship to a team of 10 junior analysts, enhancing team capability and knowledge on cutting-edge cybersecurity practices.
• Prepared and delivered detailed security reports to executive management, offering strategic insights and actionable recommendations to fortify the organization's security posture.
SOC Analyst | Company B
March 2018 — April 2021, New York, USA
• Monitored and analyzed network traffic and security alerts in real-time through SIEM technologies to detect and address potential threats.
• Coordinated incident response efforts for over 300 security events annually, utilizing tools such as Wireshark, FireEye, and Palo Alto Networks.
• Developed and maintained threat intelligence feeds, increasing the threat detection accuracy by 20% through continuous refinement and updates.
• Conducted root cause analysis for post-incident reviews, identifying gaps in security processes and recommending improvements.
• Coordinated incident response efforts for over 300 security events annually, utilizing tools such as Wireshark, FireEye, and Palo Alto Networks.
• Developed and maintained threat intelligence feeds, increasing the threat detection accuracy by 20% through continuous refinement and updates.
• Conducted root cause analysis for post-incident reviews, identifying gaps in security processes and recommending improvements.
Associate SOC Analyst | Company C
June 2015 — March 2018, Austin, USA
• Assisted in the monitoring and analysis of security alerts and incidents, contributing to the detection of 150+ security events monthly.
• Utilized Splunk and ArcSight for log analysis and correlation, enhancing the identification of potential threats and anomalies in network traffic.
• Supported vulnerability assessments and penetration testing, aiding in the mitigation of identified security vulnerabilities.
• Utilized Splunk and ArcSight for log analysis and correlation, enhancing the identification of potential threats and anomalies in network traffic.
• Supported vulnerability assessments and penetration testing, aiding in the mitigation of identified security vulnerabilities.
Junior SOC Analyst | Company D
January 2013 — June 2015, Denver, USA
• Conducted initial triage and analysis of security events, ensuring timely escalation of incidents to senior analysts.
• Analyzed security metrics and trends to identify potential threats, contributing to the prompt resolution of 100+ incidents.
• Maintained and updated incident response documentation and playbooks, supporting continuous improvement of SOC processes.
• Analyzed security metrics and trends to identify potential threats, contributing to the prompt resolution of 100+ incidents.
• Maintained and updated incident response documentation and playbooks, supporting continuous improvement of SOC processes.
Education
Bachelor of Science in Computer Science | Stanford University
2012
Expert-Level Skills
Security Information and Event Management (SIEM), Advanced Threat Detection, Incident Response, Threat Intelligence, Cybersecurity Compliance, Vulnerability Assessment, Penetration Testing, Network Traffic Analysis, Log Analysis, Team Leadership, Communication, Problem-Solving