Resume

Security Operations Center Analyst Resume Example & Writing Guide

Use this Security Operations Center Analyst resume example and guide to improve your career and write a powerful resume that will separate you from the competition.

An operations center is where an organization’s entire security infrastructure comes together. It’s where analysts monitor an organization’s systems for signs of intrusion and respond to threats as they arise. And it’s where they collaborate with other members of their organization to identify risks and develop strategies to mitigate them.

If you’re interested in a career that combines the best parts of technology and customer service with the challenge of staying one step ahead of hackers, security operations center analyst could be the perfect job for you. And if you have a passion for helping others protect their assets and improve their processes, you might be ready to make a move into this exciting field.

Here are some tips and an example to help you write a security operations center analyst resume that hiring managers will love.

David Moore
Chicago, IL | (123) 456-7891 | [email protected]
Summary

Seasoned security operations center (SOC) analyst with experience in monitoring and responding to cyber threats. Proven ability to manage and prioritize incidents, identify and mitigate risks, and maintain compliance with industry standards. Seeking an opportunity to use expertise and experience to protect company data and assets.

Education
Illinois State University Jun '10
B.S. in Criminal Justice Administration
Experience
Company A, Security Operations Center Analyst Jan '17 – Current
  • Monitored and analyzed security events from SIEM, IDS/IPS systems, endpoint agents, etc. to identify threats and incidents in real-time.
  • Provided 24×7 support for the Security Operations Center (SOC) by monitoring network activity using various tools such as Splunk, Arcsight, Solarwinds, etc.
  • Investigated alerts generated by SIEM or other security solutions to determine if an incident has occurred and escalated issues appropriately based on severity of impact.
  • Assisted with Incident Response activities including malware analysis and remediation efforts when applicable.
  • Participated in SOC maintenance tasks such as patching servers and workstations, software installation & upgrades, hardware replacement & repair, etc., as required to ensure optimal performance at all times.
Company B, Security Operations Center Analyst Jan '12 – Dec '16
  • Analyzed and reported on security incidents, including malware attacks, phishing emails, spam messages and other threats to the company’s network
  • Conducted regular vulnerability scans of the company’s servers and performed penetration testing when necessary
  • Managed a team of 10 Security Operations Center analysts responsible for monitoring critical systems 24/7
  • Created detailed documentation about all security events in accordance with standard operating procedures (SOPs)
  • Developed an automated system that monitored user activity across multiple platforms for suspicious behavior
Company C, Security Operations Center Trainee Jan '09 – Dec '11
  • Learned to operate and troubleshoot various security technologies such as firewalls, intrusion detection systems, and security information and event management systems.
  • Became proficient in using a variety of security tools such as packet capture analysis and malware analysis tools.
  • Assisted with the development and implementation of security policies and procedures.
Certifications
  • GIAC Security Essentials Certification
  • Certified Ethical Hacker (CEH)
  • Certified Information Systems Security Professional (CISSP)
Skills

Industry Knowledge: Network Security, Security Architecture, Security Operations, Incident Response, Security Monitoring, Vulnerability Management
Technical Skills: Cisco, Checkpoint, Palo Alto, Fortigate, Juniper, Brocade, Solarwinds
Soft Skills: Communication, Problem Solving, Attention to Detail, Analytical Thinking, Teamwork

How to Write a Security Operations Center Analyst Resume

Here’s how to write a resume of your own.

Write Compelling Bullet Points

The best way to make your resume stand out is to use strong, specific language. Rather than saying you “monitored security systems,” you could say you “monitored security systems for 24×7 operations for 200+ retail locations, ensuring compliance with federal, state, and local regulations.”

The second bullet point is much stronger because it provides specific details about what you did and the results of your work. It also includes a number—200+—which helps quantify your experience and makes it easy for the reader to understand how significant your role was.

Identify and Include Relevant Keywords

When you submit your resume for a security operations center (SOC) analyst role, it’s likely that it will go through an applicant tracking system (ATS). This system will scan your resume for certain keywords related to the job, like “incident response” or “cybersecurity.” If your resume doesn’t include enough of the right terms, the ATS might not rank it highly enough to be seen by a recruiter.

To increase your chances of getting noticed, make sure to include relevant keywords throughout all the sections of your resume. Here are some of the most commonly used security operations center analyst keywords:

  • Security Operations Center (SOC)
  • Security
  • Incident Response
  • Network Security
  • Information Security
  • Networking
  • Cybersecurity
  • Firewalls
  • Active Directory
  • SIEM
  • Windows Server
  • Cybersecurity
  • Security Architecture
  • System Administration
  • Incident Management
  • Network Administration
  • Snort
  • Enterprise Security
  • VMware
  • Troubleshooting
  • SIEM Solutions
  • Windows
  • IPSEC
  • Ipv6
  • VMWare ESXi
  • Border Gateway Protocol (BGP)
  • Border Gateway Protocol (BGP)
  • Packet Capture
  • Open Shortest Path First (OSPF)
  • Switching

Showcase Your Technical Skills

As a security operations center analyst, you need to be proficient in a variety of software programs and systems in order to effectively do your job. This might include familiarity with security information and event management (SIEM) systems, intrusion detection systems (IDS), and vulnerability management systems. Additionally, you should have experience with specific programs like Splunk, ArcSight, and QRadar.

Including your technical skills on your resume will show recruiters that you have the necessary skills and experience to be successful in the role.

Previous

Nutrition Coach Resume Example & Writing Guide

Back to Resume
Next

Quickbooks Bookkeeper Resume Example & Writing Guide