Cybersecurity Analyst Resume Example That Passes ATS Screening

Information Security · Mid Level · Updated 2025-03-20

Information Security mid level Resume Example

Mid-level cybersecurity analyst resumes tend to fall into one of two traps: either drowning in acronyms that read like alphabet soup, or staying so vague that nothing distinguishes you from a help desk technician who once ran a vulnerability scan. The strongest resumes in this field pair specific tooling expertise with measurable security outcomes - incidents contained, vulnerabilities remediated, compliance frameworks maintained. This example shows how to strike that balance.

Full Resume Sample

Nadia Petrova

Cybersecurity Analyst

Professional Summary

Cybersecurity analyst with 5 years of experience in threat detection, incident response, and vulnerability management across financial services and SaaS environments. Currently responsible for monitoring and triaging security events across a 4,000-endpoint enterprise environment using Splunk SIEM and CrowdStrike EDR. Hold active Security+ and CySA+ certifications with hands-on experience conducting forensic investigations, hardening cloud infrastructure, and supporting SOC 2 Type II and PCI DSS compliance programs.

Experience

Cybersecurity Analyst II

Fidelity Investments · Boston, MA · Mar 2022 - Present

  • Monitor and triage an average of 350+ daily security alerts across Splunk SIEM and CrowdStrike Falcon, maintaining a mean time to acknowledge (MTTA) of under 8 minutes during business hours
  • Led the incident response for a targeted phishing campaign that compromised 14 employee accounts, containing the breach within 3 hours and coordinating credential resets and forensic analysis across affected systems
  • Developed 22 custom Splunk correlation rules that reduced false positive alert volume by 34%, allowing the SOC team to focus analyst time on higher-fidelity detections
  • Conduct monthly vulnerability scans using Tenable Nessus across 4,000+ endpoints and work with system owners to drive remediation, reducing critical vulnerability count from 186 to 41 over a 10-month period
  • Support annual PCI DSS assessments by preparing evidence packages, conducting access reviews, and documenting security control implementations across 12 in-scope systems

Associate Security Analyst - Managed Detection and Response

Rapid7 · Boston, MA · Jun 2020 - Feb 2022

  • Provided 24/7 threat monitoring and incident investigation for 40+ MDR client environments using InsightIDR, handling an average caseload of 15-20 active investigations per week
  • Authored detailed incident reports for client security teams, translating technical findings into executive-friendly summaries with remediation timelines and risk ratings
  • Identified and escalated a supply chain compromise affecting 3 client environments through anomalous PowerShell execution patterns, earning recognition from the VP of MDR Services
  • Built and maintained threat hunting playbooks for common attack patterns including credential dumping, lateral movement, and data exfiltration across Windows and Linux environments

IT Security Intern

Boston Medical Center · Boston, MA · Jan 2020 - May 2020

  • Assisted the security team with daily log review and alert triage in the QRadar SIEM environment, processing 50-80 alerts per shift
  • Conducted phishing simulation campaigns for 1,200 hospital employees, generating reports on click rates and coordinating follow-up security awareness training for high-risk departments
  • Documented network segmentation configurations across clinical and administrative VLANs for an internal compliance audit

Education

Bachelor of Science in Cybersecurity — Northeastern University, 2020 (Concentration in Network Security. Member, Collegiate Cyber Defense Competition team (2018-2020).)

Skills

Security Operations: SIEM management (Splunk, QRadar, InsightIDR), EDR (CrowdStrike Falcon, Carbon Black), Incident response and forensics, Threat hunting, Log analysis, Alert triage and escalation

Vulnerability & Compliance: Tenable Nessus, Qualys, PCI DSS, SOC 2 Type II, NIST 800-53, CIS Benchmarks, Patch management coordination

Technical Skills: Python scripting for automation, PowerShell, Bash, TCP/IP and network protocols, Wireshark, YARA rules, MITRE ATT&CK framework

Platforms & Infrastructure: AWS Security Hub, Azure Sentinel, Active Directory, Linux (Ubuntu, CentOS), Windows Server, Firewalls (Palo Alto, Fortinet)

Certifications

CompTIA Security+ · CompTIA CySA+ (Cybersecurity Analyst) · Splunk Core Certified Power User · AWS Certified Cloud Practitioner

See how your resume scores against ATS systems

Check Your ATS Score Free →

Why This Resume Works

Alert volume and response times ground the resume in operational reality. Stating that you triage 350+ alerts daily with an 8-minute MTTA gives hiring managers an immediate sense of your operational tempo. These are the metrics SOC managers use to evaluate analyst performance internally, so seeing them on a resume lets them benchmark you against their own team before the interview even happens.

The incident response narrative demonstrates composure under pressure. The phishing campaign bullet doesn't just say 'responded to incidents.' It specifies 14 compromised accounts, a 3-hour containment window, and the coordination of credential resets and forensics. This level of detail shows someone who can think clearly during a real security event, not just run through a textbook checklist. Hiring managers in security look for evidence that you've handled live fire situations.

MDR experience adds breadth that single-company analysts often lack. Working across 40+ client environments at Rapid7 means exposure to diverse architectures, toolsets, and attack surfaces. This is a significant differentiator over analysts who have only seen one company's infrastructure. The resume leans into this advantage by mentioning the client count and the variety of threat hunting scenarios covered.

Vulnerability reduction is tracked with before-and-after numbers. Reducing critical vulnerabilities from 186 to 41 across 4,000 endpoints tells a clear remediation story. Raw scan counts alone mean nothing if vulnerabilities never get fixed. Showing the trajectory from initial assessment to sustained reduction demonstrates that Priya doesn't just find problems, she drives them to resolution through coordination with system owners.

ATS Keywords for Cybersecurity Analyst Resumes

ATS systems scanning Cybersecurity Analyst applications look for these terms. The resume above weaves them in naturally rather than listing them outright.

cybersecurity analyst SIEM Splunk incident response threat detection vulnerability management EDR CrowdStrike SOC MITRE ATT&CK PCI DSS NIST threat hunting Security+ log analysis

Section-by-Section Writing Tips

Professional Summary

Lead with your years of experience, the size of the environment you protect, and your core security domains (IR, vuln management, threat hunting, compliance). Name your primary SIEM and EDR platforms in the summary itself since these are high-frequency ATS keywords. Mention active certifications here rather than making the reader scroll to find them.

Experience Section

Every bullet should connect a security activity to a measurable outcome. Alert triage means nothing without volume and response time metrics. Vulnerability scanning is unremarkable without remediation numbers. Incident response needs specifics: how many systems affected, how fast you contained it, what the downstream coordination looked like. Security hiring managers are technical readers who will interrogate vague claims in the interview.

Skills Section

Group skills by function, not just by tool name. Separate security operations tools from compliance frameworks from scripting languages from infrastructure platforms. List SIEM and EDR platforms you have production experience with, because these are expensive to train on and employers strongly prefer candidates who already know their stack.

Education Section

A cybersecurity or computer science degree is helpful but not required at the mid level. Certifications carry more weight in security hiring than almost any other field. Security+, CySA+, GIAC certs, and cloud security credentials (AWS Security Specialty, AZ-500) should be prominently listed. If you competed in CTFs or cyber defense competitions, include that - it signals genuine passion for the field.

Common Cybersecurity Analyst Resume Mistakes

Hiring managers reviewing Cybersecurity Analyst resumes flag these problems repeatedly. Each one can knock your ATS score or land your application in the rejection pile.

More Resume Examples

Ready to Optimize Your Resume?

Get your ATS score in seconds. 500 free credits, no credit card required.

Start Free with 500 Credits →