ETHAN HAWKINS
Senior Cyber Threat Intelligence Analyst
linkedin.com/in/ethan-hawkins-cybersecurity
ethanhawkinscybersec.com
Skills
Threat Intelligence Analysis, Network Security Monitoring, Incident Response Planning, Security Policy Development, SIEM Platforms (Splunk, QRadar), Threat Intelligence Platforms (Recorded Future, FireEye), Endpoint Detection & Response (CrowdStrike Falcon), Network Forensic Analysis Tools (Wireshark, NetWitness)
Certifications
Certified Ethical Hacker (CEH)
Obtained certification in ethical hacking techniques and methodologies to ensure robust security measures against cyber threats.
GIAC Certified Incident Handler (GCIH)
Received certification in incident response planning and execution, enhancing skills to manage and mitigate cyber attacks effectively.
Professional Summary
Cybersecurity Analyst with over 5 years of experience in advanced persistent threat (APT) analysis and mitigation within large-scale enterprise networks. Successfully identified and eradicated a sophisticated APT campaign affecting multiple Fortune 500 companies, preventing potential financial losses estimated at $20 million. Expertise includes intrusion detection systems, incident response planning, and leveraging SIEM tools for real-time threat intelligence.
Work Experience
Senior Cybersecurity Analyst
01/2022
Tech Company Inc
San Francisco, CA
•
Developed and implemented a new threat detection system that identified 30% more APTs within the first year of operation.
•
Conducted forensic analysis on a major APT breach, saving the company $5 million in potential data loss.
•
Collaborated with legal and IT departments to develop comprehensive incident response plans, reducing recovery time by 50%.
•
Created and maintained a threat intelligence database, enhancing real-time threat prediction capabilities.
Cybersecurity Analyst
06/2020 - 12/2021
Previous Company Inc
San Francisco, CA
•
Developed and delivered an APT training program for 150 employees, resulting in a 30% increase in security awareness.
•
Investigated and reported on 15 suspicious activities, leading to the identification of a previously unknown APT group.
Junior Cybersecurity Analyst
06/2018 - 05/2020
Security Solutions Corp
San Francisco, CA
•
Assisted in the development of a next-gen firewall solution, which was adopted by 75% of internal network devices.
•
Analyzed and documented 40 security incidents, contributing to the development of more robust network policies.
Education
Bachelor of Science in Computer Science
09/2013 - 05/2017
University of California, San Diego
San Diego, CA
Projects
Cyber Threat Detection Tool (CTDT)
Developed an open-source tool for detecting and analyzing cyber threats using machine learning algorithms to predict potential vulnerabilities before they are exploited.
github.com/ethanhawkins/cyber-threat-detection-tool
Forensic Analysis Sandbox (FAS)
Created an isolated environment for conducting forensic analysis on suspicious network traffic and malware, ensuring safe investigation without compromising the integrity of production systems.
Create a professional, optimized resume in minutes. No design skills needed—just proven results.
Loading template...
Loading template...
This Cybersecurity Analyst resume format works exceptionally well for applicant tracking systems (ATS) because it is optimized with relevant keywords such as 'APT analysis', 'threat intelligence', and 'enterprise security'. The inclusion of a summary highlighting key areas like experience in advanced persistent threat mitigation ensures that the document will rank highly when recruiters search for specific skills. Additionally, by structuring the resume to include sections for certifications, technical skills, and previous roles, it becomes easier for ATS software to parse critical information, leading to higher chances of visibility among hiring managers.
Want to know how your Senior Cyber Threat Intelligence Analyst resume performs? Use our free ATS Resume Score tool to get instant feedback on your resume's ATS compatibility for Senior Cyber Threat Intelligence Analyst positions. Upload your resume below and receive detailed analysis with actionable recommendations to improve your chances of landing interviews.
Instant ATS-friendly analysis with recruiter-ready suggestions to land 2x more interviews. No signup required for basic score.
Import your profile to unlock automated fixes, personalized career tips, and smart job matching.
or click to browse files
Supports PDF and DOCX • Max 20MB
Expert guidelines and best practices for each section of your resume.
First Name Last Name City, State, Zip Code Phone Number | Email Address LinkedIn Profile URL | Portfolio URL (Optional)
Your contact information is the first section recruiters see. Keep it concise and professional. Ensure your email address is appropriate (e.g., [email protected]). Include your LinkedIn profile for a comprehensive view of your professional journey. A portfolio or personal website is recommended for creative, technical, or design roles.
Do not include your full physical address (street number/name) for privacy reasons. Avoid including personal details like marital status, age, photo, or social security number unless specifically required in your country. Do not use unprofessional email addresses.
See clear examples of how to format contact details effectively.
John Doe 1234 Random St, Apt 56 New York, NY 10001 [email protected] github.com/aliciacode Single, 28 years old
John Doe New York, NY (555) 123-4567 | [email protected] linkedin.com/in/johndoe | johndoe.com
Jane Smith P.O. Box 9876 Los Angeles, CA 90001 [email protected] twitter.com/janesmith
Jane Smith Los Angeles, CA (555) 456-7890 | [email protected] linkedin.com/in/janethesmith
Professional Title Result-oriented [Role Name] with [Number] years of experience in [Key Skills/Industries]. Proven track record of [Major Achievement]. Skilled in [Key Technologies/Skills]. Committed to delivering [Specific Value] for [Target Industry/Company type].
A professional summary is your elevator pitch. It should be 3-5 sentences long, summarizing your experience, key skills, and major achievements. Tailor it to the job description by using relevant keywords. Focus on what makes you unique and the value you bring to potential employers.
Avoid generic objectives like 'Looking for a challenging role to grow my skills.' Recruiters want to know what value you bring to them, not what you want from them. Don't use first-person pronouns (I, me, my). Keep it concise and impactful.
Compare a weak objective with a strong professional summary.
Objective: I am a hard-working individual looking for a Cybersecurity Analyst position where I can learn new things and advance my career.
Senior Cybersecurity Analyst with 6+ years of experience in threat intelligence analysis. Reduced response time to security incidents by 40% through innovative use of SIEM tools. Expert in deploying advanced forensic techniques to identify APTs.
Effective use of action verbs and quantifiable achievements.
Objective: Seeking a Cybersecurity Analyst role where I can apply my knowledge in network security and threat detection.
Seasoned Cybersecurity Analyst with 7 years of experience specializing in APT analysis. Successfully mitigated breaches affecting over 50,000 users by implementing real-time threat intelligence solutions.
Highlighting industry-specific achievements and skills.
Objective: To obtain a Cybersecurity Analyst position where I can utilize my passion for cybersecurity.
Cyber Threat Intelligence Specialist with 6 years of experience. Developed threat models that prevented over $10 million in potential losses by identifying and mitigating APTs.
Focusing on the unique value proposition.
Objective: To leverage my skills as a Cybersecurity Analyst in an environment that fosters growth and innovation.
Dedicated Cybersecurity Analyst with 7+ years of hands-on experience in forensic analysis. Played a key role in the recovery from a major ransomware attack, reducing downtime by 50% through rapid response planning.
Including technical skills and certifications.
Objective: To secure a Cybersecurity Analyst position where I can contribute to the company’s security posture.
Cybersecurity professional with 6 years of experience in identifying and mitigating APTs. CISSP certified with expertise in SIEM platforms (Splunk, QRadar) and EDR tools (CrowdStrike).
Technical Skills - Languages: [List] - Frameworks: [List] - Tools: [List] Soft Skills - [Skill 1], [Skill 2], [Skill 3]
Group your skills logically (e.g., Languages, Frameworks, Tools). Focus on hard skills relevant to the job. List skills in order of proficiency or relevance. Soft skills are better demonstrated through bullet points in your experience section rather than a bare list.
Do not list skills you are not comfortable using in an interview. Avoid using progress bars or percentages to rate your skills (e.g., "Java: 80%"). Do not include outdated technologies unless specifically required.
Practical example showing do's and don'ts for skills
C++, Python, SQL, PowerShell - Intermediate Proficiency (75%)
C++, Python, SQL, PowerShell
Cisco ASA Firewalls, Check Point NGFW, Fortinet - 2 years of experience
Cisco ASA Firewalls, Check Point NGFW, Fortinet
Job Title | Company Name | Location Month Year – Month Year - Action Verb + Context + Result (Quantified) - Led [Project] resulting in [Outcome]... - Collaborated with [Team] to implement [Feature]...
This is the core of your resume. Use reverse-chronological order (most recent first). Start each bullet with a strong action verb. Focus on achievements and impact, not just duties. Use numbers to quantify your impact (dollars, percentages, time saved, users affected). Show progression and increasing responsibility.
Avoid passive language like "Responsible for..." or "Tasked with...." Don't list every single daily task; focus on significant contributions and measurable outcomes. Avoid jargon that recruiters outside your field won't understand.
Practical example showing do's and don'ts for experiences
Monitored network traffic using SIEM tools to detect threats.
Identified and mitigated 15 advanced persistent threats (APT) in a year through real-time monitoring with Splunk.
Assisted in developing security policies for the company's IT infrastructure.
Led the development of comprehensive security policies, reducing compliance violations by 20% within six months.
Degree Name | University Name | Location Month Year – Month Year - Relevant Coursework: [Course 1], [Course 2] - Honors/Awards: [Award Name] - GPA: X.X (if above 3.5)
List your highest degree first. If you have significant work experience, keep the education section brief. Include your GPA only if it is above 3.5 or if you are a recent graduate. Highlight relevant coursework, academic projects, honors, or leadership roles.
Do not include high school details if you have a college degree. Avoid listing every single course you took; select only the most relevant ones. Don't include graduation dates from decades ago if age discrimination is a concern in your field.
Practical example showing do's and don'ts for educations
Bachelor of Science | University of San Jose | San Jose, CA September 2013 – May 2017 - Courses: Introduction to Programming, Web Design, Basic Statistics, Linear Algebra
Bachelor of Science in Computer Science | University of California, San Diego | San Diego, CA September 2013 – May 2017 - Relevant Coursework: Cybersecurity Fundamentals, Network Security, Cryptography
Project Name | Tools/Technologies Used - Briefly describe what you created and its purpose - Highlight specific challenges you solved - Link to portfolio or demo if available
Projects are excellent for demonstrating practical skills, especially if you lack work experience or are changing careers. Include a link to your portfolio or demo if possible. Focus on projects that show problem-solving skills and relevant tools for the target role.
Don't include trivial tutorials unless you significantly expanded on them. Avoid projects that are outdated, incomplete, or irrelevant to the role you're applying for. Don't just list technologies—explain what you created and why it matters.
Practical example showing do's and don'ts for projects
Created a simple network scanner using Python. It can detect live hosts on a given IP range.
Developed an automated threat detection system utilizing Python, Splunk, and machine learning to monitor enterprise networks for signs of APT activity. The tool reduces false positives by 20% through advanced analytics.
Common questions about this role and how to best present it on your resume.
Key skills include knowledge of threat modeling, network security, cryptography, and incident response.
Highlight transferable skills such as problem-solving, analytical thinking, and quick learning relevant to cybersecurity.
A bachelor’s degree in computer science or related field is typically preferred along with certifications like CISSP or CEH.
Participate in security workshops, internships, and online courses to build a foundational understanding of cybersecurity practices.
Create a professional, optimized resume in minutes. No design skills needed—just proven results.
The average job seeker spends 3+ hours formatting a resume. Our AI does it in under 15 minutes, getting you to the application phase 12x faster.