Senior Threat Intelligence Analyst
Ethan Harrison
[email protected] • +1 (555) 987-6543 • linkedin.com/in/ethan-harrison • eh-threatintelligenceportfolio.com • San Francisco, CA
Professional Summary
SOC Analyst with over 5 years of experience in threat intelligence and incident response. Successfully mitigated a major ransomware attack by identifying and blocking malicious traffic patterns, reducing potential damage costs significantly. Proficient in SIEM tools like Splunk and QRadar.
Skills
SIEM Tools (Splunk, QRadar), EDR Solutions (CrowdStrike Falcon), IDS/IPS Systems, Scripting with Python and PowerShell, APT Detection and Mitigation, Incident Response, Threat Hunting, Security Frameworks (CIS Controls, NIST)
Work Experience
Senior SOC Analyst
01/2022
Tech Company Inc, San Francisco, CA
•
Developed and deployed threat hunting scripts that identified 50+ suspicious activities per week, leading to the prevention of 3 major security breaches.
•
Optimized incident response procedures, reducing average resolution time for alerts from 4 hours to 30 minutes.
•
Collaborated with IT and DevOps teams to integrate security measures into development workflows, enhancing overall system resilience against cyber threats.
•
Conducted regular cybersecurity training sessions for 20+ employees, increasing the company's overall awareness of phishing attacks.
SOC Analyst
06/2020 - 12/2021
Security Firm Ltd, San Francisco, CA
•
Created and maintained threat intelligence reports that helped identify and mitigate 10+ vulnerabilities, securing critical systems.
•
Analyzed network traffic patterns to detect and respond to 30+ APTs, preventing potential data exfiltration.
Security Analyst
06/2018 - 05/2020
Cyber Defense Corp, San Francisco, CA
•
Developed and implemented a threat detection playbook that reduced incident response time by 50%, improving overall system security.
•
Analyzed and responded to 50+ security incidents, ensuring continuous protection against malicious activities.
Education
Bachelor's Degree in Information Security
09/2018 - 05/2023
University of California, Berkeley, Berkeley, CA
Relevant coursework: Cybersecurity Fundamentals, Network Security, Threat Intelligence. GPA: 3.9
Projects
ThreatHunterScript
Developed a Python script to automate the detection of APTs within network logs, enhancing threat hunting capabilities for personal research and community sharing.
CyberSecBlog
Maintained a cybersecurity blog where I share insights on emerging threats, APT trends, and defense strategies to help fellow professionals stay informed.
Certifications
GICSP (GIAC Information Security Certification Professional)
06/2025
SANS Institute
Certification in information security focusing on secure software development, system hardening, and operational best practices.
CISSP (Certified Information Systems Security Professional)
10/2024
ISACA
Recognized globally for validating knowledge and experience in the design, engineering, and management of secure business environments.
In minutes, create a tailored, ATS-friendly resume proven to land 6X more interviews.
Loading template...
Loading template...
This resume format is tailored specifically for SOC Analysts who need to demonstrate their technical expertise and professional achievements in the field of cybersecurity. By using clear section headers like 'Professional Summary', 'Technical Skills', and 'Experience', it aligns well with what ATS (Applicant Tracking Systems) are programmed to look for, ensuring that key qualifications and accomplishments are easily scannable by both human eyes and automated systems. Additionally, including industry-specific keywords such as 'threat intelligence' and 'incident response' enhances the resume's visibility in search results on job boards and company websites.
Want to know how your Senior Threat Intelligence Analyst resume performs? Use our free ATS Resume Score tool to get instant feedback on your resume's ATS compatibility for Senior Threat Intelligence Analyst positions. Upload your resume below and receive detailed analysis with actionable recommendations to improve your chances of landing interviews.
Instant ATS-friendly analysis with recruiter-ready suggestions to land 2x more interviews. No signup required for basic score.
Import your profile to unlock automated fixes, personalized career tips, and smart job matching.
or click to browse files
Supports PDF and DOCX • Max 20MB
Expert guidelines and best practices for each section of your resume.
First Name Last Name City, State, Zip Code Phone Number | Email Address LinkedIn Profile URL | Portfolio URL (Optional)
Your contact information is the first section recruiters see. Keep it concise and professional. Ensure your email address is appropriate (e.g., [email protected]). Include your LinkedIn profile for a comprehensive view of your professional journey. A portfolio or personal website is recommended for creative, technical, or design roles.
Do not include your full physical address (street number/name) for privacy reasons. Avoid including personal details like marital status, age, photo, or social security number unless specifically required in your country. Don't use unprofessional email addresses.
See clear examples of how to format contact details effectively.
John Doe 1234 Random St, Apt 56 New York, NY 10001 [email protected] github.com/aliciacode Single, 28 years old
John Doe New York, NY (555) 123-4567 | [email protected] linkedin.com/in/johndoe | github.com/johndoe | johndoe.dev
Professional Title Result-oriented [Role Name] with [Number] years of experience in [Key Skills/Industries]. Proven track record of [Major Achievement]. Skilled in [Key Technologies/Skills]. Committed to delivering [Specific Value] for [Target Industry/Company type].
A professional summary is your elevator pitch. It should be 3-5 sentences long, summarizing your experience, key skills, and major achievements. Tailor it to the job description by using relevant keywords. Focus on what makes you unique and the value you bring to potential employers.
Avoid generic objectives like 'Looking for a challenging role to grow my skills.' Recruiters want to know what value you bring to them, not what you want from them. Don't use first-person pronouns (I, me, my). Keep it concise and impactful.
Compare a weak objective with a strong professional summary.
Objective: I am a hard-working individual looking for a SOC Analyst position where I can learn new things and advance my career.
Senior Threat Intelligence Specialist with over 5 years of experience in advanced threat analysis and incident response. Successfully mitigated over 15 APTs, reducing mean time to detection (MTTD) by 30%. Proficient in SIEM tools like Splunk and QRadar.
Technical Skills - Languages: [List] - Frameworks: [List] - Tools: [List] Soft Skills - [Skill 1], [Skill 2], [Skill 3]
Group your skills logically (e.g., Languages, Frameworks, Tools). Focus on hard skills relevant to the job. List skills in order of proficiency or relevance. Soft skills are better demonstrated through bullet points in your experience section rather than a bare list.
Do not list skills you are not comfortable using in an interview. Avoid using progress bars or percentages to rate your skills (e.g., "Java: 80%") as they are subjective and often misinterpreted. Don't include outdated technologies unless specifically required.
Practical example showing do's and don'ts for skills
Python: 75%, Java, C++ (intermediate)
Languages: Python, Java, C++
SIEM Tools: Splunk (basic), QRadar (advanced)
Tools: Splunk, QRadar
Job Title | Company Name | Location Month Year – Month Year - Action Verb + Context + Result (Quantified) - Led [Project] resulting in [Outcome]... - Collaborated with [Team] to implement [Feature]...
This is the core of your resume. Use reverse-chronological order (most recent first). Start each bullet with a strong action verb. Focus on achievements and impact, not just duties. Use numbers to quantify your impact (dollars, percentages, time saved, users affected). Show progression and increasing responsibility.
Avoid passive language like "Responsible for..." or "Tasked with...." Don't list every single daily task; focus on significant contributions and measurable outcomes. Avoid jargon that recruiters outside your field won't understand.
Practical example showing do's and don'ts for experiences
Monitored network traffic using various tools like Splunk and QRadar.
Analyzed network traffic to detect anomalies, preventing overcyber threatsin the first six months.
Worked on incident response procedures for security incidents.
Led the development of an incident response playbook that reduced resolution time by 45% and was adopted across multiple departments.
Degree Name | University Name | Location Month Year – Month Year - Relevant Coursework: [Course 1], [Course 2] - Honors/Awards: [Award Name] - GPA: X.X (if above 3.5)
List your highest degree first. If you have significant work experience, keep the education section brief. Include your GPA only if it is above 3.5 or if you are a recent graduate. Highlight relevant coursework, academic projects, honors, or leadership roles.
Do not include high school details if you have a college degree. Avoid listing every single course you took; select only the most relevant ones. Don't include graduation dates from decades ago if age discrimination is a concern in your field.
Practical example showing do's and don'ts for educations
Bachelor of Science | XYZ University | Springfield, IL September 2018 – May 2023 - Courses: Introduction to Programming, Basic Math I, Calculus II, Art History, and more than 40 other unrelated courses - GPA: 3.7
Bachelor of Science in Information Security | University of Tech | San Francisco, CA September 2018 – May 2023 - Relevant Coursework: Cybersecurity Fundamentals, Network Security, Threat Intelligence - Honors/Awards: Outstanding Graduate Award (2023) - GPA: 3.9
Project Name | Tools/Technologies Used - Briefly describe what you created and its purpose - Highlight specific challenges you solved - Link to portfolio or demo if available
Projects are excellent for demonstrating practical skills, especially if you lack work experience or are changing careers. Include a link to your portfolio or demo if possible. Focus on projects that show problem-solving skills and relevant tools for the target role.
Don't include trivial tutorials unless you significantly expanded on them. Avoid projects that are outdated, incomplete, or irrelevant to the role you're applying for. Don't just list technologies—explain what you created and why it matters.
Practical example showing do's and don'ts for projects
Created a simple Python script that prints out 'Hello, World!' to the console. No specific challenges or tools were used.
Developed an automated threat hunting script using Python and Splunk API that identifies suspicious user activity within network logs. Resolved the challenge of reducing false positives while maintaining high detection rates for potential APTs.
Built a basic blog site to share random cybersecurity news without any technical content or analysis.
Maintained a cybersecurity blog where I publish in-depth analyses of emerging threats and defensive strategies, enhancing community awareness through practical insights and innovative ideas.
Common questions about this role and how to best present it on your resume.
Essential skills include threat intelligence, incident response, and network security.
Highlight transferable skills and demonstrate enthusiasm for the role despite seniority.
Certifications like CISSP, CEH, and GICSP are highly valued along with relevant cybersecurity education.
Include key projects, leadership roles, and increasing responsibilities over time.
In minutes, create a tailored, ATS-friendly resume proven to land 6X more interviews.
Job seekers using professional, AI-enhanced resumes land roles in an average of 5 weeks compared to the standard 10. Stop waiting and start interviewing.