Summary
Overview
Work History
Education
Skills
Websites
Accomplishments
Certification
Software
Interests
Timeline
Generic

Logan Jones

Nashville,tn

Summary

Dynamic Cybersecurity Analyst with hands-on experience at a leading tech firm, specializing in risk assessment and incident response. Proven track record in enhancing network security through vulnerability assessments and automated threat detection. Strong analytical thinking and attention to detail have driven significant improvements in compliance and incident resolution processes.

Energetic and analytical with passion for cybersecurity and keen eye for identifying potential threats. Possesses solid understanding of network security protocols and vulnerability assessments, complemented by skills in risk management and incident response. Dedicated to protecting organizational assets and ensuring data integrity.

Offering strong foundation in cybersecurity principles and commitment to continuous learning and growth. Brings ability to quickly adapt to new technologies and methodologies, with focus on network protection and threat analysis. Ready to use and develop skills in security monitoring and incident response in analysist role.

Developed critical cybersecurity skills in fast-paced, high-stakes environment, focusing on threat detection and risk mitigation. Transitioning into new field to leverage expertise in analyzing security vulnerabilities and implementing safeguards. Committed to applying analytical and problem-solving abilities to protect and enhance organizational information security.

Overview

1
1
Certification

Work History

Cybersecurity Analyst

Undecided

I am currently in school for cybersecurity as an analyst specialist.

ethically analyze data using nist and rmf frameworks.

  • Collaborated with IT teams to integrate security measures into the development and deployment of new applications.
  • Analyzed security incidents post-resolution, identifying areas for improvement in both technical controls and incident response processes.
  • Conducted security audits to identify vulnerabilities.
  • Reduced risk of cyber attacks by conducting regular vulnerability assessments and penetration testing.
  • Improved incident response times by developing and maintaining cybersecurity playbooks for common attack scenarios.
  • Performed regular reviews of user access rights, minimizing the risk posed by insider threats or compromised accounts.
  • Performed risk analyses to identify appropriate security countermeasures.
  • Optimized security monitoring processes by implementing automated tools for real-time threat detection and analysis.
  • Ensured compliance with industry regulations by performing comprehensive audits on existing security policies and procedures.
  • Enhanced network security by implementing advanced threat detection and prevention systems.
  • Guided IT teams in secure configuration of hardware and software, minimizing vulnerabilities and compliance issues.
  • Spearheaded adoption of encryption technologies, safeguarding sensitive information during transmission and storage.

Education

GED -

Google Course Era
Remote
07-2025

Skills

  • Risk assessment
  • Incident response
  • Digital forensics
  • Network security
  • Attention to detail
  • Phishing detection
  • Vulnerability assessment
  • Threat intelligence
  • SIEM management
  • Incident response management
  • Identity management
  • Log analysis
  • Security operations center
  • Penetration testing
  • Compliance monitoring
  • Data encryption
  • Application security
  • DDoS prevention
  • Analytical thinking
  • Cryptanalysis
  • Web application security
  • Patch management
  • User awareness training
  • System hardening
  • Intrusion detection
  • Mobile security
  • DDoS mitigation
  • Two-factor authentication
  • Social engineering prevention
  • Disaster recovery
  • Virtualization security
  • Biometric security

Accomplishments

  • Used Microsoft Excel to develop inventory tracking spreadsheets.
  • Achieved [Result] through effectively helping with [Task].
  • Documented and resolved [Issue] which led to [Results].
  • Achieved [Result] by introducing [Software] for [Type] tasks.
  • Resolved product issue through consumer testing.
  • Achieved [Result] by completing [Task] with accuracy and efficiency.
  • Collaborated with team of [Number] in the development of [Project name].

Certification

cyber security analyst specialist Training - march 2025 - july 2025

Software

Nist rmf framwork seim tools sprunk python usage

Interests

  • Outdoor Recreation
  • I participate in low-impact exercises to strengthen core muscles
  • I like working with my hands and fixing things
  • Watching Movies and TV Shows
  • Horseback Riding
  • Gym Workouts

Timeline

Cybersecurity Analyst

Undecided

GED -

Google Course Era
Logan Jones