Cybersecurity Analyst
MetTel
About the role
Below is a ready‑to‑use cover‑letter and a sample résumé that you can copy‑paste, edit with your personal details, and submit with your MetTel application.
Both documents are written to hit the exact keywords, responsibilities, and qualifications listed in the posting, while also showcasing measurable achievements that will make you stand out to the hiring team.
📄 Cover Letter – Cybersecurity Analyst (MetTel)
[Your Name]
[Street Address] • [City, State ZIP] • [Phone] • [Email] • [LinkedIn URL]
April 5 2026
Hiring Manager – Security & Compliance Team
MetTel
[Company Address – if known]
Dear Hiring Manager,
I am excited to submit my application for the **Cybersecurity Analyst** position on MetTel’s Security and Compliance Team. With 4 years of hands‑on experience leading vulnerability‑management programs for Fortune‑500 enterprises, a proven track record of delivering > 95 % remediation SLA compliance, and deep expertise in Tenable.io, Splunk, and ServiceNow, I am confident I can help MetTel further strengthen its security posture and accelerate the delivery of secure, managed communications solutions to your global customers.
### Why I’m a strong fit
| MetTel Requirement | My Experience & Impact |
|--------------------|------------------------|
| **Configure & maintain Tenable scans** (credentialed, policy creation, asset tagging) | Designed and automated Tenable.io scan policies for a 12,000‑asset environment, reducing false‑positive rates by 38 % and increasing scan coverage from 78 % to 99 % within three months. |
| **Interpret CIS benchmark results & drive remediation** | Led a CIS‑benchmark hardening project for Windows Server 2019 and Ubuntu 20.04, achieving a 96 % compliance score on the first audit and cutting remediation time by 22 % through scripted remediation playbooks. |
| **Develop Splunk SPL detections, alerts & dashboards** | Built 15+ SPL queries and real‑time dashboards that surface high‑severity CVE exploits and credential‑dumping activity, decreasing mean‑time‑to‑detect (MTTD) from 48 h to under 6 h. |
| **Ticketing & cross‑functional coordination (ServiceNow)** | Managed the end‑to‑end remediation workflow in ServiceNow, integrating Tenable findings via API; consistently met or exceeded the 72‑hour critical‑vuln SLA for three consecutive quarters. |
| **Reporting to leadership & auditors** | Produced executive‑level monthly risk‑posture reports and quarterly compliance decks presented to C‑suite and external auditors, translating technical findings into clear business impact and ROI. |
| **Certifications & education** | B.S. in Computer Science (Cybersecurity concentration); CompTIA Security+; Certified Ethical Hacker (CEH). |
Beyond the technical skills, I bring a **risk‑based mindset**: I prioritize remediation based on CVSS scores, asset criticality, and business impact, ensuring that limited resources are focused where they matter most. I also champion continuous improvement—regularly reviewing scan policies, refining SPL detections, and updating hardening standards to stay ahead of emerging threats.
MetTel’s mission to simplify secure communications for both commercial and government clients resonates with my own passion for building resilient, compliant infrastructures that enable organizations to focus on their core objectives. I would welcome the opportunity to discuss how my background, analytical rigor, and collaborative style can contribute to MetTel’s continued leadership in the telecommunications space.
Thank you for considering my application. I look forward to the possibility of speaking with you soon.
Sincerely,
**[Your Name]**
📄 Sample Résumé – Cybersecurity Analyst
[Your Name]
[Phone] • [Email] • [LinkedIn] • [City, State]
PROFESSIONAL SUMMARY
Results‑driven Cybersecurity Analyst with 4 + years of experience designing, executing, and managing vulnerability‑management programs for large, multi‑cloud environments. Expert in Tenable.io/Nessus, Splunk (SPL), CIS benchmark hardening, and ServiceNow ticketing workflows. Proven ability to translate complex security data into actionable remediation plans, achieve > 95 % SLA compliance, and communicate risk to technical and executive audiences.
CORE COMPETENCIES
- Tenable.io & Nessus scan policy design
- CIS Benchmark & hardening standards
- Splunk SPL development, alerts & dashboards
- CVE/CVSS analysis, risk‑based prioritization
- ServiceNow integration & workflow automation
- Asset inventory & dynamic tagging
- Cross‑functional remediation coordination
- Executive‑level reporting & audit preparation
- Incident response fundamentals
PROFESSIONAL EXPERIENCE
Cybersecurity Analyst – Vulnerability Management
ABC Global Solutions, New York, NY — Jan 2022 – Present
- Managed Tenable.io for a 12,000‑asset footprint (on‑prem, AWS, Azure); created 20+ credentialed scan policies and dynamic asset groups, raising scan coverage to 99 %.
- Reduced false positives by 38 % through custom policy tuning and credential management.
- Led CIS‑benchmark hardening for Windows Server 2019, Red Hat Enterprise Linux, and Ubuntu; achieved 96 % compliance on first audit.
- Built Splunk SPL detections for CVE exploitation, credential dumping, and lateral movement; deployed 15 real‑time alerts and executive dashboards, cutting MTTD from 48 h to < 6 h.
- Integrated Tenable findings with ServiceNow via REST API, automating ticket creation and status updates; maintained > 95 % SLA adherence for critical remediation (72‑hour window).
- Produced monthly risk‑posture reports and quarterly compliance decks for C‑suite and external auditors, translating technical findings into business impact and ROI.
- Conducted exception & risk‑acceptance processes for 12+ findings, documenting justification and mitigation controls.
Information Security Engineer – Vulnerability & Patch Management
XYZ Telecommunications, Chicago, IL — Jun 2019 – Dec 2021
- Executed Nessus Professional scans across 8,000+ endpoints; identified and remediated 1,200+ high‑severity vulnerabilities, decreasing overall CVSS‑weighted risk score by 45 % in 12 months.
- Developed PowerShell & Bash remediation scripts for rapid patch deployment, reducing average remediation time from 5 days to 2 days.
- Collaborated with network, cloud, and application teams to validate remediation, achieving 100 % verification on critical assets.
- Authored hardening guides based on CIS Benchmarks; trained 30+ system administrators on secure configuration practices.
EDUCATION
B.S. Computer Science – Cybersecurity Concentration
University of Illinois at Urbana‑Champaign, IL — May 2019
CERTIFICATIONS
- CompTIA Security+ (2020)
- Certified Ethical Hacker (CEH) – EC‑Council (2021)
- (In progress) CISSP – Expected Q4 2026
TECHNICAL TOOLSET
| Category | Tools / Platforms |
|---|---|
| Vulnerability Management | Tenable.io, Nessus Professional, Qualys, Rapid7 |
| SIEM / Log Analytics | Splunk (SPL), Elastic Stack |
| Ticketing / ITSM | ServiceNow, JIRA Service Management |
| Operating Systems | Windows Server 2016/2019, Linux (RHEL, Ubuntu, CentOS) |
| Cloud | AWS (EC2, S3, IAM), Azure (VM, AD), GCP |
| Scripting | PowerShell, Bash, Python |
| Compliance Frameworks | CIS Benchmarks, NIST SP 800‑53, ISO 27001, PCI‑DSS |
| Other Security Tools | CrowdStrike Falcon, Microsoft Defender ATP, Wireshark, Nmap |
PROFESSIONAL AFFILIATIONS
- Member, Information Systems Security Association (ISSA)
- Volunteer, CyberPatriot mentor program (2022‑present)
How to Use These Documents
- Replace placeholders (
[Your Name],[Phone], etc.) with your personal information. - Quantify your own achievements – if your numbers differ, adjust the percentages and counts accordingly.
- Tailor the “Core Competencies” section to match any additional skills you have that are mentioned in the job posting (e.g., EDR experience).
- Save the résumé as PDF (use a clean, ATS‑friendly template) and attach it with the cover letter when you apply through MetTel’s career portal or via the recruiter.
Quick Checklist Before Submitting
- ☐ All keywords from the posting appear (Tenable.io, Splunk, CIS, ServiceNow, CVE, CVSS, OWASP, etc.).
- ☐ Metrics (percentages, counts, time reductions) are included to demonstrate impact.
- ☐ The cover letter is addressed to “Hiring Manager – Security & Compliance Team” (or the specific recruiter’s name if you have it).
- ☐ Your citizenship status is clear (U.S. citizen) and you are prepared to provide a GSA Fitness Review if requested.
- ☐ Attach any relevant certifications (Security+, CEH) as PDFs or screenshots.
Feel free to let me know if you’d like:
- A more concise one‑page résumé version,
- An interview‑preparation cheat sheet focused on Tenable, Splunk, and CIS benchmarks, or
- Any other customization (e.g., adding a “Projects” section for open‑source contributions).
Good luck with your application – MetTel would be fortunate to have a professional with your skill set on their team!
Requirements
- Configure and manage vulnerability and compliance scans in Tenable, including scan policies, asset tagging, and credential management
- Collaborate with technical teams to remediate findings, implement hardening standards aligned with CIS benchmarks, and manage risk exceptions
- Develop and deliver vulnerability and compliance reports, dashboards, and executive summaries that communicate risk posture, remediation progress, and SLA adherence to stakeholders
- SIEM experience with Splunk
- Experience using ticketing systems such as ServiceNow
Responsibilities
- Configure and maintain scheduled and ad-hoc vulnerability scans using Tenable.io and Nessus Professional, ensuring comprehensive coverage across all network segments, endpoints, and cloud assets
- Create and manage scan policies tailored to organizational requirements, including credentialed and non-credentialed scan configurations
- Develop and maintain asset tagging strategies using dynamic and static asset groups to support targeted scanning and reporting
- Monitor scan health and troubleshoot scan failures and credential issues
- Interpret CIS benchmark audit results and translate compliance findings into actionable remediation guidance for system administrators and engineering teams
- Track and validate remediation efforts to confirm that hardening actions achieve the desired compliance posture
- Assist in developing and maintaining organizational hardening standards and gold image configurations based on CIS benchmarks
- Generate and distribute recurring vulnerability and compliance reports
- Create team-specific remediation reports that clearly identify asset owners, severity levels, aging metrics, and required actions
- Track and report on SLA adherence for vulnerability remediation timelines based on criticality ratings
- Analyze vulnerability and compliance data to identify systemic issues, recurring misconfigurations, and areas requiring additional attention
- Present findings and risk trends to leadership, auditors, and cross-functional stakeholders in both technical and non-technical formats
- Maintain documentation of scanning processes, reporting schedules, and escalation procedures
- Facilitate exception and risk acceptance processes for findings that cannot be remediated due to operational constraints
- Create and test detections written in advanced Splunk Programming Language (SPL)
- Develop rules, alerts and dashboards based on business and security requirements in Splunk
- Correlate event or incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation
Skills
Don't send a generic resume
Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.
Get started free