Manager, Cyber Security Resume Samples

4.7 (91 votes) for Manager, Cyber Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the manager, cyber security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
AO
A Orn
Arvilla
Orn
5543 Dixie Bridge
Chicago
IL
+1 (555) 909 9488
5543 Dixie Bridge
Chicago
IL
Phone
p +1 (555) 909 9488
Experience Experience
Detroit, MI
Manager, Cyber Security
Detroit, MI
Crist, Rice and Lowe
Detroit, MI
Manager, Cyber Security
  • Creates and implements operations improvements to meet established objectives
  • Contributing to developing the market for Cyber Security services across all sectors and identify sales opportunities and escalating these to senior management
  • Development of process, policies and procedures congruent with incident response and incident management
  • Perform an ongoing assessment of the activities that could be better provided by the market place as capabilities and technologies evolve
  • Manage all Security Event Center (EVC) Operations tasks. Develop and maintain the EVC functions consisting of 24X7 shifts of security operation analysts
  • Manage incident response activities globally and provide expert advice, tracking and reporting to local responders, local IT, and security staff
  • Define, publish, and execute the overall IT security strategy with buy-in from operational and business stakeholders
Los Angeles, CA
Manager, Cyber Security Services
Los Angeles, CA
Franecki-Greenfelder
Los Angeles, CA
Manager, Cyber Security Services
  • Oversee Information Security projects involving strategy, implementation, technical delivery, software/hardware optimization related to IT operations, business processes, business resiliency, security, and data integrity
  • Manage planning, designing, implementing, testing and operating of cyber security processes and systems
  • Review security profiles to assess how application security is being used as a part of the overall business process control environment
  • Coordinate business process design as it relates to managing identities and access privileges such as architecture, delegated administration models, workflow models, and access control models
  • Administer security configuration and testing of networking and operating systems, such as TCP/IP, WAN/LAN routing, VLAN architecture, and a wide array of large-scale environments, including various major web application servers
  • Present firm-based approaches and messaging at internal training classes, external events, and client meetings
  • Travel may be up to 80-100%
present
New York, NY
Senior Manager, Cyber Security
New York, NY
Boyle, Pouros and Wiza
present
New York, NY
Senior Manager, Cyber Security
present
  • Oversee day to day cyber security operations as provided by strategic partner
  • Manage the relationship, drive process and procedures, SLA’s for successful program execution
  • Develop escalation process for serious events and actual/suspected incidents
  • Promote the reporting of security events and issues through the partner (help desk)
  • Respond to and manage any major operational issues, events or incidents
  • Implement proactive and preventative security monitoring solutions and projects
  • 1-2 direct reports
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of South Florida
Bachelor’s Degree in Computer Science
Skills Skills
  • Ability to work independently and possess strong project management skills
  • Vulnerability assessment tools (Qualys, ISS Scanner, Nmap, Nessus, Nexpose etc.)
  • Knowledge of programming and scripting for development of security tools and industry frameworks
  • Knowledge of BYOD and Mobile Device Management platforms
  • Be capable of learning specific security features and operations for multiple operating systems
  • LAN/WAN routing and high availability (OSPF, BGP4/iBGP, EIGRP and NSRP)
  • Knowledge of computer forensics tools and investigative methodologies
  • Knowledge in UNIX, Linux, Solaris, IRIX, SUSE, and MAC operating systems
  • Technical experience and comprehensive knowledge of threat actor capabilities, intentions, methodologies and motives
  • Professional Security Management, Network and/or Security Certifications a plus (e.g., CISSP, CISM, CISA, GCIH, etc.)
Create a Resume in Minutes

15 Manager, Cyber Security resume templates

1

IS Business Operations Core Manager Cyber Security Operations Resume Examples & Samples

  • GBO Core Business Services provides business unit level services for SecOps in the areas of: Financial/P&L Management; Capital Investment & Budget Planning; Procurement/Vendor Management; Risk Management, Controls, Regulatory Compliance, & Business Continuity Management; Workforce/Resource Management; Technology Process Management; Infrastructure & Software Asset Management; Program/Project Operational Portfolio Management; Marketing & Communications; Metrics & Reporting (MIS); Tools & Automation efforts; Continuous Improvement/Strategic Initiatives; and General Administration, Coordination & Chief of Staff support to the Global Head of Cyber Security Operations
  • Relationship Management: Act as central point of contact for the Cyber Security Operations organization in support of the offered shared services. Coordinate tactical and strategic requests driven as requested on behalf of the SecOps Senior Leadership
  • Financial Management: P&L Responsibility for a ~$120mm budget consisting of people, infrastructure and services. Work with CFO to manage run rate on a day-to-day basis. Act as gatekeeper and manage interactions across multiple regions and business functions. Manage the intercompany recovery and allocations process to remain EBIT neutral and achieve financial transparency
  • Capital Investment & Budget Planning: Lead the yearly investment planning and execution (historically ~$200mm CAPEX) for net new investments in cutting edge security capabilities
  • Vendor Management: Relationship management of 70+ vendors, including contract negotiations, procurement, and renewals
  • Workforce/Resource Management: Oversee the workforce management process end-to-end, including management of requests for new positions, joiners/leavers, interaction with HR, location strategy, financial run rate reconciliation, and management reporting, for full time direct staff, contractors, and statement of works (temp staff and augmentations)
  • Asset Management: Develop tools and processes to manage all Security infrastructure and software assets effectively across 70+ product components and data center supporting infrastructure
  • Program/Project Management: Design and drive large, complex projects to meet client, IS, and regulatory requirements
  • Process Management: Responsible for the engineering/re-engineering and oversight of common operational processes and documentation while continuously driving service maturity
  • Risk, Controls, Compliance, and Business Continuity: Management of internal audit, external auditors and regulatory examiners as liaison on behalf of the SecOps as well as responsible for oversight of the internal control environment, including issue management and reporting
  • Monitoring, Metrics, and Reporting: Creation and analysis of executive/MIS reporting and Key Performance Indicators (KPI) on operational performance, productivity and IS capabilities
  • Automation, Administration, and Communications: Centralize automation efforts for the organization. Manage communications program, marketing channels, and administrative responsibilities across the organization
  • 10+ years in a relevant management role. Experience in a Business Analysis, Business Operations, Business Management, Business Office, Client Management and/or Project Management role is required. In depth knowledge/experience in Finance, Contract/Price negotiations, MIS/Metrics and Reporting, Business Analytics are required. ITIL Service Management and Information (IS) and Cyber Security are a plus. Finance/MIS Degree or related degree is required and MBA is a plus
2

Am-program Manager, Cyber Security, VP Resume Examples & Samples

  • Leads technical programs and projects from initiation through implementation including phases such as planning, analysis, design development and implementation
  • Drive corporate initiatives focused on the remediation of security gaps and enhancing data protection controls
  • A project is defined as a unique endeavor with a defined end result that requires project management skills to deliver successfully
  • Program Managers will oversee and report on a portfolio of projects while often simultaneously managing some projects within their portfolio
  • Establishes project/program requirements, priorities, and deadlines
  • Ensures project/program is completed in accordance with all Risk, Architecture and other relevant firm-wide guidelines
  • Coordinates resources (staff, equipment, vendors and consultants) across one or more projects/programs
  • Responsible for coaching and mentoring less experienced team members
  • Manages budget for assigned project(s), monitors project progress and adjusts resources and priorities accordingly
  • Organizational Savvy & Know-how
  • Ability to think big picture; view issues and situations with a broad perspective
  • Advanced knowledge of Project Management and Business Analysis
  • Advanced knowledge of Project Management and Business Analysis tools including Presentation, Word Processing, Spreadsheet & Planning Tools (exp. MS Word, PowerPoint, Excel, MS Project & Visio)
  • Ability to work under pressure and within tight deadlines
  • Executive Level Communication (written and verbal)
  • Experience working on risk or control projects
  • Advanced PMO Certification; a Plus
  • Advanced Level Education within the Technology, Business &/or Management disciplines
3

O&t-is Business Operations Asia Pacific Core Manager Cyber Security Operations Resume Examples & Samples

  • Relationship Management - act as central point of contact for the Cyber Security Operations organization in support of the offered shared services specifically for the Asia Pacific region; coordinate tactical and strategic requests driven as requested on behalf of the SecOps Senior Leadership team
  • FInancial Management - P&L responsibility for the Asia Pacific portion of the Cyber Security Operations budget (~$120mm globally) consisting of people, infrastructure and services; work with CFO to manage run rate on a day-to-day basis; act as gatekeeper and manage interactions across multiple regions and business functions; manage the intercompany recovery and allocations process to remain EBIT neutral and achieve financial transparency
  • Capital Investment and Budget Planning - lead the yearly investment planning and execution (historically ~$200mm CAPEX) for net new investments in cutting edge security capabilities and represent plan with regional senior management
  • Vendor Management - relationship management of Asia Pacific vendors/suppliers including contract negotiations, procurement and renewals
  • Workforce/Resource Management - oversee the workforce management end-to-end process including management of requests for new positions, joiners/leavers, interaction with HR, location strategy, financial run rate reconciliation and management reporting for full-time direct staff, contractors and statement of works (temp staff and augmentations)
  • Asset Management - develop tools and processes to manage all security infrastructure and software assets effectively across 70+ product components and data center supporting infrastructure
  • Program/Project Management - design and drive large, complex projects to meet client, IS and regulatory requirements
  • Process Management - responsible for the engineering/reengineering and oversight of common operational processes and documentation while continuously driving service maturity
  • Risk, Controls, Compliance and Business Continuity - management of internal audit, external auditors and regulatory examiners as liaison on behalf of the SecOps as well as responsible for oversight of the internal environment including issue management and reporting
  • Monitoring, Metrics and Reporting - creation and analysis of executive/MIS reporting and Key Performance Indicators (KPI) on operational performance, productivity and IS capabilities
  • Automation, Adminstration and Communications - centralize automation efforts for the organization; manage communications programs, marketing channels and administrative responsbilities across the organization
  • Provide management support to the Cyber Securtiy Operations Asia Pacific Senior Leader and Management team
  • 10+ years in a relevant management role
  • Experience in a business analysis, business operations, business management, business office, client management and/or project management role is required
  • In-depth knowledge/experience in Finance, Contract/Price Negotiations, MIS/Metric and Reporting, Business Analytics are required; ITIL Service Management and Information (IS) and Cyber Security are a plus
  • Finance/MIS degree or related degree is required; MBA is a plus
4

Senior Manager, Cyber Security Resume Examples & Samples

  • Maintain, develop and implement a Computer Security Incident Response Team (CSIRT) program and response plan for the company
  • Assemble and coordinate all activity related to an incident including containment, remediation, and root cause analysis
  • Communicate with all stakeholders, partners and executives as necessary
  • Work with legal partners on Privacy and Regulatory incidents as needed
  • Previous security, privacy, investigations and/or operations experience
  • General knowledge of networking and security concepts, various tools and solutions including firewalls, IDS, endpoint protection and other solutions
  • Ability to track, trace and analyze raw logs from various sources, data correlation and other intelligence
  • Ability to adapt quickly and work on multiple tasks simultaneously
  • Demonstrated analytical, problem solving and project management skills
  • High work ethic, excellent verbal, written and presentation skills
  • Possess outgoing, collaborative, team oriented style and strong interpersonal skills to successfully manage potential conflicts of information security goals and business goals
5

Senior Manager, Cyber Security Resume Examples & Samples

  • Expert knowledge of generic information security topics
  • Expert knowledge of compliance and the controls needed to meet various regimes
  • Excellent management and communication skills
  • Strong ability to develop training objectives and metrics for different audiences of varying technical backgrounds
  • Ability to stay up to date on the developing threat landscape
  • Ability to communicate highly technical information to stakeholders without requisite experience in the space
  • A demonstrated ability to think globally
  • Ability to manage a highly distributed team
6

Product Manager Cyber Security Resume Examples & Samples

  • Responsibility for audit and compliance areas such as oversight and delivery of internal and/ or external audit actions ensuring timely and high quality delivery as well as resolution of audit and compliance actions/ issues
  • Initiate proposals for new products/ platforms in alignment with business
  • Develop, negotiate and monitor Operational Level Agreement (OLA), coordinating with Service Management and act as single point of contact for system integrators needing specific details
  • We are open to consider candidates who would be based in London, Zürich, New York or Wroclaw
7

Technology Manager Cyber Security Operations Resume Examples & Samples

  • Bachelor’s Degree in Computer Science, Information Technology, Security or a related field
  • Experience with Data Loss Prevention technologies and processes
  • Ability to navigate a highly matrixed organization
  • Sound business and technical acumen
  • Ability to communicate at all levels with clarity and precision both written and verbal
  • Ability to remove barriers for staff to be setup for success
  • Prior experience in security team leadership role
  • Experience with MS Project & Visio
  • Experience using and managing teams supporting security policy enforcement
8

Senior Manager, Cyber Security Resume Examples & Samples

  • Conduct and analyze risk assessments to identify areas of weakness and vulnerability within networks, applications, and operating systems, including web and mobile technology, and recommend enhancements to meet security standards and regulatory requirements
  • Oversee the research, design, development, and implementation of cyber security systems, as well as the preparation and maintenance of security guides, standard operating procedures, and systems/network documentation
  • Lead architecture testing, analyzing results for gaps and compliance
  • Prioritize mitigation tasks, ensure deployments are in accordance with security best practices, and test implementations to validate intended function or purpose
  • Remain current on emerging security trends and technology used. Evaluate existing and proposed architectures, recommend and implement security measures, enhancements and mitigate risk
  • Plan, design, and manage enterprise Incident Response Plans
  • Implement and communicate information security strategies, policies, and procedures
  • Create baselines for the secure configuration and operations of all in-place systems and devices, apply frameworks for new systems and devices
  • Work closely with business partners to ensure business needs are met while establishing standards and security frameworks that can be aligned with the overall business strategy
  • Provide support for audit and remediation activities as required
  • Lead Incident Response activities
  • 1-2 direct reports
  • Bachelors degree in computer science, networking, engineering, or other computer-related field of study, or demonstrated ability to meet the job requirements through a comparable number of years of applicable work experience
  • 5-7 or more years of experience in a cyber-security role with strong working knowledge and understanding of cyber security, frameworks, incident management, operations and application security best practices
9

Advisory Senior Manager Cyber Security Cyber Program Management Power & Utilities Resume Examples & Samples

  • Effectively lead and motivate multiple concurrent client engagement teams with diverse skills and backgrounds. Provide constructive on-the-job feedback/coaching to team members
  • Lead large scale engagements and consistently deliver quality client services. Drive high-quality work products within expected timeframes and on budget. Monitor progress, manage risk and ensure key stakeholders are kept informed about progress and expected outcomes
  • Manage expectations of client service delivery. Stay abreast of current business and industry trends relevant to the client's business. Foster relationships with client personnel to analyze, evaluate, and enhance information systems to develop and improve security at procedural and technology levels
  • Develop and maintain long-term client relationships and networks. Understand EY and its service lines and actively assess/present ways to serve clients. Develop and maintain long-term client relationships and networks
  • A minimum of 6+ years of related work experience in developing, implementing or architecting information security systems with a strong understanding of information security regulatory requirements and compliance issues
  • Knowledge of general security concepts and methods such as vulnerability assessments, privacy assessments, intrusion detection, incident response, security policy creation, enterprise security strategies, architectures and governance
  • CISSP is required. Non-certified hires are required to become certified within 1 year from the date of hire
10

Advisory Senior Manager Cyber Security Cyber Program Management Resume Examples & Samples

  • Generate new business opportunities and foster relationships with client personnel at appropriate levels
  • Demonstrated ability to develop new engagement opportunities in the information security advisory space; and the ability to contribute to the development of client deliverables and technical content
  • Project management of information security projects including development of project charters and plans; management of project execution and successful implementation of the planned solution
  • Excellent leadership and teaming skills with advanced written and verbal communication skills
11

Advisory Manager Cyber Security Identity Access Management Resume Examples & Samples

  • Assist with cultivating and managing business development opportunities. Understand EY and its service lines and actively assess/present ways to serve clients
  • A bachelor's or master's degree in computer science, information systems, engineering, or a related major
  • Experience in one or more of the following: user provisioning and identity management solutions including design or implementation of user provisioning technologies (such as CA eTrust Admin, IBM Tivoli Identity Manager, HP Select Identity); role-based access control (including design and development of user access roles); web access control solutions including design and implementation of products such as RSA Cleartrust, CA/Netegrity Siteminder; and analysis of Segregation of Duties
  • CPA/CA, CIA, CISA, CMA, RICS APC, PMP or other relevant certification desired; non-certified hires are required to become certified within 1 year from the date of hire
12

Advisory Manager Cyber Security Cyber Program Management Resume Examples & Samples

  • Effectively lead and motivate client engagement teams and provide technical leadership in the assessment, design, and implementation of security and IT risk solutions
  • Generate new business opportunities by participating in market facing activities and developing thought leadership materials. Understand EY and its service lines. Actively encourage team members to contribute ideas and identify opportunities to introduce Ernst & Young LLP services
  • Foster an innovative and inclusive team-oriented work environment. Play an active role in counselling and mentoring junior consultants within the firm
  • Use knowledge of the current IT environment and industry trends to identify engagement and client service issues, and communicate this information to the engagement team and client management through written correspondence and verbal presentations. Stay abreast of current business and industry trends relevant to the client's business
13

EY Manager, Cyber Security, EAC Resume Examples & Samples

  • Foster an innovative and inclusive team-oriented work environment. Play an active role in counselling and mentoring junior consultants within the firm. Participate in research and provide recommendations for continuous improvement
  • Consistently deliver quality client services. Drive high-quality work products within expected timeframes and on budget. Monitor progress, manage risk and ensure key stakeholders are kept informed about progress and expected outcomes
  • Demonstrate and apply a thorough understanding of complex enterprise systems. Use knowledge of the current IT environment and industry trends to identify engagement and client service issues. Communicate with the engagement team and client management through written correspondence and verbal presentations
  • A Master’s degree and approximately 4 years of related work experience in the fields of Computer Science, Information Systems/Technology, Engineering, Business or related major (essential)
  • Strong understanding of cyber security concepts, technologies, principles and current market and business trends
  • Ability to examine issues both strategically and analytically
  • Ability to mentor and coach others
  • Able to work collaboratively in a team environment
  • We are keen to see candidates from a range industry backgrounds but particularly
14

Project Manager Cyber Security Resume Examples & Samples

  • Partner with OPT CTO sponsor to ensure program is in line with senior management expectations
  • Engage subject matter experts to ensure requirements and solution approaches are appropriate
  • Partner with Demand Management to ensure cyber program is properly prioritized across OPT and CCB
  • Provide weekly status reporting for regular program meetings as well as senior management updates
  • Escalate technical, resource, & funding roadblocks
  • Ensure OPT concerns are properly represented in the CCB program
  • Ensure forecasting and billing continue to be in line
15

Senior IT Project Manager / Cyber Security Resume Examples & Samples

  • A challenging and exciting position as senior project manager in the area of Cyber Security addressing emerging threats and regulatory requirements
  • A possibility to improve our project management capability and to lead projects by setting high delivery standards
  • The possibility to help drive and implement the latest technologies in the IT Security field to keep the IT infrastructure state of the art
  • Close regular interaction and collaboration with key international stakeholders and partners (e.g. Security Architecture, Technology Risk Management, Operations and Audit)
  • Highly professional culture, empowering project managers to be leaders and investors, with responsibilities for project planning, strategic risk taking, stakeholder engagement and people leadership
  • Providing the stakeholders with transparent, accurate and regular information regarding the program status
  • Managing a team of experienced professionals, as part of a matrix organization, ensuring efficient use of resources
  • Ensuring compliance with CS-SDF project management framework
  • Embed Risk Awareness by designing and operating an effective control environment, proactively identifying and raising control deficiencies and driving diligent and sustainable risk remediation
  • Fluent in English, German an advantage
  • LI-CSJOB*
16

Technical Solution Manager Cyber Security Resume Examples & Samples

  • Security TSM should be able to analyze technical documentation, extract customer expectations, and convert business requirements into a workable solution, well measured from technical and financial perspective
  • Security TSM will work together with architects, sales teams, end customers, thus client-facing communications skills and focus on business are also essential to this position
  • Security TSM needs to be able to create technical delivery artifacts such as Technical Solution Document, Statement of Work, service designs, detailed cost calculations and other technical deliverables
  • As a technical professional, Security TSM will be required to provide guidance on implementation of proposed solution/architecture. This would include infrastructure sizing, deployment considerations and systems integration
  • Managed Security Services
  • Security in the Cloud
  • Physical access
  • IAM
  • Business Resiliency
17

EY Senior Manager, Cyber Security, EAC Resume Examples & Samples

  • Lead on Identity & Access Management engagements
  • Improve EY’s business processes and incident response methodologies
  • Liaison with and offers strategic direction to related governance functions (such as Physical Security/Facilities, Risk Management, IT, HR, Legal and Compliance) plus senior and middle managers throughout the organisation as necessary, on information security matters such as routine security activities plus emerging security risks and control technologies
  • Recruitment, leadership and direction for a loose network of information security ambassadors distributed throughout the organization
  • Leads the design, implementation, operation and maintenance of the Information Security Management System based on the ISO/IEC 27000 series standards, including certification against ISO/IEC 27001 where applicable
  • Forms a “centre of excellence” for information security management, for example offering internal management consultancy advice and practical assistance on information security risk and control matters throughout the organisation and promoting the commercial advantages of managing information security risks more efficiently and effectively
  • Bachelor's degree and a minimum of 7 years of related work experience,
  • Degree in Computer Science expected, and PHD in Information Security required
  • Currently working in Big 4 Consultancy role -essential
  • Candidates must have worked in Identity & Access Management recently
  • All industries are of relevance but we are particularly keen to see candidates with a background in one or more of the following
18

Manager, Cyber Security Architecture Resume Examples & Samples

  • Ensures programs are envisioned, designed, developed, and implemented across the enterprise to meet business needs. Interfaces with the enterprise architecture team and other functional areas to ensure that most efficient solution is designed to meet business needs
  • Ensures solutions are well engineered, operable, maintainable, and delivered on schedule
  • Contributes to the overall system implementation strategy for the enterprise and participates in appropriate forums, meetings, presentations etc. to meet goals
  • Applies new and innovative ideas to old or new problems. Fosters environments that encourage innovation. Contributes to and supports effort to further build intellectual property via patents
  • Handles budgets and assists leadership team with needs for their respective departments
  • Sets department standards and best practices. Develops and oversees staff and is available for guidance
  • Education Level: Bachelors Degreein Information Sciences, Technology or Equivalent
  • Certifications: CISSP, CISM (preferred)
  • 6-9 years of related experience
  • Experience leading security architecture teams is preferred
  • Strong technical foundation in information security
  • Experience in networking (TCP/IP)
  • Experience working with network devices and server workstations
  • Familiar with SABSA Architecture Framework
  • Familiar with standards such as NIST, PCI
  • Understanding of programming concepts (SQL, Java) is a plus
19

Manager, Cyber Security Threat Discovery Resume Examples & Samples

  • Create and grow a team of focused cyber investigators highly experienced in advanced threat detection, analytics, anomaly detection and forensic science
  • Apply leadership focus and experience in a Fraud Detection, Incident response context
  • Outstanding analytical skills and ability to synthesize situations for corresponding solutions
  • Manage critical incidents involving slow moving or persistent threats across the infrastructure
  • Communicate technical terms in a clear concise format
  • Self-starter; demonstrate personal initiative and willingly assume responsibly and ownership
  • Manage multiple projects, providing timeline, budget and estimates for work, tracking and escalating issues, defining risks and ensuring integration between various systems
  • Maintain expertise to function as subject matter expert in multiple security disciplines; serve as security consultant for projects and troubleshooting efforts
  • Possess a naturally inquisitive nature
  • Experience conducting Incident Response and traffic capture and analysis
20

Manager, Cyber Security Operations Resume Examples & Samples

  • Oversee the operations organization, consisting of direct reports and indirect reports (including FTE employees, contract and MSS staff, external service providers and key technology partners and vendors). This includes hiring, training, staff development, performance management, on-call and crisis/incident support
  • Develop and manage information security budget forecast, expense, and technology, service and vendor roadmaps
  • Liaise with external agencies, such as law enforcement, standards and technology organization, advisory bodies and industry and peer working groups as necessary, to ensure that the organization maintains a strong security posture and technical congruency
  • Work directly with business units to facilitate IT demands and delivery of new products, services and technology delivery, ensure compliance with risk management objectives and guidelines, and work with stakeholders throughout the enterprise on identifying acceptable levels of risk
  • Perform all required maintenance, support, administration and break/fix remediation, including root cause analysis, availability and capacity reporting, and routing health and performance monitoring
  • Sustain high-availability service levels and ensure fulfillment of business-wide service levels and operational support objectives
  • Demonstrates continuous effort to improve operational performance, streamline work processes and work cooperatively and provide quality seamless customer service
  • Possess broad knowledge of advanced technology, IP services, ISP operations, Telecommunications and DOCSIS/DAVIC infrastructure
21

Manager, Cyber Security Threat Management Resume Examples & Samples

  • Leading technical cyber experience team in examining systems for points of intrusion and recreate breach scenario
  • Manage the response plans to the most critical cyber-security events including producing the final report
  • Establish rapid response processes closely linked to key stakeholder teams overseeing Comcast critical systems and data
  • Maintain process for managing updates to cyber security executives to keep them abreast of findings during a cybersecurity incident
  • Collaborate with Security teams throughout the organization in ensuring proper logging activity is designed, configured and readied for ingestion to Security Operations monitoring / forensics tools
  • Managing team processes establishing proper chain of custody of cyber evidence by maintaining preservation, collection, processing and production of electronically stored evidence
  • Ability to deploy effective security measures and risk mitigations in a multi-tiered defense in depth strategy
  • Working closely with various groups, such as Investigations, internal and external counsel, internal audit, security, and human resources on internal matters
  • Provide support to the Security Incident Response Team (SIRT) in the effective detection, analysis, and containment of attacks
  • Collaborate and build relationships in industry groups to obtain the latest investigative best practices
  • Analyze malware and perform reverse engineering to drive intelligence, assist in containment and eradication
  • Create briefings to educate leadership, IT operations staff, and users about technical threats
  • Building strong relationships both internally and externally (including vendors) as part of the technical leadership team
  • Demonstrate expert skills in cyber security incident response threat management practices and proven track record managing cybersecurity teams
  • Demonstrates an ability to successfully investigate fraud schemes and develops investigative strategies
  • Develops and presents verbal and written investigative and management reports
  • Ability to deliver succinct and fact-based communications, both verbally and in writing, and at various management layers
  • Demonstrate proficiency skills and technical knowledge of cybersecurity forensic collection and data analysis tools (e.g., EnCase, FTK, X-Ways, TSK, Volatility, Honeyd, Firebug, Burpsuite, Redline)
  • Must have knowledge of common probing and attack methods, network/service discovery, system assessment, viruses and other forms of malware
  • Perform as subject matter expert on technical incident response handling and digital forensics that is capable of planning, executing, and directing all phases of incident response
  • Solid understanding of threat actor techniques related to reconnaissance, server attacks (with emphasis on web applications), end-user attacks, network-based attacks, expanding foothold (pivoting), and hiding tracks
  • Advance proficiency in information security principles and standards
  • Knowledge of and experience with incident handling procedures and pursuing incidents
  • Experience determining cause and extent of data loss and advice on remediation plan
  • Must be flexible with work schedule to allow for rapid response to cyber-security events
22

Manager, Cyber Security Incident Response Resume Examples & Samples

  • Maintain best-in-class cybersecurity incident monitoring and response processes closely linked to key stakeholder teams throughout the organization
  • Contribute to the creation and execution of mock cyber-security incidents with increasing sophistication across all critical systems
  • Maintain process for managing escalations and notifications to key stakeholders and management during a cybersecurity incident
  • Collaborate with other colleague cyber security teams and key internal stakeholders to ensure that security monitoring alarms are in conformity with overall security strategy
  • Analyze, recommend and implement monitoring and compliance procedures based on external and internal information security risk and vulnerability assessments
  • Maintain security and operational efficiency metrics through comprehensive reporting, including on-the-fly data mining, historical reporting, self-auditing and tracking capabilities
  • Manage 1st level triage security forensics activities on identified compromised systems and unauthorized changes to production configurations
  • Update Security Response Center Situational Awareness Dashboard communicating active security threats and issues on the production network
  • Build efficiencies in incident tracking and handling via automation
  • Maintain current with new developments in the security industry including alerts, bugs, vulnerabilities and viruses; evaluate and report on their potential business impact
  • Regularly develop and produce status reports of the tactical incident response operations constructed from discovered or reported issues
  • Maintain a highly skilled Security Incident Response Team (SIRT) team for the effective detection, analysis, and containment of attacks
  • Assembles, evaluates, and implements performance and effectiveness metrics for functions supervised
  • Demonstrate expert skills in cyber security incident monitoring and response practices and proven track record managing cybersecurity teams
  • Incident handling and forensics skills including knowledge of common probing and attack methods, network/service discovery, system assessment, viruses and other forms of malware
  • Must have experience with business fraud detection and investigation techniques in a cross-functional team working environment
  • Knowledge of current security threats, techniques, and landscape, as well as a dedicated and self-driven desire to keep abreast of latest cybersecurity threats and hacking techniques
  • Established background in managing team of professionals including skills to select, develop, mentor, discipline and reward employees
  • Ability to foster cross-disciplinary collaboration throughout internal and external to the organization
  • Ability to present risks and propose countermeasures to non-technical audience
  • Demonstrated proficient decision making skills, analytical and problem solving ability
  • Must be flexible with work schedule to allow for management of 24x7 team
23

Manager, Cyber Security Operations Resume Examples & Samples

  • Develop the enterprise data loss prevention strategy for securing Bell’s information
  • Excellent communication skills; ability to create high quality written communications and to conduct executive presentations
  • Production of visualization dashboards and analytics to support governance initiatives
  • Leadership of the team, including the mentorship and training of security analysts
  • Seven (7) years’ experience in information security
  • Knowledge and experience with standards such as ISF, NIST Cybersecurity Framework and PCI
24

Principal Audit Manager Cyber Security Resume Examples & Samples

  • Plan, agree and execute a global Cyber Security audit plan and provide Cyber risk subject matter expertise to the Group Audit PAM team supporting technology and business function audits globally
  • Provide risk focused and relevant input to audit (tollgate) meetings. In addition, provide subject matter expertise to other PAMs to assist in driving risk-based dynamic planning and supporting delivery of the global audit plan
  • Maintain relationships with other PAMs globally to support efficient and comprehensive integrated coverage of key risks
  • Identifies and escalates audit issues fostering a constructive tone in audit reports. Reviews relevant audit issues, drafts audit reports and communicates results to senior client management. Responsible for tracking of open audit issues and validation of issue closures
  • Monitoring of risk profiles, regulatory requirements and industry developments, updating the audit plan and resource allocation as required. Managing the audit plan and available resources to deliver audits to time and budget
  • Establish relevant and measurable audit profiles and objectives for the Cyber audit. On-board and retain the required talent and implement measures to assess the teams achievements
  • Provide additional in-region mentoring and support to the Americas technology audit staff
  • Supervise audit personnel, ensuring efficient scheduling such that staff are properly utilized with clear responsibility for execution of audit projects and provide guidance on quality standards
  • Maintain excellent, responsive working relationships with regional management, regulators and external auditors
  • Be a ‘risk manager’, take personal accountability and be commercially pragmatic
  • Be a strong influencer and networker
  • Have a clear understanding of differences between independent oversight, supervision and execution responsibilities
  • Have excellent written/verbal communication skills and be able to communicate effectively at all levels. Composed and articulate when delivering difficult messages. Excellent command of English is required, further language skills are generally useful
  • Have a proven track record of building effective relationships, including at senior management level
  • Be able to work in a coordinated manner with fellow Principal Audit Managers, both locally and globally, building contacts and relationships with clients and colleagues through effective teamwork and innovative thinking
  • Be a proven multi-task manager who is resilient under pressure, with ability to plan, lead and execute the program of audit coverage with limited supervision
  • Demonstrate proven ability to manage teams, providing honest and constructive feedback
  • Understand and manage change effectively
  • Have an innovative mindset and be able to develop ideas which are implemented and have a positive impact. Design and disseminate best practice and lessons learned to colleagues and clients
  • Be involved with significant development efforts or projects
  • Be a natural role model and reference point for peer group
25

Advisory Senior Manager Cyber Security Cyber Transformation Resume Examples & Samples

  • Effectively lead and motivate multiple concurrent and large scale client engagement teams with diverse skills and backgrounds
  • Build internal network across service lines. Develop and maintain long-term client relationships and networks
  • Understand EY and its service lines and actively assess/present ways to serve clients
  • Lead pursuits and sales processes. Provide support for selling engagements and expanding current engagements. Generate new business opportunities and foster relationships with client personnel at appropriate levels
  • Review ongoing work in a timely manner and provide constructive feedback to engagement team members
  • Provide subject matter expertise to client’s executive management and internal teams
  • Play an active role in counseling and mentoring staff and managers within the firm
  • Consistently deliver quality client services. Drive high-quality work products within expected timeframes and on budget
  • Use knowledge of the current security environment and industry trends to identify engagement and client service issues, and communicate this information to the engagement team and client management through written correspondence and verbal presentations
  • A bachelor's degree and approximately 8 years of related work experience; or a graduate degree and approximately 7 years of related work experience in the fields of Computer Science, Information Systems, Engineering, Business or related major
  • A minimum of 6+ years of related work experience in one or more of the following areas
  • Information security assessments
  • IT and information security policies, standards, procedures and controls
  • Security strategies and roadmaps
  • Information security awareness and training
  • Information security metrics and reporting
  • Information security organization design and implementation
  • A strong background of the security frameworks and standards such as ISO 27001/2, PCI DSS, NIST 800-53 and the cybersecurity laws and regulations such as HIPAA, FISMA and GLBA
  • An understanding of the IT security technologies and tools
  • Advanced skills in Microsoft PowerPoint, Excel, and Word
  • Demonstrated ability to manage large scale engagements and develop new engagement opportunities in the information security advisory space
  • CISSP, CISM, CISA, CIPT, CIPM, CRISC or other relevant certification desired; non-certified hires are required to become certified within 1 year from the date of hire
  • A willingness to travel to meet client needs; travel is estimated at 60-80%
26

Advisory Manager Cyber Security Privacy Resume Examples & Samples

  • Demonstrate excellent project management skills, inspire teamwork and responsibility with engagement team members, and use current technology and tools to enhance the effectiveness of deliverables and services
  • A bachelor's degree and a minimum of 5 years of related work experience; or a graduate degree and approximately 4 years of related work experience in the fields of Computer Science, Information Systems, Engineering, Business or related major
  • A minimum of 4+ years of related work experience in developing, implementing or architecting information security systems with a strong understanding of information security regulatory requirements and compliance issues
  • Ability to contribute to the development of client deliverables and technical content
  • Strong leadership and teaming skills with advanced written and verbal communication skills
27

Product Manager, Cyber Security CoE Resume Examples & Samples

  • Minimum 5 years of total work experience
  • Minimum of 3 years of experience developing and managing software within an Agile environment - promoting iterative and incremental software development techniques
  • Bachelor's Degree in Computer Science, Information Systems or related technology
  • Master Degree in either Computer Science or Business Administration
  • 3+ years of direct Cyber Security Product Management experience
  • CISSP, CISM and other Cyber Security certifications
  • Firm understanding of industrial solution selling across different verticals
  • Demonstrate knowledge on Cyber Security commercialization market excellence
  • Prior experience as a consultant, product manager, or solution manager for cyber solutions
  • Highly collaborative with effective teaming and problem solving abilities
  • Outcome driven - highly organized and detail oriented
  • Ability to managing through ambiguity
  • Executive presence - strong oral and written communication skills
  • Strong interpersonal and leadership skills
  • Able to interface effectively with all levels of the organization and external customers
  • Understanding of the project life cycle management
28

Manager Cyber Security & Resilience Resume Examples & Samples

  • You will lead commercial cyber, privacy and resilience projects involving strategy, implementation, support, and software/hardware optimisation related to IT operations, business processes, business resiliency, security, and data integrity
  • Scope engagements and apply your commercial acumen to identifying valuable opportunities and developing new business to make a difference to our clients whether it be in their change or business as usual environments
  • Serve as a senior advisor to key clients on their cyber, privacy and resilience needs
  • Publish thought leadership
  • Mentor and coach team members so that they are successful and can best realise their potential to be impactful
  • 8 years’ + experience, in cyber and information security implementation and methodologies ideally within a consulting, professional services or a Big 4 practice preferred
  • Proficient at communicating security-related concepts to a broad range of technical and non-technical staff, including to C suite and Board level stakeholders
  • You will enjoy investigating complex problems and expect nothing to be as it first appears. Like the attacking communities you defend against, you will be creative and adept at thinking outside the box
  • Strong report writing and presentation skills
  • Accomplished as a coach and mentor with political acumen and maturity
  • Proven experience of implementing leading industry standards such as the NZISM, ISO 27001:27002, Australian / NZ Protective Security requirements, or other equivalents, in a fit for purpose manner
29

Manager, Cyber Security Operations Center Resume Examples & Samples

  • Recommending policies, standards, procedures, and guidelines to prevent the unauthorized use, release, modification, or destruction of data
  • Recommending and maintaining preventive systems and programs used to stop and/or deter security breaches
  • Participate in the direction for long range security planning and risk assessments
  • Be a security consultant to business units and provide quick accurate information of the security risks, controls, and policies governing new systems and systems enhancements
  • Help maintain and facilitate a corporate wide Security Awareness Program
  • Maintain familiarity with industry trends and current security practices
  • Interface with all Bank branches and administrative offices in the administration of information security. Act as the backup to the Manager of Systems Security, when as required
  • Work experience in the areas of information security, IS auditing, data processing operations, systems development and/or computer programming
  • Must have 7 years’ experience working in a large complex, matrix, global organization
  • Must have a minimum of 5 years experience in information security
  • Must have at least one certification in a related security domain such as CISSP, GCIA, or GSEC
  • Knowledge of operating systems and corresponding security systems in the financial services industry preferred
  • Knowledge of banking concepts and theories, preferred
  • A thorough understanding of security software packages, networking concepts, and information security principals in the financial services industry
  • Must have experience with software productivity packages like MS Office suite, MS Access, and terminal emulation software
  • Must have a bachelor’s degree in related field of study such as computer engineering, computer science or similar
30

Senior Manager Cyber Security Operations Center Resume Examples & Samples

  • Provide SOC vision, direction and guidance on people, process and solutions to monitor, detect and respond to security incidents
  • Provide 24 x 7 day to day security operations within the incident response area and insure effective execution and implementation of programs and capabilities
  • Responsible ensuring availability of required metrics for goals and project reporting
  • Guides, influences and supports people resources and processes in pursuit of the team’s goals and objectives
  • Advise on best tools, process, practices, and standards to insure effective and efficient security tools/capabilities for investigations
  • Analyze workflows, staffing, incident management and related metrics to improve efficiency and performance of the SOC
  • Provide guidance and helps enforce escalation procedures to ensure that security incidents are appropriately assigned and that all necessary communication guidelines are followed
  • Mentor team in goal setting and achievement
  • Complete performance evaluations for each direct report
  • Define job descriptions and upward mobility path
  • Provide monetary forecasts and estimates for capital and operating expenditures for future budgeting purposes
  • Keep abreast of security projects driven by groups both internal and external to Network Security
  • Maintain visibility outside of Network Security, interfacing with outside groups such as Application Support, Tier 1 Operations and platform support departments
  • Communicate with non-CIS Security groups during Security events to coordinate cross-functional efforts
  • 7 to 10 year’s industry experience in leading information security teams as a group manager or program in a SOC or CIRT environment
  • 3+ years of experience in network monitoring and operations support systems
  • Ability to communicate with and manage executives to specific outcomes
  • Proactive in anticipating and preempting potential problems
  • A wide degree of creativity and latitude is expected. Ability to employ strict discretion in sensitive situations
  • High-level troubleshooting ability and experience
  • Demonstrated operational performance management capabilities
  • Demonstrated experience with the following security domains: GRC, SIEM, VPN, PKI, Vulnerability management, Access Management, Firewalls, DLP, Forensics, Malware analysis, and Incident Response
  • Negotiation, influence, and leadership skills are essential
  • Ability to able to credibly coordinate between technical teams and business stakeholders
  • Knowledge of relevant information security standards and frameworks including NIST, SANS, ISO, etc
  • Proven ability to manage Cyber Incident Response and or Security Operations team through the incident response life cycle
  • Ability to plan, organize, prioritize and delegate tasks to complete independently and within time frame established
  • In-depth knowledge of the security technologies such as but not limited to: Firewalls, Intrusion Detection systems, Event Correlation systems, Security forensics, Content caching technologies, URL filtering systems and Encryption protocols
31

Manager, Cyber Security Resume Examples & Samples

  • Experience implementing the NISPOM, ODAA Process Manual, JAFAN 6/3, DCID 6/3, JSIG, ICD-503 or equivalent requirements to include technical computer/network system auditing
  • Experience in developing System Security Plans (SSPs) to include the completion of the C&A documents
  • Experience in successfully and respectfully interfacing with internal and external customers (i.e. AOs, DAOs, SCAs, Program Managers, etc.)
  • Experience providing technical security expertise and oversight for complex, cross-domain, heterogeneous classified networked environments in collaboration with Customers, the Information Technology (IT) Department and other Raytheon Business Units. Familiar with the security features and/or vulnerability of various operating systems
  • Be capable of learning specific security features and operations for multiple operating systems
  • The selected candidate must have or be able to achieve a DoD 8570-1M (IAM III) compliant certification within six months of selection
  • NISPOM, ODAA Process Manual, DCID 6/3, JAFAN 6/3, DIACAP, JSIG and/or ICD 503 (a.k.a. Risk Management Framework) experience
  • Knowledge in UNIX, Linux, Solaris, IRIX, SUSE, and MAC operating systems
  • Experience with various types of special test equipment (STE)
  • Public speaking experience
  • BS degree in an information systems/technology related field with 8 years of directly related experience, or. MS degree in an information systems/technology related field with 6 years of directly related experience, or PhD degree in an information systems/technology related field with 4 years of directly related experience
32

Manager, Cyber Security Resume Examples & Samples

  • Position contingent upon the ability to obtain required clearance and accesses as directed by the program
  • Experience implementing the JAFAN 6/3, DCID 6/3, JSIG, ICD-503 or equivalent requirements to include technical computer/network system auditing
  • DCID 6/3, JAFAN 6/3, DIACAP, JSIG and/or ICD 503 (a.k.a. Risk Management Framework) experience
  • Possess current SAP/SCI program access or ability to receive
  • High school diploma and 12 years of directly related experience, or
  • BS degree in an information systems/technology related field with 8 years of directly related experience, or
  • MS degree in an information systems/technology related field with 6 years of directly related experience,
  • Or PhD degree in an information systems/technology related field with 4 years of directly related experience
33

Manager, Cyber Security & Infrastructure Resume Examples & Samples

  • People management; inspiring your team through dialogue, setting direction, sparring and performance reviews
  • Budget responsibility and resource allocation
  • Stakeholder management
  • Support project managers to ensure successful project execution
  • Process improvements in relation to software development and security processes
  • Develop roadmaps, business cases, project proposals etc., to secure continuous development of our products
  • Collect and prioritize market inputs regarding our products
  • Identify cost optimization or revenue potential in our products
  • You probably have a theoretical background within Computer Science or IT on M.Sc. level or similar
  • You have experience with people management
  • You have solid experience within IT security, enabling you to spar with your employees and stakeholders
  • You have knowledge about networks, and preferably about IT development
  • Experience with project management would be advantageous
34

Senior Manager, Cyber Security Services Resume Examples & Samples

  • Facilitate collaboration with client engagement team prior to commencement of client work to discuss roles and responsibilities, risk areas, materiality and deadlines
  • Leverage team appropriately to ensure proper documentation is prepared for the client and procedures relating to the file are followed accordingly
  • Develop business relationships through contacts and drive Cyber Security opportunities with existing MNP clients
  • Monitor project timelines against targets and adjust where necessary; advise clients of project status
  • Network and take a leadership role in the local professional and business community while raising awareness of MNP and looking for new business development opportunities
  • Contribute to the development of new ideas and approaches to improve work processes
  • Develop, coach and train team members towards professional and personal development
  • Conduct formal, written annual performance reviews
  • Promote regular attendance, balanced lifestyle and high standard of team wellness
35

Senior Manager, Cyber Security Resume Examples & Samples

  • Leading a portfolio of cyber engagements with our clients, directing and developing teams to deliver the highest quality Cyber Security solutions and services
  • Managing the production of reports and via review ensuring the highest quality deliverables prior to Director / partner review
  • Contributing to developing the market for Cyber Security services across all sectors and identify sales opportunities
  • Building client relationships with senior stakeholders across the FTSE 350 market
  • Working with prospective clients to identify opportunities and scope engagements and creating high quality proposals
  • Advocating and championing Cyber Security service both internally to our wider network of colleagues and to our clients and the wider market
  • Managing engagements, monitoring hours worked and ultimately responsible for billing EY’s services to our clients
  • Contributing to the latest thought-leadership, industry research and creation of marketing collateral relating to cyber security
  • Security transformation programmes – design and management of security solution implementations and / or remediation programmes to address risks
  • Breach and incident management, design and implementation of breach and major incident management practices
  • Resilience, design and implementation of programmes to improve IT Disaster Recovery, Business Continuity
  • Security relation qualifications such as CISSP, CISM, CISMP, ISO27001 lead implementer or auditor, MBCI, IAPP (desirable)
36

Manager, Cyber Security Resume Examples & Samples

  • Contributing to developing the market for Cyber Security services across all sectors and identify sales opportunities and escalating these to senior management
  • Establishing client relationships with senior stakeholders across the FTSE 350 market
  • Working with prospective clients to agree, scope and plan the delivery phase of engagements
37

Manager, Cyber Security Services Resume Examples & Samples

  • Oversee Information Security projects involving strategy, implementation, technical delivery, software/hardware optimization related to IT operations, business processes, business resiliency, security, and data integrity
  • Manage planning, designing, implementing, testing and operating of cyber security processes and systems
  • Review security profiles to assess how application security is being used as a part of the overall business process control environment
  • Coordinate business process design as it relates to managing identities and access privileges such as architecture, delegated administration models, workflow models, and access control models
  • Administer security configuration and testing of networking and operating systems, such as TCP/IP, WAN/LAN routing, VLAN architecture, and a wide array of large-scale environments, including various major web application servers
  • Five years of experience in Information Security or in a technology related field
  • Strong understanding of current regulatory environment and related implications to identify management and security compliance as well as assist with scoping prospective engagements and developing proposals
38

Senior Manager Cyber Security Operations Resume Examples & Samples

  • Lead a team of Operations Analysts focused on detection of cyber security events, management of detection infrastructure, and response to global cyber security incidents. Provide performance guidance and counseling to ensure development of team members
  • Develop and implement a strategy for monitoring the most important parts of Hyatt’s infrastructure focusing on cardholder data, personally identifiable information, and critical infrastructure
  • Provide continuous security monitoring metrics on a regular basis to departmental and divisional leadership, allowing for clear indications of the performance and health of the program
  • Act as the lead of Hyatt’s Cyber Security Incident Response Team (CSIRT), responding to cyber security incidents globally and ensuring the duration of impact is minimal
  • Manage Hyatt’s Security Incident and Event Monitor (SIEM) tool, guiding the CSO team continuously in refinement activities focused on increased visibility and detection efficacy
  • At least five years of experience in Cyber Security is preferred; however any combination of experience, education, and certification that demonstrates the candidate can be successful in the position are acceptable
  • At least two years of experience as a people manager is required
  • Experience with Network IDS, Host IDS, DNS Firewalls, Next Gen Firewalls, Secure Web/Email Gateways is preferred
39

Senior Manager, Cyber Security Operations Resume Examples & Samples

  • Lead the Cyber Security Operations team responsible for monitoring and responding to cyber and information security incidents
  • Lead the global threat & vulnerability management program including identifying, assessing, and driving remediation of vulnerabilities
  • Lead the cyber security incident response program and assist with related matters resulting from security investigations
  • Proactively monitor threats as it pertains to the AGCO brand, technology and operations, and provide timely reporting based on gathered information
  • Lead the lifecycle management of a diverse security infrastructure including firewalls, IDS/IPS, secure web gateways, endpoint security, vulnerability scanners, SIEM and DLP
  • Actively participate in key security initiatives including special projects
  • Develop and maintain partnerships with key vendors to ensure that service levels are met
  • Serve as subject matter expert to internal business and IT partners
  • 10+ years of experience in information security
  • Proven experience with profiling network traffic to detect possible intrusions from inside or outside networks
  • Previous experience in conducting vulnerability testing and penetration analyses of computers, networks and applications
  • Experience with computer forensic procedures to support investigations with evidence seizure, computer forensic analysis, and data recovery
  • Proven project management and organizational skills, specifically managing multiple, concurrent projects
  • GIAC GCIA and GIAC GCIH certifications
40

Manager, Cyber Security Services Resume Examples & Samples

  • Lead the Security Operations Center (SOC) program that focuses on the monitoring, detection, analysis, and investigation of threat activity for clients
  • Create, manage, and develop the roadmap and plans for the SOC to drive continuous improvement in maturity and capability
  • Guide the implementation of new technology enhancements that support the SOC program and define operational and risk metrics by which the SOC will be measured
  • Mentor and train SOC staff and new hires, manage staffing levels and performance, and create the hiring plan to staff the SOC as it matures
  • Lead and/or provide support for the Incident Response process, including the coordination of SOC resources and other Information Technology and business groups
  • Communicate effectively with leadership, operational teams, outsource service providers, and other business units
  • Significant experience in Incident Response including plan creation, responding to incidents, and managing the response to incidents
  • Project management skills with experience in creating project plans, managing the execution of projects to completion, reporting/metrics, and the budgeting process, including the ability to estimate capital and operating costs
  • Experience in understanding threats, the current threat landscape, and intelligence gathering with an analytical mindset able to translate threats into risks faced by clients
  • Applicants must be currently authorized to work in the United States without the need for visa sponsorship now or in the future
41

Senior Program Manager Cyber Security & Innovation Resume Examples & Samples

  • Manage, plan and identify equipment needs, and logistics for digital forensics call-outs in support of Global Security strategies and Abbott Corporate Officer infrastructure
  • Primary point of contact for Abbott CAT Teams responsible for digital investigations and business resilience needs
  • Confer with Abbott legal team to plan, coordinate investigations and prosecutions with State, Local, Federal and Tribal global law enforcement, Security and Intelligence partners
  • Subject matter expert charged with the explanation of technical concepts to Abbott Senior Managers
  • Provide worldwide 24/7/365 technical support and response to Abbott Regional Security Directors and analytical personnel related to digital device support, requirements, and documentation
  • Global Security representative and team member for the Abbott Incident Security Response Management group housed within the office of the Chief Information Security Officer
  • Create and instruct digital forensics training regimens and class development; entry level and advanced for Abbott writ large employees
  • Maintain working relationship with key partners and stakeholders within the U.S. Departments of Justice and Homeland Security
  • Maintained evidence integrity and chain of custody documentation provided forensics support and conducted data acquisitions and analysis for ATF and assorted agencies
  • Advanced degree and 5+ years of cyber investigative experience
  • ​Advanced knowledge of multiple security disciplines; e.g., information, physical/technical, OPSEC
42

Manager Cyber Security & Privacy Resume Examples & Samples

  • Bachelor’s degree in business administration or technology related field
  • 5+ years experience in IT, risk management or information security; strong security expertise required
  • Past experience in healthcare cyber risk, including familiarity with state and federal healthcare regulations (e.g. HIPAA)
  • Knowledge of and past experience with common information security management frameworks
  • Background in information privacy is optional
43

Manager, Cyber Security, Financial Services Resume Examples & Samples

  • Being able to manage clients’ expectations in relation to deliverables
  • Building relationships with colleagues across the business, supporting them and promoting a collaborative culture
  • Being actively involved and lead throughout the life-cycle of an assignment
  • Helping develop our practice and lead business development activities on strategic and global priority accounts
  • A strong academic background with a minimum of one privacy-related certification such as CIPP/E, CIPP/IT or equivalent
  • Demonstrable experience gained in a privacy & data protection role in Big 4, a recognized Global Management Consultancy firm or a large Financial Services organisation
  • Significant experience in providing expert technical advice, guidance and support on privacy and data protection, both in both a business-as-usual and programme context, with an in-depth knowledge of GDPR
44

Manager, Cyber Security Operations Center Resume Examples & Samples

  • Manage the overall day-to-day 7x24 operations
  • They are responsible for ensuring events and/or incidents are detected and responded to in adherence to established process as well as procedures
  • Oversee the analysts’ daily tasking
  • Manage the team’s scheduling
  • Ensure effective incident management
  • Identify chronic operational and security issues, and ensure they are managed appropriately
  • Manage and escalate roadblocks that may jeopardize security monitoring operations, infrastructure, and SLAs
  • Serve as a senior mentor to SOC staff
  • Interface and collaborate with outside teams
  • Track tactical issues in execution of SOC responsibilities
  • Document and track analyst training requirements
  • Manage the process improvement program for SOC processes
  • Serve as an incident manager for the SOC, along with other collateral responsibilities
  • Bachelor’s Degree in Computer Science or Information technology or equivalent work experience
  • Certification in Information Security and Information management, CISM, CISSP, or CISA
45

Manager Cyber Security Resume Examples & Samples

  • Leading a portfolio of cyber engagements with our clients, reporting to a Senior Manager or Director, responsible for the day to day running of the engagements and the quality of the teams output
  • Managing and creating reports and via review ensuring the highest quality deliverables prior to Senior Manager’s / Director’s review
  • Establishing client relationships with senior stakeholders across the Irish market
  • Managing engagements to time and budget
  • Contributing to the development of the existing cyber risk team acting as mentor and coach to the junior members of the team and leading by example
  • Security architecture – creating secure architecture designs for solutions, designing secure patterns for reuse and the delivery of architectural reviews using TOGAF or SABSA
  • Security around emerging technology platforms – mobile device platforms (iOS, Android), cloud services (IaaS, PaaS, SaaS), Big Data, Social media
  • A security related qualifications such as CISSP, CISM, CISMP, ISO27001 lead implementer or auditor is desirable, although not essential
46

Regional Sales Manager Cyber Security Solutions Resume Examples & Samples

  • BS technical degree or equivalent
  • 10+ years of above quota sales experience in a similar Sales role
  • Prior experience selling Endpoint Security solutions
  • Strong communication (written and verbal) and presentation skills, both internally and externally
  • Enterprise sales experience with and actionable rolodex of decision makers
  • Experience working with Channel partners and understanding of a channel centric go to market approach
47

Manager, Cyber Security Support Systems Resume Examples & Samples

  • Development, implementation, and execution of standard procedures for the administration, backup, disaster recovery, and operation of the system’s infrastructure, including: operating system security hardening, backup management, capacity planning, change management, version or patch management, and lifecycle upgrade management
  • Development and maintenance of the the technical architecture of the cyber support systems, enabling all the components to perform as expected and meet established service-level objectives for system uptime. Specific duties include
  • Management of the team’s scheduling
  • Ensuring that content is maintained for effective incident management
  • Identification of chronic operational and security issues and ensuring appropriate management and remediation
  • Management and escalation of roadblocks that may jeopardize security operations, infrastructure, and SLAs
  • Serving as a senior mentor to Security Operations Center (SOC) staff
  • Interfacing and collaboration with outside teams
  • Tracking tactical issues in execution of CSS responsibilities
  • Management of the process improvement program for CSS processes and systems
  • Serving as an incident manager for the SOC, along with other collateral responsibilities
  • Minimum requirements
  • Bachelor’s Degree in Computer Science, Information Technology or equivalent work experience
48

Program Manager, Cyber Security Resume Examples & Samples

  • Cyber Security Program Maturation
  • Minimum 5+ year’s industry experience as a program or product manager within a technology environment, with a progressive record of successful delivery of complex solutions, systems, or services
  • Detail oriented; able to prioritize, speak and direct as a business leader; problem solving skills a must
  • Maturity, judgment, negotiation/influence skills, analytical skills, and leadership skills are essential
  • Knowledge of new product development processes, go to market strategies, and product life
  • Awareness of general accounting practices, related to project management - including budgeting, invoicing, purchase orders, and accounts payable
  • Bachelor’s Degree in computer Science, Business Administration, Project Management or combination of equivalent experience and education
49

Manager, Cyber Security Operations Resume Examples & Samples

  • Experience in managing security operations staff
  • Requires a working knowledge of Vulnerability Management, Incident Response, and Threat Intelligence
  • Experience in working colaboratively with the Security Engineering Team, IT Infrastructure, and Development Teams
  • Experience in the use and evaluation of security intelligence from infrastructure, security systems, and threat sources
  • Solid communications skills are required, needs to be able to adjust communications style according to audience. Needs the ability to create and develop meaningful reports/dashboard/alerts to various constituents across the enterprise
  • Strong knowledge of system and software logging, monitoring, reporting and correlation techniques
  • Extensive experience with security technologies
  • Strong knowledge of enterprise infrastructure and approaches to managing security
  • Knowledge of risk based security approaches
  • Knowledge of digital forensics desirable
  • Good project management skills and/or substantial exposure to project-based work structures, project lifecycle models, etc
  • Excellent understanding of the organization’s goals and objectives
  • Three (3) to five (5) years direct experience in security management
  • Proven experience in overseeing the direction, development, and implementation of security solutions
  • Direct, hands-on experience with security software and security management tools
  • Flexible and adaptable to learning and understanding new technologies
  • Effective interpersonal and relationship building skills
  • Communicates effectively with non-technical staff and members of interdisciplinary teams
  • Strong written, oral, and interpersonal communication skills
  • Ability to prioritize and execute tasks in a high-pressure environment
  • Excellent understanding of department goals and objectives
  • Ability to be discreet with highly confidential information
  • Ability to shift priorities, demands, and timelines through analytical and problem-solving capabilities
50

Senior Program Manager, Cyber Security Resume Examples & Samples

  • Minimum 8+ year’s industry experience as a program or product manager within a technology environment, with a progressive record of successful delivery of complex solutions, systems, or services
  • Demonstrated experience leading complex enterprise-scale Programs end-to-end
  • Familiarity with enterprise solutions, such as web services, workflow modeling and enterprise application integration
  • Effective written and oral communication with multiple levels of business and technical leadership
  • Ability to assess and implement successful, focused, integrated product development plans
  • Experience working in a technical industry
  • Experience working on projects in a wireless industry
  • Master’s / Advanced Degree desired
51

Product Manager, Cyber Security Program Resume Examples & Samples

  • Make proactive assessments of current capabilities within the assigned security domain(s) at T-Mobile, as well as trends within the industry. Develop strategic roadmaps to mature the capabilities and functions within the security domains over the near and long term
  • Define security requirements for the Portfolio activities and Programs impacted by in-scope security domains
  • Assist the Governance team in the development and refinement of key performance indicators and other necessary processes to demonstrate maturation and safeguarding of the business
  • Provide status reports on a weekly, monthly and quarterly basis to business managers and other management activities that demonstrate the health of the program
  • Interact with internal audit, third party auditors, and appropriate regulatory bodies
  • Support the Information Security policy lifecycle throughout, including all aspects of intake, creation, review, approval, implementation, publishing, communication and maintenance
  • 10 years of technical Product or Program management within a Cyber Security organization. Preferably in the wireless communications space
  • The ability to apply Information Security principles to business solutions
  • Knowledge of federal & compliance regulations e.g. SOX, PCI & CPNI
  • Good understanding & experience applying CoBIT, ISO, ITIL, NIST frameworks
  • A good understanding of Network Security, Firewalls, Intrusion Detection and Prevention, AVS, VLANS
  • Fluency in the use of all MS Office applications, including SharePoint services
  • Candidate must have strong technical, influential and organizational skills
  • Experience translating emerging IT and business trends into meaningful risk reduction opportunities
  • Ability to interpret business strategy and align to appropriate security enhancements to achieve business enablement
  • Strong understanding of encryption, obfuscation and/or tokenization technologies or compensating controls
  • Bachelors Degree. Computer Science, Information Technology or related field from an accredited 4-year college or university
52

Manager, Cyber Security Resume Examples & Samples

  • Manage all Security Event Center (EVC) Operations tasks. Develop and maintain the EVC functions consisting of 24X7 shifts of security operation analysts
  • Manage daily security event monitoring and device/alert oriented activities in the EVC with guidance on short-term projects such as upgrades, migrations, procedure creation and implementations
  • Services monitored and delivered include, but are not limited to SIM, IDS/IPS, Firewall, Web Content Filtering, Proxy and Security Event Correlation and Reporting
  • Manage enterprise IT defense monitoring and scanning infrastructure and assist in communicating security infrastructure integrity and posture to applicable personnel and/or management
  • Establish processes to monitor and analyze and report output from various security monitoring devices and take or recommend security actions per procedures where required including incident management and daily status calls
  • Development of process, policies and procedures congruent with incident response and incident management
  • Creates and implements operations improvements to meet established objectives
  • Coordinate with other managers to leverage resources focused on corrective actions
  • Manage staff (includes one-on-one) and accomplish all TDA administrative tasks for EVC associates
53

Manager, Cyber Security, Advisory, Belfast Resume Examples & Samples

  • Contributing to developing the market for Cyber Security services across all sectors, identifying sales opportunities and escalating these to senior management
  • Security strategy, assessment, designing and implementing security strategy, governance frameworks over processes, controls, organisation and infrastructure to management cyber security
  • Data privacy, implementation of data protection / GDPR programmes to address confidentiality and security over customer, employee or patient data
  • Security over operational technology and control systems (SCADA)
54

Manager, Cyber Security Resume Examples & Samples

  • Cyber Security Strategy – formulation and delivery
  • Cyber Security Governance across TransCanada
  • Cyber Security Risk Management and advisory services
  • Compliance management (Regulatory-NERC/CIP, SOX, etc.)
  • Cyber Security Policy, Standards and Awareness Program
  • Team Leadership and Resource Management
  • Participation in Project Definition and Delivery
  • Lead a dynamic team of 15 – 20 employees and contractors in the execution of Information Security activities
  • Create and drive a vision for Information Security at TransCanada
  • Maintain a solid stance of security operations for the Company working consistently to identify and remediate gaps in people, process or technology
  • Report on the current status of security operations and what they mean for resourcing, roadmap and investment strategy
  • Update senior leadership, including the CIO, on cyber security activities. Communicate the roadmap, budget and the reasons for why investments need to be made
  • Manage relationships with external vendors, creating a strong governance model and ensuring an environment in which the maximum value of vendor partnerships can be realized
  • Perform an ongoing assessment of the activities that could be better provided by the market place as capabilities and technologies evolve
  • Manage staff, ensuring there is a high-performing and engaged team. Ensure team members have development and succession plans as appropriate
  • Interact with key business stakeholders, such as the SCADA security team, understanding their requirements and incorporating them into the roadmap for the team
  • Solid understanding of how Cyber security processes operate across a large organization and complex computing infrastructure; including requirements for a regulated business environment
  • Excellent people and team leadership and performance management skills
  • Ability to work effectively with all levels of management, with proven ability to assign, schedule, motivate and guide team personnel
  • Strong leadership skills (strategy / objectives-setting, planning, organizing, reporting, etc.)
  • Confident presentation, project management, problem-solving, training/coaching, and conflict resolution skills
  • Ability to demonstrate working in a team-oriented, collaborative environment
  • Demonstrate strong interpersonal skills with an ability to influence and facilitate a cyber-aware culture within the organization
  • Ability to interpret cyber-related regulations (NERC/CIP, SOX, etc.) and laws and communicate effectively to all levels of the organization
  • Bachelor's degree and relevant work experience focusing on the design and management of Cyber Security programs is required
  • Minimum 10-15 years of related experience with an equivalent combination of education and experience
  • Information security certifications is preferred (CISM, CISSP, etc.)
  • Solid knowledge of cyber-related ISO and NIST standards/frameworks
  • Strong knowledge of Cyber security toolsets and processes from a wide industry perspective is preferred
  • Computing and/or MIS Designation is considered an asset
55

Senior Manager, Cyber Security Technologies Resume Examples & Samples

  • Provide leadership for the Cyber Technologies team dedicated to reducing the a) number, b) the duration and c) the impact of cyber security incidents
  • Lead the engineering, implementation, management and operation of cyber security technologies to ensure effectiveness of protection, monitoring and response capability
  • Provide leadership in maintaining effective interlock with delivery partners (e.g. IT, Network)
  • Keep current, and provide cross-team leadership, on emerging security technology
  • Provide leadership for the definition, development, and oversight of an integrated security architecture
  • Provide thought leadership for introduction of Machine-Readable Threat Intel (MRTI) and AI into the integrated security architecture and roadmap
  • Provide leadership in the development and operationalization of on-going threat reporting, monitoring key trends and defining metrics to regularly measure control effectiveness for priority assets and environments
  • Ensure personal, professional development for both technical and soft skills; encourage a culture that supports the development of innovative and effective solutions that enable cyber security protection, monitoring and response
  • Direct development of processes, procedures and playbooks for operational effectiveness
  • Manage vendor relationship for cyber security technology and related managed services
  • Provide leadership to team for ongoing development of individual capabilities, to ensure continuous and timely support and delivery of cyber security technology
  • Strong understanding of cyber security controls and frameworks (NIST, CIS, SANS, COBIT)
  • Strong understanding of regulatory controls related to security (e.g. SOX & PCI)
  • University degree or equivalent industry experience
  • Advanced knowledge of various cyber security technologies, frameworks and products
  • Strong understanding of security technologies (e.g. SIEM, TVM, DLP, TIP, AV, IDS/IPS, Encryption)
  • Advanced understanding of businesses and/or organizational practices/ disciplines
  • Experience in managing a team of diverse, dedicated cyber security analysts and officers
  • Strong managerial, communication, financial and leadership skills
  • Ability to manage multiple complex deliverables in a fast paced, dynamic environment
  • Excellent verbal and written communication and facilitation skills
  • Recognized security certifications: e.g. CISSP, CISM, CISR, CISA
  • Provides functional / technical leadership to own team
  • Works on multiple large or complex projects
  • Makes technical decisions aligning to middleware roadmap and standard
  • Coaches and mentor developers and supports their career aspirations
  • Expert level understanding of Middleware Technologies
56

Senior Engg Manager Cyber Security Resume Examples & Samples

  • Lead, manage, and direct a team of Product Security professionals
  • Support NPI project product security process activities including threat modeling, final security reviews, threat vulnerability assessment, security testing, etc. for software and firmware development efforts in HBT
  • Provide product security related coaching/mentoring and security expertise
  • Lead and coordinate local cross-functional activities to support incident response
  • Drives continuous improvement through internal and external benchmarks, and baselining practices to industry standards
  • Ensure best practice sharing and cross-learning across different sites
  • Understand the business priorities to derive Strategic Action Plan (STRAP) for developing strategies, skills and infrastructure needed to as per product roadmaps
  • Working with Leadership for deriving Annual Operating Plan (AOP) and ensuring mechanisms for financial tracking
  • Drive goal setting, performance appraisals, competency development and career planning for the teams
  • 10+ years of software development with at least 5 years in developing secure systems
  • 3-5 years managing teams
  • Certifications in security and privacy demonstrating deep practical knowledge such as ISC² CSSLP, CISSP or CSSP
  • 2 years experience as a product security professional
  • Understanding of security by design principles and architecture level security concepts
  • Master’s degree in computer science or software engineering, or equivalent
57

Junior Marketing Manager Cyber Security f/m Resume Examples & Samples

  • Supporting the development and execution of the marketing plan with campaigns using both digital and traditional marketing techniques (Exhibitions/content generation/website)
  • Gathering and analysis of both market and competitor intelligence
  • Increase brand awareness in the marketplace
  • Monthly reporting of marketing activity
  • Liaising with all relevant internal and external stakeholders Tasks
  • Degree in Business, Marketing, Communications or similar
  • Initial B2B experience, writing marketing collateral for business customer or technical Marketing would be expected
  • Advanced knowledge with PC and Microsoft Office Literate
  • IT security/engineering sector and CIM qualifications would be a plus
  • Initial experience in event organization
  • Good understanding and experience of digital marketing, marketing campaign and automation tools
  • Experience of working within a team and with projects, virtual teams
  • Creative with an ability to look at things differently and to think outside the box, attention to details
  • Fluency in English and German
58

Project Sourcing Manager Cyber Security Resume Examples & Samples

  • Ensuring coherence between Programmes and Procurement matters and as such defining and agreeing the appropriate procurement approach
  • According to sourcing strategies & project constraints, overall organising of the tender evaluation & supplier selection/negotiation process for the project
  • Coordinating the Supply Management functions supporting the proposal (Procurement Contract Management, Commodity Management, Supply Chain & Quality Management, Supplier Development Management)
  • Ensuring that procurement processes are correctly and consistently applied
  • Preparing & submitting a cost brochure detailing Supply Management commitments (product prices plus procurement effort)
  • Within a Product Line / Project (when appointed to)
  • Master's degree (or equivalent) specialising in procurement or IT engineering
  • At least 3 years of experience either as Buyer an IT environment or in IT engineering, ideally with supplier management responsibilities
  • Project management experience would be highly appreciated
  • Knowledge in IT: Hardware & Software
  • Knowledge in Purchasing: negotiation, contract management, supplier management
  • Adaptation, autonomy, communication skills, technical curiosity, negotiation skills and team spirit
  • French: negotiation level
  • English: advanced level
59

Senior Manager, Cyber Security Resume Examples & Samples

  • Lead a team of 3-5 Senior Cyber Security Analysts on assigned regional Service Management team
  • Act as the main customer point of contact in working with Sony Operating Companies in assigned region, ensuring quality of service delivery of Sony security team efforts
  • Translate individual Sony Operating Company requirements into technical monitoring and detection solutions
  • Interface with Sony Operating Companies in assigned region to assess cyber security, monitoring, and reporting requirements
  • Ensure assigned Operating Companies are providing log and alert data for key data-sources in their environment, work to oversee onboarding of additional data sources to achieve higher monitoring and detection maturity levels
  • Collaborate on the development of advanced detection and monitoring content for Sony’s global infrastructure and systems
  • Act as primary liaison for OpCo customer service, reporting, and audit response efforts
  • Collaborate on the integration of cyber security tools into the global monitoring and detection framework
  • Ensure assigned analysts follow established technical procedures
  • Advanced knowledge/experience with SIEM, IDS/IPS, firewalls, advanced malware detection systems and other cyber security platforms is strongly preferred
60

Manager Cyber Security Operations & Cyber Threat Intelligence Resume Examples & Samples

  • Works closely with the Director of Information Security and the SOC team capable of providing freedom of action in every cyber environment Zappos operates
  • Develops and leads the Zappos Security Operations Center
  • Develops and leads the Zappos Security Operations Center Intelligence team to ensure security threat information, system log information, and sources of external intelligence are combined to provide real time response to cyber events
  • Take action on alerts, events, and incidents escalated to the Zappos SOC
  • Motivate and coach SOC Team Members on specific da-to-day tasks, as requested
  • Provide timely and actionable threat intelligence in line with the business objectives
  • Develop and implement a proactive program to improve intelligence gathering, analysis and dissemination
  • Provide input into the training plan and continual process improvement for the SOC Analysts
  • Own the incident management lifecycle and instruct others on its workflow
  • Establish and maintain intrusion detection policies and offense rules
  • Works closely with IT Operations, Systems Infrastructure, and other functional area specialists to ensure threat indicators are rated by severity and responded to in a manner consistent with the threat
  • Integrates the global strategy and approach to sourcing and integrating external sources of cyber intelligence
  • Defines, gathers and reports on metrics regarding all security systems within the Zappos networks
61

Senior Manager, Cyber Security Resume Examples & Samples

  • Plan, design, manage and lead enterprise Incident Response Plans and activities
  • Bachelor’s degree in computer science, networking, engineering, or other computer-related field of study preferred, or demonstrated ability to meet the job requirements through a comparable number of years of applicable work experience
  • Extensive experience with Tripwire, SIEM, Event Logging, Alerting systems
62

Senior Manager, Cyber Security Resume Examples & Samples

  • LI-MANUAL-POST-JOB*
  • Security strategy, assessment, designing and implementing security strategy, governance frameworks over processes, controls, organisation and infrastructure to management cyber security (Essential)
  • Security transformation programmes – design and management of security solution implementations and / or remediation programmes to address risks (Essential)
  • Identity and access management (IDAM) or Incident Management (Essential)
  • Security policies and procedures, design and implementation of security policies, procedures, standards and controls in line with regulation and/or current standards, ISO27001 (Essential), NIST (Desirable), SANS (Desirable) etc
  • Security architecture – creating secure architecture designs for solutions, designing secure patterns for reuse and the delivery of architectural reviews (Essential)
  • Understanding of ISO27001 - Information Security standard (Essential)
  • Project and programme related qualifications; Prince II, Scrum, Agile (Desirable)
63

Manager, Cyber Security Services Resume Examples & Samples

  • Manage Governance Risk & Compliance platforms and services, including Policy, Risk, Compliance, Enterprise, Incident, Vendor, Threat, Business Continuity, Audit, and Security Operations Management
  • Oversee one or more eGRC/ITGRC platforms, such as RSA Archer, MetricStream, or BWise
  • Lead client teams and engagement teams in successfully delivering multi-tenant solutions and multiple work streams within Archer platform
  • Develop Archer solutions to support three or more of the following: SOX, PCI DSS, ISO 27001/27002/27005, HIPAA, Unified Compliance Framework, Enterprise Risk Management, Vendor Risk Management, Vulnerability Risk Management, Security Operations Management, Business Continuity Management, Audit Management
  • A minimum of five years of Information Security experience (with a minimum of five years of RSA Archer experience)
64

Manager, Cyber Security Resume Examples & Samples

  • Mentor analysts, senior analysts, and Cyber Security individual contributors to promote successful performance and career growth in alignment with department and enterprise objectives
  • Plan and execute appropriate protective measures to include policy, process, and overall security awareness
  • Excellent verbal and communication skills necessary to engage with diverse cross functional groups and present effectively to small and large groups
  • Lead security projects driven by groups both internal and external to Corporate Information Security
  • Ability to provide status reports and tracking updates to leadership
  • Working knowledge of security policy, compliance and control environment related to information security
  • Demonstrated experience with leadership role on at least one large project implementation
  • Demonstrated organizational influence, and ability to communicate with all levels of the organization
  • Experience working with risk and vulnerability management at a large corporation highly desired
  • SOX or PCI experience
  • Familiarity with Qualis
  • Experience operating network or server technologies
  • Excellent reporting skills
  • Bachelor Degree. Computer Science or Information Technology
  • Certifications in Information Security and Information Management, CISM, CISSP, CISA preferred
65

Manager Cyber Security Resume Examples & Samples

  • Must have experience in implementing, assessing, and improving cyber security programs
  • Must have experience security architecture concepts
  • Must have experience in project management; PMP is preferable
  • Must work with cyber team to develop security standards and solutions for new technologies
  • Experience preferred in NERC CIP, HIPAA, PCI, NIST CSF, COBIT, COSO, ISO27000
  • Understand cyber security testing, assessments and controls validation
  • Must have strong technical skill in Cisco, Microsoft, VPN, networking protocol (SNMP, HTTP, SOAP, SOA), encryption, Web Services, secure coding practices, threat modeling, vulnerability assessment, network and server security, including firewalls, VPN, anti-virus, patch management, etc
  • Understanding of defense in depth concepts and supporting security technologies, including but not limited to, identity management, federated identity services, access control, endpoint protection, firewalls, IDS/IPS, SIEM, application security controls, and public key infrastructure
  • Supervise development, application and maintenance of security requirements and architecture
  • Supervise development, application, and maintenance of IT procurement vendor/item security requirements
  • Supervise security review of technology implementations prior to releasing new systems to production
  • Supervise definition and management of identity, access management application security controls
  • Supervise cyber security professionals executing and operating the following cyber security processes
  • Develop, implement, and maintain accountable portions of the security program
  • Support definition of information security responsibilities and implementation of security processes
  • Support allocation of trained/skilled resources to implement the information security program and plan
  • Identify, manage, and maintain the work products required to implement the information security program and plan
  • Support security reporting and communications
  • Measure and monitor cost, schedule, and performance including security metrics (KRI/KPI)
  • Support review of the security program status with senior leadership
  • Identify, review, asses, and enable business services/functions that rely on / impact information security
  • Define, implement, and enforce information security policies
  • Support collection, analysis, and triage of threat information for cyber risk management purposes
  • Support governance of the security program including governance boards
  • Develop security controls and verify they are adequate to meet legal, regulatory, policy, standards, and security requirements including NERC CIP
  • Manage relationships with external security stakeholders (e.g. MS-ISCAC, E-ISAC, NYISO, NCCIC, DOE, DHS, US-CERT, ICS-CERT, FBI)
  • Support development of knowledge, skills, capabilities, and availability of the security team
  • Support enterprise-wide security awareness efforts
  • Ability to respond to Cyber Security alerts and communicate during off hours is required
  • Project delivery and staff supervision skills required
  • Knowledge of security architecture and cybersecurity requirements frameworks required (DOE ES-C2M2, NIST 800-53, NIST Cyber Security Framework, NERC CIP v5)
  • Experience using and applying a security controls framework required
  • Experience conducting cyber risk management required
  • Process oriented security design experience preferred
  • Knowledge of supply chain security preferred
  • Current knowledge and experience with market available cybersecurity tools and services preferred
  • Experience with following regulations: Health Insurance Portability and Accountability Act (HIPAA), North American Reliability Council Critical Infrastructure Protection (NERC CIP), Payment Card Industry (PCI)
  • Bachelor's Degree in a computer science/engineering or related technical or business discipline or equivalent experience required
  • Minimum 7 years of experience required including at least 5 years in cyber security, or a minimum of 9 years directly related experience for non-degree holders
  • Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM) is preferred
  • Ability to lift up to 20 pounds for racking of equipment
  • Approximately 10% travel primarily within NY State
66

Manager Cyber Security Resume Examples & Samples

  • Must have experience in implementing, assessing, and improving compliance program
  • Must have experience in NERC CIP
  • Should have knowledge of and experience is preferable in HIPAA, PCI
  • Must have experience in cyber security controls frameworks (NIST CSF, COBIT, COSO, ISO27000)
67

Manager, Cyber Security Resume Examples & Samples

  • Leads the team in the identification and detection of cybersecurity vulnerabilities across the enterprise
  • Responsible for the development of periodic reports used to communicate known cybersecurity vulnerabilities to appropriate stakeholders at all levels of the organization
  • Partner and collaborate with stakeholders to provide security expertise in the development of remediation solutions for security threats and vulnerabilities
  • Ability to deal effectively with stressful situations
  • Proven ability to lead and motivate staff
  • In-depth understanding of
  • SIEM (ArcSight, IBM Qradar, McAfee NitroSecurity, etc.) solutions
  • Vulnerability assessment tools (Qualys, ISS Scanner, Nmap, Nessus, Nexpose etc.)
  • Secure Web Gateway (BlueCoat, Microsoft Forefront) solutions
  • Network sniffers and packet tracing tools (DSS, Ethereal and tcpdump, WireShark)
  • Intrusion Detection & Prevention Tools such as SNORT/Sourcefire, Palo Alto, etc.)
  • Hands on experience with network architecture, including network security
  • Hands on experience with Active Directory security, including scans, best practices and security configuration
  • Hands on experience with Application Security controls including design, dynamic scans, static code analysis
  • Hands on experience with Incident Reponses process, procedures and Tools
  • Identity and access management (I&AM) experience with Active Directory, NTFS permissions, LDAP and Single Sign On (SSO) solutions
  • Standard technical writing tools including MS Word, Excel, Project and Visio
68

Information Risk Manager / Cyber Security Resume Examples & Samples

  • Provision of subject matter expertise (SME) on matters relating to information risk management
  • Assessment of information risks associated with technology projects, solutions and changes
  • Lead the provision of information risk management SME advice and guidance to key stakeholders across the Functions including multiple senior Managing Directors and Directors
  • Leading investigations, incidents and exceptions to address information risk management matters
  • As a key part of the Governance and Control management team support the implementation of an agenda of consistency, effectiveness and efficiency for Information risk management across the company
  • Understanding of the information or cyber risk issues that are relevant to our business and financial services more widely
  • Experience of working within information security, including infrastructure security architectures and configurations, application/database security, encryption mechanisms, logical data/information storage techniques, data management and mobile technologies
  • Experience of building and maintaining effective relationships at a senior level
  • Resilience, able to influence senior management when dealing with complex and competing objectives
  • Evidence of innovative thinking that challenges the status quo to improve control, efficiency, understanding
  • Demonstrable track record of strong team work and delivery, within and across departmental teams
  • Strong and successful matrix management experience would be beneficial
  • Strong analytical and project management skills would be beneficial
  • Strong communication skills, both written and verbal
  • Influencing and negotiating skills
  • Understanding of relevant regulatory environment
  • Information Risk background
  • Experience of working within information or cyber risk field, including systems audit or internal controls, preferably in the financial sector
  • Strong academic background, educated to degree level or equivalent experience
  • Relevant privacy/information risk qualifications e.g. CISA, CISSP, CISM
  • Experience of COBIT, ISO27001, ISF/IRAM, DAMA and other relevant frameworks
  • Information risk / operational risk, especially in relation to:-
69

NY Regional Sales Manager, Cyber Security Resume Examples & Samples

  • Extensive domestic travel is required, International travel may be required as necessary
  • Ideal candidates will have prior experience selling End Point security based products (such as Malware/Exploit Prevention, Anti-Virus, White Listing and other End Point Security techniques) in the Commercial and Enterprise markets working in a fast-paced start up environment
  • 5-10 years of above quota sales experience as a Regional Sales (Executive)/Manager selling End Point solutions
  • Other Requirements
  • Self motivated
  • Superb organizational skills
  • "Whatever it takes" attitude and motivation to deliver above quota performance
  • Prior startup experience, experience being one of the first RSMs into an organization
70

Manager, Cyber Security Services Resume Examples & Samples

  • Lead Privileged Access Management (PAM) projects, including Privileged User Identity, Privileged Password, session brokering, session management, and session recording
  • Help assist with management and execution of PAM solutions that adhere to applicable policies and comply with access management requirements
  • Guide the implementation of Role Based Access Controls (RBAC), including analytical role mining and entitlement analysis
  • Provide oversight with regard to building, configuration, and architecture of one or more Identity platforms, such as Privileged Access Manager and CyberArk
  • Administer Privileged Access Manager tools, including Quest TPAM, Dell TPAM, Lieberman Software, Xceedium, BeyondTrust, Oracle Privileged Identity Manager, and CA Privileged Identity Manager
  • Participate in strategic growth and business development initiatives
  • A minimum of five years of experience with Information Security or in a technology related field
  • Significant understanding of the implementation and functionality of Privileged Access and Account Management systems and controls
  • Strong experience with Powerbroker, Centrify, e-DMZ, Hitachi ID, and CA ControlMinder
  • Extensive understanding of RBAC methodologies
71

Manager, Cyber Security Services Resume Examples & Samples

  • Provide guidance and share knowledge with team members and participate in performing procedures, especially focusing on complex, judgmental, and/or specialized data protection and privacy issues
  • Plan engagement objectives, strategize to comply with professional standards, and mitigate risks inherent in the engagement
  • Review work performed by the engagement team and maintain relationships with client account leadership to manage expectations of service, including work products, timing, and services to be delivered
  • Manage the execution of Information Security and privacy inherent to client engagements
  • Identify technological opportunities and evaluate the Information Security and privacy impacts on the client's business
  • Demonstrate excellent project management skills, promote teamwork and individual accountability with engagement team members, and use available technology, tools, and KPMG Information Security assets to enhance the effectiveness of deliverables and services
  • A minimum of five years of experience with regulatory requirements and compliance issues in at least one of the following areas: PCI GLBA, EU Data Protection Directive, and International Cross Border & US State Data Privacy Laws
  • Bachelor's degree from an accredited college/university and seven years of work experience with at least two years in an Information Security leadership role; Master's degree and a minimum of five years of related work experience with at least two years in an Information Security leadership role is preferred
  • CIPP or CIPP/IT certified; non-certified hires are required to become certified within a minimum of one year from the date of hire
  • Experience with Information Governance and Information Security Strategy plans, and assessments using industry framework, such as ISO 27002 or NIST 800:53
  • Advanced written and verbal communication and presentation skills, teamwork and client service skills
72

Manager, Cyber Security Resume Examples & Samples

  • Design, development, implementation, and operation of an enterprise incident response and management program to include creation of planning documents, exercises, targeting intrusion discovery assessments, and actual response to detected events
  • Manage development and maintenance of Cyber Security Operations technology such as Anti-Virus, vulnerability scanning, SEIM and other security solutions
  • Oversee security activities related to remediation of system security vulnerabilities
  • Develop recommendations for technical security solutions that align with department vision and the needs of the business
  • Drive and/or participate in efforts to respond to privacy and security events
  • Manages the financial, time and resource aspects of a project against a set budget and project plan
  • Define service levels and manage them for the Cyber Security operations area
  • Assist and prepare the budget, forecast, and capital equipment reports
  • Provide expert support for cyber forensics collections and analysis in support of both cyber protection and legal activities
  • Manage incident response activities globally and provide expert advice, tracking and reporting to local responders, local IT, and security staff
  • Assist teams in the collection, preservation and eradication of malware on systems
  • Provide expert advice on the identification and mitigation of risks as they are identified thru forensics analysis and vulnerability discovery
  • Conduct technical level and business discussions, as it relates to incident response, cyber forensics, vulnerability management and threat analytics
  • Four (4) year degree or equivalent experience
  • 5 - 7 yrs of relevant IT security experience
  • 3+ years of information security management experience
  • 3+ years of experience managing a multiple site incident response team
  • 4+ years of experience utilizing forensics software tools, including live memory and systems analysis and “dead box” analysis
  • 4+ years of experience managing vulnerability and risk scoring information for a multiple site network
  • Excellent communication, organization, interpersonal and writing skills
  • Experience developing threat indicators to be used to develop SIEM alarms and correlated alerts
  • Experience integrating forensics tools to support cyber security analytics in a SOC environment
  • Demonstrated a high level of knowledge associated with incident response activities in a distributed environment
  • CISSP, CISM, or CISA certification preferred
  • Demonstrate expert knowledge in one or more of the following information security disciplines
73

Project Manager, Cyber Security Services Resume Examples & Samples

  • Provide leadership to the project teams, coordinate resources and ensure projects are delivered on time and according to the project scope
  • Conduct project planning, resource coordination and scheduling
  • Manage the entire lifecycle of the company's project portfolio, ranging from strategic planning initiatives to tactical activities
  • Conduct cost-benefit analyses, risk analyses and ROI calculations to determine project feasibility
  • Conduct stakeholder meetings and forums in order to solicit feedback, input and expectations; incorporate these into project plans
  • Produce regular reports (status, escalations, etc.) on the progress of projects; deliver these reports during regular stakeholder meetings
  • Reallocate resources across multiple projects where necessary; identify and resolve any resource allocation discrepancies
  • Manage projects on time, on budget and to client satisfaction
  • Complete documentation, metrics and reports
  • Interact directly with clients
  • Proactively identify potential problems and vulnerabilities and apply a structured approach to problem solving
  • Recognize and celebrate team success
  • Adhere to established methodologies for project management
  • Keep abreast and have knowledge of new technologies
  • Conduct project post mortems in order to identify areas for improvement; make recommendations based on findings
74

Senior Manager, Cyber Security Engineer Resume Examples & Samples

  • Manage the team of Cybersecurity Engineering professionals ensuring the required contribution to and delivery of the Global Information Security program and services
  • Manage transformation of high level and detail level designs of security safeguards into specific configuration sets for deployment
  • Provide Cybersecurity Engineering team’s organizational and technical input into the design, deployment and operational readiness of global Information Security management software and hardware devices including, but not limited to: AntiVirus defence, Intrusion Detection, encryption systems, authentication and access control systems, network scanning and vulnerability assessment
  • Cooperate with internal and external stakeholders, including Security Architecture and Cybersecurity Operations to support the Global Cybersecurity operational processes
  • Propose and implement improvements to the landscape of technical security safeguards, including technologies, systems and associated processes and procedures
  • Contribute to the development and engineering of procedures and metrics in relation to processes and tools operated by the Cybersecurity Operations team
  • Assist with the development and documentation of a global Cybersecurity architecture to assure confidentiality, integrity and availability of company IT assets
  • Manage activities of the Cybersecurity Engineering team including performance management, professional development and mentoring
  • Manage third-party specialists where necessary to support design, development and implementation of information security safeguards
  • Minimum of 10 years of professional experience in Cybersecurity, Information Security, Risk Management, IT Controls or other related areas, including minimum of 3 years in Information Security or Cybersecurity roles
  • Experience in information technology related positions with working knowledge of IT infrastructure, networks, databases, processing systems, web applications, mobile technology, cloud, big data and virtualization
  • Working knowledge of Cybersecurity principles, algorithms, protocols and technologies supporting encryption, authentication, access control, information systems attack patterns, intrusion detection, and network security
  • Working knowledge of IT governance frameworks and standards such as CobiT, ITIL, ISO27001/2
  • Experience in working with automated network and application security vulnerability scanners is preferred
  • Excellent communication skills, including ability to communicate across countries
  • Attention to detail combined with strategic perspective
  • Experience of estimating and planning work effort including managing risks and issues in relation to delivery of work
  • Commitment to ongoing professional development
  • Must be able to translate highly technical concepts into language that is meaningful to many audiences, including software engineers, business and technical leaders
  • Working experience with Palo Alto Networks firewalls is preferred
  • Direct experience working with a Managed Security Services Provider is preferred
  • Operational experience working with McAfee ePolicy Orchestrator is preferred
  • Bachelor degree in computer science, computer engineering, or information technology
  • At least one of the following certificates is mandatory: CISSP, CISM, CEH or GIAC
75

Product Marketing Manager, Cyber Security Resume Examples & Samples

  • Develop and execute overall product marketing strategies and roadmap for Enterprise Security suite of services and capabilities (Technology Services, Managed Security Services and Professional Services) across region and sales segments
  • Ensure A&P plan and marketing executions to supports overall product revenue and market share
  • Partner Sales and Product houses to drive demand and dial up high customer delight and engagements on chosen strategic priorities in Global Enterprise business
  • Disciplined execution of the interlock and cadence with cross-functional marketing teams, sales and product house through planned and structured approach
  • Marketing plan by quarters and work year
  • Execute to plan for A&P
  • Clear baseline of product positioning, value proposition document and plan
  • Partner and triangulate with marketing communications and digital team
  • Partner Sales to ensure timely rollout of sales enablement content
  • Communicate the value proposition of the products to the sales team and develop the sales tools (e.g. collaterals, customer events and training) that support the selling process of your products
  • Lead to plan and execute key below the line executive customer and product/partner events
  • Responsible for preparing materials and organizing events to engage research analysts
  • Market and customer research including voice-of-customer surveys and Market share analysis
  • Excel and execution of new product and services launches
  • BA/BS or equivalent working experience
  • 5 years of IT solution marketing experience
  • Experience in Information Security would be an advantageous
  • Experience in working with/in agency or large MNC marketing functions
  • Deep hands-on planning and executional experience in above the line and below the line marketing (events, b2b customer engagements)
  • Local and regional marketing experiences in a B2B tech industry
  • Project management skills and understanding how to manage the priorities of multiple stakeholders in a complex environment and focus on the delivery of results in the form of engagement
76

Manager, Cyber Security Operations Center Resume Examples & Samples

  • Serves as team leader and mentor, defining and driving goals and performance for SOC analysts
  • Manages vacation requests, time off requests, against schedule and other HR related requests
  • Ensure that Service Level Agreements are defined, tracked and met across SIE
  • Mentor and guide SOC Lead and Analysts and perform knowledge transfer to other teams as required
  • Be a leader in the expansion and growth of the SOC; drive integration of new products and services
  • Ensure that Standard Operating Procedures are being created and followed by the team
  • Identifies opportunities to improve security monitoring and operational tasks
  • Evaluate existing SIEM rules, filters, events and use cases and adapt to meet the business requirements
  • Work with outside teams in the development of a comprehensive set of operational security policies and standards designed to permit the organization to achieve its business objectives while effectively managing our security and compliance requirements of meeting PCI and SOX goals
  • Delegates to SOC lead to ensure project work is coordinated to Analysts
  • Works with SOC Manager in the creation of new operational processes and procedures
  • Assist in implementation of new SOC tools and applications and processes
  • Working knowledge of SIEM technologies, like Splunk ES, ArcSight, Nitro specific certification
  • 4+ years working within the information security field, with emphasis on security operations, incident management, intrusion detection, firewall deployment, and security event analysis
77

Manager, Cyber Security Resume Examples & Samples

  • Define, publish, and execute the overall IT security strategy with buy-in from operational and business stakeholders
  • Develop and implement processes and tools to ensure Federal Signal is securing its internal and external systems
  • Apply deep process and technical domain expertise within security operations as it relates to threat prevention, detection, and mitigation
  • Manages response, remediation, and recovery from cyber events that impact the company
  • Advise innovation and product organizations to drive a product security strategy that enables Federal Signal product and cloud services to be both secure and compliant
  • Partner with the audit organization to define and execute a risk and compliance roadmap with a governance structure
  • Builds collaborative working relationships across functions
  • Demonstrated experience in designing and implementing programs to secure and maintain systems consistent with industry standards and frameworks
  • Experience in overseeing business continuity planning / disaster recovery programs
  • Strong knowledge of IT security concepts in a risk based approach including prevention, detection, response and recovery
  • Experience in a decentralized, multi-division environment