Security Business Analyst Resume Samples

4.8 (114 votes) for Security Business Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security business analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
SM
S Mante
Sallie
Mante
544 Cruickshank Squares
Philadelphia
PA
+1 (555) 838 9480
544 Cruickshank Squares
Philadelphia
PA
Phone
p +1 (555) 838 9480
Experience Experience
Boston, MA
Security Business Analyst
Boston, MA
Treutel Inc
Boston, MA
Security Business Analyst
  • Manage own work load, work to forward plans and schedules without prompting
  • Establishes operational reporting schedule and builds necessary tools to generate and maintain them
  • Develops standards and processes for creation of regular operational security metrics
  • Manage information security risks as part of the Intarcia Security Governance Program
  • Liaise with financial teams to administer security capital and operational budgets and ensuring invoicing and billings for security vendors are managed
  • Present security awareness and training to GxP audiences and adjust accordingly (business, technical and management) either structured presentations or ad-hoc
  • Manages all areas of security vendor relationships, such as onboarding, agreements, SOW, licensing, procurement, renewals, etc
Philadelphia, PA
Cyber Security Business Analyst
Philadelphia, PA
Lesch-Abbott
Philadelphia, PA
Cyber Security Business Analyst
  • Work with Management to report on key metrics related to data issues, data quality etc
  • Establish and manage department communication processes, including the forward calendar of briefings to steering committees and other executive audiences
  • Develop and execute overall senior leader messaging and communications to expand Cyber Security’s reach, generate ideas and increase adoption of services
  • Product strategy and road map creation: Work in coordination with the development teams to support a rolling 6 - 12 month road map
  • Project Management: Works proactively with direct teams to deliver both strategic and tactical initiatives throughout the entire SDLC
  • Technical Documentation -- Working with Engineering to enhance documentation and collaboration among team
  • Successful business analysis of applications in an agile application development environment
present
Houston, TX
Information Security Business Analyst
Houston, TX
Kling-Torphy
present
Houston, TX
Information Security Business Analyst
present
  • Ensure proper risk and information security management is performed at the program and project levels
  • Help develop automated as well as manual access provisioning workflows
  • Establish and manage overall integration plans for small to medium size efforts
  • Perform Gap Analysis on application security structures
  • Ensure a process of continuous information security improvement through collection and analysis of stakeholder feedback and trend analysis
  • Identify and promote opportunities to achieve continuous improvement on information security within the an operational and process context
  • Document business and technical processes surrounding user access, segregation of duties, provisioning and identity management
Education Education
Bachelor’s Degree in Business
Bachelor’s Degree in Business
Webster University
Bachelor’s Degree in Business
Skills Skills
  • Excellent organizational skills and a proven ability to manage multiple priorities and ensure that deadlines are consistently met
  • Strong working knowledge of Microsoft office products such as (Excel, Word, SharePoint, PowerPoint, Visio etc.)
  • Good analytical / interpretation skills
  • Exceptional communication, analytical skills, attention to detail, and project management
  • Confident Windows and MS Office user
  • Fluency in both written and spoken English
  • Team-player attitude
  • Analysing and interpreting data to create accurate MI reports, making recommendations and following up actions where necessary to ensure the team can fully account for its people costs
  • Manage own work load, work to forward plans and schedules without prompting
  • Advance Excel user
Create a Resume in Minutes

15 Security Business Analyst resume templates

1

Security Business Analyst Resume Examples & Samples

  • Support the full implementation life cycle for projects as assigned
  • Responsible for executing project planning, requirements gathering, coordinate/perform testing and successful production migration
  • Responsible for process design, data integrity and user support of HRMS, Workday
  • Analyze impact and testing functionality for Workday releases or system enhancement
  • Participate in projects to provide essential recommendation or tactics related to current system functionality or business processes
  • Provide production support and serve as liaison between HR, HRIT and third party vendor on Workday related issues that cannot be solved by the Service Center
  • Obtain regular feedback on process and systems related issues and develop and implement action plans to address the issues
  • Keep up-to-date with alerts and updates via Workday Community
  • As an HR Operations professional is in imperative that the following design principles be met when executing on the above
  • Partnering with legal and compliance in order to ensure regulatory compliance
  • Upholding the Firm’s audit standards
  • Ensuring the proper data security for our Firms employee data
  • Designing processes for a sound employee, manager and HR user experience
  • Bachelor's degree required with at least 5 years of HR business experience
  • Hands-on experience with Workday, PeopleSoft, Oracle or SAP is required
  • Familiarity with HR business processes and systems
  • Experience in performing system requirements definition, design, development, configuration, and testing support
  • Strong verbal, written communication and organizational skills. Strong Microsoft Office skills in Excel, Access, Power Point, Project, etc
  • Ability to advise and question, as well as analyze and execute
  • Effective problem solving skills, high degree of initiative and creativity with a quality focus and strong attention to detail with minimal day-to-day supervision
  • Customer service focused with a sense of urgency
  • The ability to balance multiple priorities in a fast-changing environment
  • Must be a team player who enjoy high volume, fast paced and dynamic environment
2

Cyber Security Business Analyst Resume Examples & Samples

  • Develop and execute overall senior leader messaging and communications to expand Cyber Security’s reach, generate ideas and increase adoption of services
  • Establish and manage department communication processes, including the forward calendar of briefings to steering committees and other executive audiences
  • Develop a deep knowledge base around the JPMorgan Chase culture, including communication style and decision-making processes in order to efficiently execute business related tasks
  • Incorporate research and audience feedback in Cyber Security content decisions
  • Ability to work in a fast-paced, deadline-driven environment
  • Capacity to handle interrelated and complex issues concurrently
  • Disciplined self-starter with strong attention to detail and analytical and problem-solving skills
  • Ability to work well in cross-functional and international teams and create internal partnerships
  • Familiarity with technology and an eagerness and ability to expand that knowledge
  • Expert user of Microsoft PowerPoint, Word and SharePoint
3

Cyber Security Business Analyst Resume Examples & Samples

  • Perform complex data analysis in an evolving data environment
  • Identification of data specific issues and liaise with key technology partners in resolving them
  • Support transition/handover of data gathering, enrichment, storage, usage, etc. to a business as usual state
  • Work in a collaborative team of Information Security/Cyber and technology professionals
  • Must have strong client and vendor relationship building skills
  • Excellent presentation skills, and ability to communicate with various audiences, including end users, managers, and members of the IT team. Experience in supporting Information Technology or Cyber Security projects from inception to delivery
  • Quick learner who is easily able to understand new products, systems, applications and technologies
4

Information Security Business Analyst Resume Examples & Samples

  • Researches, designs, and implements information security Identity and Access Governance solutions for organization systems and products that comply with all applicable security policies and standards
  • Help develop automated as well as manual access provisioning workflows
  • Serve as a Subject Matter Expert (SME) for application security access provisioning solutions and audit compliance
  • Document business and technical processes surrounding user access, segregation of duties, provisioning and identity management
  • Provide education and consulting for application provisioning administration training to Business/IT users
  • Establish and manage overall integration plans for small to medium size efforts
  • Enjoy working with across technology teams and helping them solve their information security problems
  • Embrace a challenge and can think creatively
  • Be able to effectively influence others to modify their opinions, plans, or behaviors
  • Maintain an understanding of organizational mission, values, and goals and consistent application of this knowledge
  • The successful candidate will need to demonstrate proficiency in
  • Knowledge and experience working with
  • Operating Systems (Windows, UNIX, etc.)
  • Data Formats (XML, CSV, etc.)
  • Remote Management Protocols (SSH, RDP, WMI, etc.)
  • Effective verbal and written communication skills that include the ability to describe highly technical concepts in non-technical terms
  • RSA – IMG (formerly Aveksa)
  • Privileged Access Management Suites
  • Lieberman
  • Very good understanding of security controls, monitoring systems, reporting, and regulatory/business drivers that impact security policies and practices
5

Security Business Analyst Resume Examples & Samples

  • 3rd Level qualification (BA/BS required. MBA, MS Finance, CFA, CAIA designations looked at favourably
  • Business or systems analysis experience
  • Strong working knowledge of Microsoft office products such as (Excel, Word, SharePoint, PowerPoint, Visio etc.)
  • Strong ability to work with stakeholders at all levels within the organization to analyse underlying trends and issues and translate these into specific requirements
  • Excellent organizational skills and a proven ability to manage multiple priorities and ensure that deadlines are consistently met
  • Exceptional communication, analytical skills, attention to detail, and project management
6

Security Business Analyst Resume Examples & Samples

  • Bachelor’s degree in business, information technology, related field, or equivalent work experience
  • 2+years of experience as an IT business analyst
  • Understandingof security risk management principles
  • Stronganalytical, communication and problem-solving skills
  • Criticalthinking skills and the confidence to speak up about matters that needattention
  • Provenability to work with others in a team environment
  • Goodtime management skills and ability to prioritize work while meeting alldeadlines
  • Provenability in learning/communicating related to technical systems
  • Strongdegree of proficiency with Microsoft Excel, Word, PowerPoint, Outlook, Visio,Project, etc
7

Security Business Analyst Resume Examples & Samples

  • Develops standards and processes for creation of regular operational security metrics
  • Establishes operational reporting schedule and builds necessary tools to generate and maintain them
  • Administers project planning processes for security group
  • Works with security management to build projects documentation, such as requirements, cost, schedule, reporting, etc
  • Supports business unit security strategies from project and budgeting perspectives
  • Manages all areas of security vendor relationships, such as onboarding, agreements, SOW, licensing, procurement, renewals, etc
  • Liaise with financial teams to administer security capital and operational budgets and ensuring invoicing and billings for security vendors are managed
  • Support overall improvement of all processes and documentation within security group and across IT and business organizations
  • 2+ years of experience as IT business analyst
  • Understanding of security risk management principles
  • Strong analytical, communication and problem-solving skills
  • Critical thinking skills and the confidence to speak up about matters that need attention
  • Proven ability to work with others in a team environment
  • Good time management skills and ability to prioritize work while meeting all deadlines
  • Proven ability in learning/communicating related to technical systems
  • Strong degree of proficiency with Microsoft Excel, Word, PowerPoint, Outlook, Visio, Project, etc
8

Security Business Analyst Resume Examples & Samples

  • 5+ years of project management or related experience
  • 2+ years of experience in physical security or related security organization
  • Demonstrable experience with Microsoft technologies; Excel, OneNote, PowerPoint, Word, SharePoint, SQL Server and Power BI
  • BS or BA preferably in business management or data analysis related discipline
9

Global Security Business Analyst Resume Examples & Samples

  • Responsible for launching new projects in support of the Information Security strategy
  • Responsible for monitoring the entire program including investment and baseline initiatives
  • Responsible for developing a program master schedule
  • Provides support to the Information Security Group leadership team during the annual planning process
  • Contribute to the development of project proposals including determining project scope and deliverables
  • Responsible for facilitating the portfolio review process by partnering with internal team members to assess all project requests and define labor, hardware, software, and other associated project costs to support leadership prioritization and approval of initiatives
  • Responsible for partnering with the internal team on detailed budget requests and issues, reviews all project change controls to assess the impact on the project portfolio
  • Supports the Director of Strategy and Risk to identify opportunities on specific portfolio and operational improvement needs
  • Supports all department functions related to Information Security Portfolio Management
  • Bachelor's degree in Business Management, Finance, Accounting, or related discipline
  • 3+ years of experience in portfolio level management, project and program management
  • Working knowledge of information security industry frameworks (e.g. ISO, NIST, COBIT)
  • A self-driven and motivated individual with strong process management, analysis, problem resolution, technical, and improvement skills
  • Strong written and verbal communication skills including the ability to facilitate meetings and effectively lead discussions
  • Excellent organizational skills and ability to work independently
  • Ability to lead cross functional teams to successful completion of deliverables
  • Ability to build and maintain effective working relationship at all levels of the organization
10

Cyber Security Business Analyst Resume Examples & Samples

  • Requirements Gathering and Development -- Working with various teams acorss cyber to collect business requirements and develop technical requirements for Cyber Engineering to execute
  • Technical Documentation -- Working with Engineering to enhance documentation and collaboration among team
  • Develop Communication strategy for Vulnerability Management team to interface with Service Owners and Production management groups
  • Experience in information technology preferably with an emphasis on information security and/or IT infrastructure technology project management
  • Familiarity with Cyber Security & Information Security technology is preferred - Specifically Vulnerability Management
  • In Depth knowledge of Microsoft SharePoint and/or Confluence
  • In depth knowledge and understanding of technical execution disciplines (performance management, process improvement, architecture and design, communications)
  • General understanding of Financial Services and key drivers of business performance
  • Clear leadership skills and ability to exercise judgment and sound decision-making under pressure
  • Strong oral and written communication skills, able to communicate with senior Technology and Business management
  • Proven ability to influence others across all contributing teams and disciplines
  • Strong team player with the ability to build relationships from both a business and technical point of view
  • Experience managing resources that are geographically distributed and culturally diverse
11

Cyber Security Business Analyst Resume Examples & Samples

  • Coordinate with team lead to ensure goals and priorities are aligned
  • Respond to inquiries for service and detail alignment steps for prospective Subscribers
  • Work with admin team to obtain hardware recommendations required for quote generation
  • Generate new service and renewal service quotes
  • Create new or updated MOAs
  • Update database records with Subscriber information
  • Run database reports to identify expired Subscriber information and outreach for updates
  • Generate Subscriber and performance metrics
  • Support internal, external and teleconference meetings
  • A Bachelor’s Degree or a total of 12+ years of professional/relevant experience
  • 8+ years of relevant experience to include
  • Certification and Accreditation (C&A), DIACAP, RMF experience
  • Cyber Security Service Provider (CSSP) DoD 8530.01 Experience
12

Cyber Security Business Analyst Process Improvement Resume Examples & Samples

  • Works directly with stakeholders to elicit their input and feedback on process improvement initiatives
  • Collect and synthesize requirements into a cohesive functional design that delivers against business needs
  • Identify and manage upstream and downstream dependencies; clearly communicates those dependencies and impact with technology and business stakeholders
  • Identify and document internal and external people, process, technology and policy gaps
  • Facilitates root cause analysis, gap analysis and other process improvement approaches
  • Develop, test and present business process improvement recommendations to senior leadership
  • Partner with functional leads to identify opportunities for better collaboration and process improvement
  • 4+ years leveraging Agile or similar well-defined framework/methodology in a cybersecurity environment
  • Extensive experience creating end-to-end process workflows in a cybersecurity environment
  • Translate business needs into functional requirements that can be executed by a development team
  • Experience educating internal and external stakeholders on improvement actions required to accomplish future state goals and objectives
  • Strong data analysis, both quantitative and qualitative
  • Exposure to information security principles and relevant standards
  • Exposure to cyber and information security regulatory requirements
  • Must be able to evoke a sense of urgency and work well under pressure
  • Knowledge of ITIL framework
  • Proficient with Microsoft Project, PowerPoint and Excel
  • Six Sigma Black Belt
  • PMP or CAPM
13

Informaiton Security Business Analyst Resume Examples & Samples

  • Analyze, evaluate, diagram current business process
  • Define, understand and outline business gaps, issues, and objectives
  • Work with key business leaders, stakeholders, product owners to understand business process
  • Work with cross-functional teams to evaluate and recommend improvements
  • Assist in evaluation of potential software solutions, both off-the-shelf and internal solutions
  • Create function requirements, such as use cases or user stories
  • Work with testing teams to identify and clarify business process development
  • Understand business processes
14

Cyber Security Business Analyst Resume Examples & Samples

  • Experience leveraging BI Tools
  • Experience establishing new Data Quality routines in large organizations
  • Ability to lead new initiatives with minimal direction & deliver on time
  • Broad understanding of Information Security Controls
  • Knowledge in BI tools
15

Cyber Security Business Analyst Resume Examples & Samples

  • Requirements Definition: Define specifications for our applications ensuring that stakeholder requirements are met
  • Product strategy and road map creation: Work in coordination with the development teams to support a rolling 6 - 12 month road map
  • Project Management: Works proactively with direct teams to deliver both strategic and tactical initiatives throughout the entire SDLC
  • Analyze impact of proposed solution across the business, develop use cases to explain/demonstrate business requirements/specifications to IT team, and contribute a business or process perspective during design reviews
  • Testing Management: Author and execute tests to ensure that developed solutions implement defined requirements
  • Support external testing team's activities, ensuring appropriate test and stakeholder coverage
  • Facilitate implementation of new functionality through training sessions, demos, and the development of appropriate end user and support team documentation
  • Demand Management: Partner with business stakeholders to understand their demand; you will be responsible to solicit,
  • Assess, and review business requirements and advise on options, risks, and costs
  • Successful business analysis of applications in an agile application development environment
  • Demonstrated experience influencing and negotiation with key stakeholders
  • Able to work in an extremely fast paced environment and meet deadlines
  • Experience in writing technical requirements / user stories
  • Experience in defining acceptance criteria as test scenarios
  • Results-oriented with a proactive approach to resolving problems
  • Collaborates extremely well with cross-functional partners, including Technologists, Quality Assurance, Implementation Engineers and Project Managers
  • Outstanding written/verbal communication skills with experience distilling and presenting complex quantitative analysis
  • Proven critical thinking ability
  • Demonstrated experience with project management activities
  • Highly desired experience with
16

Security Business Analyst / Project Manager Resume Examples & Samples

  • By providing top quality business analysis expertise to GIS Shared Services programmes or projects
  • Ensuring new developments adopt an integrated multi-channel approach delivering a world class client experience
  • To drive the delivery of new developments to time, cost and quality and the designs are in accordance with the business strategy, goals and objectives
  • To contribute to the leadership of GIS Shared Services, demonstrating commitment to the team’s goals coupled with dedicated and singular focus on execution and delivery
  • Work on high impact project, taking prime responsibility for identifying, quantifying, planning, and controlling all business analysis delivery related activity. Alongside this ensure the quality of requirements and subsequent solution is fit for purpose
  • Lead on the definition of requirements to meet the businesses strategic objectives on specific large or complex workstreams or elements of demand
  • Lead on facilitation and diagnostic activities to establish and assess/prioritise business requirements including interviews, workshops, and data collection
  • Responsible for business analysis, project managing and defining the future state of business processes associated with change initiatives
  • Produce business requirements, design documentation, process flows, and project delivery documentation
  • Be creative, innovative and proactive in managing requirements scope, identifying solutions to problems or issues and ensuring that the resulting customer experience is optimal
  • Lead the design and development of complex business models/solutions
  • Record risks and issues regarding business area specific constraints or considerations
  • Initiate, formulate, and present recommendations based on analysis in order to influence the decisions made by GIS
  • Support the Barclays Change Lifecycle (BCL) and Design Data Lean Agile (DDLA) delivery methods
  • Actively contribute to the realisation of the project aims and objectives
  • Support all Training deliverables and tasks
  • Expert in the in the delivery of high-quality business analysis
  • Expert in employing a broad and diverse range of business analysis best practices, disciplines, methodologies and tools
  • Comprehensive knowledge of Project and Change Management tools and techniques
  • Highly competent in developing own and others’ capability within a team environment
  • Knowledge of Barclays online platforms, including the technology profile and customer experience
  • Exposure to Risk and Rigour Management and Corporate Governance, including Regulated practices
17

Information Security Business Analyst Resume Examples & Samples

  • Manage the delivery information security methodologies according to pre-defined and agreed project plans and achieve agreed targets
  • Identify and promote opportunities to achieve continuous improvement on information security within the an operational and process context
  • Collect and analyze information security health checks from stakeholders within SITA
  • Ensure a process of continuous information security improvement through collection and analysis of stakeholder feedback and trend analysis
  • Lead a virtual team of stakeholders to develop and implement information security action plans to identify gaps and resolve identified major issues
  • Ensure regular security process compliance checks with the various process owners within SITA and agree on action plans
  • Define and implement a Root Cause Analysis methodology and process for information security issues, including communication plans, process development and Key Performance Indicators (KPI's)
  • Ensure proper risk and information security management is performed at the program and project levels
  • 7 years of experience in a business analyst role with an emphasis on quality, process or security improvement
  • 7 years of experience in IT industry with the implementation of processes & procedures
  • Information Security Management Processes
  • Service Management Processes
  • Business Process Management and Improvement
  • Competent in Microsoft Office
  • Knowledge of information security frameworks (PCI, NIST, ISO27001, ISO27002) would be an asset
  • Ability to understand complex organizational contexts
  • A strong business acumen
  • Ability to gather and understand complex & diverse sets of data
  • A disposition to ensuring quality in all aspects of the organization
  • Has successfully completed a Bachelor's degree in Business administration, Business Management or Computer Science or Information Technology or can demonstrate equivalent work experience in an associated profession
  • Professional Business Analyst Certifications are an asset: CBAP, CCBA, PBA
  • Certificate in Business Analysis would be an asset
18

Security Business Analyst Resume Examples & Samples

  • To produce weekly and monthly MI reports to support Security Directors
  • To produce monthly dashboards for a portfolio of security contracts
  • To drive the delivery of contract commitments within cost targets, contract profit
  • To operate under close supervision and direction from the Head of Contract Security
  • Fluency in both written and spoken English
  • Confident Windows and MS Office user
  • Team-player attitude
  • Analysing and interpreting data to create accurate MI reports, making recommendations and following up actions where necessary to ensure the team can fully account for its people costs
  • Manage own work load, work to forward plans and schedules without prompting
  • Advance Excel user
  • Good analytical / interpretation skills
  • Confident English usage is a must
19

Security Business Analyst Resume Examples & Samples

  • Security Training and Awareness
  • Manage information security risks as part of the Intarcia Security Governance Program
  • Risk management experience 1-3 years
20

Security Business Analyst Resume Examples & Samples

  • End Point protection systems
  • Maintain Intarcia’s security tools
  • Work with Intarcia users to ensure they don’t run into any issues with IT/security tool sets
  • Demonstrate personnel management experience and/or team leadership capabilities
  • Experience in leading projects to implement new security solutions
  • Experience in working with the end users and ensure their issues are resolved
21

Information Security Business Analyst Resume Examples & Samples

  • Compile raw data into actionable reports for decision making purposes
  • System Administration for the Tenneco enterprise Information Security Risk Management automated tool. Configuration of the tool including but not limited to; creation or selection of information security and risk management surveys, controls, assignment of ownership of information systems, business processes, applications, and other applicable tool tasks
  • Manages the Data Loss Prevention (DLP) Process for Business response, tracking and reporting. The Information Security Business Analyst (ISBA) III serves as the technical representative to interface with the Tenneco business units. The ISBA must ensure that the applied controls are in alignment with Tenneco policy for data leakage protection
  • Search and provide continuous improvements and development suggestions for internal audits
  • Assist with the recommendations of information security controls or process improvements
  • Lead or participate in Information Security Risk Assessments of Third Party Vendors
  • Lead or participate in internal Information Security Risk Assessments of Tenneco Information Systems
  • Participate and Facilitate IT Risk Assessments of Tenneco IT processes, policies, and controls
  • Report and Monitor Information Risk Action Plans
  • Serve as a Lead resource for Information Risk Management program activities which include engaging Tenneco Business and Information Technology Leadership
  • Multiple years of success working on both technical and business teams as related to information governance risk and compliance
  • Facilitating a metrics and reporting framework to measure the efficiency and effectiveness of the program, facilitating appropriate resource allocation, and increasing the maturity of the security
  • Proficiency with common information security management frameworks. Demonstrated ability to communicate effectively with stakeholders and customers regarding technical and business concepts
  • Evaluate and assess emerging security threats, vulnerabilities, and works with business and IT personnel to identify risk to Tenneco
  • Demonstrated experience with global or multinational clients
  • Excellent written and verbal communication and presentation skills for leadership, technical, and business audiences
  • Analytical/problem solving ability; critical thinking skills
  • Strong ability to communicate across all levels of the organization
  • Ability to communicate with technical and not-technical personnel security risk and mitigation options
  • A Bachelor degree and a minimum of five years of related experience is required
  • Monitors due diligence of information security risk processes and results on an ongoing basis
  • Identifies and evaluates the magnitude and documents information security risks ensures necessary approvals are obtained
  • Manages Information Risk Issues to ensure that these are current, accurate supported by sound resolution plans or formal risk acceptance by business executive
  • Experience in operating, monitoring and enforcing security policies, standards, tools, controls, and systems in large scale organizations
  • Demonstrable understanding of information security and control principles and technology
  • Experience of working within a quality, compliance, and security management framework
  • Experience with data analytics tools is a plus
  • Experience with administration and Configuration of an Information Security Risk Management Module of GRC Tool is a plus
  • Experience with administration and Execution of Data Loss Prevention (DLP) business processes in a corporate environment is a plus
  • Enterprise Resource Planning (ERP) tool security experience a plus
22

Security Business Analyst Resume Examples & Samples

  • Determine business requirements and define solutions to address business, process, information and system problems
  • Define, scope, document and validate the requirements of internal clients using best practice methodologies
  • Suggest solutions to identified or tacit business issues and promote the reuse of existing assets and compliance with enterprise architecture
  • Support and manage projects and programmes including mitigating of risk and delivery of end user training
23

Lead Cyber Security Business Analyst Resume Examples & Samples

  • You will deliver operational capabilities to rapidly and effectively identify, detect and respond to cyber security events, vulnerabilities, and threats targeting Credit Suisse
  • You will redefine and align the IT security strategy to future business objectives
  • You will demonstrate industry good practice expertise to improve the maturity of security services
  • You will define the future in detecting suspicious activities by privileged users
  • You will also be tasked to recommend strategies to meet local and regional regulatory cyber security requirements, and to translate these requirements into specifications meaningful to senior management and partners as well as Engineering
  • Design and architecture definition of a Security Information and Event Management (SIEM) solution with the Security Operation Centre (SOC) roles to professionalize the existing Splunk infrastructure to function as a fully operational SIEM
  • Be at the forefront of Cyber Thought Leadership in response to market changes and new challenges faced today
  • Advise on how to efficiently remediate vulnerabilities, manage IT risks and improve the overall cyber security posture and resiliency of Credit Suisse
  • Simplify existing processes and workflows of onboarding of sources to reduce overall costs of service without compromising security
  • Understand and manage the effect of changes at the controls level (policies, regulatory requirements) and the technical level (infrastructure changes)
  • Support Engineering to develop solutions; oversee overall delivery to meet quality and requirements of requestor
  • The role requires thought leadership, strong presentation and analysis skills, and the ability to interact with senior management
  • A minimum of 5+years of professional experience in a cyber security, information security or IT risk consulting role
  • Good understanding of the value proposition that comes with technical product such as SPLUNK, Tripwire, Quaylys and Archer
  • Experience in setting up global Security Operations Centers (SOC) as well as Security Information and Event Management (SIEM) capabilities
  • Excellent business analysis skills, inclusive of the ability to communicate with senior management
  • Ability to compress knowledge to an easily understandable level for circulation to a wide audience from outside the department
  • Ability to lead, advise, and coordinate global workgroups
  • Strong understanding of the threat landscape combine with problem solving skills to define counter-threat measures
  • Hands-on experience in the following domains: cyber threat management, vulnerability management, access management, malware protection, ethical hacking and penetration testing
  • Practical knowledge in applying information security standards (e.g. ISO 27001) and/or cyber security best practices (e.g. NIST Cybersecurity Framework)