Analyst, Security Resume Samples

4.5 (71 votes) for Analyst, Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the analyst, security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
HS
H Stanton
Heber
Stanton
493 Alta Mission
Los Angeles
CA
+1 (555) 352 8481
493 Alta Mission
Los Angeles
CA
Phone
p +1 (555) 352 8481
Experience Experience
Boston, MA
Analyst, Security
Boston, MA
Denesik, Ruecker and Hane
Boston, MA
Analyst, Security
  • Assists in providing information security training to all employees, contractors, and other third parties
  • Assists in setup, maintenance and testing of security monitoring software
  • Assists in conducting scheduled information security monitoring audits
  • Monitor and audit user activity and trends to insure proper use in detecting security violations
  • Produce press and marketing material to promote IHS products
  • Assists in documenting information security policies and procedures
  • Active, daily monitoring of HA’s Aviation Security Dashboard to identify, communicate and mitigate risks in the operation
Chicago, IL
Analyst, Security Systems
Chicago, IL
Erdman-O'Kon
Chicago, IL
Analyst, Security Systems
  • Assist with the coordination and facilitation of IT security control re-testing, correcting deficiencies, and status reporting
  • Responsible for performing security reviews of IT projects (new and ongoing)
  • Assists IT Security and Compliance Manager in providing input and representation on key security initiatives, meetings and committees
  • Manage enterprise Identity and Access Management
  • Manage VPN access
  • Perform other duties as assigned
  • Assist in configuration, testing and implementation of applications, IT security and network devices
present
Detroit, MI
Senior Analyst, Security
Detroit, MI
Rutherford and Sons
present
Detroit, MI
Senior Analyst, Security
present
  • Performing litigation support associated with Electronic Stored Information which includes but is not limited to the following
  • Performing intrusion detection analysis and coordinating remediation
  • Performing anomaly detection analysis and coordinating remediation
  • Reducing risk through threat mitigation which involves supporting the following
  • Interact with divisional peers in order to satisfy inter-division preservation notices
  • Provide coaching and guidance to Associate Technical Specialists to support their competency development and ensure their effective contribution to team objectives
  • Maintain ongoing inventories of custodians and associated legal matters
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Kennesaw State University
Bachelor’s Degree in Computer Science
Skills Skills
  • Strong attention to detail with analytical and critical thinking abilities
  • Ability to professionally counsel and consult with clients
  • Highly effective organizational and prioritization skills, including the ability to stay on task and maintain focus in a fast-paced environment
  • Ability and willingness to speak at conferences, events, and in media interviews
  • Technical and commercial experience in the Security industry
  • Fluent in English with effective verbal and written communication of English language skills including familiarity with business language
  • Self-motivation and natural curiosity are essential
Create a Resume in Minutes

15 Analyst, Security resume templates

1

Senior Analyst, Security Resume Examples & Samples

  • Reducing risk through threat mitigation which involves supporting the following
  • Performing vulnerability scanning which includes analysis and coordinating remediation
  • Performing litigation support associated with Electronic Stored Information which includes but is not limited to the following
  • Use approved applications to preserve custodial data required by preservation notices
  • When required perform keyword searches against collected data
  • Use approved ticketing systems to properly resolve all litigation requests
  • Interact with divisional peers in order to satisfy inter-division preservation notices
  • Maintain ongoing inventories of custodians and associated legal matters
  • Participate in the vetting of new applications used to support the collection of ESI
  • Ensure all systems or applications, used or managed by information security are available and functioning as required in order to comply with any legal requests
  • Interact with various support teams in order to comply with any preservation notices or other internal investigations
  • Participates as appropriate in the planning and implementation of any Viacom Information Security projects
  • Participates as appropriate in any MTS or Business unit project with information security implications
  • Assist in performing security risk evaluations and penetration assessments with Senior Information Security staff members
  • 5 – 7+ years of relevant work experience
  • Bachelor’s Degree – or equivalent work experience; MS Degree optional
  • 3 - 5+ years in an information security role
  • Technical Skills◦TCP/IP and other related protocols
  • Vulnerability scanning, intrusion detection, anomaly detection and associated technologies
  • Tools, techniques and standards used to conduct network penetration testing of assets in a Windows, Unix, Linux or FreeBSD platform
  • OSI layer 2, 3 and 4 and associated functionality
  • Firewalls, rule base analysis, stateful inspection, encryption and associated algorithms
  • SQL, MySQL, Oracle and associated hardening best practices
  • Able to read, understand and interpret any of the following
  • Packet captures
  • Regex expressions
  • Firewall Rules
  • Access Control lists
  • Consistently demonstrates the drive to be deliver successfully even under difficult timelines
  • Has strong analytical, methodical, investigative and auditing skills
  • Is a critical logical thinker who is efficient and orderly
  • Comfortable with being a project lead or a project resource
  • Must be reliable and available 24/7
  • Consistently demonstrates the drive to deliver successfully even under difficult timelines
2

Analyst Security Monitoring Technologies Resume Examples & Samples

  • Design and generate reports using Jasper/JRXML
  • Setup data/feed import jobs in the monitoring tool
  • Create Security monitoring rule sets in Securonix
  • Implement and troubleshoot jar/war file updates
  • Configure email templates using html
  • Workflow management
  • Perform data validation/sanity checks" Qualifications/Requirements: "* Bachelor's degree in Information Technology/Engineering/Science with alteast 4 years of experience in the following areas
  • Working experience on any Security Tools and Monitoring Technologies
  • Java Programing, XML in Information Security context
  • Experience in MySQL adminstration
  • Experience in Apache and Tomcat
  • Experience in Jasper reporting, Regex, HQL
  • Basic Linux Operating System experience
  • Knowledge of SDLC and ITIL framworks
  • Working experience related to data feeds import to the applications
  • Good understanding of the IT systems event logs
  • Strong communication skills and experience working in a global, multicultural environment with flexible working hours
  • Highly motivated self-starter " Additional Eligibility Qualifications: Desired Characteristics: "* Working knowledge in Splunk and Securonix * Java and MySQL certification would be an added advantage"
3

Systems Analyst, Security Senior Specialist Resume Examples & Samples

  • Contributing to the implementation of Shire’s security controls environment. Provide consultation for configuration and technical administration of security technologies managed by IT Infrastructure. Review requirements and outcomes of security technologies managed by IT or Third Parties
  • Identify new threats, supports and reports mitigation actions
  • Identifying and resolving root causes of security related problems
  • Responding to security incidents, conducting forensic investigations and targeted reviews of suspect areas with demonstrated in-depth knowledge of networks operating systems, intrusion detection systems, event logs and event correlation
  • Establishing baselines and monitor/report on trends and anomalies. Ensures security controls are effective in preventing, detecting and countering cyber risks
  • Enhancing identification of security incidents and response processes and procedures in a timely manner. Working together with application development and database management to fine-tune application/database level protection and give input for secure software development and database administration
  • Working with the information security team to develop strategies and plans to enforce security requirements and address identified risks
  • Assessing the criticality of vulnerabilities, determine and initiate the required remedial action
  • Conducting periodical examinations of computers, system logs, applications and networks security events
  • Providing reporting on security exposures, including attempts and/or misuse of information assets and noncompliance
  • Verifying protection levels against end user threats as it relates desktop, laptops and mobile devices
  • Consulting with clients on the data risk of their resources
  • Providing security support for application and infrastructure related projects
  • Producing metrics to be used for management status and statistical reports
  • Analyzing reports and making recommendations for improvements
  • Working with third party vendors during problem resolutions
  • Interfacing with third party vendors to evaluate new security products or as part of a security assessment process
  • Evaluating and recommending hardware and software systems that provide security functions
  • 50%: Triaging and responding to found risks & incidents
  • 25%: Researching & monitoring for cyber risks
  • 25%: Reporting on risks and SME support to initiatives
  • Bachelor’s Degree preferred. Degrees in Computer Science, Engineering and Mathematics or related discipline preferred
  • Certified Information Systems Security Professional (CISSP) and/or GIAC certifications preferred; Certified Information Systems Auditor (CISA), Security+ in good standing a plus
  • 5-7 years consecutive hands-on experience configuring, utilizing, and interpreting industry leading network, application, web, database, and host vulnerability technologies, and serving as the technical security subject matter expert for remediation
4

Systems Analyst, Security Senior Specialist Resume Examples & Samples

  • Contribute to the implementation of Shire’s security controls environment. Provide consultation for configuration and technical administration of security technologies managed by IT Infrastructure. Review requirements and outcomes of security technologies managed by IT or Third Parties
  • Establish baselines and monitor/report on trends and anomalies. Ensures security controls are effective in preventing, detecting and countering cyber risks
  • Enhance identification of security incidents and response processes and procedures in a timely manner. Acts as principle resource for escalated security incidents and response
  • Work together with application development and database management to fine-tune application/database level protection and give input for secure software development and database administration
  • Work with the information security team to develop strategies and plans to enforce security requirements and address identified risks
  • Assess the criticality of vulnerabilities, determine and initiate the required remedial action|
  • Conduct periodical examinations of computers, system logs, applications and networks security events
  • Produce metrics to be used for management status and statistical reports
  • 25%
  • Certified Information Systems Security Professional (CISSP) and/or GIAC certifications preferred; Certified Information Systems Auditor (CISA), Security+ in good standing preferred
  • 10+ years of hands on experience in the design, implementation and management of large scale information systems in security sensitive environments
  • 8+ years consecutive hands-on experience configuring, utilizing, and interpreting industry leading network, application, web, database, and host vulnerability technologies, and serving as the technical security subject matter expert for remediation
  • Strong working knowledge of security related regulations/control frameworks, with GxP (21 CFR Part 11) HIPAA, HITECH, SOX, COBIT, or PCI DSS knowledge a plus
5

Analyst, Security Systems Resume Examples & Samples

  • MAJOR RESPONSIBILITIES
  • Responsible for the daily monitoring and remediation of IT security events across the enterprise in an overall effort to minimize the potential for a breach of security
  • Monitoring IT security events on a daily basis for suspicious activities (Servers’ event log, IT security applications and devices, , Firewalls, Antivirus, and Intrusion Detection System logs, etc.)
  • Support day-to-day operations and work closely with network and server teams, as well as the IT security compliance analyst to mitigate IT security related issues as required
  • Investigate, validate and help mitigate IT security alerts based on their priority
  • Conduct IT risk assessments, security and network access audits on regular basis
  • Perform vulnerability scans to identify weaknesses and potential IT security threats and/or violations
  • Manage enterprise Identity and Access Management
  • Manage VPN access
  • Assist with the coordination and facilitation of IT security control re-testing, correcting deficiencies, and status reporting
  • Conduct regularly scheduled internal and external vulnerability assessments and penetration testing
  • Assist in configuration, testing and implementation of applications, IT security and network devices
  • Responsible for the continuous monitoring and protection of information processing resources. Evaluate suspected IT security breaches and recommend corrective actions. Evaluate changes to the environments for security impact and work under guidance of Sr, Security Manager to correct risks
  • Responsible for performing security reviews of IT projects (new and ongoing)
  • Assists IT Security and Compliance Manager in providing input and representation on key security initiatives, meetings and committees
  • Understand and actively participate in Environmental, Health & Safety responsibilities by following established UO policy, procedures, training and team member involvement activities
6

Analyst, Security Policy Awareness Resume Examples & Samples

  • Design and administrate enterprise intranet for internal user population
  • Assist Security Awareness & Communications initiatives designed to support key business objectives, long-term goals, and projects. Educate employees on new initiatives, messages, tools, technologies, and services determined by senior management
  • Partner with IIS departments to develop and implement broad-based employee communications, providing employees with messaging and industry/competitive context for all key business initiatives
  • Assist with training employees on best use of new and available information security tools
  • Write and edit company-wide communications
  • Develop metrics to assess the effectiveness and impact of Security Awareness & Communications initiatives and tools. Recommend actions based on metric results
  • Provide employee communications for day-to-day operations
  • Regular, consistent and punctual attendance
  • Ability to form complex communications/messages in a simple, clear and concise manner to the various communities within our organization. This can include different cultures, nationalities, international locations and languages
  • Project management experience, the ability to plan, manage and maintain a complex, organization wide program over the longer term
  • Display practical knowledge of different message distribution techniques to ensure end user communities understand and continually apply the required behavioral change necessary to reduce the 'human factors' risk
  • Ability to communicate with and coordinate the activities of others
  • Understanding of the concepts of information risks and the different elements that make up risk. In addition, have at a minimum a basic understanding of the different concepts of information security
7

Analyst, Security Resume Examples & Samples

  • Provides timely, detailed and effective written and verbal communication on the status of design activities, risks and complex process administration
  • Amount of specialized knowledge, experience and confidence enables the ability to coach/train team members
  • Aids and may collaborate in the thought process of decision makers with validated observations, analysis and recommendations
  • Analyzes and/or organizes complex information with broad direction. Identifies trends. Actively seeks the input and opinions of stakeholders; explores and compares a wide range of options before acting; decisions are sound, timely, attentive to details and recognize constraints and resources available
  • As a subject matter expert, develops and presents recommendations from accurate assessments and/or analysis. Offers solutions and designs to solve process, project or program issues; provides recommendations to improve the efficiency and effectiveness. Defends a recommendation and can confidently support it
  • Independently possesses the ability to diagnose complex situations into manageable parts
  • Works collaboratively with stakeholders to understand constraints and expectations
  • 20%: Perform security review and testing on systems, databases, and other critical infrastructure. This includes technical analysis, exploit evaluation and a comprehensive risk assessment
  • 20%: Conduct application, data and integration security review and testing. This includes technical analysis, exploit evaluation and a comprehensive risk assessment
  • 20%: Review security related alarms, logs, and incidents and or exceptions
  • 20%: Perform security incident and event management
  • 10%: Responsible for the oversight and coordination of governance activities related to Information Security including but not limited to audits and assessments (PCI, SOX, etc..), e-discovery and regulatory matters
  • 10%: Provide Information Security and Compliance training and awareness
  • 5 years of direct full-time professional security work experience in two or more of the following security focus areas: Access Control, Systems Security, Network Security, Information Security Governance and Risk Management, Application Security, Cryptography, Security Operations, and Security Incident and Event Management
  • Strong written and verbal communication skills with ability to communicate with management
  • Focus on customer service and teamwork required
  • Ability to discuss detailed information with internal and external customers
  • Ability to compose reports, policy and procedure manuals, proposals and summaries
  • Ability to work flexible hours as required to meet business demands
  • Knowledge of one or more security solutions dependent on security focus area: (e.g. Security Operations = Logrhythm, Symantec Endpoint Protection, etc. e.g. Application Security = Burp, Nessus, Webinspect, Fortify etc.)
8

Senior Analyst Security & Threat Analysis Resume Examples & Samples

  • 5 years analytical experience in the government, law enforcement, military, or private sector threat intelligence analysis
  • Proven effectiveness in written and verbal communication to an executive level audiences
  • Foreign language, overseas work experience, travel, and professional network development
  • Substantial prior intelligence analysis track record, work ethic, and solid academic background
  • Demonstrated ability to independently build partnerships, networks, and sustainable working relationships with direct peers and key internal business partners
  • Subject Matter Expertise in one or more of the following: core Intelligence Collection Disciplines; regional geographic specialization; transnational threats; corporate intelligence; social media monitoring. Specialized training or skills in open source (OSINT), Human Intelligence (HUMINT), Counterintelligence (CI), Transnational Organized Crime, Cyber Security or Social Media intelligence
  • Currently possess, have previously possessed or be eligible to obtain - a US Government sponsored security clearance at the SECRET level or above
  • Social Media collection certifications; Cyber Security Certifications; or graduation from USG/DOD intelligence training
  • 5-10 analytical experience in the government, law enforcement, military, or private sector threat intelligence analysis
  • Bachelor’s degree in International Relations, Political Science, Global Security Studies, National Security or Regional / Cultural/ Area Studies
9

Senior Analyst, Security Support Resume Examples & Samples

  • Fraud and/or investigation experience preferred
  • Understanding of fraud attributes and the ability to isolate and identify throughout the enterprise
  • Ability to analyze, interpret and communicate fraud threats and trends effectively
  • Excel proficiency required communication skills; proven ability to interface effectively with senior levels of management and diverse stakeholders
  • Previous SAR filing experience is desired
  • 4-year college degree in a business, criminology, or related field is preferred
  • Strong oral and written communication skills; proven ability to interface effectively with senior levels of management and diverse stakeholders
  • Demonstrated proficiency with SQL and/or associated database query tools; strong working knowledge of Microsoft office applications
  • Strong attention to detail with a proactive approach to solving and mitigating problems
  • Ability to work under pressure/deadlines and manage multiple priorities
  • Demonstrated willingness to cooperate with teams and enhance business partnerships, balancing fraud reduction with business development
  • Ability to think creatively and abstractly to find new ways to accomplish goals and achieve universal results
10

Computer Security Analyst / Security Engineer Resume Examples & Samples

  • Minimum experience: 5 years’ information assurance / system security practical experience with Bachelor’s in Science degree (technical/engineering discipline); 3 years with Masters; 0 years with PhD. Four years’ additional relevant technical experience may be substituted in lieu of Bachelor’s Degree
  • No clearance is required to start, but must be able to obtain and maintain DoD Secret clearance
  • Experience working in system and software information assurance activities, including implementing information assurance processes
  • Advanced knowledge of information assurance and government security best practices and their implementation/application
  • Experience resolving complex situations for operational mission critical systems
  • CISSP or similar security certification
  • Knowledge of data management, processing, and exploitation
  • Familiarity with SAFe
11

Analyst, Security Support Resume Examples & Samples

  • Experience establishing and maintaining relationships with individuals at all levels of the organization
  • Experience working with database systems
  • Strong computer and analytical skills
  • Intermediate to advanced level software skills required (Microsoft Word, Excel, and Access)
  • Must be self-motivated, accurate and able to work independently
  • Experience using time management skills such as prioritizing/organizing and tracking details and meeting deadlines of multiple projects with varying completion dates
  • Willing to travel up to 10% of the time for business purposes
  • A Bachelors degree from an accredited four-year college or university with major coursework in business, criminal justice, statistics, or a closely related field, or a minimum of two years of professional experience performing data analysis; or any equivalent combination of education and experience that provides the knowledge, skills, and abilities needed for this position
12

Senior IT Risk Analyst, Security Resume Examples & Samples

  • Ability to understand the business requirements as well as provide a proposal of the appropriate information risk resolution to computer threats
  • Ability to lead customer/remediation meeting(s) for information security risk definitions, needs assessments and design reviews that impact all areas of business systems
  • Collaborate with Privacy and Legal departments for assessment improvements
  • 5+ years working experience with enterprise risk management programs, privacy, data security and control issues with technologies such as Cloud, SaaS, Linux, Windows, VMware, Intrusion Prevention, Automated Malware inspection, Web Proxies, Firewalls, routers and/or switches, SAST, Network Vulnerability Assessment or Data Loss Prevention firewalls, routers and/or switches
13

Logistics Analyst, Security Force Assistance Resume Examples & Samples

  • Provide program analysis that will help increase effectiveness of advisory efforts by collecting and analyzing data and developing decision support tools or products
  • Formulate and apply logistics models and other sustainment methods in order to develop and interpret information that assists management with decision making, policy formulation, or other sustainment functions
  • Understand Afghan data reporting tools such as CORE Information Management System (IMS) and LRAT, in order to extract necessary data for analysis and logistics planning
  • Analyze information obtained from Afghan systems to optimize and resolve logistics and readiness problems
  • Develop communication products that distill complex sustainment concepts or data into products that are understandable by senior leaders
  • Develop sustainment methods and procedures to include logistics models and planning tools or management systems to optimize equipment delivery schedules and sustainment priorities
  • Collaborate with others in the organization to ensure successful implementation of chosen problem solutions
  • Prepare management reports defining and evaluating ANDSF problems and recommending solutions
  • Possess advanced MS Excel, MS Word, and PowerPoint skills
  • Knowledge of military logistics, supply, and maintenance, and/or information technology systems
  • Five (5) years combined logistics, or data sustainment, and information management experience
  • Experience working logistics or sustainment at the strategic level within DoD is desired
  • Must have a final (not interim) SECRET Level Security Department of Defense (DoD) Clearance before deployment and must maintain that clearance
14

Senior Analyst, Security Resume Examples & Samples

  • A minimum of four (4) years of overall Information Analysis experience or specialized training
  • A minimum of three (3) years of professional experience
  • A minimum of two (2) years of experience in Information Collection Management
  • Demonstrated understanding of techniques, processes, procedures, and policies
  • Experience utilizing a variety of data sources, applications, and programs to collect, analyze, and identify potential information of interest
  • Experience writing and editing clear, concise collection requirements
  • Experience writing and editing final executive-level analysis
  • Ability to identify, document, and convey information requirements specific to Hilton executives and Business Continuity Management
  • Ability to develop an information collections and management strategy including the use of automated tools and external vendors
  • Ability to produce finished analysis from multiple open and/or sensitive sources
  • Ability to conduct post-incident debriefs and produce structured reports to document events, decisions, and lessons learned
  • Familiarity with collection management principles and processes and the capability of adapting them to open source, business-driven requirements
  • Ability to identify information and ensure alignment with relevant BCM standards and/or requirements
  • Ability to direct collaborative efforts of Team Members and external vendors, to deliver analytic products
  • Excellent analytic skills, capable of tailoring production to various audiences
  • Strong ability to present information and analysis to senior corporate executives and site-level safety and security personnel alike
  • Ability to assess information significance, triage, and escalate
  • Experience with and ability to use automated information toolsets to collect and manage information
  • MA/MS Master’s Degree
  • A minimum of five (5) years of professional experience
  • Information and/or Intelligence Management certification
  • Project Management experience (PMP preferable)
  • Secret-level security clearance (SCI-eligible)
15

Lead Analyst, Security Risk Resume Examples & Samples

  • Analyzes organizational security risks, interactions, develop and publish security risk handbook, and procedures for implementation ensuring alignment with appropriate standards and frameworks
  • Manage and execute risk identification, assessment and quantification, aggregation reporting, and monitoring processes. Interprets internal or external business issues and recommends solutions/best practices. Solves complex problems; takes a broad perspective to identify solutions
  • Analyzes external market dynamics and other data sources to assess trends and develop actionable insights and recommendations to management, via understanding of the business model and the information available for analysis. Assist in coordinating the security risk within the context of the security risk model
  • Develops presentations appropriate for senior level audiences and external regulators. May mentor and give work direction to less experienced colleagues
16

Senior Business Analyst, Security Resume Examples & Samples

  • Execute functional work stream deliverables, as part of the HR transformation project, in accordance with Rogers’ project management methodology
  • Participate in requirements gathering sessions and actively contribute to discussions based on industry knowledge and understanding of Rogers processes
  • Define business process and application configuration in collaboration with functional leaders, stakeholders and subject matter experts
  • Develop internal documentation (e.g., Standard Operating Procedures, Process Flows) to support future state service delivery model
  • Conduct functional testing activities including the creation and execution of test scripts and seed data
  • Conduct configuration and integrations testing with Oracle HCM Cloud
  • Attend project status meetings to provide status updates on task execution
  • Ensure system compliance with Rogers’ internal policies and control requirements; including participating or leading audit activities
  • Contribute to change management materials including communications, training, web property content and collateral
  • Resolve escalations received from program manager, project manager or other project team members
  • Deliver on service stabilization plans post go-live
  • Work collaboratively with 3rd party vendors including the System Integrator’s project team and Rogers BPO provider
  • Work collaboratively with internal partners including Communications, Brand, Total Rewards, Organizational Development, Enterprise Learning and HR
  • 3-5 years of experience implementing technology solutions, preferably cloud-based solutions, involving multiple clients, technologies and vendors
  • Undergraduate Degree (BA, BBA, BS in Business), equivalent degree or work experience required
  • Strong understanding of multiple functional areas including payroll, compensation, leave administration, time and attendance, benefit administration, pension administration, HR reporting and core HCM
  • Strong experience working through process design projects
  • Strong functional understanding of security configuration and administration in HR systems
  • Ability to effectively communicate, clearly expressing ideas and concepts both verbally and in writing
  • Recognized for the ability to drive the timely resolution of issues
  • Ability to work under tight deadlines managing multiple tasks
17

Project Analyst Security Resume Examples & Samples

  • Assisting with managing and tracking a large budget and will ensure the funds are distributed as planned
  • Track and assess staffing requirements and forecasting for the sector
  • Aggregating and reporting all Security metrics
  • Provide counsel and expertise in project management processes for all Security related projects both at the sector and enterprise levels
  • Will assess project opportunities and develop resolutions to increase productivity, quality, client-satisfaction goals and objectives
  • Develop mechanisms for monitoring project progress and cultivate problem solving techniques with project managers, line managers and clients
  • Experience managing budgets over $20M
  • 8 years professional experience
  • 10 years of professional experience
  • Strong computer skills: word, excel, project management software
  • Ability to effectively manage competing priorities and deadlines and handle multiple tasks in a fast-paced environmentS Excel expertise (advanced formulas, macros, functions, pivot tables)
18

Princ Analyst, Security Configuration Manager Resume Examples & Samples

  • Responsible for maintaining information about Configuration Items required to deliver IACND services and maintain a logical model, containing the components of the IT infrastructure (CIs) and their associations
  • Responsible for understanding, capturing, modeling, and optimizing physical and logical interdependencies in support of desired IACND service outcomes
  • Provides configuration management support to assigned projects
  • Analyzes complex engineering change proposals to determine the effect on the overall system
  • Ensures configuration identification by reviewing design release documents for completeness, proper authorizations, and system updates
  • Performs various audits and documents results
  • Monitors subcontractors and vendors to ensure that the applications of military standards and requirements for the statement of work are properly implemented
  • Develops configuration and data management documentation based on program requirements
  • Participates in design reviews, audits, scheduling, budgeting, etc
  • Identifies requirements and coordinates the development and implementation of computer based configuration/data management systems and related support
  • Develops and implements new processes
  • Provides guidance and work leadership to less-experienced staff members, and may have supervisory responsibilities
  • May serve as technical team or task leader
  • 8-10 years of related configuration management experience
  • Requires DoD 8570: IAT III and CND-SP Specialty: CND Analyst
  • Must be willing to obtain and maintain a CI Polygraph
19

Senior Analyst, Security Services Resume Examples & Samples

  • 70% - Information Systems Security
  • 10% - Physical Security
  • 5% - Document Control
  • 10% - Other assignments in support of department goals and objectives
20

Analyst Security System Resume Examples & Samples

  • Supports and contributes to the delivery of a subset of expert commercial security services to the external market
  • Supports and contributes to the delivery of plans and budgets for monitoring, maintaining and improving the integrity of the organisation's security information processes and systems
  • To support delivery of aspects of an IT and/or Network Security procedure or processes, operations and architectural solution or security build for BT that support the business aims and takes into account appropriate legal, regulatory constraints
  • Manages where applicable Security Team Members to ensure high performing and well motivated people delivering a specific function or service
  • IT and data network experience
21

Analyst Security Systems Resume Examples & Samples

  • Supports in the delivery, implementation and operational end to end delivery for a subset of an IT security service and for a subset of the IT Security strategy, policy, procedures, processes, systems, threat identification & response that provide security services and solutions for or on security infrastructure
  • May involve management of Team Members within a specific function or service
  • Completes assigned elements of IT security risk assessments and compliance audits
  • Support elements of the Investigation and resolution as required and where necessary report incidents involving potential or actual breaches of protective security compliance
22

Dasd SE Data Analyst Security Resume Examples & Samples

  • Support the development and implementation of system security engineering policy, guidance, best practices, and lessons learned
  • Work with program office Integrated Product Teams to assess program security risks, and develop risk mitigation strategies
  • Brief lead systems engineers on program protection policy, guidance and expectations
  • Provide weekly status updates to senior Department of Defense officials
  • Coordinate Office of Secretary of Defense (OSD) efforts with Army, Navy, Air Force, and defense agency staffs
  • Lead team of subject matter experts in software, information and hardware assurance; and supply chain risk management to address security risks for advanced capabilities and systems
  • Analyze critical program information; critical mission functions and critical components to ensure protection for state-of-the-art technologies
  • Develop OSD policy, guidance and training to implement systems security engineering and program protection initiatives
  • Work with major defense acquisition programs to develop Program Protection Plans (PPP), and advise programs throughout PPP development
  • Bachelor’s degree in an engineering discipline or related field
  • 5-8 years of related experience in engineering, science or related field
  • 3-5 years of Systems Engineering experience working in the defense acquisition community (military, Government civilian, or contractor)
  • 1-2 years hands-on experience with customer relationship management
  • Strong analytical, prioritization, and problem-solving skills
  • Ability to think strategically and conceptually, and to transform ideas into practical implementation
  • Experience in delivering complex systems solutions in a high-pressure environment
  • Master’s degree in an engineering discipline or related field
  • Demonstrated experience in planning, briefing and coordinating senior-level technical reviews, panels, or similar meetings with diverse participants
  • Knowledge of OSD interface and communication protocols
  • Knowledge of DOD acquisition life cycle, policy and guidance
  • Experience and understanding of System Security Engineering Policy (DoDI 5200.39 and 5200.44); and guidance (DAG Chapter 13)
  • Experience and understanding of the System Engineering Technical Review exit criteria
  • Understanding of the system security engineering specialties requirements and design criteria (System Engineering specialties = Supply chain, cybersecurity, hardware assurance, anti-tamper, software assurance, and defense exportability)
  • Understanding of the application of DoDI 8500, 8510, NIST 800-53, and RMF/DIACAP activities
  • Experience selecting controls, incorporating into the requirements and design specs and verifying during test
23

Technical Analyst, Security Monitoring Resume Examples & Samples

  • Joining our Infrastructure Services team, you'll play a key role in keeping our customers and employees safe from cyber attacks
  • Using the latest intelligence sources provided by governmental, law enforcement and commercial agencies, you'll be an asset to our team, bringing your integrity, analytic mindset and security knowledge
  • You'll interact with teams across the world, and you'll be at the forefront of investigating cyber attacks in a field where threats and defensive measures are continually evolving
  • Providing assurance of security posture through monitoring security system status
  • Giving advice during an incident response and any subsequent reviews following this
  • Administering effective low level component design, technical change and implementation of IT systems
  • Supporting the running of RBS technology across the whole organisation
  • Providing a central point of customer contact for first and second level support
  • Security Incident and Event Management (SIEM)
  • Good knowledge of Transmission Control Protocol/Internet Protocol (TCP/IP)
  • Network Intrusion Detection (NIDs) analysis experience
  • Networking protocols and routing
  • Malware analysis techniques
24

Market Research Analyst, Security Resume Examples & Samples

  • Bachelor’s degree in economics, statistics, engineering or industry-related fields required; Master’s or higher degree is a plus
  • Technical and commercial experience in the Security industry
  • Highly effective organizational and prioritization skills, including the ability to stay on task and maintain focus in a fast-paced environment
25

Senior Analyst, Security Risk Management Resume Examples & Samples

  • Expertise and keen interest in emerging information security trends and technologies
  • Prior experience on an Information Security Risk Management team
  • Capability of analyzing large amounts of disparate data to produce easily understandable content
  • Financial Services background; knowledge of trading platform process and technologies
  • Strong understanding of network and server technologies and associated security controls
  • Experience with one or more of the following technologies: Intrusion Prevention, Web Application Firewall, Vulnerability Management, and Advanced Malware Detection
  • Experience with Governance Risk and Compliance tools and associated workflows
  • Partner with Security Risk Management peers to analyze and collect risk data and metrics from existing vulnerability, vendor management, project, threat management, and application related processes
  • Develop and maintain effective workflows for the automated collection, storage and reporting of risk data
  • Conduct risk assessments of business processes, technology designs, security controls, technology architectures and product designs
  • Analyze technology and business designs to identify and assess security risk
  • Develop risk registers, security questionnaires and surveys to aid in the effective execution of risk assessments
  • Development of risk analysis metrics and reports
  • Participate in technology and security strategy planning processes to ensure identified risks are identified and included in departmental planning
  • Develop trending reports to identify areas of focus and risk concentration
  • Record and report security risk data within a Governance Risk and Compliance platform
  • Report and escalate outstanding risk findings, as appropriate
26

Analyst, Security Administration Resume Examples & Samples

  • Primary role with maintenance and management of the Enterprise Identity and Access Management systems
  • Management IT Security support queue consistent with support SLAs
  • Provide technical support to any cyber event or system generated security alert
  • Custodian role with ensuring identity and access control changes follows Sarbanes Oxley control compliance
  • Custodian role tasked with ensuring timely resolution to any issues identified by information security technologies
  • Evaluate and make recommendations to management to continuously improve the security profile of the Company
  • Act as intermediary between IT functions to facilitate standardized security approaches and policy across IT and the Company
  • Act as a point of contact with internal and external auditors to complete audits in timely fashion
  • Serve as a liaison between the business and technical support staff
  • Cultivate good working relationships with the business
  • Work closely with management to prioritize business goals and information needs
  • Bachelor Degree in Management Information Systems or related degrees or related years of experience
  • Proficient, working knowledge of Microsoft Active Directory and Microsoft Exchange security functions and features
  • Strong analytical and problem solving skills coupled with great attention to detail
  • Broad knowledge of information security principals
  • Ability to conceptualize and assimilate data and present proposals in a clear and concise manner
  • Ability to multi-task and prioritize assignments
  • Ability to ask clarifying/probing questions of business customers
  • Ability to adapt effectively to new and changing environments
  • Ability to be on rotating 24x7 on-call rotation
  • Prior work experience – fulltime, part-time, internships in an IT security related position
  • Advanced computing skill sets – proficient with multiple computing operating systems and programming languages
  • Ability and willingness to travel to remote company field locations and lift up to 50 pounds
27

Senior Analyst, Security Risk Resume Examples & Samples

  • Provides information security risk assessment and management services to the organization in coordination with Business Security Officers, information security governance, and other security functions
  • Maintains and reports on the security risk profile, registry and risk performance against the organizations security risk tolerance
  • Identifies, develops, implements, and maintains security risk management methods and practices, standards and procedures, and reference documentation that can be integrated into business process development, business operations, and solution development activities
  • Manages and/or conducts organizational, solution, business process, project, and system threat and vulnerability assessments, risk analysis and assessments, and risk monitoring and reporting
  • Supports the vendor security risk management process
  • Educates relevant stakeholders on information risk management procedures, standards, and methodologies
  • Recommends and assists with the development of risk management strategies
  • Recommends and assists with the development of security risk treatment and/or corrective action plans
  • Recommends and assists with the definition and implementation of key performance and risk indicators
  • Monitors and reports on performance of risk treatment / risk-related corrective action plans and key risk indicators
  • Assists in the documentation of risk-based exception requests and risk-based rationales
28

Technical Analyst Security Resume Examples & Samples

  • Collaborate with IS Professionals and other technical staff to ensure that the current portfolio is meeting the needs of the business
  • Perform all system related and/or configuration assignments with some supervision
  • Analyze and resolve system/application errors in a timely and accurate fashion
  • Provide status reports where required
  • Develop and maintain systems to support business processes
  • Create and maintain documentation for setup and/or configuration throughout the system development lifecycle
  • Provide on-call support and problem resolution
  • Provide management with accurate and timely status reports of all projects as assigned
  • Ability to develop and/or modify specifications, configurations, and programs to meet individually specified requirements
  • Familiar with a System Development Lifecycle methodology
  • Ability to analyze and interpret information systems proposals
  • Ability to effectively organize and manage resources
  • Ability to work productively on a team
  • General knowledge of relevant multi-user computer systems, server, firewall and applications, and/or equipment
  • Knowledge of current technology developments and trends
  • Ability to develop and execute test plans
29

Senior IT Analyst Security Information & Event Management Resume Examples & Samples

  • Gain a clear, complete and in depth understanding of Zimmer Biomet information security requirements that apply to the Zimmer Biomet network and applications
  • Tune and Optimize current Security Information and Event Management Security Monitoring solution, which acts as a repository and analysis center for information events received from elements of the security architecture and other sources which can then be evaluated for anomalies which may indicate malicious behavior or the presence of malware
  • Work with the sources of information received by the SIEM to ensure that the data are in the proper format and with the proper semantics to be interpreted meaningfully by the SIEM
  • Develop and implement appropriate rulesets guiding how the SIEM distinguishes between anomalies warranting investigation vs. events that do not. This should also distinguish where practical between events which represent innocent user errors vs. those created by malicious actions
  • Participate appropriately in any incident response activities, especially with respect to providing information from the SIEM that may be relevant to investigation and remediation
  • Develop and report on metrics showing how the SIEM function is being properly implemented
  • Good understanding of Information Security, IT in general and IT Infrastructure in particular with a focus on network operations
  • Good understanding of information security technology, especially relating to vulnerability scanning, network security, security event monitoring, and incident response
  • Agile thinking and analysis that leads to win-win and innovative solutions
30

Analyst Security Ops Resume Examples & Samples

  • Demonstrate in-depth knowledge of concepts, best practices and controls in a breadth of information security areas/domains; these information security areas include risk management, access control, cryptography, physical security, security architecture and design, network security, application security and auditing highly preferred
  • Attention to detail, excellent writing, documentation, communication, customer service and interpersonal skills highly preferred
  • Application security control risk assessment experience highly preferred
31

Principal Analyst Security Engineering Resume Examples & Samples

  • Accountable for design, implementation and administration of Security Engineering in the Information Security department
  • Ability to detect, analyze information security threats, and be able to architect solutions for it
  • Able to operationalize processes to drive a robust security architecture
  • Work closely with IT, Product development and architecture teams to guide security direction and solutions in alignment with Industry best practices
  • Hands on experience with deploying security solutions in on-premise and public cloud environments
  • Be able to architect, deploy, enhance, orchestrate, automate and operationalize information security capabilities for the enterprise network
  • Candidate must have 5+ years working in information security
  • College degree BS/MS in Computer Science preferred
  • Strong in operational processes
  • Experience in security orchestration and automation a plus
  • Experience in any of the public clouds – AWS, Azure, is a plus
  • Proven leadership skills; communication, issue resolution and performance management
  • Security certifications are a plus (CISSP, CISM, CISA, SANS, Security+, etc)
32

Senior Analyst, Security Services Resume Examples & Samples

  • Interface with management and maintain liaison with US Government information assurance oversight agencies and prime/subcontractor liaisons
  • Interpret government and company policy to ensure compliance with designated accrediting authority requirements for classified information systems and/or networks of varying complexity
  • Provide information security guidance and direction to program and engineering management and participants
  • Establish and maintain required training and information security compliance deliverables
  • Promulgate and submit government compliant, clear and effective written plans, procedures, and instructions
  • Sustain compliance with all aspects of government approved plans throughout system and program life cycles
  • Assists security management in the preparation of “processing area” facility accreditation packages and site security plans; ensures physical security requirements are adhered to
  • Audits processing area access and recommends physical security hardware and electronic security system solutions
  • Act as COMSEC Manager and assists security management in the maintenance and accountability of electronic communication equipment
  • Ensures communications (secure telephones and fax) are compliant with Telephone Security Group and other applicable standards/requirements
  • Responsible for sending, receiving, reviewing and accountability of all classified information
  • Ensure all information is properly marked
  • Maintain all accountability records in SIMS database and conduct periodic inventory reviews of the data
33

EU Risk Analyst, Security & LP Resume Examples & Samples

  • Structured working and thinking
  • Good oral and written English skills
  • Ability to work collaboratively to achieve team goals
  • Flexibility for occasional travel (within Europe)
  • Proficiency in Microsoft Office (particularly in Excel)
  • Knowledge of logistical processes
  • High level of discretion
  • Knowledge of an EU language other than English
  • Familiarity with databases (querying and analyzing) such as SQL, Access
  • Knowledge of Amazon internally used tools is a plus
  • Formal investigation training certification
34

Senior Analyst, Security Resume Examples & Samples

  • Determine if third party vendor controls align to Intarcia policies and standards
  • Establish processes to track, escalate and resolve identified risks
  • Establish governance of solutions offered by third party service providers, ensuring they meet Intarcia security requirements
  • Strong understanding of security and compliance frameworks including Sarbanes Oxley, COBIT, ISO
35

Principal Analyst Security Engineering Resume Examples & Samples

  • Work closely with IT and architecture teams to guide security direction and solutions in alignment with Industry best practices
  • Expert level hands on experience with log management tools such as Splunk
  • Medium-level hands on experience with tools such as DLP and IPS
  • Some level of experience working with security monitoring, and security incident/event management tools is a plus
36

Logistics Analyst, Security Force Assistance Resume Examples & Samples

  • Provide program analysis that will help increase effectiveness of advisory efforts by collecting and analyzing data and developing decision support tools or products for the ANDSF
  • Formulate and apply logistics models and other sustainment methods in order to develop and interpret information that assists ANDSF management with decision making, policy formulation, or other sustainment functions
  • Understand Afghan data reporting tools such as CORE IMS and LRAT, in order to extract necessary data for analysis and logistics planning
  • Analyze information obtained from Afghan systems to optimize and resolve logistics and readiness problems for the ANDSF
  • Develop communication products that distill complex sustainment concepts or data into products that are understandable by senior ANDSF leaders
  • Develop sustainment methods and procedures to include logistics models and planning tools or management systems to optimize equipment delivery schedules and sustainment priorities for the ANDSF
  • Collaborate with others in the ANDSF organization to ensure successful implementation of chosen problem solutions
37

Analyst Security Services Resume Examples & Samples

  • Maintains relationships with people at an operational level
  • Supports and contributes to the delivery of a subset of expert commercial security services to the external market. May involve management of Team Members within a specific function or service Supports and contributes to the delivery of plans and budgets for monitoring, maintaining and improving the integrity of the organisation's security information processes and systems
  • Provide support to the communication of relevant IT security procedure and/or process as relevant
  • To support aspects of the delivery of discrete security services that provide the security infrastructure for BT and customers
  • To undertake testing and validation of hardware, firmware and software for possible impacts on security
  • To support the delivery of security vulnerability management
  • Support elements of Security compliance relationships with national Government or industry bodies
  • Support the operational relationships with specific customers, suppliers and stakeholders, including all Third Parties, joint ventures and OLOs, ensuring the cost effective provision of a professional Security service
  • Support the delivery of commercially viable security services to generate revenue and retain business
  • Contribute to the delivery of the target improvement, productivity gains and cost efficiencies
  • Recognised technical qualification or accreditation in field of security specialism
  • Relevant experience of stakeholder management and good interpersonal skills
  • Relevant operational knowledge and experience of risk management
  • Excellent management skills with the ability ensure high performing, well motivated individuals
38

Senior Analyst, Security Support Resume Examples & Samples

  • Effectively utilize communication skills; proven ability to interface effectively with senior levels of management and diverse stakeholders
  • Strong attention to detail with a proactive approach to problem solving and providing results
  • Ability to work under pressure, adhere to deadlines and multi-task case work, as required
39

Information Technology Analyst Security Information Resume Examples & Samples

  • Perform daily monitoring of system performance for error correction and enhancement opportunities
  • Oversee site account management including antivirus software and administration rights
  • Business continuity management including maintaining call trees and backup and recovery testing
  • Participate in the development and implementation of strategies for upgrade, expansion and continuous improvement of Manufacturing Execution Systems (Delta V, ArchestrA/Wonderware, and PIC/PI)
  • Be the primary site contact for Wide Area Network issues including troubleshooting with Bayer and third party providers
  • Be the primary site contact for Local Area Network group issues including switch, firewall, print and file servers, printers, and BION
  • Establish and maintain file share security
  • Establish and maintain physical security of site IT equipment
  • Support site personnel with hardware and software issues
  • Order, maintain, and lifecycle PC’s, VOIP and SONIM phones, cellular phones, 2 way radios, and other site specific IT equipment
  • Troubleshoot and maintain the site fire alarm system, security cameras, and PA system
  • Maintain support and configuration documentation
  • Comply with change control processes
  • Bachelor’s degree in a technical field or 5+ years of applicable experience
  • Proven experience in the configuration, maintenance, and support of firewalls, and network security
  • Proven experience in the support of Windows based Servers and PC’s
  • Ability to work on numerous projects at the same time
  • Good technical, interpersonal, organizational, and communication skills
  • Ability to interface with all levels of organization from Management to floor level operational employees
  • Ability to work flexible hours as needed to support the needs of the site
  • Prior experience in the troubleshooting and maintenance of security camera systems, fire alarms, and PA systems
  • Prior experience with Emerson Delta V systems
  • Domestic Relocation assistance is offered for this position
40

Analyst, Security Event & Incident Response Resume Examples & Samples

  • 55% - Lead cyber security incident investigation as the primary handler
  • 10% - Provide forensic expertise
  • 25% - Document findings & communicate effectively with business / technical resources
  • 5% - Participate in meetings related to the incident response process
  • 5% - Free personal investigation / independent learning
  • SANS GCFE, GREM, or GCIH certifications preferred
  • Bachelor’s degree in computer science, information systems, engineering or the equivalent combination of formal education, training and experience
  • Strong analytical abilities, high ethical standards, strong interpersonal skills, good verbal and written communication skills, ability to work in a team environment, well organized and detail oriented
  • Ability to define problems, collect data, establish facts, and draw valid conclusions as well as interpret an extensive variety of technical information in written or diagram form and deal with several abstract and concrete variables
  • Five or more years of cyber security experience conducting
  • Enterprise level forensics (across international borders)
  • Reverse engineering malware analysis
  • Fluent knowledge of Operating System & Network level forensics
  • Deep understanding of attack vectors, vulnerabilities, & how they are leveraged by malicious actors
  • Through knowledge of identity repositories
  • Ability to capitalize on APIs to improve the incident response
  • Experience in content creation using advanced SEIM solutions
  • Fluency in multiple device log formats including
  • Windows Logs
  • Linux Logs
  • Proxy Logs
41

Analyst, Security Resume Examples & Samples

  • Establish and manage an effective security report database where security reports are adjudicated with a taxonomy that supports data comparison with IATA and industry databases, risk rate and escalate reports to managers for action with appropriate priority
  • Support continuous improvement of the security mission at Hawaiian Airlines by developing complex data structures to support the generation of business insights and strategy, automate recurring processes and improve security capabilities
  • Drive the Security Management System (SeMS), the Security Review Board (SRB), Security Data Management (SDM) meetings to ensure incidents, risks and trends are addressed by capturing requirements, assigning tasks with target completion dates, conduct substitute risk analysis and see initiatives through to completion
  • Active, daily monitoring of HA’s Aviation Security Dashboard to identify, communicate and mitigate risks in the operation
  • Support the security mission with data entry and evaluation of program audits such as: IOSA, DOD, TSA Headquarters and Stations audit preparations
  • Support HA’s Service Evaluation Program (SEP) including uploading passenger identifying information into the security website and Customer Service SharePoint sites
  • Develop professional, attractive and articulate reports with accuracy and for managers and directors use in weekly ops highlights, department meetings; with peer groups, internal customers, department heads, executives, and external stakeholders. Creativity in reporting complex issues and ideas in ways that are easy to understand is essential
  • Provide support as directed by Senior Director of Security to all other HA departments for special projects or assignments as required
  • Masters Degree or Project Management Certification preferred
  • 5+ years of Airline or Security or Analyst experience preferred
  • Quantitative and qualitative data analysis, data modeling, developing reports relational database experience SQL, SAS, Unix programming experience preferred
42

Analyst, Security Resume Examples & Samples

  • Applies basic concepts, principles, and technical capabilities to perform routine tasks
  • Works on projects of limited scope and complexity
  • Follows established procedures to resolve readily identifiable technical problems
  • Works under direct supervision and receives detailed instructions
  • Develops competence by performing structured work assignments
  • 3+ years’ experience in related field (Security, IT, program management, etc.) or combination of professional experience and education
  • Knowledge of security systems, devices, and building automation systems in a corporate environment is preferred
  • Demonstrates knowledge of security concepts, policies and procedures
  • Possesses knowledge and experience in SharePoint
  • Has the ability to apply knowledge and experiences to a rapidly-changing environment
  • Dedicated to the principal of Ethical behavior
  • Firm understanding of the balance between Business and Security
  • Show ability to resolve problems and develop process improvements
  • Superior customer service and interpersonal skills
  • Philosophical commitment to Customer Focus and Operational Excellence
  • Able to make decisions
  • Ability to interact effectively at all levels
43

Solution Analyst Security Resume Examples & Samples

  • Proven Management experience in a complex, integrated, multi-business unit heterogeneous environment. Experience aligning the SAP landscape and technical solution options with functional requirements
  • Demonstrated Substantial experience in scoping, documenting & executing data and system access authorisation concepts across a heterogeneous system landscape
  • Experience in integrating Cloud applications into the security framework
  • Experience during a minimum of 3 significant ERP projects with a similar functional focus and organisational width
  • Working knowledge of user modelling, authorisation, screen modelling, and documentation tools, with ARIS and Floor Plan Manager highly regarded
  • Experience with mobile, tablet, and PC based user access and security
  • Experience with SAP GRC & IDM systems
  • Actively staying abreast of emerging technologies, specifically within the SAP suite
  • Strong interpersonal, written, and oral communication skills including
  • Ability to lead and influence stakeholders
  • Strong ability to communicate effectively across all levels of the organisation
  • Superior influencing and negotiation skills with a proven record of success at senior and/or executive levels
  • Ability to operate within the values of impartiality; integrity; trust; service; accountability and safety. To carry out responsibilities with professionalism, fairness and commitment and to do so in order to place the customer at the centre of all that is produced and delivered
  • Define an access governance approach for the landscape. Define governance, risk, and control mechanisms covering all business processes. Ensure audit and compliance requirements are supported