Consultant Security Resume Samples

4.7 (100 votes) for Consultant Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the consultant security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
DM
D Maggio
Deondre
Maggio
58731 Lauriane Groves
San Francisco
CA
+1 (555) 480 1678
58731 Lauriane Groves
San Francisco
CA
Phone
p +1 (555) 480 1678
Experience Experience
San Francisco, CA
Business Security Consultant
San Francisco, CA
Rogahn-Turner
San Francisco, CA
Business Security Consultant
  • Works with Sales Director to manage the system's channel portfolio effectively
  • Develops and maintains relationships with customers
  • Interacts with Sales Managers and Sales Director with regard to account forecasting
  • Works with Enterprise Legal & Regulatory to alter contracts as necessary
  • Sell our Detection and Surveillance Security Products and Services to new and existing commercial business customers based on assigned revenue targets
  • Remains current on technical information regarding Cox's products and services as well as the competitive landscape
  • Serves as main point of contact with customer ensuring customer satisfaction through the entire sales cycle
Phoenix, AZ
Business Consultant, Security
Phoenix, AZ
Deckow and Sons
Phoenix, AZ
Business Consultant, Security
  • Clients are typically C-level managers. Can combine multiple consulting assignments and create new consulting frameworks for delivery
  • Develops and manages relationships across the whole client base, discussing benefits and value at management/board level
  • Ensures knowledge capture sessions are arranged and executed building company consultant collateral
  • Leads CISO level visioning sessions providing thought leadership to client
  • Drives key meetings and workshops to achieve the outcomes within the deadline
  • Leads complex Management of Change (MOC) initiatives
  • Understands and utilizes the full range of facilitation methods and tools to run effective events
present
San Francisco, CA
Lead Consultant, Security Analytics
San Francisco, CA
Paucek-Rippin
present
San Francisco, CA
Lead Consultant, Security Analytics
present
  • Provide leadership and direction to the project team, including 3rd party suppliers, contingent workers and internal staff
  • Provides leadership for successful project completion by identifying risks and developing/recommending mitigation strategies
  • Provide results of data analysis to security operations teams to conduct security investigations based on hypothesis and suspicion
  • Visualizing data sets to make associations i.e. “connect the dots” and identify activity that falls outside of baseline levels
  • Maintain and optimize Information / Cyber Security Policies and Standards that will drive a baseline security posture with incremental improvements over time
  • Leads the development of security controls and control objectives and monitors, including the measurement of the effectiveness of security controls
  • Act as a point of escalation for Security investigations and Incidents to provide guidance and oversight on incident resolution and containment techniques
Education Education
Bachelor’s Degree in Related Discipline
Bachelor’s Degree in Related Discipline
University of California, Santa Barbara
Bachelor’s Degree in Related Discipline
Skills Skills
  • 1) Depth of knowledge in two or more of the core security domains: SSRC/GRC, IAM, SOC Operations,
  • Ability to lead and shape client expectations
  • Comprehensive knowledge and experience in network and networking concepts including network security devices and services
  • Strong communication and presentation skills
  • Excellent Analytical and problem solving skills
  • Self-motivated with an ability to work in cross platform technologies and lead more than one project at a time
  • Ability to lead large groups and be a primary facilitator
  • Proficient in design and implementation of Enterprise wide Information Security solution across different verticals. Experience in Finance and/or Telecom industry is desirable
  • Virtualized networks including basics of Virtual Routing and Forwarding
  • Ability to work in a matrix management model with diverse and dynamic teams
Create a Resume in Minutes

15 Consultant Security resume templates

1

Information Security Solutions & Engineering Consultant Resume Examples & Samples

  • Ensure that all activities and duties are carried out in full compliance with regulatory requirements, Barclays Operational Risk Framework and internal Barclays Policies and Standards
  • Broad IT Security expertise coupled with good understanding of financial services
  • Good relationship management and communication skills
  • Commercial mind-set
  • Understanding of the implications, to Barclays, of the laws and regulations associated with IT Security
2

Security Architect / Consultant Resume Examples & Samples

  • Self-starter and natural ability to work in a lean environment
  • Innovative, service minded and flexible attitude with passion to win
  • Network Security and security architect type of work experience
  • Security solutions for e.g. firewalling, IDS/IPS, security analytics, logging and accounting, identity and access management, data protection
  • Capability to analyze customer security requirements and outline proposals and security architectures/solutions meeting the requirements and explain the business value
  • Excellent presentation skills; ability to simplify and get customer buy-in for security
  • Track record on pre-sales and customer deliveries
  • Track record on previous security architect type of work
  • Risk Assessment methodologies and tools, practical experience on running risk assessment workshops
  • Deep knowledge on solutions for one or more of the following areas: firewalling, IDS/IPS solutions, security analytics, security operations center, logging and accounting, identity and access management
  • Security business landscape: key players, trends and market dynamics
3

Lead Consultant, Security Analytics Resume Examples & Samples

  • Data Analytics and Analysis skills with extensive experience working with large data sets to Identify and analyze patterns that span lengthy time periods
  • Visualizing data sets to make associations i.e. “connect the dots” and identify activity that falls outside of baseline levels
  • Security domain expertise: detailed and in depth understanding of security data, attack vectors, counter measures etc
  • Data science expertise: advanced analytical skills, like using machine learning and predictive analytics algorithms, and expert knowledge to prepare data for analysis and reporting
  • Expert knowledge of big data technologies designed to optimize analysis of large amounts of data
  • MapReduce/Spark/Storm/Hive/Pig expertise is advantageous
  • Demonstrate competence and expertise to combat emerging threats by taking advantage of big data, and data discovery advanced threat detection capabilities
  • Identify the sequence of an attack: analyze data surrounding incidents to identify anomalies and patterns that are not “normal.”
  • By factoring in IT, user, and business application data as context, they can reach a conclusion on the impact of a security incident
  • Data interrogation techniques to conduct big data analysis in order to discover attack sequences and better understanding of the business impact of security and other events
  • Analyze security incidents, detect root causes, and infer larger attacks before adversaries can exfiltrate high-value data
  • Provide results of data analysis to security operations teams to conduct security investigations based on hypothesis and suspicion
  • Possess the ability to ask questions as needed, receive fast responses, and quickly pivot their investigations based on those responses
  • Translate security incidents into business impact by developing a centralized view of IT, user, business application data and security event data
  • Define and create a multi-structured data model into a single repository, to be transformed and correlated so that the outcome of security investigations is about business impact
  • Establish, mature and optimize the Security Analytics capability across the Enterprise and globally
  • Lead the delivery of Security Analytics capability to identify advanced and targeted attacks, as well as to support / enhance Cyber Threat analysis, intelligence and reporting functions
  • Lead the evaluation and implementation of Security Analytics capability to enhance the Cyber
  • Provide leadership, guidance and oversight to drive Security Analytics maturity improvements across the organization, in line with the changing Threat Landscape, Regulatory and Compliance requirements etc
  • Provide subject matter expertise, technical deliverables oversight of strategic Cyber projects and initiatives to enhance and improve Security Analytics capabilities and maturity
  • Conduct regular key control assessments for technologies and services implemented
  • Measure the effectiveness of the Cyber solutions capabilities to ensure appropriate plans are in place to address lower performance and ineffective practices
  • Partner with Information Security Operations to provide leadership and support in the areas of
  • Cyber Threat analytics, Security Analytics techniques and approaches
  • Support the delivery of the 3 year Cyber security roadmap to maintain and optimize the Security Analytics capability
  • Provide depth of expertise, skills, source of knowledge on current & emerging techniques leveraging Security Analytics to identify Cyber threat issues and trends
  • Act as a point of escalation for Security investigations and Incidents to provide guidance and oversight on incident resolution and containment techniques
  • Interface into Business units to bring business context to Cyber threat and trends
  • Provide Security Consulting to various areas in the Bank on Cyber Security topics as needed
  • Further develop and enhance relationships with other Lines of Business to form a cohesive, cross functional Cyber Security analytics capability to identify trends, external / insider threat intelligence information
  • Lead the enhancement and optimization of implemented reporting mechanisms to provide enhanced data to detect advanced and complex threats affecting individual business units
  • Maintain and optimize Information / Cyber Security Policies and Standards that will drive a baseline security posture with incremental improvements over time
  • Leads the development of security controls and control objectives and monitors, including the measurement of the effectiveness of security controls
  • Provides leadership for successful project completion by identifying risks and developing/recommending mitigation strategies
  • Depth of skills and experience - Information Security and Cyber Security domains
  • Professional with experience on security consulting, designing and delivering large projects/programs
  • ISO 27002, NIST 800 series, COBIT control framework
  • Experience with large projects/programs
  • PAR process and financial knowledge related to technology
  • Design, deployment, optimization of Enterprise Security solutions and services e.g. Cyber Threat Management & Intelligence, Security Analytics solutions, SIEM, Malware detection & analytics, APT detection and containment etc
4

Lead Consultant, Security Technology Resume Examples & Samples

  • Experience working with large projects/programs
  • Design and deployment of Enterprise Security technologies and solutions e.g. Firewalls, IDS/IPS, SIEM, Malware detection & analytics, Vulnerability scanning Data Loss Prevention Services such as rule expansion, endpoint protection and data protection
  • Data security best practices around Data Leakage Protection focusing on endpoint, network based, tagging, data masking, with accompanying profiles for data protection on and off the network
  • Multiple platforms e.g. Windows, Internet, Client/Server, Unix
5

Information Security Program Consultant Resume Examples & Samples

  • Take lead in governing core elements of Humana’s information protection program
  • Partner with other members of functional project teams to define business requirements
  • Partner with business to identify business process requirements and design controls that enable secure business processes
  • Partner with other teams to develop Information Security Solutions
  • Effectively communicate with Internal Business Partners to promote Information Security
  • Support enterprise-wide Information Security programs
  • Bachelor’s Degree or at least 5 years IT Security experience
  • Progressive experience in designing IT Security controls
  • Excellent Communication and Leadership skills
  • Strong Presentation Skills
  • Experience in information security program governance
  • Bachelor’s Degree in Computer Science, Business Administration or related field
  • Security certification such as CISSP, CISA, etc
  • Experience in Role-Based Access Control
  • Experience in “Segregation of Duties” program
6

SAP Basis Security CRM Consultant Resume Examples & Samples

  • Hold sessions with end users and/or functional consultants to gather business requirements for Basis
  • Deliver basis design based on the project requirements
  • Pursue prescribed Basis standards
  • Prepare quality deliverables as per designated project timelines
  • Assist business user during design/FUTs/UATs
  • Conduct trainings
  • For support engagements, support end users in resolving the reported incidents within prescribed SLA
  • Work in shifts to support client support engagements
  • Work with offshore, client, onsite teams as part of the project
  • Should be willing to travel onsite on short term or long term on need basis
  • Support Project Management Office (PMO)
  • Min 4 years of relevant experience working in SAP Basis, Security - CRM
  • Should have worked in at least 2 full life cycle implementations
  • Experience of having worked in an onsite- offshore delivery model would be a plus
  • Experience of having worked in a CMMI environment would be a plus
  • Expertise in SAP Security
  • Conversant with technical architecture of SAP CRM
  • System installation
  • System Monitoring
  • Possesses good communication skills to coordinate, resolve queries of both external and internal customers
  • Team player with excellent interpersonal skills and people centric approach to understand employee needs as well as to manage employee expectations
  • Self-motivator and result oriented to complete task as per timelines
  • Must have good analytical and problem solving skills
7

Technical Consultant, Security Resume Examples & Samples

  • Defining customer requirements for Security Solutions with a focus on Identity Management solutions and/or Infrastructure Protection solutions i.e. Firewalls, VPNs, VOIP, Intrusion prevention/detection, Access controls, Perimeter security, Secure content including Network Access Control (NAC), Data Loss Prevention (DLP), Security Information and Event Management (SIEM), etc
  • Delivering security consultation and solutions engagements
  • Approving vendor choices and establishing product / vendor selection criteria
  • 7+ years in IT with a minimum of 5 years of demonstrated experience in providing detailed technical architecture expertise on Security Solutions within large corporate environments with a focus on solution implementation
  • Superb customer relations and the ability to interact with customers at all levels
  • Bachelor or specialized college degree in Computer Science, System Engineering or another related IT program
8

Malware Security Consultant Resume Examples & Samples

  • Support Security Incident Management team on analysis and remediation of an active incident
  • Perform malware analysis (static and dynamic reverse engineering) from potentially compromised systems in support of incident analysis and response
  • Perform cyber threat counter intelligence by identifying intelligence sources, enhancing search methods for intelligence and communicating implications on cyber threats to technical and non-technical audiences
9

Consulting & Security Consultant Resume Examples & Samples

  • Be responsible for supporting IT Security and Privacy projects that include but are not limited to
  • Expect to travel (60%) regularly throughout the continental US (some international travel does exist)
  • Willingness to learn the various service offerings of the delivery unit, business unit, and firm
  • Be able to communicate technical findings to non-technical audiences such as Boards of Directors and other C-Level individuals
  • Willingness to obtain the Certified Information Systems Security Professional (CISSP) certification or other relevant certification(s)
  • Information security industry standards and concepts including the OSI model
  • Web Applications and Web Servers (Microsoft IIS, Apache)
  • Minimum 3.2 GPA
10

Salesforce Security Consultant Resume Examples & Samples

  • Builds Trust: Consistently models and inspires high levels of integrity in decisions, speech, and actions. Lives up
  • Customer Focus: Connects meaningfully with customers to build emotional engagement and customer advocacy
  • Bachelor’s Degree in Computer Science, Information Technology or a related field
  • Ensure the security, compliance, performance, and reliability of an enterprise CRM solution
  • Maintain the configuration of an encryption gateway for the protection of sensitive data
  • Define, document, and socialize best practices and processes
  • Master’s Degree of Business Administration, Information Technology or a related field
  • Security credentials or certifications
  • Prior experience managing vendor relationships
11

Security Consultant / Hacker Resume Examples & Samples

  • BSc / MSc in Computer Science or related technical discipline, or equivalent practical experience
  • Offensive mind-set for security testing
  • Ability to write instructions for security configuration guidelines and hardening guidelines
  • Ability to bring in offensive, hacker mindset type of thinking to the team
  • Information security standards
  • DoS and DDoS, IDS/IPS
  • Some of the following certifications: CEH, CISSP, CISM, CISA
12

Security Access & Automation Lead-risk & Security Consultant Resume Examples & Samples

  • Minimum 3-5 years of experience performing hands-on systems administration, scripting, or programming primarily within a Windows environment
  • Hunger to learn new technologies, scripting/programming languages, share best practices, and contribute to the broader shared knowledge of a global infrastructure and security team
  • Experience designing and implementing automation via scripts, programs, and utilities
  • Experience implementing Identity Access Management systems or components
  • Ability to self-organize, prioritize activities independently, create documentation and reporting
  • Strong hands-on systems administration experience with Windows 2008 (and above)
  • Strong hands-on experience with Active Directory, Powershell and MSSQL
  • Ability to perform data manipulation on database tables, views, flat files, or common data structures (JSON, XML, CSV, etc)
  • Ability to independently understand API documentation and build appropriate tools and infrastructure to utilize API functionality built in to enterprise software and systems
  • Clearly articulate specifics surrounding data flow requirements, attribute manipulation, and field types in order to join data between multiple systems
  • Experience with code repository software, such as git
  • Experience with ServiceNow a plus
13

CA Iam-security Consultant Resume Examples & Samples

  • User Account management using CA Identity Manager
  • Active Directory administration using NetIQ DRA tool
  • Unix account creations for users on multiple Unix servers
14

Vulnerability Scanning Security Consultant Resume Examples & Samples

  • Good knowledge and understanding of Vulnerability Scanning, Networking and TCP/IP concepts
  • Good Knowledge and understanding about different types of Vulnerability Scanning and Scan Policies
  • Basic understanding about IBM security policies such as ITCS, EBHS & ISEC/GSD331
  • Efficient in Microsoft Excel
  • Excellent in communication
15

Security Consultant Delivery Resume Examples & Samples

  • Solid experience in Information security consulting experience (professional services consulting for end clients)
  • Solid experience in thorough understanding of network protocols, network devices, computer security devices, secure architecture, and system administration
  • Solid experience in Organizational/multi-tasking skills
  • Knowledge in security industry regulations/standards (PCI DSS, HIPAA, GLBA) and compliance frameworks (ISO 27002, CobiT)
16

Security Consultant EPH Resume Examples & Samples

  • Experience in IT Security with deep understanding of challenges, technologies, trends and business issues
  • Strong engagement management and delivery skills with track record of high customer satisfaction
  • Ability to use knowledge gained from previous engagements, IBM's intellectual capital, knowledge of the market / industry, and own research to develop creative hypotheses and formulate conclusions
  • Willingness and experience participating in knowledge sharing activities like industry conferences
  • Excellent communication and presentation skills including the ability to effectively communicate and influence across all management and organizational levels both internally and externally
17

Siem Security Consultant Resume Examples & Samples

  • Create and maintain team standards and strategy for special projects involving Enterprise Firewalls, Network Access Control, VPN infrastructure, and other network-centric technologies
  • Ensure that system improvements are successfully implemented and monitored to increase efficiency
  • Partner with the IT and business operations areas and with both internal and external parties to resolve technical security issues
  • Create testing procedures, requirements, documents and evaluation methods using Microsoft Office applications including Word, Excel, PowerPoint and Visio Access
  • Thorough understanding of logging formats/functions used across various types of logging sources (Windows Event Logging, Microsoft SQL, Syslog, IIS, etc.)
  • Basic understanding of the functions of programming languages, including Perl, Javascript, PowerShell, etc
  • Ability to partner with other departments within the organization to implement logging solutions for business challenges
18

Global Consultant Security Intelligence & Operations Resume Examples & Samples

  • Depth of knowledge in Security Intelligence/SOC Operations/Security Information and Event Management (SIEM)
  • Deep knowledge of SIEM products preferably QRadar
  • Knowledge of governance of development processes
  • Understanding of compliance issues and industry standards frameworks (eg, ISO 27001/2)
  • An understanding of security technologies such as; firewalls, intrusion detection, content filtering, anti-virus, mobile security, data loss prevention, bot-net detection, and other such technologies in the security industry. Advise on security incident handling and management programs
  • Short term management of a security operation center
  • Experience in the setup or design of security operation centers
  • Implement SIEM technology and advise on best practices
19

Security Solutions Consultant Resume Examples & Samples

  • 5+ years in IT with a minimum of 3 years of demonstrated experience in providing detailed technical architecture expertise on Security Solutions within large corporate environments with a focus on solution implementation
  • Experience in providing detailed technical architecture and integration expertise with major Vendor solutions i.e. NetIQ, Cisco, HP, McAfee, RSA, Juniper, Fortinet, Citrix, CA, Oracle, VMware, etc
  • Ability to document problems and solutions that address technical issues
  • Ability to gain management support and work effectively at all levels across the organization and across department
  • Technical certification with major vendors i.e. Cisco, HP ArcSight, McAfee, RSA, Juniper, Fortinet, Citrix, CA, Oracle, VMware, etc
20

ERP Control & Security Consultant Resume Examples & Samples

  • Bachelor’s or Master’s in Accounting Information Systems, MIS, IT security, or other related fields
  • Good knowledge of ERP systems. Hands-on working experience is preferred; in such areas as SAP implementation, IT audit and security, business process improvement, IT risk management and/or application control review
  • Strong interpersonal skills and able to work both independently within given guidelines and as part of a team
  • Good analytical and problem solving and project management skills with the ability to get things done
  • Highly proficient in both English and Thai with good written and oral communication skills
  • Reliable, energetic, proactive, self-motivated and pragmatic in approach
21

Principal Consultant Security Resume Examples & Samples

  • Gathers technical requirements and translates requirements into hardware and software capabilities (Technical)
  • Communicates technical architecture direction and coordinates technical proof of concept analyses (Technical)
  • Assists in solving technical and performance problems within the technical infrastructure (Technical)
  • Develops required work products for technology, application, and data domains of change (Methodology)
  • Leads a team of 5-8 resources (company, client and third-party resources), in area of expertise, to conclusion of a project phase (Management)
  • Participates in providing gap analyses, from a technical perspective, highlighting current state, future state, client needs, best practices and competition (Business)
  • Interacts with confidence and ease when interacting with middle- and senior-level managers (client and CSC); uses complex strategies like indirect influence to build consensus and support (Relationship Management)
  • Assists sales staff in qualifying leads and generating proposals (Leverage)
  • Provides leadership and work guidance to less experienced personnel (Leadership)
  • Communicates in formal presentation settings including proposal orals, client workshops and regional internal events; develops proposal sections, methodology work products and formal written deliverables covering area(s) of expertise (Communication)
  • Six or more years of consulting experience with technical architecture analysis and design
  • One to two years of additional relevant experience in one or more technical specialty areas
  • Experience working with one or more technical platforms
  • Experience working with technical infrastructure communication issues of low to medium complexity
  • Good technical infrastructure design skills
  • Ability to manage competing priorities in a complex environment
  • Ability to devise creative technical solutions
  • Ability to convey a strong presence, professional image, and deal confidently with complex technical problems
22

Security Intelligence & Operations Consultant Resume Examples & Samples

  • Knowledge and experience in one or more of the core security domains: Preferably SOC Operations
  • Basic understanding of compliance issues (ISO 27001, PCI DSS, COBIT)
  • Penetration testing skills is a plus
  • 2-6 years of experience in Security consulting and/or systems integration
23

Psirt Security Consultant Trainee Resume Examples & Samples

  • Desire to learn and develop, have ambition to grow
  • Flexibility and willingness to travel if needed (limited travel)
  • Security hobbyist, hacker
  • IP networks
  • Operating Systems
  • Good understanding of relational databases and fluent in MySQL queries
  • Scripting skills (e.g. Python, Ruby, etc.)
  • Experience in database migration
  • Generic understanding of information security
  • “Security mind-set”
  • Linux server administration skills (including installation, configuration, maintaining and hardware requirements)
  • LI-SM1
24

Information Security GRC Consultant Resume Examples & Samples

  • Review the identify opportunities for improvement within the Information Security Governance program and processes
  • Liaison with other risk management programs to identify opportunities to improving alignment with the Information Security Governance program
  • Represent Information Security during enterprise wide projects impacting multiple risk programs
  • Document and present to management recommended changes to processes and supporting systems
  • Develop business requirements for the GRC system (Archer) enhancements
  • Assist in designing and configuration of the GRC system (Archer)
  • Perform data analysis to help identify process or data issues
  • Develop and maintain Key Risk and Performance Indicator reports
25

Scada Security Consultant Resume Examples & Samples

  • Professional Information Security certification such as CISSP, CISA or CISM
  • Proven track record of delivery of large security improvement programs
  • Experience in one or more industry sectors: Manufacturing, Oil & Gas, Energy or Water
  • Experience in Strategic IT planning / Information Security Strategy
  • Knowledge of Risk and Regulatory frameworks (NIST-IR, ISO 27001, IEC, NIST 800 52/53, IEC, NERC CIP v3/v6)
26

Security Consultant, Any Massachusetts Resume Examples & Samples

  • Knowledge of and hands-on experience with Structured Query Language (SQL) language
  • Understanding Network and product software security concepts
  • Understanding with enterprise architecture
  • Knowledgeable and experienced with database environments such as Oracle, Informix, SQL Server, Universal Database2 / Database2 (UDB/DB2), Informix, Mysql, Teradata and/or Sybase
  • Knowledge of and experience with UNIX shell environments
  • Knowledge of and experience with UNIX scripting and Perl programming is a plus
  • Knowledgeable and experience with Big Data technology and environments is a plus
  • Knowledgeable and experience with cloud environments is a plus
27

Security Consultant UK / Middle East / Africa Resume Examples & Samples

  • Provide security operations support to staff and locations across UK, Middle East and Africa
  • Provide security advice and input to real estate projects
  • Construct and implement event security plans, attending where required
  • Develop existing travel security package with the Intelligence Manager, including
  • Experienced security professional with corporate security experience and at least 5 years of industry/law enforcement/intelligence service experience
  • Minimum of a Bachelor's Degree or equivalent
  • A solid understanding of the security and safety methods used to deliver a safe and secure environment
  • Knowledge of physical security system design, delivery and operation
  • Knowledge of security technology system design, delivery and operation
  • CPP or PSP accreditation desirable
  • Demonstrable emergency response planning, execution and incident management experience
  • Able to manage multiple projects simultaneously and provide effective support to all functions and individuals
  • Clear and concise oral and written communications skills and the ability to influence at all levels of the organization
  • Ability to discuss and respond to delicate issues
  • Sensitive to different cultures and business operating methods
  • Experience of living and/or working across UK/Middle East/Africa
  • English fluency is a must with additional languages an advantage
  • LI-RS1*
28

Security Managing Consultant Resume Examples & Samples

  • Core consulting
  • Comfortable working in a project based / client serving model
  • The successful Senior Managing Consultant will be internal advisor to other IBM consultants and client teams. The Senior Managing Consultant will assist in pre-sales, sales, closure, and then organizing the delivery of security consulting services with local teams
  • Experience working with Security practitioners
  • Security Services in a top tier professional services firm or in an end user environment
  • At least 8 years experience in working with security consulting teamsRequired
  • At least 8 years experience in management consulting and systems integration or Managed Security Services in a top tier professional services firm or in an end user environment
  • At least 8 years experience in projects related to the core security domain
  • English: Fluent
29

Security Managing Consultant Resume Examples & Samples

  • Provide first line supervision to direct reports
  • Provide management oversight for the identification, triage and response of events or incidents of apparent security breaches
  • Play a significant role in long-term SOC strategy and planning, including initiatives geared toward operational excellence
30

Business Security Consultant Resume Examples & Samples

  • Develops and maintains relationships with customers
  • Enters sales opportunities into sales database
  • Provides regular updates to direct supervisor, stakeholders, and others as needed, including requested reports
  • Works with Enterprise Legal & Regulatory to alter contracts as necessary
31

Manager, Regional Security Consultant Resume Examples & Samples

  • Support the Risk Information Security Officer (RISO) in the implementation of KPMG’s global information management and protection strategy to comply with firm policy, applicable regulatory requirements, and client expectations
  • Partner with the RISO, promote and reinforce global policies and requirements, and help ensure they can be implemented regionally
  • Report/escalate relevant security issues to the RISO, IPG leadership, and Member Firm, as required
  • Support the Compliance team in helping ensure new Member Firm National IT Security Officers (NITSO) are onboarded appropriately and understand their responsibilities; support NITSOs in their roles, as needed
  • Coordinate with the relevant IPG teams to assist member firms with remediation of issues with key controls, critical incidents, and other security requirements; escalate to member firm and regional leadership as necessary and track progress
  • Support activities, actively champion awareness, influence compliance with security policies, provide solutions for business-specific security issues, and remind personnel of the importance of awareness and training
  • Minimum four years of business experience; preference for security consulting experience with a strong knowledge of key principles surrounding Information Security
  • Bachelor’s degree from an accredited college/university required; Master's degree from an accredited college/university is preferred
  • Ability to speak and write in English; Spanish fluency preferred
  • Professional security qualifications such as CISSP and/or CISM preferred; must be willing to obtain certification if not already certified
  • Background working on major projects and the ability to manage multiple processes and projects at once
  • Knowledge of regional issues and structures with the ability to work with people from many different cultural backgrounds; ability to travel up to 50% of time within the region and occasionally outside of the region
32

Cloudera Kerberos Security Consultant Resume Examples & Samples

  • Define cluster security architecture
  • Verify and define the access points to intranet and Internet
  • Meet with application team. Verify and define their individual security needs
  • Verify and define database security requirements
  • Verify the security maintenance requirements
  • Integrate existing active directory with Future system for easy maintainability
  • Define the user roles as per application needs. Carry forward the existing roles for easy transition and training
  • Solution and deliver rock solid security architecture with security at three level I.e. At cluster level, application level and database level
  • Verify data masking requirement with data architect and integrate those requirements with future system
  • Secure the data at rest and data in transit
  • Train the application maintenance team
  • Training document
  • Build and deliver security architecture
33

Research Consultant Security Clearance Required Resume Examples & Samples

  • Partner with research consultants and subject-matter experts to design cultural and sociological programs
  • Conduct secondary research to analyze various cultures’ ideology, political environment and economic landscape to guide the research process
  • Design quantitative and qualitative research and data analysis plans, and develop questionnaires with senior team members
  • Analyze large survey data sets and secondary data sources to create policy recommendations
  • Create and review research reports and PowerPoint presentations for executive leaders
  • Consult with policy leaders on findings and recommendations
34

Consultant, Information Security Resume Examples & Samples

  • Supporting Cyber and Physical intelligence on a global-level by monitoring business systems for anomalies and threats that require further investigation. Work with other departmental experts to understand the threats and their implications
  • Support initiatives addressing implementation of information security operations policy, threat detection and mitigation, and enhanced integration and operational collaboration
  • Providing support to senior leadership working on information security and cyber intelligence issues; and providing insight into cyber-related intelligence tasking, collection, exploitation, processing, and dissemination issues
  • Performing analysis and critical thinking, including assessing complex programmatic issues and applying diagnostics to assess risks and propose innovative solutions
  • Proactively identifies potential information security intelligence areas and opportunities and proposes recommendations that would positively minimize the threat to Mastercard and its customers
  • Assist in live time events to protect against ongoing threats and determine causality
  • Gathering data and generating reports that support the evaluation of the execution of designated intelligence security functions relative to strategic and programmatic goals
  • Assessing complex programmatic issues and applying diagnostics to assess risks and propose innovative solutions
35

Consultant Security Resume Examples & Samples

  • Works as part of a multidisciplinary global & regional team in the delivery of information security and privacy response services to the global retail and commercial enterprise
  • Delivers the execution of triage controls to detect and prevent attackers from infiltrating company information or jeopardizing e-commerce programs
  • Establish and deliver incident response methods, tools and processes which provide
  • The organization value by reducing risk
  • Deliver response focused initiatives leveraging experience in doing so previously
  • Provide support in relation to the other Information Security team functions as and when dictated by workloads and deadlines
  • Provide general advice and guidance on Information Security related matters as and when required
  • Provision of ‘out of hours’ support and investigation as and when required
36

Junior Security Consultant Resume Examples & Samples

  • Provide expert guidance around data security management
  • Advise customers on security concerns and recommendations with regard to the security of data and systems
  • Ensure that data security policies are implemented, enforced and monitored
37

International Consultant Security Sector Reform Consultant Resume Examples & Samples

  • Fluency in English spoken and written and Arabic will be an asset
  • Demonstrate integrity by modelling the UN’s values and ethical standards
  • Have experience and ability to develop reparations offerings and framework of a reparations plan
  • Demonstrate strong writing, communications, interpersonal, and facilitation skills
  • Advanced university degree in social sciences, economics, law, security studies, international relations or a related field; a combination of relevant academic qualifications and extensive experience may be accepted in lieu of the advanced university degree (13-16 years of experience with Bachelor Degree)
  • At least 11 - 15 years’ provision of policy advice in the areas of public administration and security sector reform in developing countries, preferably in the MENA region
  • Strong writing skills with demonstrated track record in providing policy and programmatic advice to governments on design and implementation of security sector reform, policing and/or community security programs in crisis and post-conflict situations. (submission of 2 writing samples)
  • Good understanding of conflicts in the MENA region, core government function support and fragile public sector institutions
  • Experience and/or familiarity with policy and legal frameworks with regard to security sector reform in Libya, a distinct advantage
  • Previous experience working with the UN preferred
  • Excellent analytical, communication and negotiation skills
38

Security Consultant EPH Resume Examples & Samples

  • Lead opportunity identification and qualification activities and progress deals through signing
  • Identify and assist in closing opportunities for follow-on business with the client
  • Experience as security consultant
  • Advanced english level
39

Consultant, Information Security Resume Examples & Samples

  • You will need creative ethical hacking skills to perform any or all of the following: manual testing or ethical hacking; social engineering tests; analyzes technical security weaknesses; and validate exploits
  • Are you interested in working in a fast paced environment researching real-time security threats that arise including critical zero-day vulnerabilities?
  • Do you maintain proficiency in tools, techniques, countermeasures, and trends in information security including new vulnerabilities and exploits impacting your networks and devices?
  • Technical security experience with software architectures, secure software development lifecycle, design and implementation of web based security architecture for secure on-line transactions
  • Technical security experience with network and application layer firewalls, network segmentation, wireless, remote access, SSL, VPN, IPsec
  • Technical security experience in Cryptography, Access Control, ESM, and IDS/IPS, GRC tools
  • Experience with software development and/or scripting (i.e. .NET, C++, Java, C#, perl, python, bash, etc.)
  • Experience with security design principles, best practices, theories, and concepts
  • Strong verbal and written communication skills to effectively partner with business, cross-functional technical and other security teams
  • Ability to validate security best practices, policies and frameworks (PCI, SOX, GLBA, NIST, ISO, etc.) are implemented to meet security and regulatory requirements
40

Technical Sales Consultant Security Resume Examples & Samples

  • Work directly with account team and customer in providing technical expertise and solution recommendation to drive sales
  • In coordination with account team, will identify, design, close and retain Security solutions sales
  • Will participate and/or lead customer solutions meetings
  • Will participate and/or lead internal solution meetings/calls
  • Provide subject matter expertise and end to end technical solution training to account owners
  • Work with internal departments including Product Marketing and Service Management to identify and aid in resolving gaps in product and implementation
  • Sales administration to include funnel management, navigate and execute internal process, management reporting, travel and expense management, training compliance
  • Deep knowledge of managed security solutions portfolio
  • Willingness to travel approximately 25%
  • Technical sales or technical sales support experience
  • Security solutions expertise
  • Industry security certifications desired, i.e. CISSP, GIAC, etc
  • Excellent leadership, communication and presentation skills
  • Proven ability to lead cross functional teams
  • Experience presenting to C-level
  • Must be able to pass a background check and drugscreen
41

Consultant Information Security Resume Examples & Samples

  • Coordinate and execute ISO related projects with an eye for change management at the client (training and certification of relevant business owners)
  • Assist in the development of security organization and security strategy development
  • Performing penetration test to prevent and assist in incident response to mitigation cyber attacks
  • Work on projects regarding identity & access management
42

Consultant Security Engineer Resume Examples & Samples

  • Requires a Bachelor’s degree (or foreign equivalent) in Computer Science, Computer Applications, or a directly related field plus five (5) years of experience establishing and implementing Identity Management functionalities
  • Five (5) years of demonstrated experience with the administration, installation, and troubleshooting of an enterprise IAM environment
  • Five (5) years of LDAP experience, including experience with LDAP schema
  • Three (3) years of experience with object-oriented programming concepts and languages including Java an J2EE
  • Three (3) years of Linux scripting experience
  • Three (3) years of experience integrating legacy systems
  • One (2) year of experience developing web services
  • Experience integrating with Access Management technologies (e.g. SiteMinder) a major plus
43

Security Managing Consultant Resume Examples & Samples

  • 2) The individual should have an understanding of the contemporary security landscape and technologies
  • 3) Understanding of compliance issues (ISO 27001, SSAE 16, and COBIT) and Regulatory requirements
  • 6) Experience in delivering comprehensive architecture specifications for complex security solutions
  • 13) Security Solutions should include solutions from various leading industry vendors
  • Information Security Management Principles - A fundamental understanding of ISMS Principles is expected covering an understanding Disaster Recovery, Access Controls, Authentication, Audit, Governance, Risk Management, Security Architecture, Systems Development
44

Security Managing Consultant Resume Examples & Samples

  • Must have experience working on projects for the CANADA Federal Government
  • Must have eligibility for CANADA Government Security Clearance (Secret Level or Higher)
  • Must have excellent communication skills and the ability to lead complex architectural engagements
  • Must have worked in an Architect capacity in at least one or more of the Security competencies like SSRC, SIOC, IAM, Infrastructire & End Point
  • Must have at least 5 years of experience in Security Consulting
  • Basic knowledge in and experience working a structured solution design methodology
  • CISSP, SABSA, CISM or similar certifications
  • Readiness to travel when required (minimal)
  • Min 8 years of experience working as a Security Architect
  • Min 8 years working in a professional services firm focused on Security Architecture / Consulting
  • Experience in working with atleast 2 of the products such as Checkpoint, ASA, Symantec, Fortinet, Bluecoat, CISCO SourceFire
45

Business Consultant, Security Resume Examples & Samples

  • Organizes and shapes the security team's strategy to drive success
  • Leads CISO level visioning sessions providing thought leadership to client
  • Develops and manages relationships across the whole client base, discussing benefits and value at management/board level
  • Commercially shapes deals based on business benefit to client rather than actual cost to complete (value based pricing)identifying risk/reward opportunities and developing business cases to work with clients in new and different ways to mutual benefits
  • Drives key meetings and workshops to achieve the outcomes within the deadline
  • Understands and utilizes the full range of facilitation methods and tools to run effective events
  • Advises at CISO/Security team board level on strategies and implementation plans
  • Consults on governance, strategy and transformation not just operations
  • Builds and maintains significant alliances and support across the client’s business
  • Leads complex Management of Change (MOC) initiatives
  • Consults and shapes development of the client’s approach to identifying and managing risks and assumptions and for realising benefits at a department level
  • Shapes and directs proposals describing the company solution and the associated value proposition
  • Ensures knowledge capture sessions are arranged and executed building company consultant collateral
  • Clients are typically C-level managers. Can combine multiple consulting assignments and create new consulting frameworks for delivery
  • Balances long-term investments against profitability. Is a leader in the business planning process
  • Assures that correct team is assembled for the engagement
  • 8 or more years experience in commercial or public sector
  • Advanced Educational degree preferred
  • CISA/CISM/CISSP Certification would be an advantage and preferred
  • Speaks and communicate well in English and Cantonese
  • Good problem solving skills
46

Siem Security Consultant Resume Examples & Samples

  • Expert level, practical knowledge (including installation, configuration, troubleshooting and design) of ArcSight SIEM technologies (i.e. ESM, Logger, Express, flex-connector programming); work experience with other SIEM products will be additional advantage
  • Experience in architectural design and implementation of complex SIEM solutions
  • Able to communicate with internal and external senior management confidently and demonstrate the professionalism of the job family
47

Graduate Security Consultant Resume Examples & Samples

  • Provide SAP best practice advice, guidance and support for our customers on implementation projects, upgrades and migrations
  • Work collaboratively with colleagues and customers alike to attune with project methodologies and varied organisational cultures
  • Build relationships with key stakeholders and peers to ensure successful delivery and lasting trust
  • Keep up to date with the latest technologies best practice guidance and software components SAP offers its customers through training and self-study
  • Customer First attitude
  • Innovative & creative approach to problem solving coupled with advanced diagnostic & technical analysis skills
  • Basic understanding / familiarity with SAP products & solutions (e.g. SAP HANA, SAP FIORI, S/4 HANA, SAP CRM, SAP PLM, Success Factors, Hybris etc.)
  • Excited by the latest innovations & technologies and how these will affect our future (mobile, in-memory, cloud, big data, IoT, predictive analytics, machine learning etc.)
  • Proficiency with different operating systems (Unix \ Linux, MS Windows)
  • Some knowledge of object orientated programming (ABAP, Java, SQL)
  • Good time management and multi-tasking capabilities
  • Excellent communication & presentation skills (written & oral)
  • Strong interpersonal skills and assertiveness
  • Good understanding of relational databases (Oracle, MS SQL, SAP® HANA)
  • Strong team player who is also comfortable working on own initiative
  • Flexibility with working hours
  • Familiarity with general business terms and processes
  • Prior internship or fulltime experience in Technical Support, Software Development, IT, or Quality Assurance helpful, up to 2 years
48

Junior Security Consultant Resume Examples & Samples

  • 0 to 2 years of experience relevant to a functional or technical role. Undergraduate degree or equivalent experience preferred. Product or technical expertise relevant to practice focus. Demonstrates basic competence in one product or technology area. Ability to communicate effectively and build rapport with team members and clients. Ability to travel as needed
  • Execute concrete assigned tasks related to different Security projects
  • Asist to trainings and execute self-learning activities
  • Continuous learning by investigating and contributing with new ideas
49

Security Managing Consultant Resume Examples & Samples

  • 1) 3 or more years of experience in working in projects related to the Infrastructure & EndPoint Security core domain with demonstrated knowledge of
  • Access control and firewalls/UTM devices
  • Distributed Denial of Service Prevention (DDoS)
  • Web Application Firewall Protection (WAF)
  • Web Content Filtering
  • Vulnerability Management process / governance
  • 2) 5 or more years in Network Security Consulting Skills / Expertise
  • Comprehensive knowledge and experience in network and networking concepts including network security devices and services
  • DMZ secure design and Business-to-Business (B2B) connectivity network design
  • Isolation of public and private external interfaces
  • VPN security configurations, and VPN plus private line ingress demarcations and policies
  • Secure traffic isolation across common switch, firewall, and load balancing components
  • Phased migration from existing Production to desired end-state, while maintaining security
  • Cisco switches and firewalls, and firewall domains
  • Virtualized networks including basics of Virtual Routing and Forwarding
  • Understanding of Private Virtual Local Area Networks (VLAN) (PVLANs) versus standard VLAN partitioning Unified Threat Management (UTM), such as NetScaler
  • Network Address Translation (NAT), Enhanced Interior Gateway Routing Protocol (EIGRP) and the other network protocols
  • Network design for identical DMZ component configurations across primary and DR sites
  • Domain Name System (DNS) server placement security and optimization
  • Cloud technologies and integration network architectures
  • 3) CERTIFICATION: Security certification from Cisco or Checkpoint, CISSP or equivalent
  • 4) Readiness to travel 50% annually
  • English: Fluent (written and communication)
  • Bilingual: English/French for Montreal location
  • At least 5 years experience in architectural level design in infrastructure and endpoint security domain
  • At least 5 years experience in working in a professional services firm focused on network security projects
  • At least 1 year experience in working with Security Practitioners
  • At least 8 years experience in architectural level design in infrastructure and endpoint security domain
  • At least 8 years experience in working in a professional services firm focused on network security projects
  • CAN Secret Clearance is preferred not mandatory
50

Presales Consultant Security Resume Examples & Samples

  • Deliver technical solutions to clients and take responsibility for the standards of work, project sign off and client satisfaction
  • Contribute expertise towards a proposed technical solution and will work with internal colleagues to define the roadmap and milestones
  • Provide pre-sales support identifying opportunities and contributing expertise around the design and configuration requirements in relation to RFP / RFI and proposals of medium complexity
  • Provide user support, assisting with troubleshooting and design, configuration and escalated problem management
  • Develop technical training materials and conduct training programs and educate engineers on basic technical details
  • Act as key project team members charged with the analysis of user and technical requirements, specifications development, solution design and development, and in some environments may consult on testing and deployment processes
  • Expected to be technology leads for specific technologies and to use their deep knowledge of these technologies to propose enhancements and improvements
  • Proactively and independently support sales of Security Infrastructure & Services
  • Advise customers concerning Security Integration questions
  • Develop activities to extend existing customer portfolios and raise turnover
  • Design of Security infrastructure solutions and translate solution designs to tenders
  • Be involved in the transfer of projects to the delivery teams
  • Answer to RFPs
  • Maintain frequent contacts with customers and suppliers
  • Identify recent developments in the market, closely following vendors and solutions. You will be advising the business development team
  • Has minimum 1 to 3 years of experience in presales or a strong consultancy background
  • Customer management experience
  • Experience of designing, selling and/or implementing security solutions is a plus
  • Experience in optimizing a commercial proposition from a financial and operational perspective
  • Experience in assessing service level agreements for proposed security solutions
  • Native Dutch or French speaker and good second language skills with a very good level of English
  • Highly result orientated
  • Dynamic, organized and ability to cope with a high pressure environment
  • Demonstration of Dimension Data’s core values of Proactivity, Teamwork, Professional Excellence, Partnership, Personal Commitment
51

Security Managing Consultant Resume Examples & Samples

  • Min. Bachelor's Degree in Computer Science/Engineering or equivalent
  • At least 10 years’ experience in projects related to the core Information Security domain
  • At least 8 years’ experience in management consulting and systems integration or Managed Security Services in a top tier professional services firm or in an end user environment
  • At least 8 years’ experience in working with security consulting teams