Cyber Security Operations Resume Samples

4.7 (86 votes) for Cyber Security Operations Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cyber security operations job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
TG
T Gorczany
Triston
Gorczany
199 Zboncak Knoll
New York
NY
+1 (555) 451 0633
199 Zboncak Knoll
New York
NY
Phone
p +1 (555) 451 0633
Experience Experience
Detroit, MI
Cyber Security Operations Business Analyst
Detroit, MI
Hodkiewicz, Hahn and Thiel
Detroit, MI
Cyber Security Operations Business Analyst
  • Lead or assist in site specific project work including staff moves and reconstruction of seating in the workspaces
  • Develop and manage relationships across our business partners and support teams including Global Real Estate, Finance and Facilities
  • Create weekly and monthly management reporting to capture staffing and occupancy by functional teams and location
  • Collect, aggregate, and analyze business processes to identify process improvement opportunities and drive business decision-marking
  • Excellent communication (verbal and written), including succinctly advising senior management of risks, challenges and potential solutions
  • Partner with Cybersecurity managers to collect on-going headcount projections to reconcile with Finance and HR Recruiting
  • Assist in gathering documentation in support of audit and controls
Boston, MA
Specialist, Cyber Security Operations
Boston, MA
Sauer LLC
Boston, MA
Specialist, Cyber Security Operations
  • Works within operational and performance metrics to drive continuous improvement
  • Executes ITSM processes (Change, Request, Incident, Problem management) on technical IT systems at the component level
  • Perform daily response operations with a schedule that may involve nontraditional working hours
  • Consults with Information Security stakeholders to help develop, define, and prioritize work and project requests
  • Provides project fidelity by adhering to established standards
  • Configures, installs, and tests hardware-based and software-based  security tools that provide network and endpoint security
  • Collaborates with Cyber Security to improve prevention, detection, and response capabilities
present
San Francisco, CA
Cyber Security Operations Lead
San Francisco, CA
Crona and Sons
present
San Francisco, CA
Cyber Security Operations Lead
present
  • Drive innovation to sustain and automate the cyber operations by designing and working with cyber engineering team
  • Independently leads computer incident investigations, determining the cause of the security incident and preserving evidence for potential legal action
  • Responds to alerts from various monitoring systems and platforms to address potentially malicious events in a timely manner
  • Detects the full spectrum of known cyber-attacks (e.g., DDoS, malware, phishing, ransomware & others) along with any security and compliance violations
  • Security review of encryption policies, sensor policies for IDS/IPS, Firewalls, web security gateway, logging
  • Serves as a subject matter expert (SME) for performing security and threat assessments
  • Conducts research of emerging security threats
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Ohio University
Bachelor’s Degree in Computer Science
Skills Skills
  • Experience of and ability to document and explain technical details clearly and concisely both written and verbally
  • Expert knowledge of two or more Vulnerability Management Systems such as Qualys, Nessus, MVM, Rapid7
  • Solid attention to detail
  • Experience of and ability to manage multiple projects under tight deadlines
  • Experience of and ability to coach and mentor technical security specialists
  • Background in vulnerability management, pen-testing or SOC function
  • Experience of and ability to successfully interface with managed service customers
  • Experience of and ability to lead technical teams and coordinate response efforts
  • GIAC certifications
  • Familiarity with multiple security technologies and platforms and certifications
Create a Resume in Minutes

15 Cyber Security Operations resume templates

1

Cyber Security Operations Business Analyst Resume Examples & Samples

  • Working in partnership with the Cyber Operations management team to define key reporting requirements
  • Define and deliver weekly reporting, including metrics, KPIs and significant case summaries
  • Assist in gathering documentation in support of audit and controls
  • Collect, aggregate, and analyze business processes to identify process improvement opportunities and drive business decision-marking
  • Preferably 3-5 years of relevant business reporting/analysis experience
  • Advanced proficiency in Excel and PowerPoint required
  • Excellent communication (verbal and written), including succinctly advising senior management of risks, challenges and potential solutions
  • Flexibility to multi-task in order to meet deadlines
  • Experience managing confidential data with the utmost discretion
  • Ability to develop creative solutions to meet deadlines
  • Ability to prioritize and thrive in a fast-paced, changing environment
2

Cyber Security Operations Business Analyst Resume Examples & Samples

  • Develop and manage relationships across our business partners and support teams including Global Real Estate, Finance and Facilities
  • Work closely with the Global Real Estate & Project Managers through ongoing Real Estate projects to determine and manage the short and long term location strategies
  • Lead or assist in site specific project work including staff moves and reconstruction of seating in the workspaces
  • Partner with Cybersecurity managers to collect on-going headcount projections to reconcile with Finance and HR Recruiting
  • Analyze seating impacts due to demand; and evaluate of all seating opportunities
  • Create weekly and monthly management reporting to capture staffing and occupancy by functional teams and location
  • Manage Cybersecurity end-user technology inventory to ensure existing assets are upgraded, tracked, order and deploy new equipment as needed
  • 7+ years of relevant business reporting/analysis experience
  • · Ability to prioritize and thrive in a fast-paced, changing environment
3

Paymentech Cyber Security Operations Lead Resume Examples & Samples

  • 7 to 10 years of Technology, IT Risk/Security or Security Audit experience, IT Forensics, & ITIL (Incident, Problem, Change Management) methodology
  • Advanced experience with Microsoft Office suite including Visio, Excel, Access
  • IT Risk & Security related professional certifications: CISSP, CEH, SANS, CIPP/US
4

Cyber Security Operations Director Resume Examples & Samples

  • Ability to manage large scale Security Incidents, ideally within a Financial Services environment
  • A successful track record of driving change across a global, federated environment
  • Significant previous experience working in Information Security, Compliance, Data Loss Prevention, and/or Data Protection
  • Subject Matter Expertise in the Information Security space, incorporating both technical, incident response and process/operational elements
  • Ability to lead a geographically diverse team in all incident response, management and containment
  • General understanding of regular expressions, database structure and queries
5

Cyber Security Operations Support Resume Examples & Samples

  • Bachelor’s Degree in Computer Science or Information Technology, or equivalent experience
  • ACED Certification
  • Attend operations meetings
  • Provide backup processing and support when business needs require
  • Support any supplemental operational needs outside of Clearwell
  • Ability to travel on short notice
  • May be asked to perform other duties not listed that are of technical nature
6

Cyber Security Operations & Data Integration Manager Ed Resume Examples & Samples

  • Strong communication skills both written and verbal
  • Deep understanding of the cyber analyst and analyst processes
  • Passion for cyber security data and how to unlock its potential
  • Teaming attributes to work across organizational boundaries
7

Cyber Security Operations Senior Analyst Resume Examples & Samples

  • Providing first level response for security events including but not limited to intrusion detection, malware infections, denial of service attacks, privileged account misuse and network breaches. The event management includes triage, correlation and enrichment of individual events to either rule out as false positive, trigger standard detective and corrective responses, or escalating as a security incident
  • Improving the service level for security operations and monitoring. Creating and maintaining system documentation for security event processing. Expands the usage of security monitoring tools to improve the security of the environment based on business use cases or changes in threat landscape, root causes from security incident response, or output from security analytics
  • Configuring and monitoring Security Information and Event Management (SIEM) platform for security alerts. Integrate and work with the firm’s Managed Security Services Provider (MSSP) services
  • Providing reporting and metrics around security monitoring by designing dashboards for asset owners and management consumption. Leveraging existing technologies within the organization to expand the scope of coverage of the security monitoring service
  • Experience with SIEM technologies, log management tools, security analytics platforms, and forensic offerings
  • Strong knowledge of incident response and crisis management
  • Experience with fraud monitoring, data leakage prevention, and privileged access monitoring a plus
8

Cyber Security Operations Service Manager VP Resume Examples & Samples

  • GBO Service Management provides support for SecOps’ security services through end-to-end business relationship management of all Citi business sectors, engineering, 3rd party vendors, and senior business and technology executive management. The organization serves to provide one point of contact to customers & stakeholders and oversight of management processes & systems, while allowing the SecOps operational functions to focus on core responsibilities. The security domains include Perimeter Security; Security Event Monitoring & the Security Operations Center; Authentication, Host, & Application Security; Vulnerability Assessments & Ethical Hacking; Mobile Application Gateway; & Global System Log Review
  • Relationship Management: Act as central point of contact for all Citi business sectors, engineering, 3rd party vendors, and senior executive business and technology management to coordinate and/or in support of (but not limited to) strategic planning, client/business interactions and escalations, technology implementations and migrations, issue resolutions, incident/problem management representation. Provide a “white glove” type service to critical customers
  • Change Management Coordination: Measuring and improving upon time to market of business requests and changes
  • Financial and Vendor Management: General oversight of the P&L budget and contracts
  • Provide management support to the Perimeter Security Senior Leader
  • Experience in a Business Analysis, Technology Operations, Client Management and/or Project Management role is required. General knowledge/experience in the following Information Security (IS) technology frameworks is required (in-depth knowledge is a plus): ITIL Service Management and/or COBIT Frameworks, networks, network security products (Firewall, Proxy, Remote Access) and common architectures that deliver high performance and resilient solutions (such as systematic trading environments). Computer Engineering/Science Degree is required and MBA is a plus
9

Senior Specialist, Cyber Security Operations Resume Examples & Samples

  • Definition of incident response plans for information protection purposes
  • Discovery, analysis and enforcement of third party applications with cloud security technology
  • Monitoring and prevention of information disclosure with Data Loss Prevention policies, procedures and technology
  • Understanding of the mechanics of malware and cyber defense tactics
  • Business engagement to determine processes at risk for data loss and instituting a culture of change to better secure information
  • Familiarity with regulatory requirements such as PIPEDA and PCI
  • Bachelor’s degree in technology-related field, engineering or in computer science with a specialization in telecommunications, or the equivalent
  • Knowledge of information security concepts such as identity management and access control, encryption, communications security, digital forensics and cyber investigations, operating systems and secure application development
  • The following certifications are an asset: CISSP, CISM and CISA
  • Ability to communicate in French is an asset
  • Existing Secret clearance or ability to obtain is preferred
10

Cyber Security Operations SOC Senior Analyst Resume Examples & Samples

  • The overall team scope within the security event lifecycle includes
  • Proficiency in a Linux command line environment (awk, sed, grep, etc.) or Windows equivalent (Powershell) to analyze log files and other data sources and summarize data and locate anomalies
  • Experience with fraud monitoring, data leakage prevention, and privileged access monitoring is a plus, but is not required
  • Strong verbal and written communication skills, including the ability to lead security incident investigation calls with other technology teams, and the ability to translate complex technical concepts into plain English for consumption by non-technical audiences
11

Emeia Cyber Security Operations Centre Consultant Resume Examples & Samples

  • Cyber Incident Response
  • General network knowledge, TCP/IP Troubleshooting
  • Ability to trace down an endpoint on the network based on ticket information
  • Familiarity with system log information and what it means
  • Knowledge of host based firewalls, Anti-Malware, HIDS
  • TCP/IP, Internet Routing, UNIX & Windows NT
  • Strong analytical and problem
  • SIEM technologies and platforms such as Splunk, Arcsight, QRadar or others
  • Network monitoring technology platforms such as Fidelis XPS, RSA or others
  • End point protection tools, techniques and platforms such as CarbonBlack, Symantec, McAfee or others
  • Professional consultancy experience highly beneficial
12

Team Lead-cyber Security Operations Centre Resume Examples & Samples

  • Design, develop and implement an efficient and effective way of collecting, assessing, disseminating and tracking technical security intelligence relating to internal and external threats targeting the OCBC Group’s staff or customers that will deliver objectives aligned with organisational strategy and enable functional results
  • Implement and initiate a coherent, relevant and practical strategy that maps out the means by which OCBC can mature existing intelligence gathering processes into one that clearly demonstrates early identification and understanding of threats as they emerge
  • Implement and initiate an effective roadmap and strategy by which OCBC can mature Threat Detection and Response capability in line with the Threat Landscape as a result of intelligence gathered
  • Establish reporting functionality to produce well-sourced and authoritative reporting on cyber risk issues and threats, drawing on the fullest possible range of official and expert sources, and apply rigorous analytical techniques to do so. Engaging with senior management and other key stakeholders to ensure they are made aware of significant changes in risk profile and kept current on major developments and trends
  • Ensure that the Cyber Defense Unit provide subject matter expertise in cyber and technical threat and vulnerability issues
  • Builds solid network and relationships within Information Security Risk, Fraud, Audit, Operational Risk, IT Operations, Software Development and Business to assess vulnerability and provide advice guidance and counsel on mitigation measures
  • Manage and develop relationships with peer organisations, security intelligence vendors, industry partners and government agencies in order to share best practices, experiences and information of mutual interest
  • Provide technical expertise to assist stakeholders in efforts and objectives related to mitigation of threats across entity and region
  • Lead and direct all initiatives across the Group
  • Ensure that all techniques, tools, processes and working practices are strictly developed in accordance with Group Standards, legal and regulatory requirements, and ethics
  • Strategy / Vision - Be able to define and implement a vision and strategy for the creation and development of a threat intelligence capability within a global organisation
  • Influence - Have significant personal gravitas and ability to engage with senior management and stakeholders, at a technical and business level, to obtain their engagement, attention, awareness and support. Evidence ability to win the trust and confidence of peers and colleagues to influence their thinking and decision making with regards risk mitigation
  • Span of Control - A proven track record of managing direct and indirect personnel across a wide geography
  • Location – Based in the Singapore. Travel will be required as necessary
  • Communication - Have excellent communication skills to be able to build relationships with key internal & external stakeholders at a business and technical level
  • Style – Pragmatic change agent who can readily understand organizational context and purpose, but who is not afraid to challenge existing processes and ways of thinking
  • LI-EL
13

Cyber Security Operations Sales Engineer Resume Examples & Samples

  • Assess, synthesize, and document customer business requirements
  • Connect cybersecurity goals and objectives with the business mission
  • Evaluate cybersecurity risk in the context of business requirements
  • Create and give technical sales presentations primarily focused on SOC solutions
  • Develop a deep understanding of our managed security services in order to address customer questions and concerns
  • Work closely with sales representatives to support the sales process, including responding to RFPs, generating price quotes, and
  • Develop strategies based on requirements, market trends, products, and technologies for use with customers
  • Support business development and marketing activities, including conference presentations, articles, blogs, and customer meetings
  • Regularly interacts with customers (both current and prospective) and senior management
  • Advise on technical architecture design, product selection, and detailed implementation guidance
  • Contributes to the development of organization's goals and objectives
  • Prior experience providing technical support for the sales process involving cybersecurity solutions
  • Strong public speaking and customer presentation skills
  • Familiarity and experience working with SIEM technology, security device management, and security infrastructure design issues (e.g., “Kill Chain” analysis)
  • Expert understanding of common network protocols (e.g., TCP/IP, Ethernet, routing/switching protocols)
  • Ability to execute in a methodical manner to gather, document, and present specific customer requirements
  • A passion for cybersecurity consulting and willingness to constantly learn more
  • Dedicated to continued professional development
  • The candidate must have excellent technical, communication (verbal and written) and time management skills as well as the ability to visualize/execute projects are essential
  • Prior experience as a sales engineer selling managed security services
  • Thought leadership experience such as conference presentation, blogging and other publications related to security operations
  • Experience performing radio frequency analysis and exploitation
  • Understanding of Utility and/or Oil and Gas Control systems
  • Familiarity and experience with funds transfer, payment systems, trade matching and execution, settlement activities, insurance underwriting and risk analysis
  • Familiarity and experience with electronic medical record systems, medical insurance payment systems, medical diagnostic and treatment device security
  • Bachelors Degree or at least 8 years of related experience
14

Cyber Security Operations Support Resume Examples & Samples

  • Bachelors degree in engineering or related technical discipline and at least 3 years of applicable experience
  • Experience with proposals, direction, cyber security assessments, design input, and testing for new projects. Direction, cyber security assessments, design input, and testing for new projects
  • Coordination of Cyber Security Program implementation
  • Support for Isolated Development Infrastructure
  • NRC, NUPIC and Customer audits of cyber security
  • Development of cyber security program and training materials
15

Cyber Security Operations Resume Examples & Samples

  • 1-3+ years of experience in operational cyber security, with demonstrated passion for the topic
  • Strong client service orientation and ability to be credible with senior clients in this area
  • Technical depth and expertise for cyber security technologies
  • Deep perspective on cyber threats to private and public sector organizations
  • Understanding of how cyber operations are run in the public sector and government (and the overlap between public and private sector organizations on the topic
  • Creative, entrepreneurial mindset, execution orientation, and the ability and energy to manage multiple initiatives with limited oversight
  • Strong analytical skills, including structure problem solving, quantitative analysis
  • Flexibility to travel
16

Cyber Security Operations Resume Examples & Samples

  • CompTIA Security + required
  • GIAC certifications a plus
  • Expert knowledge of two or more Vulnerability Management Systems such as Qualys, Nessus, MVM, Rapid7
  • Expert understanding of network protocols and enterprise systems
  • Expert understanding of multiple operating systems, cryptography and small apps
  • Familiarity with multiple security technologies and platforms and certifications
  • Background in vulnerability management, pen-testing or SOC function
  • Experience of and ability to successfully interface with managed service customers
  • Experience of and ability to lead technical teams and coordinate response efforts
  • Experience of and ability to document and explain technical details clearly and concisely both written and verbally
  • Experience of and ability to manage multiple projects under tight deadlines
  • Experience of and ability to coach and mentor technical security specialists
  • Solid attention to detail
  • SANS Certified Intrusion Analyst (GCIA)
  • SSCP, CISSP or CEH
17

Cyber Security Operations Forensic Analyst Resume Examples & Samples

  • 3+ years of experience with Cybersecurity
  • Experience in performing computer, network, and other types of forensics
  • Experience in conducting malware analysis
  • Experience with defensive measures and information collected from a variety of sources to identify, analyze, and report events in order to protect information, information systems, and networks from threats
  • Experience with NIST SP 800 Series, particularly NIST SP 800-53
  • Experience with Cybersecurity automated tools, including McAfee ePO, IBM Big Fix, RSA Archer, Nessus, and AppDetect
  • GCIH, GCIA, or CSIH Certification
  • Experience with security automation standards, including CVE, CCE, CPE, CVSS, XCCDF, and OVAL
  • Possession of excellent technical writing skills to communicate at technical and management levels
18

Cyber Security Operations Architect, Lead Resume Examples & Samples

  • 5+ years of experience as a security engineer or architect in designing, integrating, and implementing best-in-class Cybersecurity tools or products to serve client needs
  • Experience with creating and maintaining designs for security operations architecture, providing guidance and analysis for new security technologies and enhancements to existing security technologies, providing recommendations on how to optimize current automation tools, creating, reviewing, and updating security engineering and architecture processes and procedures, and implementing Enterprise security architecture frameworks and methodologies
  • Knowledge of the capabilities and techniques of malicious actors, including hacktivists, criminal syndicates, and advanced persistent threats conducting computer network exploitation and attacks against the US government resources and critical infrastructure -Knowledge of incident handling and incident response methodologies
  • Knowledge of Information Security policies, standard, procedures, directives, and frameworks and security principles, best practices, and solutions for security countermeasures
  • Experience with marketing or selling best-in-class Cybersecurity tools or products to a variety of clients
19

Cyber Security Operations Technician Resume Examples & Samples

  • 5 years of experience with IT
  • 5 years of experience with administrating Linux or UNIX and Windows servers
  • Experience in server virtualization technology platforms, including vSphere
  • Experience in working with McAfee ePolicy Orchestrator, McAfee Host Intrusion Prevention System, and McAfee Data Loss Prevention Endpoint products
  • Knowledge of Linux or UNIX and Microsoft operating systems, networking, DNS, and STIG implementation
  • DoD 8570.01-M (IAWF) IAT Level II Certification
  • Experience in working with SQL, firewalls, and Intrusion Detection and Prevention Systems (IDPS) preferred
  • Experience with Host Intrusion Prevention System (HIPS) signature development preferred
  • BA or BS degree in Computer Science or Computer Information Systems
20

Director of Cyber Security Operations Resume Examples & Samples

  • Forming and leading incident response teams in response to security events
  • Defining the scope of cyber security penetration tests, coordinate and communicate with appropriate teams and management
  • Managing a team to ensure monitoring of the global Kellogg network, while aligning Corporate and EPS goals to S.M.A.R.T. Enterprise Security objectives
  • Leadership experience in Security with a focus on security tool technology, security management and policy enforcement; previous management experience in managing a global SOC
  • Strong analytical and problem solving skills with the ability to synthesize the big picture and detailed technical issues rapidly and accurately. Ability to multi-task, effectively prioritizing and executing tasks in a high-pressure environment
  • Have the ability directing development of metrics required to manage improvement in SOC processes and procedures. Interacting with other teams to provide the measurements needed to effectively manage their information risk to Kellogg's current global security risk level
  • Experience with global Budget Management
  • Technical expertise working with the following security tools: SEIM (Q1 Radar), IPS (SourceFire), Firewall (Checkpoint) and Zero Day Malware (Fire Eye)
  • Proven ability to communicate threat and risk profiles to the executive leadership team
  • Familiarity and experience with security industry frameworks, such as, ISO 27001, and NIST SP 800-30/Cybersecurity Framework
21

Senior Analyst Cyber Security Operations Resume Examples & Samples

  • Continuously tune and implement new rules and use cases for Hyatt’s Security Incident and Event Monitoring (SIEM) tool
  • Travel to hotels affected by Cyber Security incidents so that they can be rapidly remediated
  • Provide expertise and guidance to CSO team and Cyber Security department, imparting knowledge that improves overall security posture
  • Work with development and operations teams to ensure all relevant system logs are stored appropriately into Hyatt’s SIEM
  • Continuously tune existing log sources and Hyatt’s Host Intrusion Detection System (HIDS) to better detect attackers
  • Use innovation and lateral thinking to “hunt” inside the environment, looking for signs of attacker behavior proactively instead of responding to known incidents
  • The position responsibilities outlined above are in no way to be construed as all encompassing. Other duties, responsibilities, and qualifications may be required and/or assigned as necessary
  • Experience working with SIEM tools and EDR tools is required
22

Cyber Security Operations Task Lead Resume Examples & Samples

  • Experience with Endpoint security
  • Experience with forensics
  • Experience with incident response
  • Experience with security assessment and authorization (SA&A) or certification and accreditation (C&A)
  • Experience with IBM BigFix
  • Experience with IBM AppScan
  • Experience with CyberArk
  • Experience with Carbon Black
  • Experience with RSA ECAT
  • Experience with Cylance
  • Experience with SolarWinds Log and Event Manager
  • BS degree in an IT field
  • Industry certification, including Security+ or CISSP
23

Cyber Security Operations Lead With English Resume Examples & Samples

  • Serve as a Subject Matter Expert (SME) within the areas of SIEM and Security Analytics
  • Collaborate with Accenture’s external vendors to support Cyber Security Operations and the development of new Cyber Security Offerings
  • Communicate directly with Accenture clients and handle escalations
  • Limited travel is possible although this is not specifically a mobile role
  • Professional experience with enterprise-level Security Information and Event Management (SIEM) tools like HP ArcSight, IBM QRadar, Splunk, etc
  • Advanced knowledge of networking and IT Security principles, techniques and methodologies
  • Demonstrated leadership skills and ability to drive projects forward
  • Strong communication, negotiation and problem solving skills
  • Very strong presentation skills and ability to contribute in client meetings
  • At least bachelor degree in Information Technology at a University
  • At least 1 certification recognized in the IT Security industry
24

Cyber Security Operations Executive Resume Examples & Samples

  • 15-17 years of related work experience
  • Deep technical knowledge of Information Security threat vectors: DDoS, Malware, etc
  • Strong proficiency with Information Security control architecture: Firewalls, Intrusion Detection, etc
  • Experience with Vulnerability and Exploit Analysis
  • Experience with Incident and Crisis Management
  • Experience with Audit Management
  • Decisive decision making
  • Ability to manage a multi-million dollar operational budget
  • Ability to lead large teams and shape their strategic direction
25

Cyber Security Operations, Lead Resume Examples & Samples

  • Develops technical cyber security solutions in response to customer requests or in support of proposal solution development
  • Provide technical writing support in support of corporate response to RFPs/RFQs from various customers
  • Support new engagements as transitional program or operations lead
  • Support documentation of all business and workflow processes in this area
  • Research, evaluates, recommends, and designs new security technologies and supporting infrastructure
  • Provides technical consultation in cyber security capability development
  • Maintains current knowledge of relevant cyber security and related technologies as assigned
  • Serves as a technical team or task lead ? Serves as liaison with various customers (internal and external)
  • Acts as a subject-matter expert to multiple tasks and/or program
  • Planning, organization, scheduling and progress reporting of various projects
  • 10-15 years of experience in a technical field
  • Past experience in managing a cyber Security Operation Center or various components of a Security Operation Center including supervision of senior technical analysts. Experience with network/host-based security systems (e.g. IDS/IPS, DLP), centralized log management systems, and Security Information Event Management (SIEM) technologies
  • Excellent teamwork skills to collaborate with a diverse team of skilled systems engineers, senior management personnel, and customers. Excellent communications skills to articulate complex technical solutions or issues
26

Head of Cyber Security Operations Resume Examples & Samples

  • Technical leadership setting strategic and tactical goals driving the evolution of the Incident Response, Security Monitoring and the Threat Intelligence function
  • Day to day operations growing and running the team
  • Developing programs to recruit and retain talent. Actively running the recruitment effort
  • Work closely with internal stakeholders to support and share latest attacker techniques, develop mitigation/response strategies and guide the acquisition and development of countermeasures to keep the business safe
  • Provide continuous metrics and performance indicators to the leadership team highlighting the effectiveness of the Cyber Security program
  • Support the CISO in liaising with regulatory and audit teams as necessary
  • Hands on experience leading response to major incidents, identifying gaps, driving process improvements to mitigate gaps/risks is expected
  • 10+ years hands of experience in the field of security engineering, architecture, operations and assurance functions
  • 5+ years of leadership experience
  • Demonstrable experience in information sharing platforms like memberships to trust groups for intelligence sharing
  • Master’s degree in Computer Science or related field
  • Experience in fast paced/high stress environments
  • Fast thinker both strategically and tactically
  • Comfortable working with senior stakeholders across business and function lines
  • Experience working on global/multicultural teams across different timezones
  • Decisive leader with the ability to present solutions which support both business and security asks
27

Cyber Security Operations Technician Resume Examples & Samples

  • Level support for the HBSS Fleet Centralization
  • DoD 8570.01
  • M (IAWF) IAT Level II Certification
28

Cyber Security Operations Architect, Lead Resume Examples & Samples

  • 5+ years of experience as a security engineer or architect in designing, integrating, and implementing Best-in-class Cybersecurity tools or products to serve client needs
  • Knowledge of incident handling and incident response methodologies
  • Experience with marketing or selling Best-in-class Cybersecurity tools or products to a variety of clients
29

Junior Analyst Cyber Security Operations Resume Examples & Samples

  • Continuously monitor Hyatt’s cyber security tools to detect signs of suspicious activity
  • Respond to Cyber Security incidents as they are detected, ensuring that attackers are evicted and Hyatt brought out of impact quickly and artfully
  • Work with senior members of the Cyber Security Operations team to enhance skills and knowledge
  • Manage small-scope enhancement projects to make small improvements to Hyatt’s security posture
  • Provide suggestions to senior CSO staff for improving detection efficacy
  • At least one year of experience in Cyber Security is preferred; however any combination of experience, education, and certification that demonstrates the candidate can be successful in the position are acceptable
  • Experience with SIEM tools, EDR tools, Network IDS, Host IDS, DNS Firewalls, Next Gen Firewalls, Secure Web/Email Gateways is preferred
30

Cyber Security Operations Team Analyst Resume Examples & Samples

  • 5-7+ years of related work experience
  • Technical knowledge of Information Security threat vectors: DDoS, Malware, etc
  • Proficiency with Information Security control architecture: Firewalls, Intrusion Detection, etc
  • Ability to relate technical issues to non-technical associates / business owners Decisive decision making
31

Specialist, Cyber Security Operations Resume Examples & Samples

  • Administers critical technology platforms, optimizing and upgrading to maximize value
  • Monitors critical technology platforms for performance, availability, and capacity
  • Configures, installs, and tests hardware-based and software-based  security tools that provide network and endpoint security
  • Collaborates with Cyber Security to improve prevention, detection, and response capabilities
  • Analyzes customer requirements and applies enterprise IT security rules
  • Executes ITSM processes (Change, Request, Incident, Problem management) on technical IT systems at the component level
  • High School Diploma or GED from an accredited institution
  • Minimum 5 years of experience in security operations, network security, or a graduate of Eaton's Leadership Development Program
  • This position requires use of information or access to hardware which is subject to the International Traffic in Arms Regulations (ITAR). All applicants must be U.S. persons within the meaning of ITAR. ITAR defines a U.S. person as a U.S. Citizen, U.S. Permanent Resident (i.e. 'Green Card Holder'), Political Asylee, or Refugee
  • Deep understanding of networking, firewalls, DNS, proxy, and VPN
  • 3 years of experience with security technologies (e.g. IPS, IDS, SIEM)
32

Senior Analyst IT, Cyber Security Operations Resume Examples & Samples

  • Analyze network security requirements for business processes and configure security technical systems per prescribed procedures
  • Configure and install hardware and software security systems that provide network security as per prescribed procedures
  • Administers/manages technical systems per prescribed procedures
  • Escalate incidents as defined in the established operating procedures
  • Perform daily response operations with a schedule that may involve nontraditional working hours
  • Develop and refine operating procedures to improve efficiency and effectiveness of incident response
  • Execute project tasks to enhance CSO capabilities
  • Collaborate with CSIRT and L1 SOC to improve prevention methods
  • 2 years of experience in networking (LAN / WAN / Internet), server and endpoint administration is required
  • 2 years of experience in cyber security technologies including firewalls (policy design, IPSEC VPN, High availability), remote access (IPSEC / SSL VPN), Unix and scripting (C, Perl) is required
  • Network security knowledge of DMZ architecture, Intrusion prevention / detection, endpoint security, TCP/IP protocol, DHCP, DNS, and operating system concepts
  • Knowledge of wide area network security as it relates to networking protocols and connectivity to / from external resources (switches, routers, firewalls, VPNs, encryption and authentication methods)
  • Technical certifications are preferred but not required: Security+, Network+, MCSE, CISSP, CCSA, CCSE, CCNA
33

AVP Cyber Security Operations Resume Examples & Samples

  • Establishes and directs the design, development, testing and implementation of appropriate Information Security strategies, plans, products, and other access control techniques. Also identifies emerging vulnerabilities, evaluates associated risks and threats, and provides countermeasures where necessary
  • Directs the staff in the evaluation of risks and threats, development, implementation, communication, operation, monitoring and maintenance of the information security technologies which promote a secure and uninterrupted operation of all IT systems
  • Manages the reporting, investigation, and resolution of information security incidents. Works with and consults with senior business leaders such as the Chief Compliance Officer and the Office of General Counsel on potential data breaches. Oversees digital forensics activities to support Human Resources, Legal, and other key stakeholders while maintaining appropriate chain of custody
  • Manages the staff overseeing all aspects of Identity and Access Management. Ensures that appropriate access is provided to employees, contractors, and other parties in a timely fashion meeting strict security standards in accordance with the principles of Segregation of Duties and Least Privilege. Works closely with Human Resources and Enterprise Procurement to ensure IT aspects of new employee and contractor onboarding are appropriately completed
  • Oversees staff supporting the Office of the General Counsel in the collection, delivery, and presentation of electronic evidence regarding litigation for and against the company. Provides services to manage the full lifecycle of electronically stored information to those ends
  • Responsible for the development and implementation of security standards, procedures and guidelines to prevent the unauthorized use, release, modification, or destruction of data across multiple platforms and environments (e.g., company-wide, distributed, client server systems, and e-applications)
  • Responsible for ensuring appropriate governance over Managed Service Providers managing and maintaining information security technologies
  • Works closely with AVP, Corporate Security & Safety to ensure common approach to threat and intelligence analysis and other security services common to both teams
  • Maintains contact with industry security groups, and an awareness of current vulnerabilities, threats, and risks to data privacy and information security
  • Senior level understanding of all aspects of information security, including: security and risk management frameworks, vulnerability and threat management, security operations, security organization, access control, and security incident management
  • Excellent ability to influence change in corporate understanding and adoption of information security concepts
  • Excellent communications and interpersonal skills and the ability to work effectively with peers; senior executives in both IT and across business units; and internal/external business partners/clients. Ability to effectively explain complex security-related concepts and issues to non-technical and business audiences
  • Strong understanding of crisis management skills
  • Experience working within a global organization
  • Ability to effectively communicate with all levels of employees within scope of responsibility
  • Ability to manage complex projects to completion
  • Proven ability to lead and motivate others in accomplishing goals
  • Ability to exercise professional judgment and assume responsibility for decisions which have an impact on people, quality of service, and costs
  • Advanced computer skills including Microsoft Office suite and other business related software systems
  • Preferred insurance industry knowledge
  • Bachelor's degree with Master's preferred in Computer Science, or related discipline, or equivalent work experience
  • Typically a minimum of ten years of experience in information security
  • Typically a minimum of five years of supervisory/management experience including preparing and managing a significant operating budget
  • Applicable certifications preferred
  • LI-WM1
  • TMJ-WM1
34

Cyber Security Operations Intern Resume Examples & Samples

  • Enrolled in or attending college
  • GPA of 3.25 or higher
  • Pursuing a degree in Computer Science, Computer Engineering Computer science coursework
  • Must be at least 16 years of age
  • Eligible for Security Clearance
  • Must be able to work in a fast paced, high profile environment
  • Participation in a Cyber Security course of study or the Cyber Patriot program. Knowledge of software development, computer networks and Internet threat activity
  • Knowledge and understanding of Security Incident and Event Management (SIEM) tools (Arcsight and Splunk)
  • Prefer students with heavy interest and experience related to Cyber Security, Science, Technology, Engineering or Math
35

Security Analyst, Cyber Security Operations Resume Examples & Samples

  • Monitoring and analysis of alerts and anomalous network activity
  • Process incident tickets
  • Initial triage of events/incidents
  • Implement appropriate mitigations
  • Provide occasional on-call support
  • Bachelor’s Degree in Cyber Security, Systems Engineering, Computer Science, or related field
  • 2+ years of related cybersecurity work experience
  • Must possess excellent organization skills and ability to manage multiple priorities
  • Understanding of Networking (TCP/IP, OSI Model, Wireless, Routing and Switching)
  • Understanding of Cyber Security concepts and best practice
  • Basic Knowledge of OS’s (Windows, MAC, Linux variants)
  • Basic understanding of attack vectors
  • CSA+, Network+, Security+, GSEC, GCIH, GMON, ECSA or related certification(s) a plus
36

Cyber Security Operations Lead Resume Examples & Samples

  • Manage a team of individuals and vendors to provide support to security operations center which is built to protect data across ABC enterprise
  • Manage a team which provides 24x7 cyber security operations support inclusive of metrics
  • Experience in customizing intelligence feeds to suit ABC organization
  • Oversees the planning, execution, and management of multi-faceted projects related to Cyber command center operations
  • Plan, build, develop and mature the security operations to pro-actively monitor the incidents that happens in the environment, build solutions to counter and respond to them
  • Drive innovation to sustain and automate the cyber operations by designing and working with cyber engineering team
  • Develops and manages security for multiple IT functional areas (e.g., applications, systems, network and/or Web) across the enterprise
  • Serves as a subject matter expert (SME) for performing security and threat assessments
  • Leads multiple projects or programs
  • Responds to alerts from various monitoring systems and platforms to address potentially malicious events in a timely manner
  • Independently leads computer incident investigations, determining the cause of the security incident and preserving evidence for potential legal action
  • Routinely develops and updates incident response playbooks to ensure response activities align with best practices, minimize gaps in response and provide comprehensive mitigation of threats
  • Security review of changes to networks, servers and end point devices in collaboration with infrastructure operations
  • Security review of encryption policies, sensor policies for IDS/IPS, Firewalls, web security gateway, logging
  • Investigations and Forensics
  • Proposes additional components and techniques that could be used to proactively detect and prevent malicious activity
  • Manages day-to-day relationship with security and infrastructure services partners
  • Develops remediation strategies and risk responses associated with the protection of infrastructure and information assets
  • Typically requires 7-8 years of combined IT and security work experience with a broad range of exposure to systems analysis, application development, systems administration and over 4 years’ experience designing and deploying cyber security solutions for operations at the enterprise level
  • Requires Security Certification(s) (i.e., Certified Information Systems Security Professional (CISSP), or Certified Information Security Manage (CISM) or CEH or other equivalent recognized security certifications
  • Great attitude to help, learn and grow, excitement is always welcome
  • Experience applying structured analytical methodologies to threat monitoring and intelligence analysis, e.g. Cyber Kill Chain
  • Experience with Network protocols and packet analysis tools
  • Must know SSL/TLS, HTTP, DNS, SMTP, IPsec, PKI, proxies, TCP/IP, VM, Wireless, VPN
  • Solid understanding of cloud based critical infrastructure systems security threats
  • Deep experience with cyber security in the domains of cyber threat intelligence and analysis, security monitoring and Incident Response
  • Familiarity with latest security vulnerabilities, advisories, incidents, penetration techniques, attack vectors, and countermeasures
  • Demonstrated sound understanding of at least 3 of the following standards such as ISO 27001/27002, COBIT, ITIL, NIST, HIPAA, SOX and PCI
  • Ability to lead and provide direction to project teams