Cyber Security Services Resume Samples

4.5 (108 votes) for Cyber Security Services Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cyber security services job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
PG
P Gutkowski
Paul
Gutkowski
57723 Emmy Mountain
New York
NY
+1 (555) 813 1386
57723 Emmy Mountain
New York
NY
Phone
p +1 (555) 813 1386
Experience Experience
San Francisco, CA
Associate, Cyber Security Services
San Francisco, CA
Schowalter, Waters and Kshlerin
San Francisco, CA
Associate, Cyber Security Services
  • Assist with planning, designing, implementing, testing and operating cyber security processes and systems
  • Implement Role Based Access Controls (RBAC), including analytical role mining and entitlement analysis
  • Programming with vb.net, ASP.net, java scripts, JSON, SQL Scripts, XML (SOAP, XLST), AJAX, C#, and Perl
  • Assist with the monitoring, detection, analysis, and investigation of threat activity for clients
  • Provide support with respect to building, configuration, and architecture of one or more Identity platforms, such as SailPoint (IdentityIQ)
  • Assist with Security Monitoring and Incident Response methodology
  • Knowledge base in operations, systems evaluation and architecture
Detroit, MI
Cyber Security Services Sales Specialist
Detroit, MI
Von-O'Keefe
Detroit, MI
Cyber Security Services Sales Specialist
  • Interfaces with Senior Management inside Symantec to help set strategy and participates in varied roles to support internal business development
  • Develops strategies and orchestrates company resources to maximize sales volume within assigned accounts
  • Actively builds networks with contacts and partner companies that can contribute to Symantec’s success
  • Identifies and qualifies opportunities, developing and executing the sales process
  • Works under general direction toward predetermined short and long term goals
  • Works independently to determine the best approach for achieving personal and company goals
  • Participate and assist in marketing initiatives to generate demand and increase CSS awareness
present
Los Angeles, CA
Senior Associate, Cyber Security Services
Los Angeles, CA
D'Amore, Spencer and Skiles
present
Los Angeles, CA
Senior Associate, Cyber Security Services
present
  • Develop Information Governance and Information Security Strategy plans, and perform assessments using industry framework, such as ISO 27002 or NIST 800:53
  • Provide support with respect to building, configuration, and architecture of one or more Identity platforms, such as Privileged Access Manager and CyberArk
  • Demonstrate integrity within a professional environment, provide guidance to team members, and participate in performing project procedures
  • Help assist with ingesting and querying large data sets, particularly systems logs, security event data, and network flow analysis
  • Articulate business risks of technical vulnerabilities to client personnel and help assist with scoping prospective engagements and developing proposals
  • Assist with scoping prospective engagements and developing proposals
  • Help assist with scoping prospective engagements and developing proposals
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of Washington
Bachelor’s Degree in Computer Science
Skills Skills
  • Experience with service lifecycle management, strategic planning, and program management
  • Demonstrate expert level communication, interpersonal, and leadership skills to influence outcomes in a matrixed organization
  • Ability to relentlessly drive a strategic vision while building and fostering collaborative relationships to achieve common objectives
  • Ability to mobilize and motivate teams; set direction and approach; resolve conflict; execute with limited information and ambiguity
  • Proven track record in challenging and influencing strategic directions to achieve the optimal future state
  • Senior level resource with high visibility
  • Broad knowledge of cyber security landscape
  • Natural inclination for strategic thinking; forward focused and problem solving oriented
  • Challenges status quo and does not take no for answer
  • Relentless drive for results
Create a Resume in Minutes

11 Cyber Security Services resume templates

1

Cyber Security Services Manager Resume Examples & Samples

  • Drives alignment across technology, operations, BISOs, and Policy to ensure successful delivery, availability, and intended value of service(s) is achieved
  • Incorporates capability requirements from stakeholders to gain consensus on common set of objectives and intended outcomes
  • Partners with Program Delivery to translates the functional roadmap into work tracks and project concepts required to realize intended outcomes
  • Identifies and leverages interdependencies across services
  • Communicates, influences, negotiates, and drives consensus both vertically and horizontally to achieve service objectives
  • Minimum 10 years of experience in cyber security or information technology
  • Strong functional and technical knowledge in one or more of the following areas: Data, Application, Device, Core Infrastructure; Cyber Security related experience preferred
  • Experience with service lifecycle management, strategic planning, and program management
  • Strong understanding of risk management, risk assessment, and remediation planning; Governance, Risk and Compliance related experience preferred
  • Demonstrate expert level communication, interpersonal, and leadership skills to influence outcomes in a matrixed organization
  • Ability to relentlessly drive a strategic vision while building and fostering collaborative relationships to achieve common objectives
  • Ability to mobilize and motivate teams; set direction and approach; resolve conflict; execute with limited information and ambiguity
  • Must be able to translate strategy into specific goals, tactics and action plans; tenacity in achieving intended outcomes
  • Proven track record in challenging and influencing strategic directions to achieve the optimal future state
  • Senior level resource with high visibility
  • Broad knowledge of cyber security landscape
  • Natural inclination for strategic thinking; forward focused and problem solving oriented
  • Challenges status quo and does not take no for answer
  • Relentless drive for results
  • Intellectually curious
  • Collaborates well; possesses broad level of influence
2

Cyber Security Services Branch Engineer Resume Examples & Samples

  • Conduct remote administration to include managing accounts, passwords, server updates, patching, and backups of Windows and Linux/Unix servers
  • Provide incident response functions when appropriate and coordinate activities with site Incident Handlers
  • Conduct research pertaining to the latest viruses, worms, etc. and the latest technological advances in combating unauthorized access to information
  • Support Information Assurance asset deployments, upgrades, and maintenance; including servers, databases, network assets and wireless intrusion detection (WIDS) LAN security
  • Perform other Network Security/Information Assurance tasks as assigned
  • Must have experience administering Windows and UNIX-based systems and TCP/IP networking
  • Red Seal
  • DP Protect
  • McAfee Vulnerability Manager
  • Nessus
  • HP Fortify on Demand (FOD)
  • Wireless Intrusion Devices
  • Authentication technologies (e.g. PGP, password files etc.)
  • Knowledge of anti-virus software functionally and capabilities
  • Knowledge of wireless LAN security (802.11)
  • Advanced Routing and Switching, Remote Access, Multilayer Switching, Cisco IOS security, VPN security, and Troubleshooting
  • LAN/System/Network administrator
  • Windows, Linux, and networks
  • TCP/IP (Network System Engineering)
  • Maintain awareness on current "special threats
  • Perform penetration tests
  • CISSP and/or SANS/GIAC Certification, CCNP/CCDP a plus and Cisco WLAN certification a plus
3

Lead Cyber Security Services Manager Resume Examples & Samples

  • Perform interviews, observation, and testing to identify cybersecurity risks in customer systems
  • Scope includes administrative, operational, and technical controls
  • Provide remediation recommendations to identified risks
  • Create written and verbal reports resulting from customer cybersecurity assessments
  • Work with other internal Motorola groups to implement changes in customer systems
  • Support strategy development with customers to improve security posture and mitigate identified shortcomings
  • Work with sales to grow adoption and market penetration of the support service offers
  • Provide detailed input to territory sales and service teams to support efforts in target customer identification and account strategies
  • Provide training to sales and service teams on portfolio offerings
  • Provide research and guidance on coverage aspects of various hardware and software portfolio coverage as it relates to security service offers
  • Participate in proposal creation and negotiation support for new or renewing contracts
  • Understand the procurement practices of public safety, government and commercial markets and be able to assist in forecasting likely contract dates
  • Ability to interface with multiple levels of customer management from technical to executive levels
  • Interface with all product management teams to ensure that concerns are captured and adopted in the product development planning and implementation process aligned with the security service strategies
  • 5+ years of professional work experience with a technical background
  • 3+ years of Risk Management, IT Audit and/or Security Assurance experience in support of internal controls industry standards
  • Ability to understand concepts and terminology in security domains including governance, risk management, architecture, compliance, and operations and be able to express them in a clear and concise manner
  • Knowledge and experience in documentation of security policies, standards, and processes
  • Knowledge and experience with cybersecurity auditing tools such as Nessus, Retina, SCAP, or Nipper is preferred
  • Must have the ability to step outside their comfort zone and work on special projects that are not related to Risk Management
  • High level of integrity in dealing with confidential and sensitive information
  • Prefer at least 1 certification related to Risk Management, IT Systems Control, IT Audit or IT Governance is highly desired; preferred certifications include
  • 5 - 10
  • Bachelors Degree - 5+ years of professional work experience with a technical background - 3+ years of Risk Management IT Audit and/or Security Assurance experience in support of internal controls industry standards - Must be a U.S. citizen with ability to obtain necessary security clearance as required by government contract.Want to create a job search agent? Send this job to a friend
4

Cyber Security Services Sales Specialist Resume Examples & Samples

  • The candidate will be responsible for both New and Renewal quota carrying opportunities within the region and to achieve/exceed Bookings target
  • Build relationships with field account teams to jointly position CSS opportunities
  • Articulate CSS value proposition and benefits
  • Overcome basic customer objections
  • Participate and assist in marketing initiatives to generate demand and increase CSS awareness
  • Ability to sell deep and develop our existing business. Increase deal size and drive revenue
  • Ability to work with the members of various organizations within Symantec including but not limited to; Sales, Sales Operations, Finance, Technical Support Operations, Services Marketing, and Legal
  • Experience with selling Managed Services
5

Cyber Security Services Solutions Engineer Resume Examples & Samples

  • Customer calls with account representatives, presentations, technical discussions and demonstrations, managing the service evaluation process, assisting sales in completing RFP's, attending and conducting internal seminars, as well as trade show support
  • Acts as customer’s primary point of contact for all technical needs related to Managed Security Solutions, Incident Response, Intelligence, and Cyber Skills Development solutions
  • Delivers presentations and demonstrations internally and externally on all relevant Symantec solutions
  • Maintains technical knowledge of competitive solutions
  • The candidate must be willing and able to travel throughout the region. Travel requirement average 50%
  • Knowledge of SIEM and/or MSSP solutions required
  • 8-10 years of enterprise-level network, application, or data security or consulting experience and at least 2-4 years of Pre sales Experience
  • Technical experience with network and/or endpoint protection technologies such as firewalls, intrusion detection & prevention, web proxies, anti-virus, etc
  • Degree in a related field (Computer Science, Engineering, Mathematics) or equivalent work experience
  • Strong analytical and presentation skills, current market knowledge and excellent customer service skills are a must
6

Cyber Security Services Principal Product Manager Resume Examples & Samples

  • Understand customer needs for security services, the competitive landscape, and technology and service trends
  • Provide guidance and drive cross-functional initiatives & alignment with key internal partners (e.g., product marketing, technical field enablement, sales specialists and specialist systems engineers)
  • Develop and manage external partner channel strategy and relationships (e.g., Global Systems Integrators, Regional Delivery Partners, Technology Partnerships, Routes to Market)
  • Help define our strategies to win (short and long) across all segments
  • Manage product/service lifecycles
  • Build and maintain product/service roadmaps
  • Gather, prioritize, and communicate business, customer, and technical requirements for Incident Response services
  • Proactively gather customer feedback and apply it to the offering strategy
  • Clearly document product and service requirements for both engineering, and delivery teams to build new capabilities
  • Collaborate with engineering and service delivery teams to prioritize development activities, make trade-offs, and plan actions
  • Drive content development and creation of sales and systems engineer enablement content and assist enablement teams in training internal stakeholders
  • Collaborate with Product Marketing teams to drive content development and creation to effectively raise awareness, deepen credibility of Symantec services solutions
  • Strong written, verbal and presentation preparation and delivery skills
  • Proven ability to work proactively cross-functionally and build relationships with all levels including executive management
  • Positive, high-energy, individual with the ability, self-confidence and flexibility to adapt to well to changes. Meet challenges with resourcefulness
  • Consulting and Managed Services Business Acumen
  • Strategic thinker, yet with a bias towards action
  • Creative entrepreneur who finds ways to overcome roadblocks and get things done
  • Strong self-starter that enjoys working in a fast-paced environment
  • Strong awareness of technology trends and their potential influence
  • Data-driven, yet visionary, with an ability to quickly understand and clearly communicate information about rapidly evolving new markets and technologies
  • Situational fluency and an ability to switch gears effortlessly and fluidly while maintaining focus and forward momentum
  • Ability to lead by influence instead of authority
  • A minimum of 2 years industry experience in cyber security. Prior experience in the product management and services is recommended
  • Knowledge of Cyber security vendor space and key Symantec competition
  • A Bachelor’s degree in a technical or business-related field. MBA is a plus
7

Senior Cyber Security Services Solutions Engineer Resume Examples & Samples

  • Strong Information Technology and Cyber Security architecture, implementation, and delivery understanding and experience
  • Support security engagements and business development efforts
  • Provide solutions, leadership, and ownership to continuously improve security and reduce risk exposures throughout lifecycle management
  • Create Governance Risk and Compliance solutions utilizing risk management frameworks
  • Design security controls and countermeasures that properly align with the scope and requirements of the business, audit, as well as the information security policies
  • Support and guide IT security problems and incidents, such as attacks, breaches, malware, APT’s
  • Design and implement countermeasures and/or compensating controls
  • Perform gap analysis on countermeasures and/or compensating controls to determine effectiveness
  • Create solutions that meet legal compliance and audit requirements (DoD, NIST, ISO, PCI, SOX, FIPS, FISMA, and others as necessary)
  • Design and deploy security solutions in multi-vendor environments
  • Experience with operating in an Architecture or Design role having end to end responsibility of IT systems
  • Lead teams of security professionals in large scale security engineering projects
  • Experience in implementing information security solutions such as firewalls, identity and access control, IPS/IDS and host based solutions, cryptography solutions, URL filtering, e-mail security, and endpoint protection solutions such as anti-malware/firewalls
  • Experience in implementing security solutions in cloud and virtual environments including AWS and Microsoft Azure
  • Mature growth and knowledge within the multiple disciplines of IT security to include penetration testing, IT risk management, risk assessments, and system hardening
  • Minimum 10 years of professional experience, with 5+ years of experience in information security and/or IT risk management
  • 5+ years of hands-on experience as a security practitioner, implementing a variety of solutions across multiple disciplines
  • 5+ years of experience architecting solutions with a concentrated focus on security, performance, scalability, and reliability
  • 2+ years of experience managing and/or implementing identity management solutions (Sailpoint, Radiantlogic, Xceedium, Microsoft Forefront Identify Manager)
  • 5+ years experience performing network and application security penetration testing and/or threat assessments
  • 5+ years experience with commercial and open source security applications and technologies (e.g. malware prevention, DLP, IDS/IDP, cryptography, vulnerability scanning and penetration testing), as well as related protocols and tools (e.g. SSH, SSL/TLS, snort, port scanners, rootkit detectors, etc.)
  • !+ years experience deploying security solutions in cloud-based environments
  • Certified Information Systems Security Professional, Certified Information Security Manager, Certified Information Systems Auditor or other security industry certifications
  • Experienced in IT networking and heterogeneous computing environments (network routing/switching, UNIX, Windows, Virtualized infrastructures)
8

Senior Consultant, Cyber Security Services Resume Examples & Samples

  • Deliver industry and technical expertise in information security through client interactions, reports, technical work, management presentations and the creation of high quality deliverables
  • Execute transactions through the provision of client services including planning, budgeting, scheduling and coordinating engagements
  • Identify ways to maximize the relationship with clients and deliver added value
  • Assist in the development and training of team members towards professional and personal growth
9

Account Executive, Cyber Security Services Resume Examples & Samples

  • Build a large sales pipeline within the territory; achieve and exceed Quota objectives annually
  • Build strong relationships with technology partners and respective field sales reps (internally and externally) to gather leads and be introduced into sales opportunities
  • Monitor and mediate all necessary communication between customer, vendor and technical resources within each account
  • Maintain internal communications with MNP team, relative to specific opportunities and the associated requirements
  • Report as directed (accurately and fully) all forecasted opportunities
10

Mid Level Cyber Security Services Solutions Engineer Resume Examples & Samples

  • Configuration and deployment of the defined security solution components (Nessus, Tripwire, Arcsight, FireEye, Trend Micro, Imperva, and others)
  • Write and perform validation tests
  • Contribute to the development and tracking of IT Security deployment projects plans
  • Monitor and control the performance and status of security devices, including routine testing, analysis and other operational tasks
  • Deploy the security technology solution to fit client requirements by adapting from reference architectures, including technical diagrams and bills of materials for implementation
  • Assist in the analysis and resolution of security incidents and in providing containment recommendations using software and hardware tools and following established procedures and corporate policies
  • Participate in security audits and audit remediation’s
  • Develop and maintain standard operating procedures, processes and guidelines for IT security operations, support and maintenance
  • Mentor other IT Security Analysts and perform knowledge transfer to other teams as required
  • Experience with application and infrastructure hardening techniques
  • An understanding of threat risk analysis concepts
  • Experience performing information security risk assessments
  • Experience in IT security related audits such as NIST 800-53, DoD 8500.2, PCI DSS, SOX, ISO27001 and 27002, or other relevant legal and best practice requirements, models, or frameworks
  • Security +, Certified Information Systems Auditor or other security industry certifications
  • Knowledge of: Strong Authentication, End Point Security, Internet Policy Enforcement, Web Content Filtering, Database Activity Monitoring (DAM), Public Key Infrastructure (PKI), Data Loss Prevention (DLP), Identity and Access Management (IAM) solutions
  • Experience mentoring colleagues
11

Inside Sales Team Manager for Cyber Security Services Resume Examples & Samples

  • Develop and lead the demand generation function for SecureWorks large enterprise/G500 segments
  • Work with SecureWorks University to drive training programs to accelerate onboarding to achieve fully ramped status and max efficiency earlier
  • Provide leadership and develop programs to Demand Generation Representatives (DGRs) who may be new to the industry and have high capability to develop into the next generation of Sales professionals at SecureWorks
  • Formalize talent development programs to create progression and pipeline of talent for broader sales organization
  • Develop processes and infrastructure to regularly measure team performance via KPIs
  • Develop roadmap of strategic and tactical initiatives to increase effectiveness and efficiency of all assigned DGR teams. These initiatives may include process definition and standardization to formalize SecureWorks Demand Gen Model; implementation of new technologies; and people programs (ex: recruitment profiles)
  • Develop working partnership with Sales Managers and Marketing teams to drive feedback on sales / demand enablement needs
  • Provide guidance and leadership to the DGR team to become effective at managing opportunities to closure. There opportunities are normally smaller in nature and are agreed upon by the Sales Rep and the DGR. Develop programs and process to support demand generation team’s ability to drive deal development to closed sale for smaller sized opportunities
  • Work in conjunction with marketing, product management and finance to develop regular cadence of programs such as SPIFFs and sales plays to drive focus towards specific corporate initiatives
  • Work with sales leaders of each segment to develop strong working relationships between the teams and tailor processes to segment specific needs, while also driving cross-segment alignment and standardization
  • Work with sales operations and finance to establish and manage to operational budget
  • Be current with latest trends and technologies in demand generation and sales process. Leader should also be committed to keeping up with the latest trends in the Security industry and have the ability to coach a DGR to success
  • Demonstrable experience building and managing an inside sales or demand generation organization
  • Working knowledge / experience with marketing automation and current sales effectiveness trends
  • Excellent customer service skills. Excellent, executive level written and verbal communications skills
  • Work effectively across functional teams and collaborate at the BU level
  • Ability to manage tactically and drive a strategy at the same time
12

Senior Associate, Cyber Security Services Resume Examples & Samples

  • Provide support with respect to building, configuration, and architecture of one or more Identity platforms, such as Oracle (11g+) and SailPoint (IdentityIQ)
  • Assist with scoping prospective engagements and developing proposals
  • One year of experience with information security or in a technology related field
  • Understanding of the Oracle IAM Suite, including Oracle Identity Manager (OIM), Oracle Access Manager (OAM), Oracle Adaptive Access Manager (OAAM), Oracle Identity Federation (OIF), Oracle Internet Directory (OID), and Oracle Virtual Directory (OVD)
  • Understanding of RBAC methodologies
  • Three years of experience with information security or in a technology related field
  • Strong knowledge base in operations, enterprise networking, systems evaluation, and architecture
13

Associate, Cyber Security Services Resume Examples & Samples

  • Operate Governance Risk & Compliance platforms and deliver services, including Policy, Risk, Compliance, Enterprise, Incident, Vendor, Threat, Business Continuity, Audit, and Security Operations Management
  • Integrate various platforms and applications via automated or manual methods
  • Assist with Quality Assurance/testing of use cases and working with requirements traceability matrices
  • Develop Archer solutions to support one or more of the following: SOX, PCI DSS, ISO 27001/27002/27005, HIPAA, Unified Compliance Framework, Enterprise Risk Management, Vendor Risk Management, Vulnerability Risk Management, Security Operations Management, Business Continuity Management, Audit Management
  • Specialize in Archer Data Feeds, Questionnaires, Complex Calculated Fields, Custom Work Flows, Access Controls , Custom Objects , Reports, Dashboards, and I-Views
  • Support proposal development, thought leadership, and go-to market activities in the information security domain
  • Function as a single contributor or in a dynamic team environment as a work stream lead
  • Assist with integration, implementation, and administration of systems with solid understanding of the RSA Archer solution
  • Programming with vb.net, ASP.net, java scripts, JSON, SQL Scripts, XML (SOAP, XLST), AJAX, C#, and Perl
  • One year of Information Security experience (with minimum of two years of RSA Archer experience)
  • Familiarity with the RSA Archer security structure, data feeds/API, workflow, and process to configure RSA Archer with content data feeds
  • Three years of Information Security experience (with minimum of three years of RSA Archer experience)
  • Experience in supporting and documenting requirements, use cases, analysis, design, development, data integration, and testing of enterprise web applications
  • Prior participation in the solution development process for an internal business unit
  • Established self and project management skills to manage deliverables in a timely manner
14

Senior Associate, Cyber Security Services Resume Examples & Samples

  • Support Information Security projects involving strategy, implementation, technical delivery, software/hardware optimization related to IT operations, business processes, business resiliency, security, and data integrity
  • Evaluate current threat landscape and mitigations
  • Utilize Cyber technologies, such as RSA NetWitness, Damballa, FireEye, Mandiant MIR, HBGary Responder Pro, EnCase, MITRE CRITS, ThreatStream, ThreatConnect, home-grown intelligence or collection management systems
  • Assist with security configuration and testing of networking and operating systems, such as TCP/IP, WAN/LAN routing, VLAN architecture, and a wide array of large-scale environments, including various major web application servers
  • Three years of experience in Information Security or in a technology related field
  • Strong understanding of and ability to provide security configuration and testing of networking and operating systems including TCP/IP, WAN/LAN routing, VLAN architecture, and a wide array of large-scale environments including various major web application servers
  • Functional certification such as MCSE, CCNA, CNE, CCIE, Archer, and/or ArcSight preferred
  • CISSP, CEH, CPT, CISM, CISA, CIPP, GIAC, GSEC, and/or GCFW certifications preferred
15

Senior Associate, Cyber Security Services Resume Examples & Samples

  • Implement one or more of the data protection products, such as Symantec Vontu, McAfee DLP, IBM Guardium, Varonis, Voltage SecureData, or Informatica Dynamic Data Masking
  • Support the execution of Information Security and privacy inherent to client engagements
  • Provide support with four or more of the following areas: Information Security Risk Assessment, Data Protection and Privacy Impact Assessment, Data Classification, Information Governance, Enterprise Information Security Strategy, Compliance Monitoring and User Awareness campaign, Data Leakage/Content Monitoring and Filtering, Data Encryption, and Compliance Readiness, such as PCI and HIPAA
  • Demonstrate integrity within a professional environment, provide guidance to team members, and participate in performing project procedures
  • Minimum of one year of experience with regulatory requirements and compliance issues in at least one of the following areas: PCI GLBA, EU Data Protection Directive, and International Cross Border & US State Data Privacy Laws
  • Bachelor's degree from an accredited college/university and three years of work experience an Information Security role; Master's degree preferred
  • CIPP or CIPP/IT certified; non-certified hires are required to become certified within one year from the date of hire
  • Prior Big 4 Consulting or Advisory experience preferred
  • Ability and willingness to travel 80% of the time, work in a fast paced, results driven environment, grasp new technology, and contribute at a rapid pace
16

Senior Associate, Cyber Security Services Resume Examples & Samples

  • Operate Governance Risk & Compliance (GRC) platforms and deliver services, including Policy, Risk, Compliance, Enterprise, Incident, Vendor, Threat, Business Continuity, Audit, and Security Operations Management
  • Develop a design and architecture for enterprise or business unit deployment
  • Develop and configure one or more eGRC/ITGRC platforms, such as RSA Archer, MetricStream, or BWise
  • Develop Archer solutions to support one or more of the following: SOX, PCI DSS, ISO 27001/27002/27005, HIPAA, Unified Compliance Framework, Enterprise Risk Management, Vendor Risk Management, Vulnerability Risk Management, Security Operations Management, Business Continuity Management, and Audit Management
  • Administer the RSA Archer 5.X platform
  • Experience in problem solving, coding, scripting, management and development of applications, and workflow design utilizing the RSA Archer SmartSuite Framework software for integration with RSA Archer’s GRC solution framework
  • Proficiency with the RSA Archer security structure, data feeds/API, workflow, and process to configure RSA Archer with content data feeds
17

Senior Associate, Cyber Security Services Resume Examples & Samples

  • Deliver Privileged Access Management (PAM) services, including Privileged User Identity, Privileged Password, session brokering, session management, and session recording
  • Support the design and development of PAM solutions that adhere to applicable policies and comply with access management requirements
  • Provide support with respect to building, configuration, and architecture of one or more Identity platforms, such as Privileged Access Manager and CyberArk
  • Utilize Privileged Access Manager tools, including Quest TPAM, Dell TPAM, Lieberman Software, Xceedium, BeyondTrust, Oracle Privileged Identity Manager, and CA Privileged Identity Manager
  • Help assist with functionality of Powerbroker, Centrify, e-DMZ, Hitachi ID, and CA ControlMinder
  • A minimum of three years of experience with Information Security or in a technology related field
  • Understanding of the implementation and functionality of Privileged Access and Account Management systems and controls
18

Associate, Cyber Security Services Resume Examples & Samples

  • Develop Information Governance and Information Security Strategy plans, and perform assessments using industry framework, such as ISO 27002 or NIST 800:53
  • Bachelor's degree from an accredited college/university and a minimum of one year of work experience in an Information Security role; Master's degree is preferred
  • Advanced written and verbal communication and presentation skills, teamwork, and client service skills
  • Travel may be up to 80-100%, work in a fast paced, results driven environment, grasp new technology, and contribute at a rapid pace
19

Senior Consultant, Cyber Security Services Resume Examples & Samples

  • Assist in scoping and developing Statements of Work based on client requirements
  • Perform network and application layer vulnerability assessments and penetration tests
  • Conduct wireless security assessments
  • Present assessment results to technical and non-technical audiences
  • Monitor project timelines against targets and adjust where necessary; advise clients of project status and issues within a timely manner
20

Cyber Security Services Sales Specialist Resume Examples & Samples

  • Develops strong relationships with customer contacts at executive level And SOC management functions to gain insight into the business imperatives and IT drivers enabling development of a strategy to sell Symantec solutions
  • Focuses on the strategic nature of the relationship and builds long term value for the client and sustainable success for Symantec
  • Works under general direction toward predetermined short and long term goals
  • Interfaces with Senior Management inside Symantec to help set strategy and participates in varied roles to support internal business development
  • Primary sales point-of-contact for the account, representing the organization to the customer and the customer to the organization
  • Drives quarterly business reviews with customer to ensure value from Symantec investment
  • Ensures customer is kept up to date with Symantec product roadmaps enabling the customer to plan and mitigate risks to their business
  • Develops strategies and orchestrates company resources to maximize sales volume within assigned accounts
  • Effectively engages and builds cooperative relationships with sales resources: SE, Channel, Specialist sales team and executives as required
  • Actively builds networks with contacts and partner companies that can contribute to Symantec’s success
  • Responsible for meeting assigned Sales Quota
  • Provide accurate forecasts and reports on activity and sales performance as and when required by management
  • Ensure full compliance with all internal processes
  • Ensure completion and utilization of whitespace
  • Proven track record of enterprise sales experience in hi tech industry (preferably software) developing strategic customer relationships
  • Proven track record of enterprise sales experience in software and service experience
  • Security Operation Centers and Forensics experience is an advantage
  • Demonstrates strong sales skills and high level of technical and business acumen in both our industry and industry being sold into
  • Demonstrates a breadth and depth of knowledge arrived through exposure to complex business situations
21

Cyber Security Services Manager Resume Examples & Samples

  • Monitors open source feeds and reporting on the latest threats against computer network defenses. And, demonstrates clear capabilities of learning the interface, customization, language acceptance, and logic of new CND related tools
  • Key responsibility is to ensure all appropriate security safeguards, policies, procedures are designed and deployed to meet program standards
  • Manages the monitoring of intrusion detection and security information management systems to discover and mitigate malicious activity on enterprise networks
  • Ensures CNDSP staff follow computer incident handling procedures to isolate and investigate potential network information system compromises
  • Supports the design and integration of custom rules and reports into proper security tools and data collection architectures
  • Evaluates reports that identify risks to computer systems and make written and verbal remediation recommendations to senior staff
  • Ensures new employees are oriented to the Security organization and responsibilities to the customer
  • 4+ years of experience in IT Audit, IT Risk Management or IT Compliance
  • Top Secret Clearance based on a SSBI and able to meet the requirements of DCID 6/4
  • Demonstrate experience with researching and fielding new and innovative technology
  • Experience identifying and resolving security issues on complex systems and enterprise environments
  • Understanding and knowledge of how attackers use tunneling and covert channels to cover their tracks on a network, and the strategies involved in defending against them
  • Clear understanding of how attackers hide files and directories on Windows and Linux hosts and how they attempt to cover their tracks
  • Experience managing a SIEM
  • Experience conducting network, system and malware analysis and reporting findings, assisting with vulnerability mitigation strategy and execution
  • 8570 Compliant with an approved Computing Environment Certification; and an OS certification; CISSP, CASP, CISM
  • Experience in a role requiring leadership skills and the ability to influence without authority
  • Excellent organizational, presentation, and collaboration skills
  • Advanced technical, analytical and problem solving skills
22

Specialist, Cyber Security Services Resume Examples & Samples

  • Support the design and development of security solutions that adhere to applicable policies and comply with information security requirements
  • Provide support with respect to building, configuration, and architecture of one or more Identity platforms, such as SailPoint (IdentityIQ)
  • Understanding of IAM relevant technical security skills (such as SailPoint, RSA or Oracle for Identity Governance. Ping Identity, ForgeRock AM, Oracle OAM, Unbound ID for Access Management. Privileged Access Management: CyberArk, BeyondTrust)
23

Senior Associate, Cyber Security Services Resume Examples & Samples

  • A minimum of one year of experience with regulatory requirements and compliance issues in at least one of the following areas: PCI GLBA, EU Data Protection Directive, and International Cross Border & US State Data Privacy Laws
  • Bachelor's degree from an accredited college/university and a minimum of three years of work experience an Information Security role; Master's degree is preferred
  • Prior Big 4 Consulting or Advisory experience is preferred
24

Senior Associate, Cyber Security Services Resume Examples & Samples

  • Assist with the monitoring, detection, analysis, and investigation of threat activity for clients
  • Conduct threat assessments and write high-quality reports for management
  • A minimum of three years of experience in Information Security or in a technology related field
  • Bachelor’s degree from an accredited college/university in an appropriate field
  • Experience in understanding threats, the current threat landscape, and intelligence gathering with an analytical mindset in order to translate threats into risks faced by clients
25

Cyber Security Services Manager Resume Examples & Samples

  • Documents and reports incidents from initial detection through final resolution using standard DoD incident reporting channels and methods (refer to CJCSM 6510.01B “Cyber Incident Handling Program” dated 10 July 2012 or later). Briefs incident details as necessary to ACE-IT Senior leadership, up to and including the Director, and determine all means by which to resolve any incidents as quickly and effectively as possible
  • Key responsibility is to ensure all appropriate security safeguards, policies, procedures are designed and deployed to meet ACE-IT and program standards
  • Coordinates with CNDSPs to develop incident response and reporting and policy updates as needed IAW ACE-IT CIRT
  • Demonstrate expert-level knowledge of Army, DOD and industry accepted policies, standards, best practices, and regulations related to Cyber Security CND
26

Help Desk Technician, Cyber Security Services Resume Examples & Samples

  • Work with both clients and vendors to troubleshoot and resolve issues
  • Investigate assigned tickets; responsible for the task until it has been completed/resolved
  • Monitor and resolve incidents and support requests; ensure response/resolution within service level agreement (SLA) targets
  • Update ticket information and associated documentation
  • Maintain monitoring software to ensure proper functionality of all managed devices
  • Maintain reporting software to provide valuable information to clients
  • Notify clients of any potential problems in their environment
  • Attend internal MNP courses to further develop knowledge around performance improvement
27

Associate, Cyber Security Services Resume Examples & Samples

  • Effectively deliver Identity and Access Management (IAM) services, including Authoritative Source, Identity Management, Provisioning, Authentication, Authorization, Monitoring & Certifications, Auditing & Reporting
  • Assist with creation and execution of an IAM roadmap that meets requirements including, but not limited to, security for hybrid cloud deployment, B2B web services, mobile computing, fine grained access control, policy driven security, Identity Governance, Access Management, and Privileged access management, user provisioning/de-provisioning, and federation focusing on multiple protocols, such as Java or BeanShell coding
  • Articulate business risks of technical vulnerabilities to client personnel
  • Identify and communicate findings to client personnel
  • A minimum of one year of experience with information security or in a technology related field
  • A minimum of three years experience with information security or in a technology related field
28

Associate, Cyber Security Services Resume Examples & Samples

  • Provide support for the alert handling and investigation of events for Incident Response, including the utilization of Security Operations Center (SOC) resources and other Information Technology groups
  • Assist with Security Monitoring and Incident Response methodology
  • Configure a variety of security controls and technologies, such as Log Management (LM), Security Information and Event Management (SIEM), firewall, intrusion prevention systems, Anti-Virus (AV), and Data Loss Prevention (DLP)
  • Utilize Security Information and Event Management and Log Management tools, such as QRadar, ArcSight, Splunk, ThreatConnect, and open source solutions
  • A minimum of one year of experience in Information Security or in a technology related field
  • Knowledge of Security Monitoring, Incident Response methodology, configuration of a variety of security controls and technologies, such as Log Management (LM), Security Information and Event Management (SIEM), firewall, intrusion prevention systems, Anti-Virus (AV), and Data Loss Prevention (DLP)
  • Experience with Security Information, Event Management, Log Management, Security Operations Center (SOC), and Incident Response (IR)
29

Associate, Cyber Security Services Resume Examples & Samples

  • Assist with planning, designing, implementing, testing and operating cyber security processes and systems
  • Facilitate business process design, as it relates to identities and access privileges, such as architecture, delegated administration models, workflow models, and access control models
  • Knowledge base in operations, systems evaluation and architecture
30

Senior Associate, Cyber Security Services Resume Examples & Samples

  • Help assist with scoping prospective engagements and developing proposals
  • A minimum of three years of work experience in an Information Security role; Master's degree is preferred
  • Strong analytic skills for problem analysis and resolution
31

Senior Associate, Cyber Security Services Resume Examples & Samples

  • Develop use-cases from client input to alert on enterprise security issues
  • Provide support to clients to understand their security posture, as well as their IT policies and plans
  • Articulate business risks of technical vulnerabilities to client personnel and help assist with scoping prospective engagements and developing proposals
  • Help assist with ingesting and querying large data sets, particularly systems logs, security event data, and network flow analysis
  • Utilize Security Analytics tools and platforms, such as Hadoop, ELK, Splunk, Hexis, Red Lamba, and Bay Dynamics
  • Help assist with planning, designing, implementing, testing, and operating Security Analytics processes and systems
  • Knowledge of Linux/Unix command line and shell scripting languages, such as Perl, Python, and bash
  • Experience with systems logs, security event data, and network flow analysis
32

Incident Handling / Cyber Security Services Resume Examples & Samples

  • Incident Handling: Support the Incident Manager and Incident Handling team as they provide rapid response and management of crisis-level cyber security and data loss incidents. Support documentation of events, assignment of action items, maintenance and proper handling of incident records and tracking of lessons-learned and after-action items through to closure. Assist with incident handling plan management and participate in periodic table top exercises
  • Metrics and Reporting: Assist with the design, creation, refinement and delivery of ad-hoc, weekly, monthly, quarterly and annual metrics and reports for the purpose of demonstrating team results and service level delivery. Identify volume trends impacting workload and staffing requirements. Assist with supporting additional metrics and reporting requests from other areas of Cigna Information Protection as may be needed for department-wide trending and tracking for cyber security operations, data loss prevention, cyber threat hunting, and threat intelligence
  • Staffing: Help manage the team’s staffing requirements from initial identification of the need through on-boarding including creation, tracking and management of To-Be-Hired records, job descriptions, and history. Includes assisting with the tracking and management of hiring-related financial impacts. Help ensure compliance with Clarity and time reporting requirements. Maintain and update staff organization charts and records as is required for department-wide reporting. Maintain entitlements which grant access to team resources. Respond to and perform required team role and access audits and reviews
  • Audit and Audit Response: Support audit inquiries related to team functions. Provide input, formulate responses and help maintain centralized records associated with inquiries. Ensure team documents and standards remain current by auditing team documentation. Help with ongoing tracking of team-owned risks and ensure action items are completed according to plan
  • Collaboration and Collaboration Tools: Help ensure effective and centralized management of team documentation through ongoing creation, design and management of team collaboration tools such as team share and SharePoint. Support development and maintenance of pathways for information sharing with other Cigna Information Protection teams, within IT and the business. Assist with the maintenance of the team’s roadmap documentation. Support the collection of requirements and analysis to ensure the team’s roadmap stays synchronized with the department’s roadmap and future plans
  • Processes and Procedures: Assist with the management of the team’s process and procedure documentation to ensure currency and accuracy. Monitor and manage team work intake processes, workflows and work completion records. Ensure the management and maintenance of team-owned workflows contained within “The Way We Get Work Done” and other similar company-wide resources. Support benchmarking assessments of the team’s deliverables
  • Creative Services and Team Visibility: Create, refine and maintain presentations needed to demonstrate and promote team delivery results. Manage team's brand and image through consistent design. Work in collaboration with other CIP teams to create and manage Board materials and other information / presentations needed by senior leaders. Manage and facilitate creation of content for team meetings
  • Project Management: Facilitate the tracking of team projects and programs through collaborative work with the Program and Project Management teams within the greater Cigna Information Protection department
  • Internal Customer Care: Support concierge and incident response services to address unique or problematic situations within the team or for specialty and high visibility interactions with other teams. Help ensure that senior leadership requests to the team are delivered in a timely, quality and professional manner
  • Third Party Security Management Program Administration: Support a variety of tasks associated with third party security program management (Verizon Cybertrust). Support annual third party penetration testing activities as needed. Assist in the engagement of other internal IT and CIP teams as needed to support remediation of identified vulnerabilities or other issues
  • Procurement of Products and Services: Support the procurement of products and services as is needed to meet team needs. Work with Supply Chain Management to assist the facilitation of effective contractual agreements and operational goals with product and service suppliers. Support management of supplier relationships and track delivery metrics where applicable. Work with Finance to manage and meet both team and department financial goals
33

Senior Consultant, Cyber Security Services Resume Examples & Samples

  • Monitor project timelines against targets, adjust where necessary; advise clients of project status
  • Network and take a leadership role in the local professional, business and community while raising awareness of MNP and looking for new business development opportunities
  • Assist in the development and training of team members
34

Cyber Security Services Manager Resume Examples & Samples

  • Bachelor's degree and a minimum of 8 years of Information / Cyber Security experience, with at least 4 of those involving network and/or security operations centers
  • Possess applicable intermediate security management certification
  • Experience with NIST and DoD security policies, directives, and guidelines implementation
  • Experience with network/system architecture design and implementation
  • Experience with Network architecture and design (e.g., security stack and integration with office automation products and services to include production, test, development, and demilitarized zone enclaves)
  • Hands-on knowledge of Host Bases Security System (HBSS) operations and monitoring
  • Strong understanding of IT auditing (e.g., system accounts, security logs, system and network anomalies) and Security Metrics – capture & documentation
  • Leadership / management experience in a DoD/Military environment
  • Current experience in Red Hat Linux Enterprise OS security configurations, Microsoft server and workstation operating system (OS) security configurations, Unix OS security configurations, VMware and Database functionality and security
  • Strong knowledge of border device security (e.g., firewall, VLANs, IP Subnetting, Ports and protocols)
  • Knowledge of Encryption standards
  • Strong technical writing skills – technical documents and user training materials