Cyber Senior Resume Samples

4.7 (110 votes) for Cyber Senior Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cyber senior job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
CG
C Goyette
Claire
Goyette
278 Powlowski Glen
Detroit
MI
+1 (555) 195 6503
278 Powlowski Glen
Detroit
MI
Phone
p +1 (555) 195 6503
Experience Experience
Dallas, TX
Cyber Eng Senior
Dallas, TX
Feeney, Boyle and D'Amore
Dallas, TX
Cyber Eng Senior
  • Develop and implement information assurance/security standards and procedures
  • Perform analysis, design, and development of security features for system architectures
  • Provide technical and engineering assessment related to the certification of systems (i.e. technology, tools, standards, policies, procedures, and products) to be installed in support of the Strategic Weapons System (SWS) and Attack Weapons System (AWS) platforms (shore based and platform based)
  • Support the SSP IA Manager with the review and approval of SSP Cyber Security packages (software and hardware) for new and existing systems
  • Facilitate communication between different contractors and government personnel to achieve resolution on cyber security packages
  • Provide technical services for IA activities, including supporting security risk assessments, security test and evaluation, system certification, and accreditation of assigned software and systems
  • Ensure that all contractor personnel performing IA functions have proper certification
Los Angeles, CA
Cyber Transformation Senior Consultant
Los Angeles, CA
McDermott LLC
Los Angeles, CA
Cyber Transformation Senior Consultant
  • Manage the performance management for the direct reportees, as per the organization policies
  • Work effectively as a team member, sharing responsibility, providing support, maintaining communication and updating senior team members on progress
  • Develop and maintain productive working relationships with client personnel
  • Help senior team members in performance reviews and contribute to performance feedback for staff/junior level team members
  • Foster teamwork and lead by example
  • Understand and follow workplace policies and procedures
  • Training and mentoring of project resources
present
San Francisco, CA
Cyber as a Service Threat Detection & Response Senior Analyst
San Francisco, CA
Hartmann and Sons
present
San Francisco, CA
Cyber as a Service Threat Detection & Response Senior Analyst
present
  • Full-spectrum incident response support including event discovery, alert notification, investigation, facilitation of containment, facilitating of resolution, and event reporting
  • Supervise tier-1/2 analysts in resolving issues and troubling shooting connection and technology issues
  • Perform mitigation activities for current and residual risk
  • Assist with project planning and identification of mitigation activities
  • Perform the activities necessary for the immediate, short-term rapid resolution of incidents to minimize risk exposure and production down-time
  • Maintain a professional communicative relationship with clients and management to provide information throughout the incident, problem, and change management cycles
  • Coordinate and drive efforts among multiple business units during response activities and post-mortem
Education Education
Bachelor’s Degree in Information Technology From
Bachelor’s Degree in Information Technology From
Towson University
Bachelor’s Degree in Information Technology From
Skills Skills
  • Existing Top Secret clearance granted within the past 5 years
  • Experience developing IS security plans, policy, and procedures for Stand Alone Systems, Local Area Network (LAN) Information Systems and Wide Area Network (WAN) Information Systems
  • Experience with certifying compliance and auditing the security aspects of various operating systems (Windows, Linux, Solaris, etc.)
  • Previous experience performing successfully as an Information System Security Manager (ISSM) in an industrial security environment
  • Currently holds a DOD 8570.1 IAM Level III Certification; (i.e. CISSP)
  • Currently holds a Top Secret Clearance with SCI
  • Working knowledge of the Joint Special Access Programs (SAP) Implementation Guide (JSIG)
  • Working knowledge with the Risk Managed Framework (RMF)
  • Ability to effectively work as part of a team
  • Excellent communication skills (written & oral)
Create a Resume in Minutes

15 Cyber Senior resume templates

1

Senior / Lead Cyber Strategist Resume Examples & Samples

  • Works closely on a daily basis as part of a co-located MITRE/Government team, with SES-level leaders in a multi-agency cyber environment to help influence and develop the organization’s mission, strategy, and strategic communications
  • Will work at all levels of strategic communications, including, but not limited to, writing executive-level presentations, preparing responses to customer and government oversight (including ODNI, EOP, and US Congress), writing proposals for new customer initiatives, and providing input and advice to develop internal SoPs and procedures
  • Strong verbal and written communications, able to respond and produce to tight customer-driven deadlines, while maintaining a clear focus on long-term customer and MITRE objectives
  • Ability to “translate” complex technical and political ideas into clear, executive-level communications
  • Must be able to work in a collaborative environment and adjust to changing deadlines and priorities to accomplish the customer mission
2

Senior / Lead Cyber Technologist Resume Examples & Samples

  • Develop agile technical solutions to sponsor initiatives
  • Conduct forensic analysis of seized media (hard drives, USB drives, mobile devices)
  • Reach-back to MITRE team and Corporation to bring in other relevant expertise
  • Ability to conduct forensic analysis of a compromised system, to include the development of an intrusion timeline
  • Ability to conduct static/dynamic malware analysis
  • Ability to develop signatures to detect malicious activity in network traffic
  • Ability to script or write code to process large amounts of data and present it in a usable format
3

Public Sector Cyber Icam Senior Associate Resume Examples & Samples

  • Security Architecture and Strategy (Integrated Risk Management)
  • Building an InfoSec Management System and/or program
  • Managing internal controls, risk assessments, business process and internal IT control testing or operational auditing
  • Communicating in an organized and knowledgeable manner in written and verbal formats, including delivering clear requests for information and communicating potential conflicts, assisting business development teams responsible for writing and presenting proposals to prospective clients
  • ICAM solutions contractually requiring US Citizenship and Secrete Level Security Clearance
4

Cyber Anst Senior Resume Examples & Samples

  • Perform inquiries using cyber or related automated investigative tools
  • Identify and analyze cyber events of CI significance
  • Apply knowledge and understanding of the applicable use of cyber auditing and analytical tools to conduct CI inquiries and analysis of anomalous activity
  • Provide expertise to support insider threat mitigation efforts
  • Provide input to and support the maintenance of appropriate CI databases
  • Facilitate the development of policies; write SOP’s and instructions and ensure that the appropriate directives, regulations, policies, and procedures are followed
  • Act as the liaison with senior members and staff of supported agencies and with leadership and staff throughout the CI and law enforcement communities, as needed
  • Experience with Cyber operations or intelligence analysis, including counterintelligence, counterterrorism, all-source, or law-enforcement missions
  • Experience working with cyber or related automated investigative tools and databases and offensive CI operations or CI investigations
  • Experience with the modus operandi of foreign intelligence entities, international threat organizations, and associated Cyber capabilities and operations
  • Knowledge of intelligence community roles, responsibilities, organizations, and capabilities in the DoD CI and HUMINT communities
  • Knowledge of the structure, policies, and directives of national intelligence agencies
5

Cyber Anst Senior Prin Resume Examples & Samples

  • Application reverse engineering
  • Layer 2/3 networking protocols
  • Data encoding and cryptography
  • Covert communications
  • Privilege separation and escalation
  • Authentication mechanisms and protocols is essential
  • Proficiency can be demonstrated through a recognized penetration testing certification that includes a practical assignment such as the Offensive Security Certified Professional (OSCP)
  • Bachelor’s degree in Information Technology or a related field with direct course or project work focused on identifying and exploiting vulnerabilities
  • 9 years of Experience
6

Cyber Eng Senior Resume Examples & Samples

  • Develop and implement information assurance/security standards and procedures
  • Perform analysis, design, and development of security features for system architectures
  • Coordinate, develop, and evaluate security programs. Recommend information assurance/security solutions to support customers’ requirements
  • Provide technical and engineering assessment related to the certification of systems (i.e. technology, tools, standards, policies, procedures, and products) to be installed in support of the Strategic Weapons System (SWS) and Attack Weapons System (AWS) platforms (shore based and platform based)
  • Analyze and define security requirements for computer systems which may include servers, personal computers, and mobile devices
  • Perform vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle
  • Support the SSP IA Manager with the review and approval of SSP Cyber Security packages (software and hardware) for new and existing systems
  • Facilitate communication between different contractors and government personnel to achieve resolution on cyber security packages
  • Provide technical services for IA activities, including supporting security risk assessments, security test and evaluation, system certification, and accreditation of assigned software and systems
  • Prepare and maintain documentation necessary to obtain IA and Navy Marine Corps Intranet (NMCI) certifications and other required certifications for assigned software
  • Ensure that all contractor personnel performing IA functions have proper certification
  • Identify, report, and resolve security vulnerabilities
  • Manage system Integrated Master Schedule (IMS) to include the drafting of expectations and waivers as appropriate
  • Maintain IASE Security Technical Implementation Guide conformance checklists and related Plans of Action and Milestones
  • A Bachelor’s Degree from an accredited college or university in Information Systems, Computer Science, Engineering, a Mathematics-intensive discipline, or a similar field
  • Minimum experience: 5+ years’ experience related to the technical and engineering assessment of US Naval based system for cyber security approval. A thorough understanding of the DoD cyber security approval process for US Naval assets
  • Ability to obtain and maintain a DoD security clearance (US Citizenship required)
  • Must be detail orientated
  • Ability and willingness to travel to local customer meetings and offsite to contractors for meetings
  • DOD 8570 IAT 2 compliant (Sec+ or equivalent enrolled in CE)
  • Extensive knowledge on DoD Information Security regulations, publications and policies
  • A solid understanding of Certification and Accreditation processes
  • A strong background in applying information systems security engineering, security services, mechanisms, threats, attack scenarios and vulnerabilities
7

Cyber Targeting Analyst, Senior Resume Examples & Samples

  • 4+ years of experience as an analyst in the IC or military, evaluating technical information for targeting and reporting purposes
  • Experience with assessing and integrating intelligence, including open source and classified from specific or multiple disciplines on personnel, places, or activities of interest
  • Experience with collecting, analyzing, and interpreting qualitative and quantitative data from multiple sources for the purposes of documenting results and analyzing findings to provide products to senior DoD officials
  • Experience with Cyber, computer network operations and exploitation, information operations or information warfare, or topical Cyber expertise
  • Experience as a liaison facilitating collaboration across multiple team or agency interests
  • Knowledge of USCYBERCOM or the client organization and operations
  • DoD 8570 Compliance IAM-I Certification required within 6 months of hire
  • Joint Intermediate Targeting Development Course
  • Joint Information Operations Planners Course
  • Joint Targeting Staff Course
8

Cyber Transformation Senior Consultant Resume Examples & Samples

  • Engage in Cyber Transformation projects
  • Execute the engagement requirements, along with review of work by junior team members
  • Contribute to people related initiatives including recruiting and retaining Cyber Transformation professionals
  • Building a quality culture at GTH
  • Help senior team members in performance reviews and contribute to performance feedback for staff/junior level team members
  • Excellent leadership skills
  • Strong knowledge of cyber / information security concepts, risk and controls concepts
  • Strong knowledge of standards such as ISO 27001/2, ISO 22301, ISO 27018, PCI – DSS, NIST standards on Cyber Security, HITRUST, etc
  • Strong knowledge of regulations such as FISMA, HIPAA, Reg SCI, MAS, etc
  • Good knowledge of TCP/IP, concepts of OSI layer and protocols, networking and security concepts
  • Good knowledge of OS (Windows / Linux) security, Database security
  • Knowledge on tools like Nessus, BackTrack, NMAP, BurpSuite, etc. is a definite plus
  • Familiar with OWASP and Secure SDLC standards / frameworks
  • Good knowledge of IT infrastructure (switches, routers, firewalls, IDS, IPS, etc.)
  • Good knowledge of Security architecture design and review
  • Knowledge on reviewing firewall rulesets
  • Experience in LAN/WAN architectures and reviews
  • Governance and reporting
  • Good knowledge of cyber threats and vulnerabilities related to platform and infrastructure
  • Knowledge of vulnerability management
  • Basic knowledge of encryption
  • Knowledge of creation of cyber policies and procedures
  • Graduates / BE - B. Tech / MCA / M. Sc. (Stats, Maths, Computer Science) / MBA with background in computer science and programming with 3 – 7 years of relevant work experience
  • CISSP, CISA, CISM, CEH, ISO 27001 Lead Auditor and Lead Implementer
  • Security operations (SOC, SIEM) skills in assessment, design, architecture, management and reporting
  • Knowledge of anti-virus solutions (e.g. Symantec, McAfee, etc.)
  • Basic knowledge of incident management
  • Knowledge on Privacy
  • Deep domain experience in a specific sector
9

Cyber Eng Senior Prin Resume Examples & Samples

  • Knowledgeable of security controls/best practices
  • Experience integrating security functional requirements into existing acquisition lifecycle phases, milestones, and deliverables using systems engineering principles and methodologies
  • Knowledgeable of best practices implementing security controls including software engineering methodologies, hardware engineering, security engineering principles, and secure coding techniques
  • Experience interfacing with senior managers and/or government customers
  • BS in CS, Info Systems, or related technical field 12 years experience, MS and 10 years experience
10

Cyber Virtualization Engineer, Senior Resume Examples & Samples

  • 2+ years of experience with security for intrusion analysis, intrusion detection, intrusion prevention, and practice in penetration testing and vulnerability assessments
  • Experience with vulnerability analysis or reverse engineering
  • Knowledge of UNIX or Linux operating systems, TCP/IP protocol stack, and networking tools
  • Knowledge of software development in C++ or Java
  • Knowledge of how to build and manage virtual systems, including VMware, ESXi, Xen, or Virtualbox
  • Knowledge of security tools and products, including Fortify, AppScan, Nessus, Nmap, Netcat, Fidelis, CloudShield, HSDI, FLO, Suricata, BRO, SPLUK, and Elastic Search (ELK)
  • Ability to parse and decode various application-level protocols, including XML and HTTP
  • Experience with developing and executing test plans and procedures
  • Experience with programming in C, C++, C#, Java, ASM, PHP, Perl, Microsoft .NET, Python, or Ruby and Linux or UNIX shell scripting
  • Experience with problem solving using out-of-the-box approaches
  • Knowledge of penetration attack strategies for Web services, databases, and e-mails and forensics tools and Cryptography principles
  • Knowledge of Enterprise-level solution storage and databases, including relational databases, database management systems, enterprise storage systems, or security concerns for these systems
  • BA or BS degree in Information Systems, Cybersecurity, EE, CS, or related field
  • DoD 8570 IAT Level II Certification, including CCNA-Security, GSEC, or CompTIA Security+
  • CompTIA Network+, Linux+, or CASP Certification
11

Cyber Anst Senior Prin Resume Examples & Samples

  • Self-motivated with excellent verbal and written communication skills
  • Current or eligible for security clearance
  • Bachelor degree 12 years experience, Masters degree and 10 years experience
12

Cyber Eng Senior Resume Examples & Samples

  • HBSS management, monitoring alerts and status, and reach-back to HBSS resources as appropriate
  • Provide professional knowledge and experience of CND analytics and operations
  • DoD 8570-M compliant certification
  • Incident Response experience
  • Enterprise-level cyber security experience
  • Bachelor’s degree in a technical field
  • 10+ years experience in hands-on CND operational and/or analysis position
  • Splunk training and experience in large and complex environments
  • HBSS certification
  • Knowledge of NIST 800-53 and ICD 502
  • Virtual host experience
  • IDS/IPS and firewall experience
13

Pubic Sector Cyber Icam Senior Associate Resume Examples & Samples

  • Requirements analysis, strategy, design, implementation, and migration for businesses
  • Contributing and supervising specific workstreams on an engagement(s), staying educated on current trends and assisting in the development of knowledge capital
  • ICAM solutions contractually requiring US Citizenship and Top Secret Level Security Clearance
14

Cyber Watch Operations Certified Analyst Senior Resume Examples & Samples

  • Under general direction, leads security event monitoring and correlation within a tiered Security Operations Center
  • Proven experience and ability to leverage CND analyst toolsets to detect and respond to IT security incidents
  • Ability to implement standard procedures for incident response interfacing with Information Security Officer and IT staff
  • Conducts research and document threats and their behavior to include monitoring external CSIRTS/CERTs
  • Employ effective web, email, and telephonic communications to clearly manage security incident response procedures
  • Performs routine event reporting over time including trend reporting and analysis
  • Provide Cyber Threat Analysis support
  • Perform analysis and correlation of cyber threat events
  • Must be able to predict trends in cyber threat activity
  • Develop and distribute cyber threat awareness products (e.g., briefings, information papers, threat tippers)
  • Develop and present a weekly cyber threat briefing
  • Professionally certified, in a CND discipline, as a Technical Level III as defined by
  • DODI8570 is a requirement
  • Have six or more (6+) years of experience, with at least four (4) of those involving CND and Incident Response
  • Possess security certifications (CISSP, Security+, IAT Level III)
15

Senior Consultant, Cyber, Data Privacy Resume Examples & Samples

  • Working across a portfolio of privacy engagements with our clients, reporting to a Manager or Senior Manager, responsible for the day to day running of the engagements
  • Working with team members you will create high quality reports, ready for review by a Manager or Senior Manager
  • Establishing and building a network of contacts across EY and across peer level networks within our clients
  • Contributing to the development of the existing privacy team by sharing knowledge, leading by example and helping team members to develop
  • Knowledge of international privacy laws and regulations
  • An awareness of current frameworks, technologies, emerging trends, and best practices related to data privacy
  • High level of drive, commitment to achieving solutions and ability to work under pressure
  • Privacy related qualification similar to CIPP, CIPM, or CIPT
  • Experience with Tools such as Archer, GRC tools
16

Advisory Senior Consultant Cybersecurity Cyber Program Management Resume Examples & Samples

  • Consistently deliver quality client services. Monitor progress, manage risk and ensure key stakeholders are kept informed about progress and expected outcomes. Stay abreast of current business and industry trends relevant to the client's business
  • Demonstrate in-depth technical capabilities and professional knowledge. Demonstrate ability to assimilate to new knowledge
  • Possess good business acumen
  • Remain current on new developments in advisory services capabilities and industry knowledge
  • Demonstrate and apply a thorough understanding of complex information systems. Use knowledge of the current IT environment and industry trends to identify engagement and client service issues, and communicate this information to the engagement team and client management through written correspondence and verbal presentations
  • A bachelor's degree and a minimum of 2 years of related work experience; or a graduate degree and approximately 1-2 years of related work experience in the fields of Computer Science, Information Systems, Engineering, Business or related major
  • A minimum of 1 year of related work experience with information security systems with a strong understanding of information security regulatory requirements and compliance issues
  • Knowledge of general security concepts and methods such as vulnerability assessments, privacy assessments, intrusion detection, incident response, security policy creation, enterprise security strategies, architectures and governance
  • Understanding of networking (TCP/IP, OSI model), operating system fundamentals (Windows, UNIX, mainframe), security technologies (firewalls, IDS/IPS, etc.) and application programming/scripting languages (C, Java, Perl, Shell)
  • Experience in process definition, workflow design and process mapping
  • Excellent teaming skills with advanced written and verbal communication skills
  • Must hold or be willing to pursue related professional certifications such as the CISSP, CISM, and/or CISA
  • A valid driver's license in the US and a valid passport required; willingness and ability to travel domestically and internationally to meet client needs; estimated 60-80%
17

Senior / Lead Cyber Intel Standards Resume Examples & Samples

  • Performing research and development to advance the state of the practice of cyber threat intelligence
  • Developing operational concepts to support cybersecurity information sharing and analysis
  • Experience in cybersecurity, including intrusion detection, network defense, penetration testing, incident response, and/or malware analysis
18

Cyber Eng Senior Resume Examples & Samples

  • Knowledge of Networks, computer components, system protocols, and COTS technology
  • Ability to coordinate activities with assessment and authorization stakeholders, government officials, and contractors
  • Current or eligible for TS security clearance
  • BS in CS, Info Systems, or related technical field
  • 7 Years with BS, 5 years with MS
19

Cyber Wargame Analyst, Senior Resume Examples & Samples

  • 5+ years of experience with intelligence analysis, including all source analysis, Cyber intelligence, and threat assessment
  • Experience with DoD and interagency partners
  • Ability to apply advanced analytic expertise to identify, assess, interpret, and report potential threats
  • Experience with working in a military staff environment
  • Knowledge of Cyberspace operations
20

Cyber Incident Responder, Senior Resume Examples & Samples

  • 10+ years of experience in working with system administration, network engineering, or security engineering in a work or an academic environment
  • Experience with leading a team to complete the mission, as needed and working well under pressure to rapidly scope and investigate incidents
  • Knowledge of the concepts of host or network incident response, malware analysis, or forensics
  • Knowledge of networking concepts and analysis tools and operating systems, software, and security controls
  • Ability to be detail-oriented and a self-starter and quick learner
  • BA or BS degree in Engineering, CS, Information Security, or Information Systems preferred; MA or MS degree a plus
21

Cyber Targeting Analyst, Senior Resume Examples & Samples

  • Level stakeholders and policy makers in the Intelligence Community (IC). Conduct Cyber Joint Munition Effectiveness Munitions (JMEM) tool development to streamline weapons
  • Capability pairing. Use multiple sources of information, including Cyber Mission Force (CMF) test data, Evaluated Level of Assurance (ELA) test data, and weaponeering systems and develop analytic models to support advanced target development. Interface with CMF, USCYBERCOM, and national agency staff by attending testing, exercises, and Cyber conferences. Provide technical and operational criteria that will inform IC objectives. Coordinate the release of target reports to appropriate IC components. Respond to ad hoc target information, analysis, and reporting requests
  • DoD 8570 Compliance IAM
  • I Certification required within 6 months of hire
22

Cyber Virtualization Engineer, Senior Resume Examples & Samples

  • Assessments, network protocols, and software code for system vulnerabilities. Provide technical information system security testing in support of the appropriate security risk management processes using security assessment and technical testing efforts, including In-depth network and application vulnerability testing for automated and manual testing and demonstrable false positive validation. Develop documentation in support of testing efforts, including test plans, preliminary findings reports, security assessment reports, and other similar test artifacts, as required by the government
  • Ability to parse and decode various application
  • Level protocols, including XML and HTTP
  • Experience with problem solving using out of the box approaches
  • DoD 8570 IAT Level II Certification, including CCNA
  • Security, GSEC, or CompTIA Security+
23

Cyber as a Service Threat Detection & Response Senior Analyst Resume Examples & Samples

  • Full-spectrum incident response support including event discovery, alert notification, investigation, facilitation of containment, facilitating of resolution, and event reporting
  • Understanding the “how,” “when,” “where,” and “why” of the incident threat
  • Perform mitigation activities for current and residual risk
  • Maintain a professional communicative relationship with clients and management to provide information throughout the incident, problem, and change management cycles
  • Routinely develop and update incident response playbooks to ensure response activities align with best practices, minimize gaps in response and provide comprehensive mitigation of threats
  • Participate in after hours on-call rotation when required
  • At least 3 years in Information Security, especially in an security operations and vulnerability discovery OR information operations/incident role
24

Cyber Sec Analyst Senior Resume Examples & Samples

  • Minimum 7 years of relevant work experience in lieu of degree is acceptable
  • Familiarity with PKIs and related technologies (LDAP directories, HSMs, OCSP) and security practices
  • Working knowledge of Entrust suite of PKI products (Security Manager, Administration Services, Security Manager Proxy) especially in a government setting
  • Hands-on experience with Hardware Security Modules (HSMs)
  • Experience with directory products (LDAP), such as Critical Path or Active Directory
  • Network device configuration – Cisco and Juniper firewalls and switches
  • Network infrastructure diagnostics (TCP/IP general networking knowledge, network monitoring tools)
  • Virtualization technologies (ESX/ESXi)
  • Working knowledge of External storage solutions
25

Cyber Anst Senior Prin Resume Examples & Samples

  • Performance in multiple areas of information security including computer network defense (CND), continuous monitoring and analysis, enterprise audit, security compliance, security event monitoring and analysis, data management, analytic rule development/adjustment, incident response and investigative support
  • Deliver technical security expertise in the operation of an enterprise class CND system, dealing with events caused by internal and external factors and the related mitigation recommendations for issues caused by process, threat and technology changes over time
  • Experience in cyber security tactics, techniques, and procedure
  • IT security training
  • Knowledge of Forensic tools and techniques
  • Enterprise audit aggregation, logging, and analysis experience
  • Experience in threat/risk mitigation
26

Cyber Sec Analyst Senior Resume Examples & Samples

  • Analyze organizational security policies and create security baseline configuration documents for various systems/platforms based on accepted industry standards
  • Utilize Tripwire Enterprise and/or Tenable Security Center to perform job duties, to include (but not limited to) configuration compliance assessment, and compliance policy administration
  • Create system/platform security hardening configuration checklists used for measuring compliance success
  • Collaborates with other technical teams (Network, Server, and Application), project managers and data center operations and technical subject matter specialists for periodically reviewing organizational security baselines and interfacing with the agency ISSO’s
  • Maintain vendor technical support documentation that aligns to the minimum security baseline (MSBs) standards and processes
  • Coordinates and facilitates communications with other departments and/or commercial vendor(s) to investigate and resolve configuration matters of significance and to ensure adherence to agency’s security baselines
  • Bachelor’s degree and 2-5 years of Information Assurance/Cyber Security experience. Masters and 3 years is acceptable
  • Prior experience with Security Content Automation Protocol (SCAP) Tools
  • Experience with any of the following SCAP tools qualifies: Tripwire Enterprise, Nessus, Retina, Tenable Security Center, CIS-CAT, STIGs, Gold Disk
  • Excellent understanding of security frameworks and such as NIST, STIG, USGCB, and CIS
  • Possesses or able to obtain within six months an information security certification commensurate with DoD Instruction 8570 (including but not limited to Security+ or, SSCP) preferred
  • Prior Windows and/or Unix System Administration experience
  • Be comfortable with Command-line Interface (CLI) for evaluating hardened system settings
27

Senior Information Assur Cyber Spec-issm Resume Examples & Samples

  • 6+ years Information Security or related IT experience
  • Experience with the NISPOM (Chapter 8 as well as familiarity with other Chapters), ODAA Process Manual, Baseline Technical Security Configuration Standards, JAFAN, Risk Management Framework (RMF), etc. (i.e. DCID, ICD)
  • Previous experience with complex Wide Area Networks and Information Systems (Multi-Program Interconnection, PL-2)
  • Bachelor's degree in either Computer Science, Information Systems Management, Information Technology, Criminal Justice, Business or other relevant degree
  • Experience developing IS security plans, policy and procedures for complex networks (contractor and government wide area networks)
  • Design and implement a process to identify and mitigate specific risks within the security environment
  • Understands and leverages IDS business knowledge to achieve results (financial, manpower, etc)
  • Ability to apply information system knowledge to other government compliance documents (JAFAN, DCID, ICD)
  • Customer focused and has excellent time management skills
  • Experience with Interconnected Security Agreements (ISA), Network Security Plans (NSP), Memorandum of Agreement/Understanding (MOA/U)
  • Ability to develop and defend Basis of Estimates
  • Utilize forward thinking to anticipate customer/government changes and challenges
  • Ability to handle difficult people and/or situations in high pressure environments and make tough decisions
  • Must be flexible and work with limited supervision
28

Intelligence Analyst / Cyber, Senior Resume Examples & Samples

  • Process incoming requests for information and preparing responses
  • Conduct research concerning cases/incidents of interest that have a direct or indirect nexus to terrorism, police officer safety threats, threats to critical infrastructure
  • Attend and participate in meetings on a regular and sometimes ad-hoc basis
  • Serve as a liaison and expert advisor with mid and upper-level management within Fairfax County Police Department (host agency for the NVRIC)
  • Research, synthesize, and analyze large amounts of data from diverse sources of information with a demonstrated ability to understand articulated stakeholder information needs, as well as anticipate and proactively address unarticulated information needs
  • Ability to establish and maintain effective relationships with others and work effectively with minimum supervision
29

Cyber Anst Senior Resume Examples & Samples

  • Perform surveillance and reconnaissance, enclave cybersecurity defense, attack vector analysis, Computer Network Defense (CND), incident handling, vulnerability management/reporting, risk analysis and readiness and strategic planning analysis
  • Provide technical support, analysis, and recommendations in the areas of
  • Surveillance and Reconnaissance
  • Malicious Software (Malware) Analysis
  • Experience with Host Based Security Systems (HBSS), IDS/IPS, Splunk, and other cyber security tools
  • Ability to deploy and manage advance cyber analytics
  • Experience performing incident reporting, analysis, and response activities
  • Hold a clearance with "Yankee White" investigation IAW DODI 5210.87
  • Hold and maintain a DoD 8570 Computer Network Defense Service Provider - Analyst certification. This is a Global Information Assurance Certification Certified Intrusion Analyst (GCIA), EC-Council Certified Ethical Hacker (CEH), Global Information Assurance Certification Certified Incident Handler (GCIH), or Cisco Cyber Security Specialty (SCYBER) certification
  • Hold and maintain a DoD 8570 Information Assurance Technician Level II certification. This is a GSEC, Security+(CE), SSCP, CCNA-Security, CISA, GCIH, GCED, CISSP (or Associate), or CASP (CE) certification
  • Ability/willingness to obtain additional Computing Environment certifications (Company funded) as required to gain/maintain proficiency in a changing technology environment
  • IT related certifications such as those issued by Microsoft, Cisco, CompTIA, (ISC)2, ISACA, and other similar organizations
  • Prior experience supporting Department of Defense or other U.S. government organizations
  • Ability to develop and maintain scripts for automating processes
30

Cyber Tools Engineer, Senior Resume Examples & Samples

  • 4+ years of experience with designing, implementing, configuring, and operating Archer
  • 3+ years of experience with IT in a professional work environment
  • 2+ years of experience with performing systems administration in Windows, Linux, or VMware environments, including performing installation and configuration, monitoring system performance and availability, performing upgrades, and troubleshooting
  • Experience with system architecture
  • Experience with performing site surveys, data gathering, and research and analysis related to deploying and implementing security tools
  • Experience with working in large federal agency environments, including USPS, HHS, SSA, Treasury, GSA, and NASA
  • Knowledge of federal information security policies, standards, procedures, directives, and frameworks and the federal security authorization, assessment, and risk management processes for enterprise systems
  • CISSP, Security+, or a related Certification
31

Cyber Technical Resilience Senior Consultant Resume Examples & Samples

  • 3+ years of experience with large enterprise recovery solutions
  • 3+ years exposure to data backup & replication services such as tape-based backup, synchronous and asynchronous replication, SAN or database replication, and snapshot journaling
  • Experience assisting with disaster recovery, business continuity, incident response, or cyber war gaming exercises
32

Cyber Identity & Access Management Senior Consultant Cyberark Resume Examples & Samples

  • Good understanding of Privileged Management processes – Defining Access Control, User Entitlements, Manage Applications Credentials, and User Access Policy Management
  • Work with IT and business stakeholders to define PAM target state processes and gather business requirements
  • BA/BS Degree in Computer Science, Cyber Security, Information Security, Engineering, Information Technology, Finance, Business
33

Cyber Engineering Senior Consultant Resume Examples & Samples

  • Bachelor’s Degree in Information Technology, Information Systems Security, Cybersecurity, or related field
  • Active Top Secret security clearance required
  • Must be DoD Directive 8570.01-M compliant Information Assurance Manager (IAM) Level II (ISC)2 - Certified Information System Security Professional (CISSP or Associate); ISC2 - Certification Authorization Professional (CAP); GIAC - Security Leadership Certificate (GSLC); ISACA - Certified Information Security Manager (CISM); CompTIA - Advanced Security Practitioner Continuing Education (CASP-CE)
34

Cyber Identity & Access Management Senior Consultant Sailpoint Resume Examples & Samples

  • 3+ years plus experience in developing, implementing or architecting information systems
  • 3+ years plus with technical architecture experience integrating identity management, access management and access governance software into clients' infrastructure and applications
  • 2+ years plus experience with installation, integration and deployment of Sailpoint IdentityIQ and/or IdentityNow product in client environment
35

CIC Cyber Enabled Financial Crimes Senior Analyst Resume Examples & Samples

  • 5+ years of experience collecting and analyzing intelligence that produced cyber enabled financial crime intelligence estimates
  • Direct experience working with law enforcement, intelligence organizations, technology, and risk
  • Strong knowledge of fraud, AML, banking, and cyber security terms and concepts
  • Intimate knowledge of cyber enabled financial crime threat actors and their tradecraft
  • Operational planning experience that includes financial crime and cyber security disciplines
  • Demonstrated ability to understand, collate, and explain complex information to a variety of audiences
  • Experience working closely in a security operations, military operations, intelligence operations or cyber fusion centers a plus
  • Ability to collaborate on financial crime and cyber security related topics with multiple teams
  • Capability to quickly review information to determine its significance, validate its accuracy and assess its reliability and present findings to both technical and non-technical audiences
  • Driven, self-motivated and able to work independently with little oversight
  • Able to produce written products on a reoccurring basis incorporating findings from cross-functional and cross-enterprise teams
  • Understanding of the tools and sources available to conduct financial crime and cyber security alerting, analysis, and enhanced situational awareness
  • Previous experience in education or training a plus
  • Ability to juggle change in priorities frequently and remain productive and effective
36

Senior Information Assur Cyber Spec-issm Resume Examples & Samples

  • 6+ years Information Security or related IT experience, or 4+ years with relevant Master’s Degree
  • Experience developing Information System (IS) security plans, policy and procedures for complex networks (contractor and government wide area networks)
  • Ability to design and implement a process to identify and mitigate specific risks within the security environment
  • Ability to apply IS knowledge to other government compliance documents (JAFAN, DCID, ICD)
  • Experience supporting various system configurations (Stand Alone, Local Area Networks, Wide Area Networks)
  • Vulnerability scanning tool experience
37

Cyber Eng Senior Prin Resume Examples & Samples

  • Perform management functions including hiring, evaluating, training, project team assignments, performance management, salary administration, mentorship, and development and retention of staff
  • Prepare and present training activities, materials, awareness programs that encourage proper security practices
  • Validate that activities and controls enacted to secure information are continually assessed. Evaluate gaps in security and identify solutions to mitigate risk, including business processes, technical controls, or policy improvements
  • Bachelor's Degree and 15 years work experience or equivalent experience
  • Certified Information Systems Security Professional (CISSP), or equivalent
  • Secret Clearance and TS/SCI eligible
  • Requires at least 5 years of management experience with a history of progressive responsibility and building bridges between organizations. No less than four of those years in an IS-related capacity
  • Minimum of four years of experience in an IS related capacity that includes a general understanding of computer networks, hardware, databases, applications, security components, computer operations, and operating system maintenance
  • Experience with the DoD, DIACAP and/or RMF process and requirements
  • The ability to assess the effects and requirements of government regulations and the ability to interpret that information for business leaders
  • A transparent leader with high integrity and capable of building strong, trusting relationships
  • Experience in a matrix organization
38

Cyber Identity & Access Management Senior Consultant Project Associate Resume Examples & Samples

  • This is a multi month/multi year project based role with minimal travel
  • Understanding of service level agreements and prioritization of incidents
  • Experience is with SailPoint IdentityIQ
  • Proficient in creating and modifying workflows for implementing business flows
  • Understanding of custom changes to SailPoint IdentityIQ
  • Extensive knowledge and skills in maintaining an access management/SSO system in a large, complex organization
  • Experience in managing deployments of SailPoint IdentityIQ and access management product
  • Experience with role mining, role based access control and access certification with SailPoint IdentityIQ
  • Ability to interact with multiple client stake holders and business units
  • Previous experience leading teams in the onshore-offshore model
  • Experience leading team, managing tasks and technical deliverables
  • Excellent communication skills, should be able to communicate clearly and effectively, should be able to communicate decisions, set expectations with the client and with the team
  • Understanding of JavaScript, XML, DSML
  • Understanding of basic system architecture design
  • Bachelor's degree in IT related field or equivalent experience
  • Previous development background in: J2EE, Java, .NET, or PL/SQL
  • 7+ years’ of experience in SailPoint IdentityIQ solutions
  • Hands on experience with UNIX or LINUX platforms
  • Experience supporting SailPoint IdentityIQ including monitoring tasks, initiating certifications and executing reports
  • Previous experience with Linux, Tomcat, ServiceNow, Oracle, SQL Server etc
  • Exposure on various incident management systems and ticketing tools
  • Knowledge of basic security concepts (encryption using keys, SSL, HTTPS)
  • Experience managing Incidents, Service Request and Changes within defined SLAs
  • Basic understanding of ITIL concepts
39

Cyber Identity & Access Management Senior Consultant Project Associate Resume Examples & Samples

  • This is a multi month to multi year project based role and will require minimal travel
  • Minimum 7+ years of experience leading teams in administration, maintenance and compliance as it pertains to enterprise risk/governance
  • Have a deep understanding of service level agreements and prioritization of incidents/enhancements
  • Understanding of security applications such as: Oracle IDAM, IBM SIM/SAM, CA SiteMinder/IdentityMinder
  • Deep experience with audit recommendations and risks
  • Knowledge of basic security concepts (encryption using keys, SSL, HTTPS) Experience on various incident management systems and ticketing tools
40

Cyber Anst Senior Resume Examples & Samples

  • IAT-II certification, such as Security+
  • Joint Cyberspace Operations Planners Course (JCOPC), Joint Advanced Cyberspace Warfare Course (JACWC), or equivalent
  • Must possess a final TS/SCI Clearance
  • Requires 6-10 years relevant Intelligence work experience, with at least 2 years Cyber/Threat Intelligence experience
  • Korean language proficiency (DLI 1/1/1 rating or TOPIK level 2) for Host Nation Liaison responsibilities
  • MS in Computer Security related field plus 3 years experience computer security
  • Network certification, e.g. CCNA
  • Programming/scripting
41

Senior Consultant, Cyber, Resilience Resume Examples & Samples

  • Working across a portfolio of engagements with our clients, reporting to a Manager or Senior Manager, responsible for the day to day completion of resilience assessments or delivering elements of a resilience transformation programme
  • Where possible, you will identify opportunities for EY to assist our clients further and escalate these potential areas to the engagement manager
  • Working with the engagement manager you will assist with the planning and delivery phases of engagements
  • Contributing to the creation of proposals and marketing material
  • Resilience, design and implementation of programmes to improve IT Disaster Recovery, Business Continuity
  • Understanding of information security requirements
  • Understanding of security policies and procedures, standards and controls in line with regulation and/or current standards, ISO27001
  • Strong academic record, to degree level or equivalent industry experience
  • Resilience/Continuity related qualifications such as CBCI/AMBCI/MBCI, Master BCM, ISO22301 auditor, 27001 auditor
42

Cyber IT Risk Management Senior Consultant Resume Examples & Samples

  • 3+ years of information security & privacy or cyber risk management experience
  • 1+ years implementing security solutions
  • Must be willing to travel up to 80% within North America
43

Cyber Anst Senior Resume Examples & Samples

  • Requirements-
  • Experience using large data sets to conduct research, discover relationships, and correlate threat data from various sources - including whois data, passive DNS, and open source malware repositories
  • Possess a strong understanding of analytic tradecraft, deductive reasoning, and critical thinking skills
  • Knowledge of incident handling and incident response. Experience providing intelligence analysis support as part of a team that performs in-depth technical analysis of network intrusion incidents
  • Ability to read and interpret pcap data, and understand common network protocols
  • Experience working with IDS/IPS rules; knowledge of snort, yara, and bro signatures
  • Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment
  • Responsibilities-
  • Directly support SOC operations, malware analysis and network/endpoint threat hunting teams with actionable intelligence products
  • Identify emerging threat actors and track existing actors as their tactics, techniques and procedures evolve over time
  • Collect and analyze all source intelligence products and generate strategic and tactical-level threat intelligence products
  • Develop a sophisticated understanding of actor capabilities and intentions. Prioritize and routinely brief team members and senior decision makers on threat actors targeting the corporate network
  • Create and share incident reports for external partners
44

Cyber Eng Senior Prin Resume Examples & Samples

  • Bachelor's Degree and 12 years work experience or equivalent experience
  • Active Clearance and upgrade eligible
  • An individual with high integrity and capable of building strong, trusting relationships
45

Cyber Anst Senior Prin Resume Examples & Samples

  • Lead planning and engagement efforts for organizational security evaluations, Red Teams, systems analyses, Pen Testing, security architecture reviews, and so forth
  • Use various tools to perform to perform these activities, such as: Nessus, Nexpose, Metasploit, Meterpreter, and so forth
  • Development of security and privacy policies (in conjunction with IT governance and other policy development groups) that embody industry best practices
  • Build collaborative internal relationships with program and project teams, as well as external relationships with customers, regulatory bodies, other agencies and business partners
  • Active clearance and eligible for upgrade
  • Demonstrated leadership, human relations, and effective communications skills required
  • CISSP or equivalent IAM Level III certification
  • CEH, OSCP or similar certifications
  • Experience leading security evaluations and Red Team engagements
  • Excellent written and oral communications skills, including high-level presentation abilities
  • The ability to mediate contentious situations and develop consensus. A demonstrated history building bridges across organizational boundaries and the ability to communicate with technical and non-technical persons in management across a large, complex organization
46

Senior Information Assur Cyber Spec-issm Resume Examples & Samples

  • 4+ years related experience or 2 years with related Master’s Degree Background in Information Security, Information Technology or Related Disciplines
  • Existing Secret Clearance
  • Bachelor's Degree in either Computer Science, Information Systems Management, Information Technology, Criminal Justice, Business or other relevant degree OR 8 years related experience in lieu of degree
  • Experience working with government regulations, such as NISPOM, JAFAN, JSIG, DIACAP and Risk Management Framework. Regulation is based on customer requirements
  • Experience with certifying compliance and auditing the security aspects of various operating systems (Windows, LINUX, UNIX etc.)
  • Preparation of Certification and Accreditation (C&A) documents and procedures
  • Experience with development and delivery of IA related briefings and training material
  • Ability to utilize forward thinking to anticipate customer/government changes and challenges
  • Customer focused, adaptable and willing to work varying assignments
  • Customer focused and excellent time management skills
  • Ability to obtain and maintain Information Security professional certification commensurate with DoD 8570.1-M requirements (CISM, CISSP or other) within six months of employment
47

Senior Associate, Cyber Response Resume Examples & Samples

  • Provide oversight for on-site examinations and collections
  • Provide technology advisory services to enhance forensic engagements
  • Assess and troubleshoot a variety of technical issues
  • Support a computer forensic lab in a technically secure environment
  • Proficiency with PC hardware and networking and experience with UNIX/Linux and Windows operating systems
  • Ability to undertake moderate to extensive travel
48

Cyber Sec Analyst Senior Resume Examples & Samples

  • Interpret, analyze and execute Cyber Security policies, procedures and tactics
  • Conduct real-time threat analysis for USCENTCOM Headquarters through multiple situational awareness and management tools
  • Monitor Cyber Security sensor grid situational awareness from Tier 0 to Tier 2 and provide mitigation and improvement recommendations; provide analysis both verbally and in writing for all sensor grid disruptions, outages and/or anomalies; coordinate, report and direct network responses through orders, policies, procedures and guidance
  • Perform Cyber Security information gathering from appropriate tools and databases
  • Track and report performance and capability metrics
  • Be familiar with the interpretation of Cyber Security event categorization through analysis and coordination of incoming data flow from security devices or other means. Track anomalies or threat indicators, as required
  • Track and report Cyber Security threats, events and incidents
  • Review and update Cyber Security tactics, techniques and procedures (TTPs) and Standard Operating Procedures (SOPs)
  • Review current intelligence for relevant threats and develop appropriate actions/response
  • Assist with tracking of compliancy reporting for USCENTCOM orders
  • Provide Cyber Security support to USCENTCOM AOR NETOPS Centers, as required
  • Review security threats and determine/implement effective countermeasures, as required
  • Coordinate and participate in Cyber Security risk analysis and assessments, as required
  • Candidate must have experience within the USCENTCOM AOR and must be familiar with its mission
  • Candidate must have a solid familiarity with application and network security. Must be able to provide technical subject matter expertise for a wide range of security technologies including, but not limited to Security Event Information Management (SEIM) Intrusion Protection and Intrusion Detection Systems (IDS/IPS), Host Intrusion Detection System (HIDS), malware analysis and protection, content filtering, perimeter access controls, logical access controls, identity and access management, and data loss prevention
  • Experience briefing senior military and civil service employees
49

Senior Info Assur Cyber Spec Resume Examples & Samples

  • Existing Top Secret clearance granted within the past 5 years
  • Experience with JSIG, JAFAN 6/3, DCID 6/3 or ICD 503, or National Industrial Security Program Operating Manual (NISPOM) Chapter 8 requirements
  • Experience developing IS security plans, policy, and procedures for Stand Alone Systems, Local Area Network (LAN) Information Systems and Wide Area Network (WAN) Information Systems
  • Previous experience performing successfully as an Information System Security Manager (ISSM) in an industrial security environment
  • Currently holds a DOD 8570.1 IAM Level III Certification; (i.e. CISSP)
  • Currently holds a Top Secret Clearance with SCI
  • Working knowledge of the Joint Special Access Programs (SAP) Implementation Guide (JSIG)
  • Working knowledge with the Risk Managed Framework (RMF)
  • Ability to effectively work as part of a team
  • Possess good time management skills. Utilize forward thinking to anticipate customer/government changes and challenges
  • Ability to execute tough decisions with minimal supervision in accordance with government regulations
  • Ability to handle various situations in high pressure environments
  • Demonstrated ability to develop and defend Basis of Estimates
50

Senior Info Assur Cyber Spec Resume Examples & Samples

  • Interface with the Defense Security Services (DSS)
  • Register new information systems and carry out Assessment and Authorization (A&A) activities under the RMF
  • Prepare artifacts to include System Security Plans (SSP), Security Controls Traceability Matrix (SCTM), Security Concept of Operations (CONOPS), and detailed technical artifacts (e.g., hardware/software inventories, information systems and network configuration diagrams) to support A&A
  • Perform basic system administration activity
  • Work closely with other IT System Admins to ensure (i.e., verify and validate) security controls have been implemented and are compliant to the aforementioned key artifacts and requirements
  • Review audit data, investigate, report and remediate security incidents in coordination with the Information System Security Manager (ISSM)
  • Execute IA sustainment activities (e.g., hardware and software change management, account management, media protection, file transfers, etc.)
  • Perform Self Inspection, Auditing, and Continuous Monitoring activities
  • Interface with Internal/External Customers: USG Customers, Program Managers/Directors, IT, etc
  • Perform IA training and awareness, incident response, investigation and resolution
  • US Citizen with a current Top Secret clearance
  • In-depth knowledge of NISPOM, DAAPM, NIST Special Publications, CNSS policies, instructions and other requirements documents associated with RMF
  • Experience with various information system security tools to include NESSUS, SCAP Compliance Checker, DISA SRR, STIGS, Logs, Anti-Virus, HBSS, etc
  • Working knowledge of Information Technology (IT) infrastructure and services to include routers/switches, firewalls, servers, workstations, Microsoft server and client services, Active Directory, Group Policy Objects (GPOs), etc
  • Prior ISSO/IAO experience
  • Microsoft Windows Professional Certification (not required but highly desired)
  • DoD 8570.01M compliant Professional Certification (e.g. Security +, CISSP, etc.)
51

CIC Cyber Enabled Financial Crimes Senior Analyst Resume Examples & Samples

  • 5 + years of Experience collecting and analyzing intelligence that produced cyber enabled financial crime intelligence estimates
  • Experience working with law enforcement, intelligence organizations, technology, and risk
  • Knowledge of fraud, AML, banking, and cyber security terms and concepts
  • Knowledge of cyber enabled financial crime threat actors and their tradecraft
52

Senior Info Assur Cyber Spec Resume Examples & Samples

  • Determines enterprise information assurance and security standards
  • Develops and implements information assurance/security standards and procedures
  • Coordinates, develops, and evaluates security programs for an organization. Recommends information assurance/security solutions to support customers’ requirements
  • Identifies, reports, and resolves security violations
  • Establishes and satisfies information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands
  • Supports customers at the highest levels in the development and implementation of doctrine and policies
  • Applies know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures
  • Performs analysis, design, and development of security features for system architectures
  • Analyzes and defines security requirements for computer systems which may include mainframes, workstations, and personal computers
  • Designs, develops, engineers, and implements solutions that meet security requirements
  • Provides integration and implementation of the computer system security solution
  • Analyzes general information assurance-related technical problems and provides basic engineering and technical support in solving these problems
  • Performs vulnerability/risk analyses of computer systems and applications during all phases of the system development life cycle
  • Ensures that all information systems are functional and secure
  • BS degree and 6 years of experience
53

Senior Info Assur Cyber Spec Resume Examples & Samples

  • Information System Self Inspection, Auditing, and Continuous Monitoring
  • Fully coordinate with the Indianapolis Information System Security Manager (ISSM) and Facility Security Officer (FSO) to ensure collaboration across security disciplines
  • Development, maintenance, and execution of effective, well written, and customer compliant IA policies and procedures
  • Basis of Estimate (BOE) development
  • US Citizen with an active Secret Security Clearance or current Single Scope Background Investigation (SSBI)
  • 2+ years of experience in Information Systems Security/Information Assurance, Security Engineering, or IT Systems Administration
  • ISSO/IAO experience
  • Experience executing a compliant IA program under various key governing requirements (e.g. NISPOM, ODAA Manual, etc.)
  • Experience successfully and effectively interacting with internal and external customers (DSS, ISSPs, ISRs, DAOs, Program Managers, etc.)
  • Experience developing System Security Plans (SSPs) and supporting Certification and Accreditation (C&A) documentation
  • Experience supporting various computer hardware platforms and multiple operating systems, both stand alone and LAN/WAN configurations
  • Working knowledge of operating systems security features and settings (e.g. Windows, UNIX, and Linux)
  • Professional demeanor, good interpersonal skills, and ability to excel in a high-paced multi-tasked environment
  • Ability to act independently, prioritize tasks, and manage to schedule
  • Experience and proficiency with OBMS (ODAA Business Management System)
  • Must be willing and able to travel to other locations as required up to 10% of work schedule
  • In-depth knowledge of NIST special publications, CNSS policies and instructions, and other requirements documents associated with the Risk Management Framework (RMF)
  • Experience supporting SIPRNet and preparing for CCRI assessments
  • Experience with various information system security assessment/hardening tools – DISA STIGs, SCAP, ACAS, HBSS, Retina, Nessus, etc
  • Working knowledge of Wide-Area and Local Area Networks (WAN/LAN), to include Cisco-based routers, switches, and firewalls
  • Experience with computer forensic tools and investigation methodologies
  • DoD 8570.1M compliant Professional Certification (e.g. Security +, CISSP, GSEC, etc.)
  • Bachelor’s Degree in Computer Science, Information Systems, Information Assurance, Cyber Security, or related field of study; or 4 years’ experience in lieu of education
54

Senior Info Assur Cyber Spec Resume Examples & Samples

  • Cyber Engineers
  • Software Engineers
  • Systems Engineers
  • Test Engineers
  • Applications Systems Analysts
  • Helpdesk Specialists
  • Systems Administrators
  • Senior Network Specialists
  • Information Assurance/Security Specialists
  • Data Warehousing Specialists
  • Administrative &Clerical Staff
55

Senior Info Assur Cyber Spec Resume Examples & Samples

  • Have cognizance over the preparation and submission of System Security Plans
  • Interpret and ensure adherence to the National Institute of Standards and Technology (NIST) and/or other applicable regulations
  • Provide expertise to the customer in developing solutions to meet published security requirement guidelines
  • Will serve as the liaison between various organizations (IT, Program, Operations, business partners, etc) with latitude in making contacts at various levels to ensure accurate and timely distribution of security information
  • Conducts reviews of computer security requirements for compliance, efficiency, and standardization of technical computer security configuration
  • Provide knowledge transfer in a phased approach
  • Experience with risk management and gap analysis
  • Experience conducting security control assessments and creating reports based on findings
  • Speaks English fluently
  • Ability to coordinate and work with outside teams in order to represent the clients auditing needs across the department
  • Personality traits: Naturally curious and inquisitive nature; persistent and determined; loves solving problems and puzzles; analytically rigorous; uncompromising integrity
  • Splunk report creation and security event correlation from security devices in the enterprise
  • Ability to create and act upon security compliance and vulnerability assessment from Tenable Security Center
  • Strong understanding of government auditing and compliance requirements for building government IT applications and programs
  • Ability to do network assessment using NMAP and advance NMAP scripting
  • Shown experience validating and remediating security vulnerabilities and risks on multiple operating systems and COTS applications
  • Strong PKI and identity experience
  • At least 1 security certification as stated below
  • A03 requires Bachelor’s and 4+ year’s concentration in an Information Assurance role or equivalent experience
  • A04 requires Bachelor’s and 6+ year’s concentration in a Information Assurance role or equivalent experience
56

Senior Info Assur Cyber Spec Resume Examples & Samples

  • A Bachelor’s degree in any field of study
  • Two (2) years’ experience in managing the collateral security program within a Federal Government Agency environment
  • Completed and received training certificates from the Center for Development of Security Excellence in the following areas: 1. Physical Security, 2. Information Security, 3. Personnel Security, 4. Joint Personnel Adjudication System (JPAS) Training, and 5. Industrial Security (In-residence government Security Training or Security Fundamentals Professional Certification satisfies this requirement)