Cyber Specialist Resume Samples

4.6 (88 votes) for Cyber Specialist Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the cyber specialist job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
AL
A Luettgen
Alta
Luettgen
1035 Kylee Ridges
Boston
MA
+1 (555) 650 5945
1035 Kylee Ridges
Boston
MA
Phone
p +1 (555) 650 5945
Experience Experience
Philadelphia, PA
Specialist Cyber
Philadelphia, PA
Schoen Inc
Philadelphia, PA
Specialist Cyber
  • Conduct forensics investigation, including collecting and analyzing data from electronic sources such as infrastructure logs, hosting application logs, end-points and network file servers to support security incident response activities
  • Investigate suspected violations of BHP Billiton's Code of Conduct
  • Conduct computer forensic analysis, data recovery, e-Discovery and other IT investigative work
  • Collaborate with fraud examiners, other IT Investigative experts, counsel, human resources and other IT technical personnel with investigations
  • Examine computers and media generated by computers to develop evidence as an expert in the specialty area of forensic computer science
  • Design, develop, de-bug, test, reverse engineer, document and maintain computer programs for security applications
  • Communicate complex technical matters with external and internal IT stakeholders including Legal, Corporate Security, Human Resources, IT Security, Engineering and other business groups
New York, NY
Cyber Policy Specialist
New York, NY
Bergstrom, Christiansen and Senger
New York, NY
Cyber Policy Specialist
  • Developing and maintaining a document asset library and conducting applied and advanced research methodologies
  • Provide security guidance to internal and external customers
  • Develops executive level briefings
  • Develop information security policy compliance strategic plans, project plans, writes policies, and measures for maturity
  • Investigate and prepare impact statements and make recommendations on security violations
  • Continually re-evaluating quality and effectiveness of policies, procedures, handbooks, manuals, processes and standards
  • Configuration baselines
present
Houston, TX
ACP Cyber Technical Specialist
Houston, TX
Rippin-Okuneva
present
Houston, TX
ACP Cyber Technical Specialist
present
  • The role holder provides exploitation of systems and technology to deliver business and cost transformation aligned to business strategy to deliver efficient customer solutions
  • He/she may contribute to the formulation of network, technology, systems and information strategy and evolution plans
  • The role holder takes a lead role on programmes and projects that go to plc, OC and/or LoB Boards for decision. He/she may have end to end ownership of network / systems & technology strategy & evolution process, or the operation and delivery of network & technology options
  • The role holder meets business objectives, solves business problems and furthers business success by applying industry, applications and technical knowledge through the definition of high level solutions. In addition he/she may work proactively with the business to define new product developments
  • The role holder may manage strategic investment and financial control for the delivery of end to end integrated solutions
  • The role holder may also play a key part in the BT wide professional communities
  • May lead teams of professionals and support teams and/or leadership of cross divisional, matrix and virtual teams
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of Pittsburgh
Bachelor’s Degree in Computer Science
Skills Skills
  • Good interpersonal skill to enable building working relationships
  • Proven ability to analyze problems and propose reasonable solutions
  • Good ability to gather information from various sources, both electronic and written to support the development of briefing materials and other projects
  • Ability to work within a multi-disciplined team
  • Good electronic research skills using search tools, databases and similar source to support various customer programs and projects
  • Good verbal and written communication skills
  • Ability to assist others in solving problems and work with them to implement the solution
  • Proficiency with MS Office Applications
  • 6+ years directly related experience
  • Processes
Create a Resume in Minutes

15 Cyber Specialist resume templates

1

Cyber Process Improvement Specialist Resume Examples & Samples

  • 8+ years of experience with Cyber operations at all levels
  • 8+ years of experience with analyzing business processes
  • 8+ years of experience in the strategic or operational level
  • 8+ years of experience with Microsoft Office software suite and application
  • BA or BS degree or 10 years of experience in a professional work environment in lieu of a degree
  • Experience with DRRS
  • Experience with working at a HQ or CCMD level
  • Graduate of the Joint Information Operations Planners Course (JIOPC)
2

Cyber Policy Specialist Resume Examples & Samples

  • Develop information security policy compliance strategic plans, project plans, writes policies, and measures for maturity
  • Maintain relationships among CISO leadership, Policy and Risk Management and other key deliverable stakeholders
  • Interfacing with the CISO team to ensure that security goals are documented appropriately in policies, procedures, handbooks, manuals, processes and standards
  • Continually re-evaluating quality and effectiveness of policies, procedures, handbooks, manuals, processes and standards
  • Promoting application of National Institute of Standards and Technology Special Publications (NIST SP), Federal Information Processing Standards Publications (FIPS), Payment Card Industry Data Security Standards (PCI DSS), International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) Standards, Committee of Sponsoring Organizations of the Treadway Commission (COSO) 2013 Internal Control-Integrated Framework, CERT Resilience Management Model and similar guidance
  • Coordinating meetings with relevant stakeholders to prepare for policy drafts and updates, and ensuring that personnel are aware of policy and legal responsibilities
  • Providing the customer with an end-to-end cybersecurity policy development, deployment and analysis capability across the CISO organization
  • Identifying the best approach for documenting cybersecurity requirements and guidelines
  • Developing and maintaining a document asset library and conducting applied and advanced research methodologies
  • Provide security guidance to internal and external customers
  • Serve as a liaison between customer and external organization security elements
  • Investigate and prepare impact statements and make recommendations on security violations
  • Must be eligible to obtain a sensitive clearance – Position of Public Trust – and may be required to obtain a higher security clearance
  • 6+ years directly related experience
  • Subject Matter Expert on NIST, OMB, policy requirements
  • Experience developing the following types of documents
  • Handbooks
  • Manuals
  • Processes
  • Candidate should also demonstrate attention to detail, have the ability to work independently with minimal supervision and adapt to changes in priorities in a fast-paced environment
  • Proven ability to analyze problems and propose reasonable solutions
  • Good interpersonal skill to enable building working relationships
  • Good ability to gather information from various sources, both electronic and written to support the development of briefing materials and other projects
  • Good electronic research skills using search tools, databases and similar source to support various customer programs and projects
3

Cyber Policy Specialist Resume Examples & Samples

  • Promoting cybersecurity policies and ensuring they are followed
  • 4+ years directly related experience
  • Experience with NIST 800-53 Security and Privacy Controls for Federal Information Systems and Organizations
  • Experience with NIST, OMB, policy requirements
  • Familiarity with FedRAMP requirements
  • Experience with existing standards for access control, intrusion detection systems, locks, destruction devices, and communications systems
4

Cyber Readiness Inspection Specialist, Mid Resume Examples & Samples

  • 3+ years of experience as administrative support
  • 3+ years of experience with supporting senior government staff
  • Experience with CNDSP or CCRI
  • BA or BS degree in CS, MIS, or a technical field preferred
5

Cyber Readiness Inspection Specialist, Senior Resume Examples & Samples

  • 5+ years of experience as administrative support
  • 5+ years of experience with supporting senior government staff
  • 8570 Compliance IAT Level II, including GSEC, Security+, SSCP, or CCNA Certification
  • Experience with supporting a DoD FSO program
6

Cyber Privacy Specialist, Senior Resume Examples & Samples

  • 5 years of experience with managing and leading project delivery teams
  • 5 years of experience with policy analysis and development
  • 5 years of experience with applying a variety of program management and business process management concepts, methods, tools, and techniques, including gap analysis, risk analysis, or process flow diagrams and identifying processes, performance-based metrics, and lessons learned
  • Experience with information sharing programs and their privacy implications
  • Knowledge of federal privacy and Cybersecurity laws and policies, including FISMA, and the Privacy Act of 1974 or E-Government Act
  • Ability to create and review comprehensive privacy compliance assessments for systems and programs that collect, maintain, or disseminate PII
  • CIPP Certification, including CIPP/US, CIPP/G, CIPP/IT, CIPP/E, or CIPP/C or CIPM Certification
  • Security+, CISM, or CISSP Certification
7

Cyber Secuirty Assessment Specialist Resume Examples & Samples

  • Must have experience with network / host scan tools, vulnerability management techniques and tools (RAPID7, nmap, openssl, Kali Linux)
  • Vulnerability Analysis/Ability to translate identified vulnerabilities to pro-active Boeing mitigation / remediation approaches
  • Programming/Scripting (Perl, Windows Scripting, Powershell, Python, C#, etc…)
  • Network Architectures (F5, Cisco, Firewalls)
  • Ability to identify vulnerable configurations or applications
  • General Knowledge of Security Controls and application (Firewalls, Encryption, IDS/IPS, Monitoring, Whitelisting)
  • OS Platforms (Windows, Linux, HP-UX, AIX) and related deployment and configuration processes
  • Systems Administration background
  • Knowledge of Information Security policies and compliance tracking processes
  • CISSP or OSCP certification preferred
8

Cyber Information Protection Specialist Resume Examples & Samples

  • Bachelor’s or Master’s Degree in Computer Science, Computer Engineering, or technical relevant field
  • Must meet DoD 8570 IAM Level 3 requirements (CISSP+)
  • Proficiency in writing, editing, executing scripts on Windows, Linux, UNIX systems
  • Experience with toolsets such as Wireshark, Metasploit, tcpdump, NMap, Nessus, Snort, Bro, EnCase, Forensic Toolkit, Windows Fundamentals, UNIX fundamentals, exploitation theory, privilege escalation, evidence removal
  • Experience with Cyber Threats Detection and Mitigation, Behavioral Malware Analysis
  • Experience with, Advanced Network Traffic Analysis, Malicious Network Traffic Analysis
  • Have strong UNIX/Linux fundamentals along with familiarity of UNIX/Linux/Windows Command Line Interface (CLI)
  • Demonstrated ability to methodically analyze problems and identify potential solutions
  • Ability to assist customer with implementing policies and tactics, techniques and procedures for conducting assessments
  • Experience programming in assembly, compiled, and interpreted languages
  • Experience with encryption and decryption such as PGP, DES, AES, RSA, and PKI
  • Experience programming in C, C++, C#, Ruby, Perl, Python, SQL
  • Certifications such as GXPN, GREM CCNA, CCNP, CCIE, RHCE, CompTIA, LPT, OSCP, GXPN, GREM CEH, Security+, MCP, and SANS GPEN a plus
  • Experience working with correlation environment tools (i.e., ArcSight)
9

Cyber Certification & Accreditation Specialist Resume Examples & Samples

  • Must have DoD 8570 IAT III Level Certification or be able to obtain Certified Information Systems Security Professional (CISSP) certification within 6 months of hire date
  • Possess a sound understanding of Microsoft Office and various Microsoft and UNIX/Linux operating systems
  • Pass Mission Qualification Training or similar and obtain Mission Ready certification within 6 months of hire date or within 3 months of obtaining in-class instruction, whichever comes last
  • Highly analytical with the ability to understand and implement customer objectives is desired
  • Experience or familiarity with military operations highly desirable
  • DOD Security Policies, Deployment Life Cycle Acquisition Life Cycle, DAU and ACQ training a plus
  • Must have an active TS/SCI security clearance
  • Bachelor's Degree in Information Assurance or related technical degree
10

Cyber Warfare Systems Test & Evaluation Specialist Resume Examples & Samples

  • Documentation Review, Test Planning Support, Operational Test Design, Test Analysis and Reporting, Test Operations Support, Modeling and Simulation Support, and Program Management Support
  • Demonstrate experience with Developmental Testing (DT) Integrated Testing (IT), Operational Testing and Evaluation (OT&E), and/or Follow-on Test and Evaluation (FOT&E)
  • Demonstrate experience relevant to the Cyber Warfare/Information Assurance areas to support test and evaluation assigned projects
  • Demonstrate experience in developing test criteria and Test and Evaluation Master Plans per DoD standards
  • Demonstrate ability to apply analytical methodologies to evaluate the operational effectiveness and suitability of combat systems, weapon systems, and combat support systems
  • Active Secret Clearance – TS eligible
  • Demonstrate familiarity with MS-Office software
  • Completion of COMOPTEVFOR OTD and Framework courses
  • Combined 5 years’ experience from the following
  • Active TS Clearance
11

Cyber Tools Specialist, Senior Resume Examples & Samples

  • 2+ years of experience with designing, implementing, configuring, and operating security tools
  • Experience with performing site surveys, data gathering, and research and analysis for deploying and implementing security tools
  • Experience with working in large federal agency environments, including the USPS, HHS, SSA, Treasury, GSA, or NASA
  • BA or BS degree in IT Security, Engineering, or related field
  • CISSP, Security+, or related Certification
12

Cyber Tools Specialist Resume Examples & Samples

  • 4+ years of experience with performing systems administration in Windows, Linux, or VMware environments, including performing basic troubleshooting, installation or configuration, monitoring system performance or availability, and performing security upgrades
  • 2+ years of experience with performing application whitelisting or blacklisting using security tools, including Bit9 Parity, RES One, or customized capabilities or enterprise or domain configuration or administration, including Group Policy editing and enforcement or 3+ years with security tool administration or network or domain administration, including Active Directory in lieu of application whitelisting or blacklisting
  • 1+ years of experience with designing, implementing, configuring, and operating CDM tools, including vulnerability scanners, host-based intrusion detection or prevention (HID/HIP), and anti-virus, hardware or software asset management, or software configuration management
  • BA or BS degree and 6+ years of experience with IT in a professional work environment or 8 years of experience with IT in lieu of a degree
  • 3+ years of experience with Linux administration, including Debian and Red Hat distribution variants or derivatives
  • Experience with integrating Cybersecurity data using enterprise, custom, or data aggregation and analysis tools, including Splunk
  • Knowledge of federal information security policies, standards, procedures, directives, frameworks, federal security authorizations, assessments, and risk management processes for enterprise systems
  • Ability to understand and provide support in an IT operations and maintenance Tier II role, including ticket work information updates and issue response and remediation
13

Cyber Privacy Specialist, Senior Resume Examples & Samples

  • 53 Appendix J and federal privacy requirements. Conduct research and draft position papers on emerging privacy issues and trends, as applied to various Cybersecurity fields and technologies. Develop privacy compliance assessments for systems and programs that collect, maintain, or disseminate PII
  • 5 years of experience with applying a variety of program management and business process management concepts, methods, tools, and techniques, including gap analysis, risk analysis, or process flow diagrams and identifying processes, performance
  • Based metrics, and lessons learned
  • Knowledge of federal privacy and Cybersecurity laws and policies, including FISMA, and the Privacy Act of 1974 or E
  • Government Act
14

Specialist Cyber Resume Examples & Samples

  • Conduct forensics investigation, including collecting and analyzing data from electronic sources such as infrastructure logs, hosting application logs, end-points and network file servers to support security incident response activities
  • Investigate suspected violations of BHP Billiton's Code of Conduct
  • Conduct computer forensic analysis, data recovery, e-Discovery and other IT investigative work
  • Collaborate with fraud examiners, other IT Investigative experts, counsel, human resources and other IT technical personnel with investigations
  • Examine computers and media generated by computers to develop evidence as an expert in the specialty area of forensic computer science
  • Determine the most appropriate method of protecting original evidence and recovering deleted, erased, hidden and encrypted data
  • Design, develop, de-bug, test, reverse engineer, document and maintain computer programs for security applications
  • Communicate complex technical matters with external and internal IT stakeholders including Legal, Corporate Security, Human Resources, IT Security, Engineering and other business groups
  • Investigate suspected fraud and/or other illegal acts involving technology services and processes
  • Establish and maintain controls for proper retrieval and handling of evidence
  • Assist other cyber security teams in conducting in-depth investigations into security breaches using all available tools within BHP Billiton
  • Process and deliver evidence for e-Discovery
  • Interview personnel to obtain information that relates to investigations, wither, where relevant, the support of HR and Legal
  • Vigilantly protect User data, ensuring proper handling and protection electronically. Physically and verbally
  • Maintain current information in a secure case management system
  • Maintain Quality Assurance for all investigation processes
15

Forescout Cyber Tools Specialist Resume Examples & Samples

  • 4+ years of experience with performing hardware network management using tools, including SolarWinds, FireEye, WUG, and network packet sniffers, such as WireShark
  • 2+ years of experience with performing systems administration in Windows, Linux, or VMware environments, including performing basic troubleshooting, installation or configuration, monitoring system performance and availability, and performing security upgrades
  • 1+ years of experience with designing, implementing, configuring, and operating CDM tools, including vulnerability scanners, host–based intrusion detection (HID) or host–based intrusion preventions (HIP), and anti–virus, hardware and software asset management, or software configuration management
  • Experience with performing physical or logical network engineering, including the installation and activation of ports, configuration of switches, LANS, VLANS, and network FW or appliances or network administration services, such as Active Directory, Guests LANS, and domain management
  • BA or BS degree in IT Security or Engineering and 5+ years of experience with IT in a professional work environment or 8 years of experience in IT work in lieu of a Bachelor’s degree
  • 3+ years of experience in Linux administration, including Debian and Red Hat distribution variants or derivatives
  • Experience with integrating Cyber security data using enterprise or custom tools data aggregation and analysis tools, including Splunk
  • Ability to provide support in an IT operations and maintenance Tier II role, including ticket work information updates, issue response, and remediation
16

ACP Cyber Technical Specialist Resume Examples & Samples

  • The role holder meets business objectives, solves business problems and furthers business success by applying industry, applications and technical knowledge through the definition of high level solutions. In addition he/she may work proactively with the business to define new product developments
  • May lead teams of professionals and support teams and/or leadership of cross divisional, matrix and virtual teams
  • To be accountable for definition and delivery of specific solutions to achieve business objectives and benefits realisation
  • To perform analysis, feasibility and strategic fit of high level projects e.g. evolution plans, new network & technology propositions and complex distributed systems, for specific networks/technologies/systems, to deliver revenue or cost reduction targets
  • Maintains an oversight of key technology transformation programmes in specific area of expertise, monitoring performance against business objectives, scorecard and responding and recommending actions to trends and taking executive action
  • To be a leading contributor individually and/or provide direction for others
  • To personally participate in and contribute to BT wide professional community activities where applicable e.g. knowledge sharing, best practice within BT and external industry
  • Relevant, contemporary and industry recognised qualifications where appropriate
  • Shares expertise with colleagues and others
  • Is a lead contributor individually and as a team member
  • Applies knowledge/skills through handling complex problems and/or co-ordinating work which may extend beyond own area of expertise
  • Anticipates client needs, investigates the underlying causes and identifies short and long term solutions
  • Anticipates internal/external business issues and developments in own discipline
  • Manages costs and profitability for a work area and/or large projects
  • Generates new and innovative solutions to complex problems
  • Manages own time and that of others
  • Develops plans for work activities in own area over the medium/long term
  • Supports strategic planning activities
  • Has a comprehensive understanding of professional communities relevant to the LOB and uses the PC development framework to maximise the potential of themselves, their team and the wider BT team
17

Cyber Tools Specialist Resume Examples & Samples

  • 2+ years of experience with performing systems administration in Windows, Linux, or VMware environments, including basic troubleshooting, installation, or configuration, monitoring system performance or availability, and performing security upgrades
  • 2+ years of experience with performing application whitelisting or blacklisting using security tools, including Bit9 Parity, RES One, or customized capabilities or enterprise or domain configuration or administration, including Group Policy editing and enforcement or security tool administration or network or domain administration, including Active Directory in lieu of application whitelisting or blacklisting
  • 1+ years of experience with designing, implementing, configuring, and operating CDM tools, including vulnerability scanners, host–based intrusion detection or prevention (HID/HIP), and anti–virus, hardware or software asset management, or software configuration management
  • 3+ years of experience with Linux administration, including Debian and RedHat distribution variants or derivatives
  • Ability to comprehend and provide support in an IT operations and maintenance Tier II role, including ticket work information updates and issue response and remediation
18

Cyber Sec Technical Specialist Resume Examples & Samples

  • 8 to 12 years of experience in network / web penetration testing
  • Having Bachelors or Masters degree in any discipline
  • CEH Certification is Mandatory. Additional certifications such as OSCP, CCSP, CCSK will be highly desirable
  • Ability to work on advanced exploitation techniques independently
  • Experience in Virtualization Security Architecture and Design (VMware, Microsoft Hyper-V, and Citrix Xen)
  • Knowledge of Attack models that pertain to virtualization and cloud environments
  • Knowledge of attack frameworks like VASTO, Virtualization Assessment Toolkit to exploit virtualization systems
  • Encryption tools and techniques for securing mobile virtual machines
  • Mentoring / training skills will be desirable
  • Hands on Experience in Performing Large Systems Threat Modeling/STRIDE/DREAD Approaches
  • Knowledge of OWASP Top 10 and SANS Top 25 and how to effectively remediate vulnerabilities associated with each
  • Knowledge of Specific virtualization platform attacks and exploits
  • Run & Analyze the penetration test (Manual & Automated) and pinpoint the security issues and suggest countermeasures for security improvements
  • Demonstrated manual product penetration testing experience; for example, you must be able to simulate a SQL injection without tools, simulate XSS attack, X-Path Injection, etc
  • Intimate knowledge and hands-on experience using various penetration testing tools like Nessus, Web Inspect, Nmap (Slow Scans, Service detection, OS detection, namp Scripts), BurpSuite, Nikto, ZAP
  • Communicate results and security risk Product owners
  • Good communication & Negotiation skills
  • Highly motivated with willingness to take ownership/responsibility for their work and ability to work both independently and in a team oriented environment
  • Highly customer focused
  • Adept at selecting and utilizing appropriate technologies to solve complex problems effectively
  • Ability to learn new upcoming security attacks & tools
  • Knowledge on domain understanding about the HVAC control systems, controllers, sensors etc
  • Bachelor’s degree in computer science or software engineering, electrical engineering or equivalent
  • Strong software engineering skills
  • Ability to travel worldwide ca. 10%
19

IIT / Cyber Sales Specialist Resume Examples & Samples

  • Drive demand creation for assigned product sets at Named Accounts
  • Call on end users, contractors, consultants, systems integrators, A&E/EPC firms and OEMs
  • Generate year over year territory growth
  • Maintenance of activity within CRM (Salesforce)
20

Cyber Tools Specialist Resume Examples & Samples

  • 4+ years of experience with performing systems administration in Windows, Linux, or VMware environments, including performing basic troubleshooting, installation and configuration, monitoring system performance and availability, and performing security upgrades
  • 1+ years of experience with designing, implementing, configuring, and operating CDM tools, including vulnerability scanners, host-based intrusion detection and preventions (HID/HIP), and anti-virus, hardware and software asset management, or software configuration management
  • 2+ years of experience with performing application whitelisting and blacklisting using security tools, including Bit9 Parity, RES One, or customized capabilities, or enterprise and domain configuration and administration, including Group Policy editing and enforcement, or 3+ years of experience with security tool administration or network/domain administration, including Active Directory, in lieu of a background in application whitelisting and blacklisting
  • BA or BS degree and 6+ years of experience with IT in a professional work environment or 8 years of total experience with IT in a professional work environment
  • 3+ years of experience with Linux Administration, including Debian and Red Hat distribution variants and derivatives
  • Experience with integrating Cybersecurity data using enterprise or custom tools data aggregation and analysis tools, including Splunk
  • Active security clearance
  • BA or BS degree in IT Security, Engineering, or a related field
21

Cyber Ark Specialist Resume Examples & Samples

  • Windows scripting e.g. PowerShell
  • Experience in the use of Cyber-Ark PACLI to automate tasks related to user and safe management
  • Experience using LDAP, Active Directory
  • Knowledge of Single Sign On Systems
  • SIEM systems, ticketing systems such as Remedy, enterprise monitoring and alerting using SNMP
  • Knowledge of regulatory issues facing large financial organisations
22

Solution Specialist Cyber Resume Examples & Samples

  • Broad industry knowledge is required along with a deep understanding of the technology platform and how to design solutions based on the Microsoft Cloud and platforms
  • This role requires an individual who is results-oriented, proactive, confident under pressure, and has demonstrated skills in solution sales. Strong leadership skills, strategic planning, excellent communication, virtual-team engagement, time management, pursuit planning, negotiation skills and presentation skills are essential
  • This role requires strong virtual team influence and integration skills, working with the Account Teams (EPG ATU and STU Teams) as well as Marketing teams to drive demand generation
  • The candidate must be confident and capable of delivering readiness to sales audiences and be able to represent the Cybersecurity solution sales business locally inside and outside of Microsoft, as well as be able to speak as a subject matter expert (SME) at industry or customer events
  • Drive pursuit strategies including precise opportunity close plans with the local Services Executive and Account Teams
  • Map customer business needs to Microsoft solutions providing a differentiating value proposition
  • Ensure opportunities are accurately qualified and mapped to customer budget cycle, aligned with Account Teams and aligned to account plan strategy
23

Cyber Specialist Resume Examples & Samples

  • Perform A&A activities and monitor status, within eMASS and XACTA for all INSCOM G7/Modernization program office systems and sites
  • Work with program personnel, site ISSOs and IAMs to facilitate the collection of data required for accreditation projects
  • Provide Confidentiality, Integrity and Availability by identifying appropriate IA controls within accreditation packages and verify implementation is in accordance with DoD and Army IA standards
  • Analyzes and resolves INFOSEC technical problems
  • Conducts testing, records and analyzes results, and provides recommendations for improvements for the products/systems under test
  • 9 years of general IA experience, with a minimum of 5 years of demonstrated experience with program support based on NIST Special Publication 800-37 (Guide for Applying the Risk Management Framework to Federal Information Systems)
  • 5 years of demonstrated experience conducting system accreditation of classified DoD systems
  • Demonstrated experience with software tools eMASS, XACTA IA Manager, Assured Compliance Assessment Solutions (ACAS) Security Center, Security Content Automation Protocol (SCAP) Compliance Checker (SCC), DISA Security Technical Implementation Guides (STIGs)
  • Demonstrated strong organizational and creative problem solving skills
  • Ability to proactively manage multiple, concurrent tasks
  • Bachelor's Degree in Computer Science, Information Systems, Engineering, Business, or related scientific or technical discipline
  • 10 years of direct relevant technical experience may be substituted for education
  • Information Assurance Technician Level II or Information Assurance Management Level II Certification
  • ICD 503 Training
  • Risk Management Framework Training
  • EMASS Training
  • HBSS Training
  • Experience with US Army ISR programs and systems
  • Active TS/SCI based upon an SSBI required
24

Cyber Engineering Specialist Resume Examples & Samples

  • Designing, installing and maintaining physical and virtual servers
  • Assisting in the investigation and remediation of cybersecurity related incidents
  • Designing, implementing and maintaining secure remote access for both computing and mobile devices
  • Implementing and maintaining encrypted Windows and Linux environments
  • Configuring and hardening IT systems per DISA Security Technical Implementation Guides (STIGs)
  • Enabling and maintaining authorized user access, re-authorizations and security configurations audits in Active Directory and/or other core systems
  • Implementing and maintaining cybersecurity patch management and software updates for Information Systems for workstation and server operating systems and applications
  • Making recommendations and implementing solutions to a variety of conventional problems and situations related to the administration, coordination, and reporting requirements of the overall Cybersecurity Program
  • Implementing and maintaining Contingency Planning, Annual Security Control Testing, Cybersecurity reviews
  • Bachelors or Master’s Degree in computer science or related technical field
  • Experience in network, host, data and/or application security in multiple operating system environments
  • Knowledge of and experience with government and industry cybersecurity policies and procedures
  • Experience working with IP networking, networking protocols and understanding of security related technologies including encryption, IPsec, PKI, VPNs, firewalls, proxy services, DNS, electronic mail and access- lists
  • Experience working with internet, web, application and network cybersecurity techniques
  • Experience working with relevant operating system cybersecurity (Windows, Solaris, Linux, etc.)
  • Experience working with leading firewall, network scanning and intrusion detection products and authentication technologies
  • Possess or be able to attain in a reasonable time security certifications (CISSP, Security+, MCITP, Linux+, CCNA, etc.)
  • Maintaining current knowledge of, and implementing, DOD/DON/NAVSEA security regulations and augmentation directives
  • Must be able to obtain and maintain a SECRET clearance
25

Cyber Protection Team-unix Forensics Specialist Resume Examples & Samples

  • Demonstrate an ability to methodically and proactively analyze problems and offer solutions
  • Willing to travel 25% of the time with trips varying in length, as dictated by the customer
  • Must possess an Information Assurance Technical (IAT) Level II or higher certification
  • Must possess or be willing to obtain a GFCA (or similar) certification within 6 months of hire
  • Must possess or be willing to obtain a UNIX/Linux System Administrator (i.e., RHCSA) certification within an agreed upon timeframe
  • Intermediate “hands-on” experience with Linux, SED, AWK, Perl, Python, Batch, or similar
  • Ability to operate and navigate UNIX/Linux operating systems from the command prompt/line with ease
  • Familiarity with common forensics tools and capabilities (i.e., EnCase, Forensic Toolkit (FTK))
  • Cisco knowledge preferred
26

Specialist Cyber Forensics & Investigation Resume Examples & Samples

  • Conducting forensics investigation, including collecting and analyzing data from electronic sources such as infrastructure logs, hosting application logs, end-points and network file servers to support security incident response activities
  • To investigate suspected violations of BHP Billiton's Code of Conduct and to carry out computer forensic analysis, data recovery, e-Discovery as well as other IT investigative work
  • Collaboration with fraud examiners, other IT Investigative experts, counsel, human resources and other IT technical personnel with investigations is required
  • Accountability to examine computers and media generated by computers to develop evidence as an expert in the specialty area of forensic computer science
  • It will be critical to determine the most appropriate method of protecting original evidence and recovering deleted, erased, hidden and encrypted data through the design, development, de-bugging, testing, reverse engineering, documentation and maintenance of computer programs for security applications
  • Communication skills are necessary in order to explain complex technical matters with external and internal IT stakeholders including Legal, Corporate Security, Human Resources, IT Security, Engineering and other business groups
  • Investigating suspected fraud and/or other illegal acts involving technology services and processes is imperative
  • Establishing and maintaining controls for genuine retrieval and handling of evidence is needed
  • Assisting other cyber security teams in carrying out in-depth investigations into security breaches using all available tools within BHP Billiton. Process and deliver evidence for e-Discovery
  • Interview personnel to obtain information that relates to investigations, where relevant, the support of HR and Legal. Vigilantly protect User data, ensuring proper handling and protection electronically
  • Parents room
27

Cyber Watch Specialist / Systems Admin Resume Examples & Samples

  • BS degree (4 years’ experience may be substituted for degree requirement)
  • Current Top Secret / SCI security clearance
  • Must have at least one of the following certifications: Network+, Security+, GIAC Security Essentials, GIAC Information Security Fundamentals, or an approved equivalent
  • Must have at least one of the following certifications: GIAC Incident Handler, CISSP, or an approved equivalent
  • 1-3 years’ experience with cyber watch operations
  • U.S. citizenship and ability to obtain and maintain Invited Contractor status under the ROK/US Status of Forces Agreement (SOFA)
  • Prior cyber experience specific to the KTO
  • Korean Defense Language Institute Qualification levels of 1/1/1, Test of Proficiency in Korean (TOPIK) level 2, or proof of basic native fluency is desirable but not mandatory
28

Operations & Maintenance Cyber Specialist Resume Examples & Samples

  • Support for systems and applications that are inherited from engineering after a system is put into production or operation
  • Deployment/installation of sensors and agents on new interfaces/segments
  • Tier 1& 2 problem resolution of IDS/IPS/CSOC systems
  • Perform and validate system backups of IDS/IPS/CSOC systems
  • Maintain sensor performance levels
  • Maintain analyst console availability and support for all baselined applications and configurations
  • Ensure integrity of data held in IDS/IPS/CSOC back-end systems
  • Manage accesses to IDS/IPS/CSOC back-end systems
  • Provide on call support after business hours and on weekends. Typical volume of support is 2-3 calls per week with the majority of calls not requiring a site visit
  • Ensure all IDS/IPS/CSOC capabilities are kept current, patched, and securely configured and management informed of status on a daily basis
  • Perform O&M on IDS/IPS/CSOC projects and/or systems as needed
  • Maintain system baselines and configuration management items, including security event monitoring "policies" in a manner determined and agreed to by the COTR and customer management. Ensure changes are made using an approval process agreed to in advance
  • Prepare briefing status reports and attend Review Boards as required
  • A bachelor's degree in computer engineering, computer science, or other closely related IT discipline
  • Minimum of two years of experience in network engineering, system administration with emphasis in implementation, operations and maintenance of Windows Server, Applications
  • Familiarity with network security applications, protocols and associated hardware
  • Good interpersonal, organizational, writing, communications, and briefing skills
29

Cyber Policy Wording Specialist Resume Examples & Samples

  • Fully understand the current wordings for all existing cyber products
  • Work with the cyber specialists to understand the coverage required and work to develop wordings which reflect that cover
  • Undertake wording comparisons to look at the differences in cover provided
  • Complete stress testing and gap analysis on the policy wordings to make sure they cover all scenarios
  • Ensure that wording comparisons are kept up-to-date, including reviews of Insurer’s new wordings
  • Ensure that key benefits documents and high level comparison documents are kept up to date in line with the wording comparison
  • Research, clarify and communicate on technical issues and developments affecting the cyber market
  • Ideally you will have proven experience of working with cyber policy wordings
  • Proven experience of writing and reviewing insurance policy wordings is essential
  • Previous experience of working with cyber insurance products from an underwriting, broking, claims, wordings or legal perspective is highly beneficial
30

Cyber Forensic Specialist Team Lead Resume Examples & Samples

  • Ability to work independently, while possessing the necessary technical leadership qualities to communicate complex technical concepts effectively to technical and non-technical customers, senior management, and teammates to ensure the mission of cyber security professionals
  • Leads a team performing a variety of highly technical analyses and procedures dealing with the collection, processing, preservation, analysis, and presentation of computer-related evidence, and is responsible for disseminating and reporting cyber-related activities, conducing vulnerability analyses and risk management of computer systems
  • Recovers information and electronic data from computer hard drives and other data storage devices, such as zip and flash drives that have been deleted, damaged or otherwise manipulated
  • Utilizes cyber forensic tools (e.g., EnCase, Forensic Toolkit, Autopsy/Sleuthkit) and investigative methods to find electronic data, including Internet use history, word processing documents, images and other files
  • As necessary, assists law enforcement officers in helping to solve cybercrimes or find electronic evidence of other kinds of crime
31

Cyber Forensic Specialist Resume Examples & Samples

  • Ability to work independently while possessing the necessary technical qualities to communicate technical concepts effectively to technical and non-technical customers and teammates
  • Performs a variety of highly technical analyses and procedures dealing with the collection, processing, preservation, analysis, and presentation of computer-related evidence
  • May also be responsible for reporting cyber-related activities, conducing vulnerability analyses and risk management of computer systems
  • Active Top Secret Security Clearance with the ability to obtain a TS/SCI is required. In addition, selected candidate must be able to obtain and maintain a favorably adjudicated DHS background investigation (EOD) for continued employment
  • Familiarity with at least one of the following tools: EnCase, Forensic Toolkit, Autopsy/Sleuthkit
  • Knowledge of investigative methods to locate specific electronic data
  • Proficiency in the latest cyber forensics, response, and reverse engineering skills and understanding of the latest exploit methodologies
  • DHS SCI and level 3 EOD suitability
  • Forensics certification(s) in EnCE, CCE, CFCE, and/or GCFA
32

Cyber Ops Specialist, Principal Resume Examples & Samples

  • Bachelors and nine (9) years or more relevant experience
  • Masters and seven (7) years or more relevant experience
  • PhD or JD and four (4) years or more relevant experience
  • Experience in exploiting vulnerabilities Ability to read, write and modify scripts
  • Experience with OWASP Experience with wireless penetration testing
  • Experience with password cracking Ability to read and analyze network packet captures
  • Experience with security forensic analysis Experience with firewall, router, and switch security Knowledge of security best practices: NIST, CIS, Cisco, Juniper, Checkpoint, Microsoft, Unix/Linux, etc. Experience with incident response
  • Knowledge of security auditing techniques Knowledge of computer control environments
33

Cyber Placement Specialist Resume Examples & Samples

  • Independently handles their own client assignments and assists more senior level Placement Specialists on more complex client assignments
  • Has superior technical, financial, written and verbal skills required to be an acknowledged expert sought out by clients and other Marsh colleagues
  • Minimum of 5 years of broking or with an insurance carrier related to cyber and/or sales experience
  • Is expected to demonstrate proficiency in knowledge and execution of responsibilities for their assigned clients