Data Security Analyst Resume Samples

4.5 (115 votes) for Data Security Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the data security analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
GM
G Monahan
Garry
Monahan
363 Kuhlman Port
Phoenix
AZ
+1 (555) 867 0892
363 Kuhlman Port
Phoenix
AZ
Phone
p +1 (555) 867 0892
Experience Experience
Dallas, TX
Data Security Analyst
Dallas, TX
Glover Group
Dallas, TX
Data Security Analyst
  • Leidos is a global leader in the integration and application of information, technology and systems working to solve the world’s toughest challenges in the civil, health, defense, intelligence and homeland security markets. The company’s 33,000 diverse employees support vital missions for government and commercial customers in 30 countries. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $10 billion for the fiscal year ended January 1, 2016 after giving effect to the recently completed combination of Leidos with Lockheed Martin's Information Systems & Global Solutions business (IS&GS). For more information, visit www.Leidos.com. The company’s diverse employees support vital missions for government and commercial customers. Qualified women, minorities, individuals with disabilities and protected veterans are encouraged to apply. Leidos is an Equal Opportunity Employer
  • Performs all procedures asked to ensure the safety of Information Security Assets and to protect systems from intentional or inadvertent access or destruction
  • Performs problem determination and resolution
  • Assists with incident management in the event of a breach of secured data
  • Supports areas to define models and connect identity management system with other systems
  • Assist with ongoing tuning of the SIEM, case management tool and reports, and the creation and maintenance of event response runbooks/documentation
  • Assists with the ongoing training of University staff
Phoenix, AZ
IS Data Security Analyst
Phoenix, AZ
Schimmel Group
Phoenix, AZ
IS Data Security Analyst
  • Under specific direction and guidance may perform basic unit testing of system or process enhancements/workflows
  • Assist in carrying out security awareness duties
  • Assist in enforcing policies to ensure safety of system assets and protect access or destruction
  • Follows Incident Management procedures and recommends changes
  • Familiar with concepts of project management
  • Assists with code changes as directed
  • Completes testing documentation
present
New York, NY
Senior Data Security Analyst
New York, NY
Koepp-Ziemann
present
New York, NY
Senior Data Security Analyst
present
  • Analyzes, recommends and implements changes to procedures and systems to enhance data systems security. Provides management with status reports on activities
  • Checks work of other team members for Quality Assurance and maintains an error log for management
  • Provide technical support for applications as they relate to security functions and access
  • Serve as Level 2 support for CSC analysts regarding security access issues and provides 24x7 on-call support
  • Conforms with and abides by all regulations, policies, work procedures, instruction, and all safety rules
  • Interact and maintain effective relationships with other AGT teams and locations and helps develop documentation as new processes and procedures evolve
  • Mentors, trains and provides guidance to other analysts on technical and administrative disciplines
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Duke University
Bachelor’s Degree in Computer Science
Skills Skills
  • Good working knowledge of Project Management, e.g. PMI, Prince2, and agile project management tools and methodologies
  • Maintain a basic knowledge of working with Hadoop
  • You'll own and curate a portfolio of high-quality analytical research reports ensuring quality, completeness and timeliness
  • Able to produce analytical report that can reach a highly technical as well as an executive level audience
  • Strong organizational skills; attention to detail
  • Strong consultative skills; ability to interface effectively with technical and non-technical leaders
  • Candidate should have excellent written and oral communication skills with ability deliver and drive to closure
  • Strong relationship building skills and ability to work with multiple stakeholders at different levels across the organization
  • Strong analytical skills with ability to manage complex categories with minimal supervision and developing collaborative partnerships
  • Strong analytical skills that show the ability to define, collect, analyses data, establish facts, draw valid conclusions, and make fact based decisions
Create a Resume in Minutes

15 Data Security Analyst resume templates

1

Data Security Analyst, Global Technology Resume Examples & Samples

  • Conducts various assessments in support of business requirements for security, privacy or compliance, leading assessments where appropriate
  • Builds procedural documentation (e.g. process flows, data flow maps, SOP's) or other work instructions to support the security, compliance and privacy programs
  • Assist in efforts to track and remediate events and alerts in their specialty area, respond to related incidents, internal or external audits, and / or control assessments
  • Maintains and reviews monitoring systems to protect data, tracking and reacting to variances to established baselines; recommends opportunities for improvement
  • Identifies, reports, and assists in resolving compliance, privacy or security violations and control gaps
  • Consults on and advises on control design and effectiveness testing to protect data from security or privacy compromise
  • Assists with development and administration of policies, procedures and standards for identifying, reporting, and resolving compliance, privacy or security violations
  • Supports senior and lead analysts, executes on defined work instructions
  • 1-2 years of practical experience leading SOX or PCI or other regulatory audits or readiness assessments is required
  • 1-2 years of practical experience developing or enhancing existing Security, Compliance or Privacy program processes, or developing continuous controls monitoring processes
  • 1-2 years of practical experience in assessing, developing or executing to a management framework such as ISO 27001 or a control framework such as COBIT is preferred
  • Experience with Microsoft Sharepoint and InfoPath is preferred
  • 1-2 years of practical experience building functional, operational or technical requirements is preferred
  • 1-2 years of practical experience utilizing data analysis and visualization tools such as PowerPivot, R, or Tableau is desired
  • Experience auditing or assessing Oracle or SAP is desired
  • Certifications such as CISSP, CISA and other technical certifications are desired
  • Ability to collaborate with counterpart teams both internal and external to Information Protection Services
  • Applies consultative approach to develop solutions for addressing root cause and related issues
  • Experience in goal and metrics development for their respective team
  • Self-motivated and proven ability to learn new technologies and develop associated processes
  • Strong communication skills (i.e. written, verbal, listening) with the ability to work with and advise cross functional groups to understand requirements
  • Ability to plan, organize and prioritize tasks both for themselves and team members, providing guidance to data security analysts when needed
  • Knowledge and experience to develop process improvement principles
  • Has extensive knowledge of commonly-used concepts, practices, and procedures within their area of specialty
2

Senior Data Security Analyst Resume Examples & Samples

  • Complies and enforces Sarbanes Oxley regulations to ensure that auditing meets compliance requirements
  • Monitors and ensures that user community understands and adheres to necessary procedures to maintain security. Determines appropriate action for remediation and implementation when noncompliant situations are discovered
  • Conducts accurate evaluation of level of security required and enforces adherence to security policies in provisioning access
  • Provide technical support for applications as they relate to security functions and access
  • Serve as Level 2 support for CSC analysts regarding security access issues and provides 24x7 on-call support
  • Possess and applies broad knowledge of concepts and principles or exhibits technical expertise in specific area; works with minimal instruction or guidance with appreciable latitude for reviewed action or decisions; performs moderately difficult assignments with diverse scope and complexity, requiring a great deal of originality, creativity and problem solving with initiative and independent judgment required
  • Mentors, trains and provides guidance to other analysts on technical and administrative disciplines
  • Capable of leading small projects within the team
  • Checks work of other team members for Quality Assurance and maintains an error log for management
  • This position is also eligible for an incentive bonus
3

Data Security Analyst Resume Examples & Samples

  • Bachelor’s degree in Computer Science, MIS, Engineering, or a related field
  • CISSP certification preferred
  • 3+ years of security related experience
  • Familiarity with commercial SIEM and FIM applications
  • Familiarity with VPN, IPS/IDS and network devices like Cisco ASA
  • Knowledge & proficiency in the application of security principles and practices
  • Knowledge of TCP/IP networking
  • Experience in Windows Operating system, Active Directory, and Group Policies
4

Data Security Analyst Resume Examples & Samples

  • Minimum of 5 years experince in an informatin securtiy or related position
  • Knowledge of information security and related banking regulations
  • Technical proficiency in Windows, SQL Server, Juniper, BlueCoat proxy, McAfee products, malware detection
  • Experience with SIEM and other security monitoring such as Dell Secure Works
  • Experience liaising with regulators and auditors
  • Proficient PC and software application skills
  • Good organizational, writing documentation, reporting and communication skills
  • Excellent interpersonal skills – ability to interact with all levels of staff
  • Understanding of corporate security policies, procedures, and standards
  • Ability to audit, analyze, and assess procedures
  • Knowledge of assorted security tools
  • Spanish proficiency a plus
  • One or more of the following certifications: CISSP, CISM, CRIS, CISA
5

Data Security Analyst Resume Examples & Samples

  • 2+ years in technical hands-on on at least one of the following topics: Databases, Storage systems, Cloud computing, Watermarking, Data lost prevention
  • Security frameworks/standards (ISO 27002, PCI compliance, NIST/DISA guides, etc.)
  • Hands-on experience in implementation or operation of identity & access management processes and controls
  • Proactive
  • Adapt quickly to change
  • English language is required (oral/written)
  • French language is an asset
  • Technical IT security expertise
6

Data Security Analyst Resume Examples & Samples

  • Provides coverage for requests related to identity and access management services
  • Sets security access in compliance with approved access governance best practices, policies and standards and makes recommendation to improve these
  • Supports areas to define models and connect identity management system with other systems
  • Executes security processes and strategy as developed in projects or by senior security analysts
  • Supports the access review, attestation and compliance testing processes
  • Provide support to achieve monthly Service Level Agreements
  • Provides on-call support for after-hours support
  • 1-2 years hands-on experience
  • Proficient working in a Windows Operating System environment
  • Proficient with office software suites and collaboration tools
  • Basic understanding of Microsoft and IBM-mainframe platforms security architecture and access management frameworks
  • Basic experience with administering identity access management solutions
  • Basic understanding of IBM’s RACF or other mainframe security product
  • Basic hands on experience with directory services
  • Basic understanding of access administration in Google and Microsoft email platforms
  • Basic understanding of identity and access management concepts relative to third party applications, databases, remote access, operating systems and cloud environments
  • Basic understanding of project management methodologies
  • Strong analytical thinking skills
  • Strong organization skills along with attention to detail
  • Quick Learner
  • Ability to multitask and adapt in a fast paced organization
7

Data Security Analyst Resume Examples & Samples

  • Responsible for identity and access management system functions including software installation, upgrades, and on-going maintenance
  • Performs lead role in developing new models and connectors to other systems in BBVA Compass
  • Manages relationship with identity and access management solution providers
  • Functions as the technical data security expert for the identity and access management systems
  • Participates in projects and supports business areas to analyze security access requirements, set strategy and security access in compliance with approved access governance best practices, policies and standards and makes recommendation to improve these
  • Researches and evaluates identity management products, tools and methods for use within organization
  • Strong understanding of Microsoft and IBM-mainframe platforms security architecture and access management frameworks
  • Must possess a minimum of 3-5 years hands-on experience in designing and/or administering user security solutions
  • Advanced experience with administering identity access management solutions
  • Strong understanding of IBM’s RACF or other mainframe security product
  • Advanced hands on experience with directory services
  • Strong understanding of access administration in Google and Microsoft email platforms
  • Strong understanding of identity and access management concepts relative to third party applications, databases, remote access, operating systems and cloud environments
  • Strong leadership capabilities for directing and training of other data security analysts
  • Positive attitude and Quick Learner
8

Senior Data Security Analyst Resume Examples & Samples

  • Conducts and coordiantes compliance and/or privacy assessments in support of requests
  • Monitor and evaluate related events and equipment, create reports on their findings, and present their
  • A certain degree of creativity and latitude is required
  • Typically reports to a supervisor or manager
  • Basic skills in MicrosoftWord, Excel and PowerPoint
  • Ability to work within large collaborative organizations
  • Ability to delegate
  • Foster effectiveness during changes in tasks, work environment, or condition affecting the organization
  • Strong analytical and problem-solving skills
  • Has knowledge of commonly-used concepts, practices, and procedures within their area of specialty
9

Data Security Analyst Lead-information Technology Resume Examples & Samples

  • Experience leading SOX or PCI or other regulatory audits or readiness assessments is required
  • Experience developing or enhancing existing Data Security, Compliance or Privacy program processes, or developing continuous controls monitoring processes
  • Ability to assess, develop or execute to a management framework such as ISO 27001, a control framework such as COBIT, or principle framework such as GAPP is preferred
  • Practical experience developing unified control frameworks or conducting cross-controls mapping is preferred
  • Experience in goal-based metrics development or reporting utilizing a framework such as Goal-Question-Metric (GQM) or equivalent is preferred
  • Experience with Microsoft Sharepoint or other team collaboration platforms is preferred
  • Experience with Archer or similar GRC workflow platform is preferred
  • Practical experience building functional, operational or technical requirements is preferred
  • Practical experience utilizing data analysis and visualization tools such as PowerPivot, R, or Tableau is desired
  • Experience auditing or assessing against data security requirements in Oracle or SAP is desired
  • Certifications such as CISSP, CISA, CIPP and other technical certifications are desired
  • Ability to use Kanban, Agile or other Kaizen management model for work prioritization and continuous improvement
  • Ability to collaborate across teams, both internal and external to Information Protection Services, fostering engagement and building relationships
  • Consultative approach to developing and presenting solutions, prioritization of workload to strategic and tactical goals for themselves and other data security analysts
  • Exceptional oral and written communication skills with the ability to communicate clearly and concisely
  • Ability to explain complex issues in common and easily understood terms
  • Demonstrated ability to improve individual job skills through training, self-research and self-study
  • Ability to communicate clearly and concisely, both verbally and in writing; active listening skills
  • Strong skills in Microsoft Word, Excel and PowerPoint
  • Ability to work within large collaborative organizations, building consensus and fostering ongoing relationships
  • Ability to work in a dynamic work environment, handle ambiguity and maintain productivity
  • Extensive knowledge of commonly-used concepts, practices, and procedures within their area of specialty. (e.g. SOX, COSO, PCI, data privacy)
10

Data Security Analyst Resume Examples & Samples

  • Oversees implementation of policies to ensure resources are adequately protected with proper security measures
  • Ensures vulnerability assessments and penetration tests of the network and system environment are complete and accurate
  • Provides technical expertise to the resolution of information security issues
  • Assists the Security team in the development and maintenance of a security awareness program
  • Keep current on industry-related security compliance programs, such SOX and PCI
  • Specify and coordinate the implementation of recommended solutions for known vulnerabilities
  • Coordinate the implementation of security related policies, procedures and tools with IT teams
  • Participates in business continuity and disaster recovery for information systems impacted by security events
11

Data Security Analyst Resume Examples & Samples

  • Ability to facilitate DLP technology towards identification of PII data and protection of same in accordance with corporate policies and standards
  • Ability to manage and support Database monitoring application on production systems
  • Ability to document data structures, data elements, and data flows
  • Effective planning and communication with the ability to execute on defined milestones
12

Data Security Analyst, Lead Resume Examples & Samples

  • 7 years of experience with IA or Cyber security with 4+ years of experience with the application of DoD policy, direction, and guidance
  • Experience with Cyber security defense, intrusion detection monitoring and incident management, Cyber threat analysis, Communications Security (COMSEC) management, and Emissions Security (EMSEC) management
  • Experience with Host Based Security Systems (HBSS) operations and monitoring
  • Experience with network and system architecture design and implementation
  • Experience with auditing and security metrics documentation
  • Knowledge of information security technologies, including cryptography, biometrics, forensic analysis, vulnerability assessment, and Security Information and Event Management (SIEM)
  • Knowledge of network and host-based security devices, including Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), firewall, proxy servers, sensors, switches, routers, hubs, and their role in moving packets securely from source to destination
  • Knowledge of security requirements and best practices applicable to physical, virtual, and Cloud, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) based environments
  • DoD 8570 IAT Level III Certification or a Certified Ethical Hacker (CEH) Certification
  • Experience with Microsoft server and workstation operating systems, Red Hat Linux Enterprise, UNIX, VMware, or operating systems security configurations
  • Experience with border device security and encryption standards
  • Knowledge of applicable DoD, USCYBERCOM, and USTRANSCOM security guidelines and best practices
  • MA or MS degree in CS or related field
  • DoD 8570 Computer Network Defense (CND) Analyst, CND Incident Responder, or CND Infrastructure Support Certification
13

Data Security Analyst, Mid Resume Examples & Samples

  • 1+ years of experience with Cybersecurity best practices, including CISCO, Juniper, Checkpoint, Microsoft, UNIX, or Linux
  • Experience with working in a client service environment
  • Experience with malware analysis and forensic collection
  • Knowledge of the Risk Management Framework (RMF)
  • Ability to work outside one’s comfort zone and display a willingness to learn
  • Ability to be an excellent team player and take charge of the area of expertise
  • Experience with incident response and network reconnaissance
  • Experience with managing and prioritizing multi-dimensional technical requirements
  • Experience with penetration testing or intrusion detection using various tool suites
  • Experience with industries within the DoD preferred
  • Knowledge of organizational risk as it applies to Cybersecurity
14

Data Security Analyst Resume Examples & Samples

  • Assist U.S. government customer in performing Designated Approving Authority (DAA) and Authorizing Official (AO) duties, to include coordinating meetings, compiling reporting and managing deliverables
  • Review and support of authorization/accreditation documentation, participation in technical meetings, on-site observations, and efficient use of automated authorization/accreditation tools and preparation of technical papers
  • Fulfilling ISSO (Information System Security Officer) duties, to include providing security solutions and interpretations of security policies as they relate to specific security infrastructure, architectures and information systems
  • Track authorization/accreditation expirations, Plans of Action and Milestones (POA&Ms) and Privacy Impact Assessment (PIA) filings
  • Evaluate, document and coordinate technical cyber security capabilities of various groups supporting the client
  • Perform cyber security incident response on an as-needed basis
  • Communicate with Business/System Owners and Certification Agents (CA) as required
15

Data Security Analyst Resume Examples & Samples

  • Analyzes and implements all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction
  • Interfaces with, consults and advises user community to facilitate their security needs and implements procedures to accommodate. Identify potential threats and responds appropriately
  • Analyzes, recommends and implements changes to procedures and systems to enhance data systems security. Provides management with status reports on activities
  • Process and respond to requests submitted through the SRC system, and abiding by security guidelines and procedures
  • Interact and maintain effective relationships with other AGT teams and locations and helps develop documentation as new processes and procedures evolve
  • Possesses and applies broad knowledge of concepts and principles or exhibits technical expertise in a specific area; works with minimal instruction or guidance with appreciable latitude for un-reviewed action or decisions; performs moderately difficult assignments with diverse scope and complexity, requiring a great deal of originality, creativity and problem solving with initiative and independent judgment required
  • Solves complex security issues with no assistance
  • Bachelor’s degree in computer science or information systems or equivalent education/experience
  • Minimum of 5 years previous related work experience
  • Requires proficient knowledge of data management and security processes as they relate to Windows security with a strong knowledge of Exchange administration, Active Directory, Mainframe RACF and UNIX, JCL, IBM utilities, TSO/ISPF, and CLISTs
  • The ability to maintain regulatory compliance is required
  • Ability to work in a team environment, adapt quickly to change and learn new applications or environments
  • Must be highly organized and maintain quality work while meeting deadlines
  • Extreme attention to detail is necessary due to audit and regulatory requirements
  • Experience with programming languages and Powershell or VB scripting
  • Experience with Oracle Identity Manager, Hyena, and Security Explorer
  • Excellent verbal communication, decision making and customer service skills
16

Business & Data Security Analyst Resume Examples & Samples

  • Bachelor’s degree or equivalent experience is required. Master’s degree is preferred
  • Experience in Healthcare Systems or HIPAA Privacy and Security is preferred
  • Minimum 6 years of business process analysis and business analysis experience is required
  • Proven experience and background with Electronic Medical Records (EMR) systems, Health Benefit/Claims experience and governance best practices as it relates to the handling and management of personal health information (PHI)
  • Experience with athenahealth systems is preferred
  • Experience and knowledge working with HIPPA compliant organizations, systems and business processes
  • Experience working independently and as part of a collaborative team
  • Experience in self-managing work plans and work assignments
  • Experience with presenting and communicating complex concepts and issues to non-technology stakeholders
  • Experience and background in business process definition and business requirements definition
  • Working knowledge of SDLC methodologies including Waterfall, Agile and SCRUM is preferred
  • Ability to demonstrate a broad, enterprise-wide view of business functions with an understanding of various dependency linkages that may impact of strategy and business or systems processes
  • Demonstrated experience in documenting end-to-end processes, obtaining in-depth knowledge of process capabilities and providing continuous improvement recommendations as it relates to systems, governance and success metrics is required
  • Strong ability to collaborate with and influence others is required
  • Excellent written, verbal and interpersonal communication and presentation skills are required
  • Experience with business processes within a federated or franchised operating model is strongly preferred
  • CISSP, CCBA or CBAP certification from IIBA is preferred
  • Knowledge of project management and PMI standards is preferred
  • In depth knowledge of the HIPAA Security Rule and other government technology laws
  • Knowledgeable of the National Institute of Standards and Technology (NIST)
  • In depth knowledge of the type of IT systems used throughout the organization to store or access sensitive information
  • Commitment to the YMCA character development values of caring, honesty, respect and responsibility is required
  • Work closely with operational teams to define business processes that can be supported by the EMR technology solution(s)
  • Acts as primary contact for vendor account manager and/or consulting teams
  • Plans and facilitates meetings at a regularly schedules interval with business leadership to review system usage, needs and issues
  • Gathers and validates requirements that will be used for program build-out and maintenance, as well as program reporting
  • Develop and maintain training materials and oversee the training program delivery
  • Oversee reports creation and dissemination as directed by the business needs working with Y-USA IT and vendor account manager
  • Provides support assistance; coordinates with Y-USA Level 1 support and vendor help desk as needed
  • Performs continuous improvement process review to ensure system and workflow optimization for HMLS Technical team as well as end users
  • Performs other duties as assigned by the Sr. Director, Business Services
  • Work with the Privacy Officer with identifying and evaluating all databases (IT systems) used by the organization to store ePHI and ensure that these IT systems meet appropriate security requirements and standards
  • Work with the Privacy Officer in developing appropriate information security policies, standards and procedures
  • Implement appropriate technical safeguards e.g. privacy screens for computer monitors, data encryption, firewalls and virus protection
  • Perform ongoing information risk assessments and audits to ensure that information systems are adequately protected
  • Lead in investigation of computer security breaches within the organization
  • Collaborate with appropriate staff to ensure that an operational IT Systems Contingency Plan is in place and tested
17

Data Security Analyst Resume Examples & Samples

  • Work with malware researchers to interpret and analyze malware/threat trends and compile trending reports addressing wide spectrum of audience of large enterprises
  • Keep abreast with latest market trends on breaches and major security events
  • Able to produce analytical report that can reach a highly technical as well as an executive level audience
  • You'll own and curate a portfolio of high-quality analytical research reports ensuring quality, completeness and timeliness
18

Data Security Analyst Resume Examples & Samples

  • College degree or technical education with typically at least 3 years IT experience
  • Basic understanding of Active Directory and Programming
  • Should understand correct etiquette for email communicationSearch Jobs US
19

Data Security Analyst Resume Examples & Samples

  • Triage Security alerts and events
  • Provide ongoing research and identification of security events using Security tools and reports
  • Assist with ongoing tuning of the SIEM, case management tool and reports, and the creation and maintenance of event response runbooks/documentation
  • Bachelor degree preferred or equivalent work experience
  • Minimum 3 years of work experience in related field
  • Demonstrates advanced technical proficiency at security tasks, including analytical skills
  • Has enough technical knowledge to work with limited oversight
  • Demonstrates an aptitude for learning and applying new IT security skiulls to tasks
  • Continues to develop a solid understanding of IT security skills, threats, and best practices
20

Privacy & Data Security Analyst Resume Examples & Samples

  • Bachelor’s degree required but advanced degree preferred
  • Candidates with experience in any of the following areas preferred
  • Identifying and using tools to monitor data transmissions and analyze data streams
  • Examining source codes of websites and applications in multiple environments (including phones and tablets) to identify potential vulnerabilities and security flaws
  • Reviewing data breach notifications and assisting in investigations
  • Advising the Bureau on a wide range of internet and technology issues, e.g., privacy, computer security, and encryption standards
  • Compiling, summarizing, and succinctly presenting research on relevant entities and issues
  • Litigation support including drafting affidavits and letters; and
  • Performing other duties as required
21

Data Security Analyst Resume Examples & Samples

  • Work with the security team to manage and run the Paddy Power Betfair Data Loss Prevention program
  • Participate in the oversight of the internal identity management process
  • Engage in the implementation and expansion of the IDM solution within Paddy Power Betfair
  • Analyse, influence and drive the implementation of end user computer controls across laptops, desktops and mobile devices
  • Develop data security standards and procedures
  • Work with the wider security team to ensure data security controls are implemented and maintain on the Platform as a Service (PaaS) solution and legacy platforms
  • Participating in projects internal and external to the security team to assess them from a data security perspective and define appropriate requirements
  • Support compliance and regulatory initiatives and requirements such as PCI DSS, UKGC, and other regional compliance
  • Consolidate and report relevant metrics and related key performance indicators (KPIs) and key risk indicators (KRIs) as and when required
22

Data Security Analyst Resume Examples & Samples

  • Three years of relevant experience with security operations, network operations, system administration, help desk analytics, firewall engineering, or IDS administration
  • Two to four years of experience providing technical client service support demonstrating excellent customer service skills and a conceptual understanding of other IS Security procedures and policies preferred
  • Must have strong communication, analytical, and problem solving skills
  • Must demonstrate self-initiative, discretion, and ability to meet challenges head on
  • Problem Solving: Ability to recognize and analyze problems of average complexity and independently consider a variety of alternatives to arrive at a timely, practical and cost-effective solution
  • Team Orientation: Builds relationships with peers to achieve objectives. Working to build relationships with other departments to work as one team. Balances team and individual responsibilities. Exhibits objectivity and openness to others’ views. Gives and welcomes feedback. Puts success of team above self as a team oriented trouble shooter, interfacing with multiple functional groups to identify problems as they arise
  • Leadership: Accountable for all tasks delegated by the supervisor. Planning and Project Management: Sets appropriate goals and priorities. Completes multiple tasks in the time allocated to accomplish results. Accurately evaluates and estimates new tasks. Provides management with accurate and timely status information
23

Data Security Analyst Resume Examples & Samples

  • Detects the full spectrum of known cyber-attacks (e.g., DDoS, malware, phishing, ransomware & others) along with any security and compliance violations
  • Provides Tier III technical expertise on post event security intelligence and trend analysis
  • Guide, mature and work with the security operations team to build a top of the line security command center
  • Performs user and entity behavior analytics to develop predictive cybersecurity capabilities
  • Provides other services as a key member of the Cybersecurity team
  • Cloud and IoT security strategy and planning
  • Configuration monitoring
  • Conducts research of emerging security threats
  • Develops security solutions for critical and/or highly complex assignments
  • Bachelor’s Degree in Computer Science, Information Systems or other related field, or equivalent work experience
  • Typically requires 7-10 years of combined IT and security work experience with a broad range of exposure to systems analysis, application development, systems administration and over 5 years’ experience designing and deploying security solutions at the enterprise level
  • Ability to work effectively on a day-to-day basis with key security partners
  • Experience with visualization platforms and technologies as they apply to threat intelligence analysis
  • Detailed experience of network and system vulnerabilities, malware, networking protocols, multi-tiered applications and attack methods to exploit vulnerabilities
  • Experience in a technical security role, including network security, operating system security, Internet or Web security, Data Loss Prevention (DLP), anti-malware, IDS/IPS, and penetration and vulnerability testing
  • Maintain a basic knowledge of working with Hadoop
  • Understands Information Security as it relates to the business and other areas of IT; understands direct impacts and risks
24

IS Data Security Analyst Resume Examples & Samples

  • Conducts evaluation of security required
  • Interfaces with customers to understand needs
  • Responds to access requests (manual/auto-generated)
  • Troubleshoot issues with access rights
  • Resolves incidents within a timely manner to achieve customer SLA
  • Follows Incident Management procedures and recommends changes
  • Recommend procedural changes based on needs of customers
  • Assists with code changes as directed
  • Interface with customers to understand needs, either through email or phone calls
  • Recommend procedures to accommodate user needs
  • Familiar with concepts of project management
  • Assist in enforcing policies to ensure safety of system assets and protect access or destruction
  • Assist in carrying out security awareness duties
  • Under specific direction and guidance may perform basic unit testing of system or process enhancements/workflows
  • Completes testing documentation
25

Data Security Analyst Resume Examples & Samples

  • Associates degree in IT or related field
  • IT customer service (Helpdesk) experience
  • Works well in a support team environment
  • 1 to 3 years experience with Microsoft Windows Domain and Exchange management
  • 1 to 2 years experience in a data security administrative position
  • Certified Information Systems Security Professional (CISSP) and/or GAIC Security Essentials Certification (GSEC) certification desired; or working to obtain these certifications will be considered
  • Windows scripting experience with PowerShell and VBScript
  • UNIX scripting experience
26

Data Security Analyst Resume Examples & Samples

  • Plan, implement and upgrade security measures and controls
  • Maintain data and monitor security access
  • Perform vulnerability testing, risk analyses and security assessments
  • Analyze security breaches to determine their root cause
  • Conduct examinations of computers, system logs, applications and networks security events
  • Provide reporting on security exposures, including attempts and/or misuse of information assets and noncompliance
  • Identify new threats and evaluate mitigation actions
  • Resource for in-house information security risk assessments
  • 60%: Researching monitoring for cyber risks
  • 15%: Triaging and responding to found risks incidents
27

Senior Data Security Analyst Resume Examples & Samples

  • Develop a comprehensive information security system security plan that is aligned with the organization’s compliance and risk requirements
  • Work under the supervision of the Information Security Officer as part of the information security team coordinating with OIS and within the organization as required
  • Demonstrate professional experience applying information security principles in large, diverse organizations with protected or regulated information
  • Communicates technical details in plain English verbally and in writing
  • Deals well with ambiguity
  • Ability to break large problems into smaller pieces in order to accomplish the project in the desired timeframe
  • Mature and a self-starter requiring minimal supervision
  • Familiar with project management principles
  • Hands-on experience with NIST SP 800-53v4 and is familiar with information security audits
  • Experience developing policy, processes, and/or security frameworks
  • Leads through consensus and is a team player
  • Experience in health care, social services, and state government preferred
  • Experience implementing NIST SP 800-53 and dealing with audits is preferred
28

Data Security Analyst Resume Examples & Samples

  • Must be able to analyze , design, implement, document and support and review company wide IT operation security solutions for mainframe systems, networks and audit compliance
  • Good documentation skills
  • Experience with mainframes, systems, networks and IT security
  • Working knowledge of IBM system z RACF security administration
  • Experience with HP NonStop Safeguard
  • Experience with IBM System i
29

Data Security Analyst Resume Examples & Samples

  • Deployment experience should include support of security configuration management and/or patch management
  • Two years of relevant experience supporting endpoint security in an enterprise
  • Three years of relevant experience with data security practices, processes, and data security event investigation/resolution preferred
  • Experience providing high-level support with a comprehensive knowledge of specific IS Security methodologies, processes, and software packages and a conceptual understanding of other IS Security procedures and policies preferred
30

Top Secret Data Security Analyst Resume Examples & Samples

  • Provides expertise in the implementation of DOD related security policy
  • Recommends and implements policy and procedures for local security programs
  • Provides system design expertise to ensure that as new systems are designed, security implications and security requirements are incorporated into the system from the initial design phase
  • Reviews network designs, database system designs, communication engineering designs, etc. as they relate to security requirements
  • Performs security audits during the development and testing of new systems
  • Conducts RED/BLACK inspections, responds to security penetration studies, and is responsible for other types of security oriented studies
  • Configures and maintains a TCP/IP based security monitoring and analysis program all classified LANs including the development, implementation and analysis of reports and logs produced by firewalls, intrusion protection devices, and TCP/IP service logs
  • Follows guidance established in DOD Information Systems Standards
  • ACTIVE DOD Top Secret security clearance
  • Three (3) years of demonstrated experience in DOD ADP security matters and regulations.Demonstrated experience in information security to include both physical and IS security
  • Specialized Experience. Demonstrated experience in defining computer security requirements for high-level applications, evaluation of security products and capabilities, and development of solutions to multi-level security issues
31

Senior Data Security Analyst Resume Examples & Samples

  • Lead the project activity to apply Access Governance standards across the business; including expansion of the incumbent IDM solution (Sailpoint)
  • Manage the access assurance process for business critical applications and work with relevant business areas to address any issues identified
  • Assist with any internal and external audits of access controls
  • Ensure the Data Security tools are current and fit for purpose including the identity and access governance application – Sailpoint; the DLP system and Forensic tools
  • Manage the response to containing and remediating any access control related security incidents
  • Assess and action escalations from the DLP solution including remediation actions and user training
  • Lead the project to integrate the current DLP processes and controls to one common standardised approach
  • Support the provision of the digital forensic service
  • Working knowledge of risk management and ability to explain data security risks
  • Analyse, influence and drive the implementation of end user computer data security controls across laptops, desktops and mobile devices
  • Develop data security standards and procedures and ensure they are adhered to
  • Work with the wider security team to ensure data security controls are implemented and maintained on all information systems
  • Collaborate with infrastructure security to ensure the Security Incident and Event Management (SIEM) platform is receiving and correlating pertinent information
  • Continually seek solutions to identify, manage and eradicate data security issues within Paddy Power Betfair
  • Build and maintain strong and positive relationship with key stakeholders across the organisation
  • Work with the technology risk function to ensure identified threats and risks are captured and recorded in line with our risk management policy, procedures and standards
32

Data Security Analyst, Cybersecurity Resume Examples & Samples

  • Track events in event case management system
  • Participate in investigations of events to determine root source and validity of reported events
  • Participate in regular and ongoing security calls with cross-organizational teams to address reported items
  • Ensure events are properly documented for use in dashboard metrics and reports for management and security stakeholders
  • 1-3 years infrastructure engineering experience in any one of the following capacities: security operations, network operations, system administration, help desk analytics, firewall engineering, or IDS administration
  • 2-4 years of work experience in a technical client service capacity demonstrating excellent customer service skills
  • Experience with Python, PowerShell, or ELK/Elastic is preferred
33

Data Security Analyst Resume Examples & Samples

  • Possesses advanced Microsoft Excel skills
  • Microsoft Access and Word skills
  • Should understand correct etiquette for email communication
  • Recognizes and analyzes problems of average complexity. Independently considers a variety of alternatives to arrive at a timely, practical and cost-effective solution
  • Builds relationships with peers to achieve objectives. Exhibits objectivity and openness to others’ views. Gives and welcomes feedback. Puts success of team above self
  • Accountable for all tasks delegated by the supervisor
  • Sets appropriate goals and priorities
  • Completes multiple tasks in the time allocated to accomplish results
  • Accurately evaluates and estimates new tasks
  • Provides management with accurate and timely status information
  • Is responsible for important and confidential information
34

Data Security Analyst Resume Examples & Samples

  • Assist with management of data security program and contribute towards development and maintenance of relevant policies and technical standards
  • Work with other members of the Information Security team to identify critical data in the lines of business and the applicable controls
  • Contribute, as required, to security/governance/privacy initiatives
  • Work with Legal, Compliance, and regional Data Protection/Privacy offices on privacy compliance and cross-border data protection issues
  • Assist Technology teams as required on roll-out of data security controls
  • Work with records management on data lifecycle management
  • Provide consultative services as subject matter expert specialist to Technology and business stakeholders as needed
  • Assist with development of data security awareness / training materials, and support awareness program including periodic presentations to promote effective behavior and practices
  • Support privacy activities related to data security e.g. Privacy Impact Assessments, Privacy by Design, etc
  • Assist with tracking of developments in data protection requirements and legislation and that the organization is in a position to comply with future requirements
  • Advise on and negotiate data security issues with third parties as required. Ensure compliance with all applicable contracts
  • Ensure all activities are in line with TCF outcomes (individual contributor)
  • 5 plus years Information Technology experience with 3 plus years in Information Security
  • Experience within Data/Information Security
  • Experience working in large (preferably multinational) corporate environments
  • Experience building and managing relationships at all levels in the organization
  • Experience developing training and awareness materials, including presentation skills
  • Experience with audit, risk management and regulatory compliance pertaining to information security, privacy and/or data security
  • Financial services experience highly desired
  • Knowledge of global data protection/privacy practices / regulations
  • Knowledge of and experience with security standards such as ISO27001, Nymity, etc
  • Understanding of data security controls such as data loss prevention, encryption, file transfer mechanisms, cloud access security broker, etc
  • Data classification and handling
  • Proven ability to effectively sell ideas and achieve agreement at all levels within the organization
  • Strong analytical skills that show the ability to define, collect, analyses data, establish facts, draw valid conclusions, and make fact based decisions
  • Good communication and selling skills, flexibility; and a good listener
35

Data Security Analyst Senior Resume Examples & Samples

  • Maintenance of data security tables and files used to manage for access controls and identity management systems
  • Assists with investigative process during computer security incident responses
  • Implements and maintains information security infrastructure
  • Collaborates with other HSCS teams to ensure Information Security Plan and Standards are implemented
  • Collaborates with other HSCS teams to ensure facility and physical security is implemented
  • Coordinates Information Security Awareness program and educational activities
  • GENERAL INFORMATION
36

Data Security Analyst Resume Examples & Samples

  • Manage and deploy multiple IT security infrastructure and utility tool requirements and other technical projects simultaneously in a fast paced environment
  • Own the process and be accountability delivering engineered security requirements in to the production
  • Conduct project retrospectives and provide recommendations in order to identify process improvement and remediation opportunities for existing engineered solutions
  • Build, configure, secure and deploy Windows (2008, 2012, clustered systems) and Unix/Linux (Redhat 6.6/7, Solaris 10, SLES 11.x, AIX 6.1/7.1)
  • Troubleshooting issues emanating from hardware and software related and configuration issues
  • Analyze system performance, system resources and infrastructure capacity and usage
  • Application scripting, packaging / re-packaging, script customizations (BMC Blade Logic, HPSA, VB Script, Batch script)
  • Technical experience deploying and managing a File Integrity Monitoring (FIM) platform, monitoring Operation Systems, Databases, Applications and Network (Tripwire, equivalent products) (8 years)
  • Ability to build, configure, secure and deploy Windows (2008, 2012, clustered systems) and Unix/Linux (Redhat 6.6/7, Solaris 10, SLES 11.x, AIX 6.1/7.1) (8 years)
  • Knowledge in troubleshooting issues emanating from hardware and software related and configuration issues (8 years)
  • Knowledge in analyzing system performance, system resources and infrastructure capacity and usage (8 years)
  • Experience in application scripting, packaging / re-packaging, script customizations (BMC Blade Logic, HPSA, VB Script, Batch script) (5-8 years)
  • Experience using scripting and programming languages (VB Script, Perl Script, JavaScript, java etc.) (3-5 years)
  • Bachelors of Science degree in Electrical/Computer Engineering, Computer Science or Information Systems or related discipline
  • Technical knowledge and experience in designing, deploying and managing an enterprise Tripwire platform
  • Candidate must have a technologist mindset with aptitude to
  • Work on complex projects while possessing organization, time management, and multitasking skills
  • Candidate should have excellent written and oral communication skills with ability deliver and drive to closure
  • Good working knowledge of Project Management, e.g. PMI, Prince2, and agile project management tools and methodologies
  • Experience in SDLC and agile development, especially in design, implementation and testing as well as deployment phases
  • Proficient in MS PowerPoint presentation for management communication and reporting (including Excel, Word, MSAccess)
  • CISSP certification ( nice to have)
37

Data Security Analyst Resume Examples & Samples

  • Provides technical support to manager, compliance officer and executive management
  • Maintains ongoing proficiency in technical aspects and industry guidelines related to data security
  • Consults with other departments regarding the configuration of functional system designs, processes and procedures, and risk analysis
  • Assists with onsite reviews of data environments, with emphasis on technical aspects
  • Assesses proposed technical solutions in order to comply with industry and University guidelines
  • Monitors external scan activity for all departments
  • Assists with annual or regular reporting requirements
  • Assists with incident management in the event of a breach of secured data
  • Acts as liaison with third-party providers and industry consultants
  • Facilitates ongoing training of University staff
  • This position requires, or will require prior to the completion of the probationary period: knowledge of basic computer terminology and operations, and the ability to use email and the Internet
38

Data Security Analyst Resume Examples & Samples

  • Provides both technical and business support in an industry-specific environment to the manager and compliance officer
  • Maintains ongoing proficiency in business and technical aspects of the related industry-specific guidelines related to data security
  • Takes direction from the manager or compliance officer regarding the configuration of functional system designs, processes and procedures, industry guidelines, and risk analysis
  • Assists with onsite compliance and risk evaluations of data environments, including people, systems, applications, policies and procedures
  • Assists with the assessment of proposed technical and operational solutions in order to comply with industry and University guidelines
  • Performs external scan activity for all departments
  • Assists with the ongoing training of University staff
39

Data Security Analyst Resume Examples & Samples

  • Consults with manager or compliance officer regarding the configuration of functional system designs, processes and procedures, industry guidelines, and risk analysis
  • Performs onsite compliance and risk evaluations of data environments, including people, systems, applications, policies and procedures
  • Assesses proposed technical and operational solutions in order to comply with industry and University guidelines
  • Monitors external scan activity for all departments and remediation recommendations
40

Data Security Analyst Resume Examples & Samples

  • Minimum of one year functional experience in healthcare Information Systems and process flow
  • Minimum of one year in customer service position with information technology
  • Knowledge of access control concepts
  • Data security concepts and principles
  • Healthcare information systems
  • Quality improvement principles and management and work flow concepts
41

Data Security Analyst Inter / Assoc Resume Examples & Samples

  • Carry out activities (e.g. containment, eradication, restoration) in response to reported information security incidents and in accordance with established incident response procedures. Participate in lessons learned activities
  • Detect and prevent intrusions using IDS/IPS, SIEM, and other tools
  • Detect and/or assess the impact of reported vulnerabilities; implement mitigation strategies based on severity
  • Monitor and provide support Michigan Medicine around security policy and security standards
  • Identify sensitive data and provide input for proper storage and protection; assist with remediation efforts as required
  • Provide information security consulting for various Michigan Medicine groups and units requesting information assurance assistance on a project or long-term consulting basis
  • Work with the Compliance Office to determine applicability and scope of various regulations; assist in interpreting and/or implementing technical requirements to ensure compliance
  • Participate as an information assurance subject matter expert in the analysis and design of new enterprise systems and services
  • Participate in the design, implementation, and continuous improvement of security service offerings
  • Extensive exposure to, experience with, responsibility for, and deep understanding of at least four of the security related concepts or practices listed above
  • Experience performing information security risk assessments using an interview-based approach
  • Experience assessing the security architecture of proposed IT solutions
  • Detailed understanding of security controls for Windows, Macintosh, Linux, and Networking platforms
  • Detailed understanding of the assurance implications associated with cloud-based solutions
  • Solid understanding of mobile device security issues, strategies, and controls
  • Experience securing virtualized environments
  • Extensive system administration background with Microsoft, Macintosh and *nix environments
  • Detailed understanding of the assurance implications of various regulatory and compliance requirements including PCI and HIPAA
  • Demonstrated success working across organizational boundaries