Data Security Resume Samples

4.6 (107 votes) for Data Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the data security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
MT
M Towne
Marietta
Towne
31806 Thiel Views
Philadelphia
PA
+1 (555) 221 5435
31806 Thiel Views
Philadelphia
PA
Phone
p +1 (555) 221 5435
Experience Experience
Houston, TX
Data Security Engineer
Houston, TX
Bartoletti-Crist
Houston, TX
Data Security Engineer
  • Work with customers on Networking including DNS, Proxy, ACL, Policy and troubleshooting
  • Support the data security management program across Adobe through realization of Adobe’s Data Management Policies and Standards
  • Work with creating technical instructions for support of Enterprise (IdAM, CASB, Networking and Authorization)
  • Assists the Security team in the development and maintenance of a security awareness program
  • Assist with updating all security whitepapers and other technical documentation
  • Assist with CASB applications and facilitate support of a SaaS product with CASB tools
  • Work with application troubleshooting and access
Los Angeles, CA
Senior Security Data Security Architect
Los Angeles, CA
Mertz, Nitzsche and Bergnaum
Los Angeles, CA
Senior Security Data Security Architect
  • Refine processes for preventing, detecting, identifying, analyzing and responding to data security incidents
  • Working knowledge of PCI DSS and ERM Compliance and Standards
  • Working knowledge of data security across various database platforms. Primary concentration over Oracle, Teradata and SQL environments
  • Maintain technical security knowledge through continuous research and attending educational workshops and seminars
  • Integrate data security incident response plans with the organization’s Disaster Recovery and Business Continuity Plan
  • Establish a process for data asset classification and ownership Incident Management and Response
  • Identify and implement security improvements and controls across the Data Integration and Database platforms
present
Philadelphia, PA
Senior Technology Risk & Big Data Security Specialist
Philadelphia, PA
Wilderman-Crooks
present
Philadelphia, PA
Senior Technology Risk & Big Data Security Specialist
present
  • Provide assistance to the business to address technology based Audit findings and issues
  • Participate in the development of on-going Technology Risk reporting, monitoring key trends and/or breaches
  • Ensuring full participation in Audit programs assisting business in identifying technology based controls
  • Providing a Point of coordination for various security related activities within the central Technology Risk Mgmt and Information Security team
  • Participation in a “State of Health” program for the business, including reporting, planning and prioritization of key risks
  • Comprehension of Federal and Industry based regulations as well as alignment to technology controls
  • Ensuring business understand key security and IT Risk strategies, and how they affect the Corporate Office business lines
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Ball State University
Bachelor’s Degree in Computer Science
Skills Skills
  • Experience with implementing and deploying security (encryption, anonymization, data integrity, policy control) features in large scale infrastructures
  • Experience working in and adopting data infrastructure to regulatory frameworks such as EU privacy directives and SOX
  • Great communication skills and the ability to break down and explain complex data security problems
  • Experience in working with large scale distributed systems (for example Hadoop), either on premise or on cloud
  • Very passionate about the integrity and privacy of users, as well as caring deeply about things like backups, and high availability
  • Pragmatic and understand the trade-offs between the perfect solution and the working solution
  • Able to combine long-term vision with short-term achievements
  • A humble person with “strong opinions weakly held”
  • Proactive in collaborating with other software engineers, taking learning and leadership opportunities that will arise every day
  • Working knowledge of data loss detection and prevention technologies
Create a Resume in Minutes

15 Data Security resume templates

1

Data Security Engineer Resume Examples & Samples

  • Experience with implementing and deploying security (encryption, anonymization, data integrity, policy control) features in large scale infrastructures
  • Experience working in and adopting data infrastructure to regulatory frameworks such as EU privacy directives and SOX
  • Great communication skills and the ability to break down and explain complex data security problems
  • Experience in working with large scale distributed systems (for example Hadoop), either on premise or on cloud
2

Data Security Engineer Resume Examples & Samples

  • 4-8+ years of overall IT experience with the ability to articulate and document infrastructure support and operational processes, various tools and monitoring agents
  • Must have 2-4 years experience in one of the following areas: Information Security, Proxy Support and SMTP support
  • Must have 2-4 years experience supporting or troubleshooting information security applications and systems
  • Experience with Linux, Microsoft Windows Enterprise Server, ESX VM Solutions, firewall and proxy technologies; hands-on experience with security or firewall products
  • Familiar with large enterprise messaging and web proxy technologies
  • The knowledge of more than one scripting or programming language
  • Device life cycle management
  • Understand and decision problems that involve trade-offs between security, cost containment and timeliness of service
  • Technical understanding of large enterprise Proxy and Messaging environments
  • CISSP, CISA, SANS GIAC, or relevant security certification(s) desired
  • Additional certifications such as MCSP, CCIE, CCNA, CCNP, and CCSP etc. preferred
  • Engineering level: 4-6+ years information security experience in network architecture and engineering
  • Engineering architecture, platform configuration, and documentation experience within JPMorgan Chase
  • Web Proxy engineering, router/switch engineering, SMTP engineering, protocol analyzers, TCP/IP protocol stack and the OSI layer, content management systems, SSL accelerators, VPN, web servers (IIS, Apache, etc.)
  • Knowledge and understanding of defense-in-depth, layered network security architectures
  • Symantec Data Loss Prevention software knowledge a plus especially relating to DLP policy development, management and troubleshooting. Installation and troubleshooting of DLP Network (SMTP and Web), Endpoint, and/or Discover servers would also be very beneficial
  • Symantec Data Insight knowledge i.e. configuration of servers with filers and ability to troubleshooting Indexer and Collector servers
3

IT Data Security Resume Examples & Samples

  • Plan and coordinate deployments in collaboration with technology groups and business partners
  • Manage, maintain and trouble shoot Vormetric and Guardium infrastructure
  • Create policies and write security rules based on rule definitions and specific requirements
  • Promote best practices to ensure the Asset Management risk profile is minimized
  • Automate functions with scripting tools, develops reports
  • Design, test and evaluate results and communicate findings
  • Develop, document and continuously improve the support model and underlying processes
  • 4+ years hands-on experience with data security, encryption, monitoring, access control, and incident management tools
  • Team player exhibiting professional maturity, personal integrity, and excellent interpersonal skills
  • Global awareness; experience with and conscious/aware of local, regional, cultural challenges
  • Strong work ethic, self-starter who is creative with a 'can-do' attitude
  • Comfortable with working at all levels of seniority
4

Encryption Lead-data Security Resume Examples & Samples

  • Implementing firmwide cybersecurity cryptographic infrastructure based on defined strategy
  • Assessing cryptographic approaches, requirements and capabilities
  • Understanding emerging trends, technical reviews, security threats, business requirements, and architectural views in order to engineer solutions
  • Collaborating with business and technology partners to understand the firm’s business goals, use of cryptography in business processes and cryptographic requirements
  • Provide support in guiding business and technology partners on cryptographic and data protection matters
  • 4-6 years experience in implementing corporate IT cryptographic solutions
  • Working experience with cryptographic solutions (including authentication, encryption, hashing, tokenization & signing) across application, backup, database, endpoint device, email, file, network, removable media and storage domains. It is desired to have worked with vendor based implementations such as Cloud-based, Cisco, EMC, IBM, Microsoft, Oracle, RSA, Sybase, Voltage or Vormetric
  • Working experience with key storage, distribution and administration (user and machine based)
  • BS degree in Computer Science, Computer Engineering, or Applied Mathematics required
  • Direct involvement in cryptographic and key management programs
  • Supporting cryptographic strategy, policies, standards and compliance procedures
  • Implementing security architectures involved with authentication, authorization and cybersecurity
  • Solid understanding of security, encryption, authentication, key management and applied cryptography
  • Knowledge of cryptographic algorithms, protocols, implementation and standards (e.g., AES, CMS, DES/TDES, DH, DNSSEC, ECC, IBE, Kerberos, IPSec, MD5, OpenSSL, RSA, SHA*, SSL/TLS and ANSI, IETF, NIST, FIPS, PKCS, PKI)
  • Understanding of country based legal and regulatory requirements for cryptography, information confidentiality and privacy
  • Digital rights management
  • Information security, professional certificates, etc
  • Knowledge of programming languages such as Java, C, C++, Python, and Perl is desired
5

Information Lifecycle Management Lead-data Security Resume Examples & Samples

  • 10+ years of overall IT experience with the ability to articulate and document information management, information governance, data security and retention policies, tools and remediation activities
  • 5+ years experience in one of the following areas in the Financial Services industry: Security, Risk, Compliance, Operations or Audit. An in-depth understanding of formal Risk and Control Framework as well as the RCSA or similar assessment processes
  • 3+ years experience working directly in or supporting financial services business areas at large financial institution
  • 1+ years experience in one of the following areas: Information Governance, Information LifeCycle Management, Records Management
  • 1+ years working knowledge of email and data archiving products, secure email solutions, master retention schedules, legal hold systems, enterprise solutions, GUIs
  • Experience developing and reporting on metrics for risk and controls
  • Experience with business intelligence and reporting tools
  • Experience with data identification and classification taxonomy, tools and processes
  • Expert in Microsoft Office and related tools including Project, Visio and SharePoint
  • Understanding file, web and application server environments, midrange systems, database and SAN storage environments and backup architectures
  • Excellent technical/business writing skills (policies, standards, business requirements)
  • Must be able to work collaboratively with other departments to advocate information security solutions. Must possess a high degree of initiative, motivation, and problem-solving skills
  • Understand and decision problems that involve trade-offs between security and risk mitigation, cost containment and timeliness of service
  • Able to facilitate business enablement activities including corporate policy reviews, reporting and workflows
  • Demonstrable strengths in driving change through influence, negotiation, and partnership
  • Familiar with risk and controls assessment process, compliance enforcement, controls testing or auditing
6

Senior Data Security Controls Analyst Resume Examples & Samples

  • Maintain a data security and controls framework for monitoring and managing data risk exposures resulting from data exchanges and partner activities
  • Manage processes supporting third party data security
  • Develop and maintain methodology to assess, review, and evaluate internal and external data security issues
  • Provide an integrated view of data risk issues and security activities with other areas of the business (eg. Information Security, Corporate Security, Fraud, Technology)
  • Act as a subject matter expert on applicable CIBC Information Security policies and applicable industry standards such as the Payment Card Industry Data Security Standard
  • Overall accountability is to ensure the effectiveness of data security and compliance controls in the Card Products Division
  • Participate as the Business Controls representative on new and existing business initiatives primarily to ensure that compliance and controls are built in up-front on projects
  • Ensure that project teams adequately prepare business requirements and/or process flowcharts. Analysis thereon to identify control and compliance opportunities and/or deficiencies
  • Thorough identification and analysis of existing business processes and their associated risks and controls, including identification of significant control weaknesses
  • Conduct risk analysis including mitigation strategies, and present to relevant stakeholders as appropriate
  • Negotiate appropriate balance between internal control and business needs with varied levels of management
  • Complete ad-hoc reviews as required (i.e. in response to production issues, FCAC complaints, new operational processes etc)
  • Perform root causes of control weaknesses, and provide recommendations for improvement
  • Discuss and obtain client agreement on the severity of the weaknesses identified, and to the materiality of the unmanaged risk(s)
  • Work with management to develop action plans, and ensuring recommendations provide realistic and workable solutions, either being adopted elsewhere within CIBC or in the industry, to mitigate the risk and exposure in the long term
  • Obtain business management's commitment to corrective action, and ensure that action plans and time frames are clearly articulated
  • Escalation with various levels of management as required
  • Implement creative, innovative and well controlled processes into the operational environment
  • Update, create and implement business policies as required, including introduction of new policy requirements identified during projects and ad-hoc reviews
  • Influence stakeholders from varied backgrounds, with differing priorities and over which one does not have direct authority
  • Accountable for performing high quality work in reasonable time limits. This includes meeting time deadlines where assigned. If deadlines are not assigned, the position is accountable for setting and meeting reasonable time deadlines
  • Multi-task and organize multiple ongoing third party assessments and projects. Deal with expected/unexpected workload issues. Conduct assignments efficiently and effectively
  • Maintain a current knowledge base of industry trends through research, best practices, and investigation of latest technologies and processes
7

Senior Mts, Data Security Resume Examples & Samples

  • Improve the target state operating model, data governance, organization and roles and responsibilities to sustain the recommended changes
  • Improve alignment of initiatives and implementation roadmap including tasks, interdependencies, duration, resource requirements
  • Define and implement data architecture principles to align and conform business capabilities
  • Define performance objectives of the data architecture and impact on the existing application footprint
  • Optimize the data architecture, data models and database including designing, developing and deploying improved conceptual, logical and physical data artifacts
  • Define data standards including design patterns
  • Improve the performance, availability and scalability of the physical database, including database access layer, database calls and SQL statements
  • Embrace Challenge - Take on complex situations and challenges. Focus on the future
  • Business Partner - Make the business perform better
  • Collaborate - Reach across team boundaries, disciplines, organizations, countries and cultures
  • Technology - Superior innovation
  • Build mutual trust - Get different constituents to work together to solve problems
  • Influence -Continually deepen your our own knowledge and your colleagues knowledge
  • Transform - Bring intellectual curiosity and spirit of restless invention
  • Communicate - Communicate shared outcomes, simply and easily, especially in complex situations
  • Help yourself and others succeed - Strive to be the best yourself and help others grow and learn
8

Professional Data Security Resume Examples & Samples

  • Previous security analyst experience - monitoring, investigating, alerting and reporting security threats
  • Experience on SIEM tools preferably ArcSight
  • 3 Experience of IDS/IPS systems
  • A good understanding of threats and threat vectors
  • A sound knowledge of networking and traffic flow
  • SC clearance (or ability to achieve SC)
  • A good team ethos and drive
  • The ability to work unsupervised and under pressure
  • A sound understanding of security technologies and there function within a networked environment
  • Incident handling experience
9

Tech Mgr-system / Data Security Resume Examples & Samples

  • Ability to coordinate delivery of project/changes milestones, ensure project deliverables stay on target, and appropriately identifying and escalating roadblocks
  • Ability to navigate and lead in a matrixed organization
  • Ability to set direction for a team given high-level objectives
  • Effective communication skills - able to translate technical functions into business value statements
  • Knowledge of data Acquisition / Data Quality
  • Knowledge of Cyber Security Datawarehouse - Hadoop
  • Knowledge of database architectures, database administration, and extract, transform, and load (ETL) technologies
  • Experience implementing Informatica Big Data Environment or Syncsort a plus
  • Familiarity with Cloudera/Hadoop implementations highly desired
  • College degrees in computer science or similar field highly desired
  • Advanced technical degrees or post-graduate work desired
10

Senior Security Data Security Architect Resume Examples & Samples

  • Develop and maintain a data security strategy that supports the business objectives and ensures alignment between the data security program and primary interests of NBCUniversal
  • Audit, monitor, measure, test and report on the effectiveness and efficiency of data security controls and compliance with NBCUniversal data security policies. Recommend best practices and tools required
  • Ensure that non-compliance issues and other variances are resolved in a timely manner
  • Ensure that threat and vulnerability evaluations are performed at an ongoing basis and report significant changes in data risk to appropriate levels of management
  • Identify and implement security improvements and controls across the Data Integration and Database platforms
  • Maintain technical security knowledge through continuous research and attending educational workshops and seminars
  • Ensure the development, communication and maintenance of standards, procedures and other documentation (e.g., guidelines, baselines, codes of conduct) that support data security policies
  • Identify current and potential legal and regulatory requirements affecting data security
  • Establish a process for data asset classification and ownership Incident Management and Response
  • Refine processes for preventing, detecting, identifying, analyzing and responding to data security incidents
  • Minimum of 5-7 years of full-time experience in data security analysis and architecture or related functions (such as IT audit / IT Risk Management)
  • Proven skills using Protegrity Security software or similar security software
  • Understand the significance and use of encryption and tokenization for data protection
  • Working knowledge of data security across various database platforms. Primary concentration over Oracle, Teradata and SQL environments
  • Has significant hands-on with security solutions and support experience
  • Must possess good customer relationship management, communication, and interpersonal skills
  • Is innovative, skilled in decision-making, demonstrates teamwork and flexibility, is focused on continuous learning, and productivity improvements
  • Appropriate behavior when handling sensitive and confidential situations
  • Ability to resolve conflicts between security and business objectives
  • Skill in presenting ideas and solutions to groups at all levels in the organization, with preference for experience in consulting roles
  • Ability to anticipate future data security investments for planning and budgeting
  • Knowledgeable and skilled in data security technology, demonstrating commitment to staying current with data security technology as the threat landscape constantly evolves
  • Versed in-depth knowledge on regulatory and compliance requirements
  • Strong analytical, problem solving and planning skills
  • Able to communicate at all levels of Management
  • Experience with messaging and multi-device communication
  • Experience with Data Security solution rollout process
  • Work with and managing vendor relations
  • Media and Entertainment background a plus
  • Customer focused with strong relationship building skills
11

Data Security Solution Sales Specialist Resume Examples & Samples

  • Knowledge of Guardium program product
  • Knowledge of iDNA product
  • Database Security Architecture
  • Database Security & Management Processes
  • Client Data Base Security Project Experience
  • Data Base Security Pre-Sales Experience
  • Performing Client Data Base Security Workshop
  • Data Discovery & Classification
12

Market Data & Security Master Delivery Lead Resume Examples & Samples

  • Collaborate with solution architects and CTO to determine the technical architecture, technology choices, vendor selection, project planning, resource allocation and location strategy etc. for Chief Data Office mandates
  • Establish and manage global team of skilled engineers in multiple locations to execute the AM Market Data & Security Master strategy
  • Lead the delivery of the Market Data & Security Master solution
  • Interact across departments (business, operations, and IT) to translate requirements into technical solutions and design documents to be communicated with executives
  • Assist in establishing data blueprints, frameworks, stewardship, and data governance models
  • Provide technical solutions covering data structures, sourcing, integration, security, and retention policies across UBS AM
  • Ensure the data strategies set by the Chief Data Officer and architectures are in regulatory and security compliance
  • Leverage technology vendor solutions to explore buy-vs-build solutions
  • Assist in managing vendor relationships from contract negotiations to release management, to manage cost and operational risk
  • Involved in everything from approved projects, to system improvements, and ad-hoc or emergency requests
  • Evaluate new data sources for adherence to the organization's quality standards and ease of integration
  • Defines design and development standards and guidelines while staying in tune with the industry best practices and technology trends
  • 9+ years of diverse experience in designing and managing innovative data solutions beyond ETL and Warehousing within Financial Services
  • 5+ years of experience in managing global teams, including IT service providers in Centers of Excellence
  • MarkIT EDM experience, or similar experience in 3rd party implementations for Asset Management
  • Proven experience in Agile Development methodology
  • In-depth understanding and experience with ETL/ELT, data warehousing/data marts, and design and management processes associated with each
  • Hands on experience and broad knowledge of data services, API development and REST architecture
  • Proven experience in at least two of the following: MDM implementation, Data Virtualization / Federation, Structured or Unstructured Big Data solutions
  • Broad knowledge of vendor capabilities in data management solutions – EDM, MDM, Data Federation, Big Data, Data Quality, Business Intelligence etc
  • Experience with reporting and analytics, and business intelligence tools
  • Proven experience in managing complete SDLC from architecture to delivery
  • Good knowledge of Asset Management data and business processes
  • Excellent communication and presentation skills to explain technical designs to non-technical colleagues
  • Excellent interpersonal skills to work with domain architects, front office and operations
  • Maturity to manage multiple complex programs, teams and budgets at the same time
  • Experience in delivering open solutions capable of integration into a broader architecture
  • Technical expertise in programming languages - Oracle Database, PL/SQL, SQL Server, XML, XSLT
  • LI-TP1
13

Associate Professional Data Security Resume Examples & Samples

  • Reviews computer logs and messages to identify and report possible violations of security. Coordinates, documents, and reports on internal investigations of security violations
  • Conducts tests to determine degree of stability of existing data security architecture
  • Two or more years of experience in information systems security
  • Experience working with firewall theory and configuration
  • Experience working with security systems and implementation procedures
  • Experience working with network software and hardware
14

Senior Technology Risk & Big Data Security Specialist Resume Examples & Samples

  • Continually demonstrate initiative and leadership as the Information Security and IT Risk representative for Corporate Segment, for all relative issues, events, and programs
  • Providing a Point of coordination for various security related activities within the central Technology Risk Mgmt and Information Security team
  • Participation in a “State of Health” program for the business, including reporting, planning and prioritization of key risks
  • Ensuring business understand key security and IT Risk strategies, and how they affect the Corporate Office business lines
  • Ensuring full participation in Audit programs assisting business in identifying technology based controls
  • Comprehension of Federal and Industry based regulations as well as alignment to technology controls
  • Ensure technology governance methodologies are in place within the business to minimize overall security risks to the Bank
  • Participate in the development of system security awareness and communication training programs across the enterprise to ensure alignment with the overall Technology strategy and compliance to regulatory and/or established Bank system security standards
  • Ensure outsourcing partners adhere to TDBG security policies and standards, by establishing oversight controls, and by ensuring risk has been mitigated to protect the Bank
  • Participate in the development of on-going Technology Risk reporting, monitoring key trends and/or breaches
  • Stay current with emerging technology advancements / trends, and regulations to support business needs and leverage a highly capable management team, actively developing and deploying talent across the business
15

Data Security Consultant Resume Examples & Samples

  • 2 years experience in working with consulting and systems integration methods
  • 2 years experience in working in projects related to data security
  • 2 years experience in managing large-scale technology deployment projects
  • 2 years experience in designing and implementing data security - Guardium experience highly preferred but other database security experience will be considered
  • Basic knowledge in security industry regulations/standards (Payment Card Industry (PCI DSS), HIPAA, Gramm-Leach-Bliley Act (GLBA)) and compliance frameworks (ISO 27002,Cobit)
  • 5 years experience in working with consulting and systems integration methods
  • 5 years experience in working in projects related to data security
  • 5 years experience in managing large-scale technology deployment projects
  • 3 years experience in information security consulting (providing professional services consulting for end clients)
  • Basic knowledge in and experience in database security (Oracle, MySQL, Sybase, DB2)
  • Certified in CISSP or equivalent certification
16

Finance Data Security Senior Associate Resume Examples & Samples

  • Evaluation of security requests, working with the requester and US IT to facilitate grants of proper system access to the user(s)
  • Internal controls and relationship to security policies and procedures
  • Segregation of Duties and impact on risk to a global consulting partnership; and,
  • Creation of compliance reports for management and finance leaders
  • Using independent judgment to analyse results, identifying possible issues, making recommendations, and executing changes
  • Leading security issues to resolution
  • Identifying improvements and/or security conflicts and recommending corrective actions
  • Assuming formal responsibility to clearly communicate to leadership the risk exposure to the Firm's financial applications resulting from user access to sensitive transactions and segregation of duty conflicts; and
  • Working independently on projects and providing support with operational planning, administration and implementation
17

Data Security Engineer Resume Examples & Samples

  • Responsible for the operation and maintenance of the company’s information system security processes, devices and applications, including monitoring and resolution of security events
  • Identifies areas where existing security architecture requires improvement and develops proposals, processes and implementation plans
  • Develops and evolves all digital and process security as it relates to compliance requirements
  • Maintains current knowledge of the threat environment and applicability to the company and its environment
  • Participates in infrastructure projects to develop specifications for complex network security/protection technologies for company information and network systems/applications
  • Participates in the evaluation of vendor proposals, new and existing security designs, and emerging security technologies and systems
  • Keep current on networks and systems vulnerabilities and their associated patches and controls
  • Coordinate penetration tests; discover and document vulnerabilities in information systems
  • Analyze security outputs and retain data for appropriate time periods
  • Analyze security incidents and coordinate escalation and handling of security related events
  • Point of contact for business units and vendors for routine security events
  • 5+ years of IT experience
  • 5+ years of security related experience
  • 2+ years of experience managing multiple complex projects
  • Knowledge of security compliance programs such as PCI and Sarbanes Oxley
  • Experience operating multiple security tools
  • Ability to correlate security data from disparate sources
  • Experience evaluating and deploying information security policies
  • Experience using external vulnerability monitoring services and responding to incidents
18

Data Security Consultant Resume Examples & Samples

  • 10 or more years of experience in the Information Security Area and or Audit/Compliance area
  • 3 or more years of experience in the area of Payment Card Industry – Data Security Standard (PCI - DSS) compliance and assessments
  • Extensive knowledge of PCI-DSS
  • Participated in PCI annual attestations and has received of AoC’s and RoC’s
  • HIGHLY PREFERRED – Certification as a Payment Card Industry Professional (PCIP), Individual Security Assessor (ISA), or Qualified Security Assessor (QSA)
  • Advanced knowledge and expertise in Payment Card Industry – Data Security Standard
  • Experience in Credit Card processing
  • Experience in data security systems and products, computer systems and data processing concepts
  • Experience in Banking and an understanding of banking operations
  • Knowledge of bank and Federal regulatory requirements for electronic data processing audit and security
  • Ability to develop and provide training to less experienced technical staff
  • Ability to manage multiple task/projects and deadlines simultaneously
  • Excellent interpersonal, verbal and written communications skills
  • Strong project/team skills
  • Excellent planning and organizational skills
19

Data Security & Investigations Manager Resume Examples & Samples

  • Manage and facilitate internal data security projects
  • Identify, review, and communicate data security best practices for the business
  • Manage the internal investigation program and lead all investigations
  • Improve our detection and audit capabilities
  • Continuously improve and update our data access policies, roles, permissions and audit capabilities
  • Identify deviations from policy and take appropriate action
20

Data Security Engineer Resume Examples & Samples

  • Excellent understanding and experience of architecting, engineering and automating Windows/Linux Security solutions for a Global environment of 100,000+ Endpoints - Data Leakage Controls, integrating 3rdy Party Security Agent etc
  • Experience of working with Enterprise Security Products and Frameworks (Symantec, McAfee, NIST, CIS)
  • Scripting and Automating Skills (Powershell, VBscript, C#, Perl, Python)
  • Knowledge of common Infrastructure services (Kerberos, DNS, Load Balancers, Active Directory/SCCM/GPO)
21

Data Security Engineer Resume Examples & Samples

  • MSc in Electrical engineering or equivalent
  • Broad understanding and experience in the area of data security
  • Experience and interest in embedded and desktop programming
  • Experience and interest in wired and wireless communication networks is a merit
  • Genuine interest in exploring new technologies and a desire to be in the forefront of technology
  • Creative and innovative mindset
  • Ability to drive things to completion
  • Easy to get buy-in of ideas and concepts
22

Applied Security Technical Lead-platform & Data Security Resume Examples & Samples

  • Requirements Management - Develop detailed technical requirements specifications in support of the business and partner technology teams aligning requirements with policy, standards, regulations and engineering architectures
  • Roadmap, Release Planning and Lifecycles Management - Maintain security control 1-3 year roadmaps driving release schedules to ensure effective operationalization, prevent EOL, and compliance with PLC & SDLC policy
  • Provide consultancy services to other IT Security teams - to ensure that data protections are applied consistently where applicable across the technology stack
  • Adoption of products and services - Work across TIR and EI to enable & monitor customer product adoption Identify and work with Engineering & Operations to close gaps in existing product portfolio applying new solutions or, if necessary, introducing new requirements
  • Strategically align products and services - Broaden engagement with TIR and CTO to align roadmaps with TSA Partner with SecArch CN and EI for early access to new products requirements (e.g. Cloud and Mobile) Enable Policy compliance from day-1
  • Financial Management - Inform budgets and assist engineering and operations in resource planning Work with Business Management to understand and right-size TCO Work across BM and customers to ensure allocations to the business are transparent and defensible
  • Good written and verbal communication
  • Detail focused with a proven ability to realize business requirements as precise engineering system specifications
  • The role is an individual contributor with a clear set of responsibilities and controls and service ownership however being able to operate as part of a team is also critical
  • Prospective candidates would desirably have a background in Information Security and Systems Management with a supporting industrial certification (e.g.: CISSP) and also be familiar with control assessment frameworks such as NIST and The Cloud Security Alliance
23

Consultant, Payments Data Security Resume Examples & Samples

  • Develop and enhance Discovers Information Security Compliance (DISC) program which focuses on the security controls at our merchant and service provider partners. Work with the team to manage and enhance this program to reflect the changing payments technology landscape
  • Independently conduct and coordinate in-depth cyber security assessments, including assessments of our international business partners based on Data Security policies, industry standards, guidelines and best practices. This would include reviewing vulnerability scans and ethical hacking reports, identifying partners that require enhanced monitoring and conducting follow-up/advisory meetings
  • Develop educational materials, program documentation, management reporting and other materials supporting the DISC and cyber security assessment program, serving both internal and external business partners
  • Participate in and contribute to PCI SSC working groups to develop standards, programs and guidance documents
  • Develop compliance and security programs at DFS aligned with the evolving PCI SSC standards and programs
  • Assist with or significantly contribute to the ongoing development of the team database and reporting programs
  • Document program and procedures and create or update standards and policies to support the program, including external documents as necessary
  • Foster good working relationships with business partners, Relationship Managers and other key stakeholders, to ensure the organization meets its objectives in a risk controlled manner
  • Lead key program development initiatives, and represent management in important program meetings
  • Provide support for various audit and compliance activities. #LI-BP1
  • 5 years of experience in cyber security, fraud management and regulatory compliance in the financial and/or banking industry
  • Demonstrated understanding of the credit card industry, Payments Services business
  • Demonstrated experience and very strong knowledge of cyber security and experience conducting cyber security assessments
  • Strong knowledge of PCI-DSS and other industry security standards
  • Excellent analysis, project management, and verbal and written communication skills
  • Able to effectively manage multiple projects simultaneously
  • Demonstrated ability to develop, implement and enhance programs
  • Able to confidently and competently represent management in meetings and on behalf of the team
  • Highly motivated and able to work effectively under minimal supervision
  • Fluency in a second language (e.g., Spanish, German, etc.) is a plus
24

Director, It-information / Data Security Resume Examples & Samples

  • Develop and Implement an effective information security program
  • Responsible for strategic leadership, formation, policies, and operations of a company-wide information security program
  • Define clear objectives and goals for information security and collaborate with senior leaders, business partners, and the IT community
  • Advise senior leadership on security program direction and resource investment
  • Responsible for the strategic leadership of the information security program, while leveraging company-side resources
  • Manage and facilitate global information security governance processes
  • Chair the Advisory Committee and lead Information Security Liaisons to establish the information security program and project priorities
  • Lead information security planning processes to establish an inclusive and comprehensive information security program for the entire business
  • Establish annual and long-range security and compliance goals, define security strategies, metrics, reporting mechanisms and program services; and create maturity models and a roadmap for continual program improvements
  • Stay abreast of information security issues and regulatory changes affecting consumer goods, retail and trade at the state, national and global levels, participate in policy and practice discussions, and communicate to leadership on a regular basis about those topics. Engage in professional development to maintain continual growth in professional skills and knowledge essential to the position
  • Provide leadership philosophy for the Information Security Office to create a strong bridge between organizations, build respect for the contributions of all and bring groups together to share information and resources and create better decisions, policies and practices
  • Mentor/Coach the Information Security Office team members and implement professional development plans for team members. Communicate clear goals and objectives
  • Exceptional, hands-on leader with a style that is engaging, innovative, and collaborative
  • Ability to work with other leaders to establish the best balance between security strategies and other priorities at the enterprise level
  • Empower work environments across geographies, remove barriers and realize possibilities
  • Bachelors’ degree: Information Systems, Computer Science, Business or Related field
  • Minimum of 8 years’ experience
  • Ability to multi-task, set priorities
  • Excellent communications skills - both written and verbal
  • Ability to be flexible, work under pressure and tight deadlines
  • Ability and availability to work occasional nights’/weekends
25

Data Security & Controls Lead Resume Examples & Samples

  • Support the Security & Controls Lead to implement and maintain the Core HR Systems Security Model
  • Own the governance and change control process for application security, controls processes, and data privacy content and classification, and assist with alignment of stakeholders
  • Lead activities related to the Modular Control Review Program (MCRP)
  • Facilitate meetings, focus groups and workshops
  • Gather and document security requirements for new and existing systems
  • Create and maintain internal documentation of security, controls, and data privacy agreements
  • Create and maintain user-facing content on Core HR Systems Security Site
  • Assist users, key contacts, and approvers in creating and approving access requests
  • Respond to project issues, support tickets, and general inquiries
  • Identify opportunities and make recommendations to improve the sustainability of our existing security model
  • Assist with reconciliation of cross-application components of the existing security model
  • Surface change implications and lead organizational change management and communications
  • Partner with HR, IT, Internal Control, OGC, and vendors
  • 3+ years of experience with large and complex IT projects
  • Bachelor’s Degree in Business, IT, Computer Science, or related technical field
  • Experience with a large and complex project with global team members and key stakeholders
  • Flexibility and ability to work in a new and changing environment
  • Problem solving and project management skills
  • Strong computer skills, particularly MS Access, Excel, PowerPoint and SharePoint
  • Ability to manage and facilitate global meetings
26

Data Security Engineer Resume Examples & Samples

  • Proficient in key database platforms: Oracle, SQL, MungoDB
  • Proficiencies should include platform security concepts, granular understanding of platform mechanics and platform interoperability
  • Strong communication skills
  • Must be able to produce high quality documentation of processes and procedures for the usage of the toolset
  • Strong adherence to control framework, Citi internal and regulatory requirements
27

Technical Program Manager Data Security Resume Examples & Samples

  • Partner with security and data engineering teams to manage cross functional data security projects to build access management models at scale
  • Drive engineering improvements within the team to define better tooling and models for data security
  • Provide hands on program management during analysis, design, development, testing, implementation, and post implementation phase
  • Collaborate closely with peers to unify ongoing communication of planning, project status, issues and risks in a timely fashion to stakeholders
  • Drive internal process improvements, remove gaps, across multiple teams and ensure teams are working on high impact projects that align with goals
  • B.S. in a technical discipline or equivalent experience
  • Minimum five years of software engineering / systems engineering / similar experience. In addition, at least two years of program management experience
  • Organizational and coordination skills along with multi-tasking capabilities to get things done in a fast paced environment
28

Professional Data Security Resume Examples & Samples

  • Monitors and analyzes attempted efforts to compromise security protocols. Identifies and investigates activities and conducts and provides analyses regarding results. Escalates issues to higher level associates
  • Writes security status reports to provide system status, report potential and actual security violations and provide procedural recommendations
  • Current TS/SCI with Polygraph Required
  • Applicant selected will be subject to a government background investigation and must meet eligibility requirements for access to classified information
29

Lead / Principal Data Security Engineer Resume Examples & Samples

  • Develop best practices for security of data generated in continuous monitoring
  • Examine approaches for security data in Clouds and Big Data implementations (e.g., Hadoop)
  • Recommend approaches for vendor/integration contractor proposals regarding data security in support of mission objectives
  • Analyze data and access control policies, address IdAM data and audit data, and determine approaches to secure data structuring
  • Knowledge of relational and NoSQL database architectures, models and products
  • Experience with database design
  • Understanding of database replication techniques
  • Experience with multiple data models, such as relational, key-value stores, semi-structured databases, SQL over Hadoop, and parallel RDBMS
  • Understanding of key data architectures, for example small server racks with parallel execution, and distributed / federated over multiple data models
  • Experience with data security, privacy, and integrity policies and approaches implemented via various DBMSs for policy enforcement
  • Experience with policy and methods for associating security attributes with data objects for use in access control rules
  • Experience with key data architecture, for example small server racks with parallel execution, and distributed / federated over multiple data models
30

Senior Data Security Engineer Resume Examples & Samples

  • You will drive data security across the enterprise including IT systems as well as with our 25+ R&D labs and high performance Tech Centers
  • With your data security expertise, you will be an active member of Design & Build IT project, ensuring data security is built into new data repositories and applications
  • You will actively assess existing data across the company, driving data classification efforts to identify IP and other high value data and ensuring the right solutions are applied to protect against data theft
  • You will work with IT and R&D teams to engineer and implement new data security tools and processes such as Data Loss Prevention, Digital Rights Management and encryption technologies
  • Comprehensive knowledge of application protocols and best practices
  • In-depth knowledge of data security and data loss prevention tools, procedures and practices
  • Familiarity with the latest attack trends, tools, and the threat landscape
  • Ability to occasionally travel internationally, and work on US Government engagements
31

Director, Data Security Resume Examples & Samples

  • This position will have a shared responsibility to manage the content and currency of Travelers Information Security Program Polices and Standards as well as liaison with internal stakeholders in Legal, Corporate Security and HR on supporting policies and standards. This requires strong knowledge of various industry standard frameworks such as CoBit 5, PCI DSS3.1, ISO-27002 and others
  • This position will have a shared responsibility to manage the Traveler Information Security Control Framework, to develop and manage assurance and assessment of Information Security controls. This requires strong skills in analytics, Information Security and Technology as well as awareness of common models and methodologies for program governance
  • This position will have a shared responsibility, with CISO, Chief Security Architect, Governance staff and others to direct risk-based strategic planning for the security program. This requires strong skills in the areas of project and strategic planning, presentation and reporting skills
  • This position will have responsibility for oversight of communications, education and awareness of the information security program, policies and related vulnerability and threat information which includes annual company wide security training as well as targeted user behavior and other specialized education. This requires a solid understanding of current industry methods for security education and awareness programming
32

Data Security Architect Resume Examples & Samples

  • Demonstrable knowledge of Site/Platform risks - threat tactics, techniques, and procedures –and application of relevant techniques and tools, e.g. network and application penetration tests
  • Knowledge and understanding across a wide breadth of data platforms and related systems, with the ability to quickly assimilate the inter-relationships various disciplines
  • Familiarity with Big Data security issues and at least one platform such as Hadoop, Teradata, Exadata, Informatica, etc
  • Understanding of or experience with database access monitor (DAM) products such as Imperva, Guardium, etc
  • Understanding of web application security concepts and controls, including injection threats
  • Experience working across company lines to partner with vendors, industry consortia, standards bodies, and associations
  • Ability to interact with personnel at all levels and across all business units and organizations, and to comprehend complex business initiatives
33

Industrial Data Security Engineer Resume Examples & Samples

  • Architect and design IoT edge data security systems
  • Identifies and keeps abreast of novel technical concepts and markets
  • Collaborate internally and externally with technology providers and academia
  • Evaluates, defines, communicates security methods and concepts
  • May author technical reports, papers, articles, patents, and presentations
  • Participate in Security risk analysis of engineering projects and advise on appropriate means of implementation of data security methods
  • Achieve or keep relevant security certifications current
  • Bachelor / Masters / PhD in Computer Science and minimum of 5 years’ experience in the respective field of application
  • Certified in GIAC, CEH, CISA, CRISC, GICSP preferred
  • Demonstrated related experience may be substituted for education
  • Knowledge of security methods like certificates, symmetrical / asymmetrical encryption etc
  • Knowledge of electronic and preferable control theory
  • Experience in embedded software, network communication software development preferred
  • Understanding of different means of attacking communication systems including Man in the Middle, DDoS, script injection etc
  • Preferable knowledge in embedded Linux systems
  • Understanding of already publicized hacking attacks on industrial systems
  • Familiar with OWASP top 10
34

Data Security Solutions Outside Sales Specialist Resume Examples & Samples

  • Build and maintain pro-active relationships with all partners associated with respective opportunities
  • Accurate forecasting based upon realistic opportunity assessments based on Salesforce.Com
  • Maintaining sales leadership to effectively coordinating and orchestrating sales team members with buyer’s organizational decision tree
  • Ensure 100% customer satisfaction management with all respective customers
35

Senior Professional Data Security Resume Examples & Samples

  • Bachelor Degree in Computer Science or a related technical discipline, or the equivalent combination of education and technical certifications or training, or work experience
  • CISSP, Security+ or other security-related certifications
  • 5-8 Years of directly related experience in Information Assurance
  • Have strong analysis, oral and written communication, and change management skills
  • Detail oriented, with strong follow-up skills to ensure completion of tasks (e.g., ability to track failed test cases and ensure that the technical resolution is completed and re-tested
  • Be able to work with all levels of program and client project team members and establish and maintain a strong customer-focused working relationship
  • NIST 800 series of Special Publications, disaster/contingency planning, risk assessment, and the NIST Risk Management Framework
  • Information security practices, networks, software, and hardware, computer programming, operating systems and computer desktop packages such as Microsoft Word, Excel, etc
  • Security architecture and Event Log review
  • RSA Archer Assessment and Authorization
  • DISA Security Technical Implementation Guides
  • Tenable SecurityCenter
36

Head of Data Security Resume Examples & Samples

  • Leads and provides global co-ordination and oversight of TT’s divisional and business unit Information Risk Management processes and strategies
  • Accountable for defining TT’s IT security policy, advising on the design of security systems, architecture, global controls and monitoring/reporting of performance of and adherence to information security requirements
  • As head of the information risk, the role is accountable for information security, recovery and technology risks as they relate to vendor relationship management, product selection and negotiation of high-level contracts and consulting agreements to provide services and capabilities for the protection of TT’s assets globally
  • Ensures that disaster recovery and business continuity plans are in place and tested
  • Reviews and approves security policies, controls and cyber incident response planning
  • Approves and oversees identity and access policies
  • Makes sure that cyber security policies and procedures are communicated to all personnel and that compliance is enforced
  • Continuously updates the cyber security strategy to leverage new technology and threat information
  • Reviews investigations after breaches or incidents, including impact analysis and recommendations for avoiding similar vulnerabilities
  • Maintains a current understanding the IT threat landscape for the industry
  • Ensures compliance with the changing laws and applicable regulations (participating as required in leading industry forums and consortiums to represent business interests and set standards/practices); and translates that knowledge to identification of risks and actionable plans to protect the business
  • Works with business colleagues to review RFPs, RFIs etc., and provides security and risk-related input into proposals
  • Advises all teams, employees, contractors and vendors involved in IT security, and communicates best practice to all parts of the business as appropriate
  • Provides training and mentoring to security team members, executive team and other key stakeholders around TT
  • Briefs the executive team on status and risks, including taking the role of champion for the overall strategy and necessary budget
  • Schedules periodic security audits
  • An ability to interpret organisational strategy and goals, and then lead, define and shape an appropriate information security vision for the future
  • A well-developed understanding of and appreciation for business needs and a commitment to leading the information security function, providing a high-quality, prompt, and efficient service to the business
  • A well-developed understanding of and appreciation for TT’s mission, values, and goals and consistent application of this knowledge
  • An ability to effectively influence others to modify their opinions, plans, or behaviours to ensure we act according to the TT Way
  • An ability to communicate complex and technical issues to diverse audiences, orally and in writing, in an easily understood, authoritative, and actionable manner
  • A working knowledge of the following areas of technical expertise
37

Data Security Solutions Outside Sales Specialist Resume Examples & Samples

  • Bachelor’s degree or similar
  • 10 years of relevant work experience
  • Strong knowledge of Endpoint Security Solutions (Data Encryption, Advanced Endpoint Protection, DLP, DRM, Authentication, IAM
  • Aware and up-to-date information on market and trends in Data Security, and the ability to translate this into opportunities
  • Advanced filed sales experience with exposure of selling at CXO level
  • Fluency in English, and one either Swedish, Danish or Norwegian
38

Data Security Product Marketing Manager Resume Examples & Samples

  • Positioning - Identify and develop product positioning that uniquely differentiates IBM Security as the leading provider of identity & access management
  • Product launch – Plan the market launch of new products and releases and manage the cross-functional implementation of the plan
  • Communications - Work with sales and marketing teams to broadcast our message to the market, across the organization, and our partner community
  • 4+ years of Security or applicable industry experience
  • 5+ years of product marketing, product management, tech sales or applicable experience
  • Expert in forwarding thinking, market research, and should possess problem-solving skills
  • Bachelor’s in business or marketing, or equivalent industry experience
  • Ability to listen to intended details attentively
39

Data Security Architect Resume Examples & Samples

  • Architecture, engineering, and support of data security solutions from pre-deployment through deployment and post
  • Train staff and users and promote data security awareness to ensure system security
  • Review and approve plans to safeguard sensitive data against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs
  • Triage issues working with Vendors and Development and engineering resources
  • Review and approve the implementation of Data protection plans and designs
40

Principal Software Engineer Data Security Server Resume Examples & Samples

  • Design features for multi-tenancy, high availability, scalability, manageability and extensibility
  • Identify areas for improvement within the product and propose solutions
  • Work closely with other developers and product management to evaluate new feature requests
  • Prototype, design and implement new software components
  • Use test-driven methodologies and automation in the design and development phase to ensure quality before hand-off to Quality Assurance teams for further testing and verification
  • Keep up-to-date with technologies in the fields of server development, security, technology frameworks and infrastructure
  • Security software and domain
  • Cloud technologies and paradigms
  • NoSQL
  • Agile software development experience
41

Data Security Consultant Resume Examples & Samples

  • At minimum a completed technical college education for example, (Business) computer science, mathematics, econometrics, statistics, ICT, Information Systems
  • Familiarity with security and privacy industry standards (GDPR -Regulation (EU) 2016/679, ISO 17799, NIST 800 series, etc.)
  • Operate as a technical subject matter specialist on industry trends and regulations in cyber risk
  • You have experience in the area of design, develop, test and implementation of data management solutions
  • Good command of the Dutch and English language
  • Creative, analytical and a large solution ability
  • Experience with key security control sets and risk assessment methodologies, such as NIST, ISO, COBIT, FedRAMP
  • Maintains, or is able to obtain within 6 months, relevant information security certifications, such as CISA, CISM, CISSP, CIPP/G
  • Strong organizational skills, including attention to detail
  • Demonstrated experience in writing and presentation skills
  • Ability to manage and prioritize multiple objectives with overlapping time constraints
  • Driving license
42

Manager SAP Data Security Resume Examples & Samples

  • Own the Change Control Board to coordinate between the Business Segments and different Corporate Systems Teams
  • Ensure that the Basis/Architecture Process is implemented and practiced properly to minimize the risk of negative impacts to Confidentiality, Integrity, Availability, and Privacy of Systems
  • Responsible for improving and maintaining the SAP Solution Manager and Basis Security setting currently in place
  • Ensure all changes requests for both Application and Infrastructure have been identified, entered into change system, and have appropriate impact analysis across teams and do not compromise the systems from a Basis and Architecture perspective
  • Ensure that all application releases, upgrades, patches, etc. and infrastructure upgrades and modifications are in line with strategic direction of all platforms
  • Derive and maintain consistent metrics that ensure the quality of process changes and report to management
  • Lead in the development of processes to confidentiality, integrity, and availability standards for systems and networks of the organization
  • Lead departments, affiliates, and associates with the development of security business goals, policies and standards to specify the functional requirements for systems security and access controls
  • Managerial oversight of analysis of manual and automated GRC functions and prepared input to management and department stakeholders
  • Managerial oversight of the performance of technical evaluation and testing of hardware and software for any possible impact on the security of the systems; ensure modification if requirements are not met; approve them when in conformance; provide analysis and reports to management as needed
  • Perform functional administration of Solution manager solutions to support all aspects of Corporate Systems operations
  • Supervision and oversight of the Solution Manager Analyst’s responsibilities
  • Education and Certification
  • Bachelor degree in relevant domain with 10+ years work experience as a GRC and/or SAP Basis/Architecture professional. Graduate Degree is desirable
  • Progress towards certification: CISSP, CISM, CISA, CRISK, etc… Current Certification desirable
  • Working Knowledge of
  • SAP Solution manager 7.1 and expert knowledge of the Basis area to provide all appropriate security measures for the Sap eco-system
  • GRC Analysis of processes and procedures in the areas of: security infrastructure design, risk assessment and management, WEB Application and Cloud security, policy/control design and enforcement, intrusion detection, business continuity planning, security operations management, and third party service provider management
  • Application and implementation of GRC theory and methods such as: ISO27K, COBIT, SSAE 16 SOC, SANS, FFEIC, RISK IT, NIST, PCI-DSS, ITIL, etc…
  • Managerial evaluation and testing of hardware and software related to systems security “hardening” and risk mitigation
  • Solution products that enable and enhance the security of systems such as GRC, Solman IDS/IPS, Firewalls/WAF, and SIEM
  • Authentication technologies and processes such as: VPN, SSL, SSH, PKI, SFTP, VDI etc…
  • Keep current with SAP changing technologies and GRC related risk/vulnerabilities. Stay abreast of organizational objectives and initiatives to apply analysis, identification, and resolution of GRC related issues
  • Define organizational Solution Manager and Basis Security requirements, identify and analyze platform risks, develop and implement platform risk mitigations, and document and communicate auditable evidence
  • Work independently exercising good judgment, decisiveness, and creativity; exercise initiative within established procedural guidelines; and organize and prioritize work to meet established deadlines
  • Excellent communications and interpersonal skills with the ability to effectively interact with a diverse group of Technology Staff located in multiple sites, including proven effectiveness working with global teams
43

IT Senior Service Analyst Data Security Resume Examples & Samples

  • Contribute to the protection of GSK’s technology infrastructure and information assets,
  • Monitor and report on centralized security solutions,
  • Participate in security incident management activities,
  • Perform specific activities relating to the monitoring, management and maintenance of security technologies and service,
  • Manage relationships and communications with central services, business unit, local IT staff and users,
  • Assist with architecture, proposal, standards and project reviews under supervision of senior staff
  • Provide guidance, recommendations, best practices, etc. for DLP and FDE operations, stabilize and optimize DLP and FDE system performance, including rules and reports, assist with DLP and FDE upgrades, installations and configuration
  • Liaise with vendor for complex issues and other consulting activities
  • Evaluate alternative solutions and approaches and negotiate with internal stakeholders in EIS, Business Unit IT groups, and GSK Business areas globally
  • Facilitate complex technology changes on multiple platforms with global customers
  • Maintain familiarity with global data privacy and legal requirements and their impact on the provision of the data protection services
  • Ability to process sensitive material with tact and professionalism
  • Excellent communication skills - ability to identify and communicate with technical, non-technical, and senior management audiences
  • Strong interpersonal skills; good follow-up skills
  • Highly organized and ability to adapt quickly to changing priorities
  • Perform other responsibilities and projects as assigned
  • Ability to summarize complex findings clearly and concisely
  • Ability to present to groups and to socialize new concepts
  • Define technical and business requirements for data protection solutions
  • Develop business processes and policies related to controlling access to data
  • Develop data protection strategies, architectures and implementation plans
  • Implement data protection solutions
  • Data Loss Prevention (DLP) management
  • Endpoint disk encryption (FDE) management
  • General IT Security knowledge
44

Data Security Sales Specialist Resume Examples & Samples

  • Generate, develop, and close new business in your designated region
  • Penetrate new markets calling on senior-level executives and mid to senior level operational management
  • Drive complex sales cycles to deal closure
  • Accurate forecasting based upon realistic opportunity assessments based on Salesforce.com
45

Data Security Experts Resume Examples & Samples

  • Data security aspects, including Data Discovery and Classification, Data Segregation, Encryption & Masking and Data Loss Prevention
  • Design and implementation of Data Encryption, Masking and Data Loss Prevention Solutions
  • Data security projects, including design and implementation
  • Assessment, building, testing and deployment of data security solutions
  • Review and define requirements for data security solutions and implement security controls, in order to comply to possible legal and contractual requirements
  • Design and execute training activities in the field of data security
  • Client delivery experience in data security design and implementation
  • Good knowledge of commercial data loss prevention solutions (Symantec preferred), data masking (Informatica, IBM, Oracle), data classification and discovery (Titus, Varonis, Sailpoint, Symantec, Microsoft), data encryption and tokenization (Gemalto Safenet, Vormetric, HP)
  • Understanding of security landscape – data protection, data security challenges, application security practices, code testing, etc
46

Senior Data Security Specialist Resume Examples & Samples

  • Strong understanding of database and data security principles
  • Strong understanding of database concepts and principles
  • Strong understanding of functions and features of a major DBMS (Oracle DB, MS SQL Server etc)
  • Ability to understand database architectures that supports business requirements
  • Ability to define a work breakdown structure
  • Ability to clearly and concisely provide oral and written communication
  • Organizational skills with the ability to handle several tasks efficiently
  • Ability to define and execute on proof of concept initiatives
  • Operational custodian of all aspects of the Guardium Database Activity Monitoring (DAM) and Vulnerability Assessment (VA) infrastructure
  • Establishing, implementing security best practices within the database environment. This includes but is not limited to hardening scripts, audit documents, compliance filings, etc
  • Monitoring of the database environment for adherence to security standards
  • Performance analysis, monitoring, troubleshooting and resolution of issues within Guardium security suite
  • Support project development following documented standards, policies and procedures (Change Management Process)
  • Working closely with other team members, technical/team leads, management, specialized IT areas and application support teams to ensure consistent delivery and quality of database services
  • Evaluation of functionality and features within database support products
  • Organizing and monitoring personal workload and escalating to manager when issues arise
  • LI-AG1
47

Data Security Administration Manager Resume Examples & Samples

  • CISSP - Certified Information Systems Security Professional (minimum IASEA Level II)
  • Experience safeguarding all government equipment, information, and property, government facilities, equipment, and materials through developed procedures to verify equipment inventories, check all containers, including closed and restricted areas holding classified materials, at the close of each business day or shift to ensure that materials and containers (safes and restricted or closed areas) are secured properly
  • Experience developing or overseeing the development of key control procedures into the initial security briefing that complies with NISPOM 3-106e and covers safeguarding, unauthorized use, duplication restrictions, and turn-in procedures for all physical keys, Common Access Cards (CACs), Secure Internet Protocol Router Network (SIPRNet) tokens
  • Experience working with security facility access from Contractor and all associated sub‐Contractors employees using the National Crime Information Center Interstate Identification Index (NCIC‐III) and Terrorist Screening Database (TSDB) (Army Directive 2014‐05/AR 190‐13), applicable installation, facility and area commander installation/facility access and local security policies and procedures (provided by government representative)
  • Demonstrate proven experience in tracking security classification guidance and other cybersecurity training (IAW DoD and Army training requirements in DoDD 8140.01, DoD 8570.01‐M and AR 25‐2) with specific metrics for all employees assigned to the RCAS contract and verify that they have read, understand, and complied with the DoD, Department of the Army, National and Federal Agencies security classification guides related to their functional roles. Expertise providing security related assistance to Human Resources for hiring support, overseeing administration of initial and refresher Level I OPSEC Awareness training, in addition to overseeing and verifying the annual Threat Awareness and Reporting Program (TARP) administration IAW AR 381-12
  • CISA - Certified Information Systems Auditor
  • CRISC - Certified in Risk and Information Systems Control
  • Information Technology Infrastructure Library (ITIL)v3 Foundation
48

Associate Professional Data Security Resume Examples & Samples

  • Assists in analysis, developing recommendations and implementation of security software, locks, alarm systems, and other security measures to prevent hackers from infiltrating company information. Conducts and provides initial analyses for review and escalation of results
  • Assists in monitoring and analyzing attempted efforts to compromise security protocols. Identifies issues, conducts analyses and escalates initial results
  • Reviews computer logs and messages to identify and report possible violations of security. Documents and reports on internal investigations of security violations
  • Assists in conducting tests to determine degree of stability of existing data security architecture
  • Interacts with customers to understand their security needs and assists in implementing procedures to accommodate them
  • Writes security status reports to provide system status and report potential and actual security violations
49

Specialist Information Security Engineer Data Security Resume Examples & Samples

  • Develop or participate in the development of business cases and presentations on information security technologies of interest to Amgen
  • Advise project teams, application owners, and other Information Security teams (like Identify) on information security controls
  • Strong demonstrated knowledge and experience on data security with technologies and solutions like Symantec DLP (Data in Motion, Data in Use, and Data at Rest), Database Activity Monitoring (e.g., Imperva, Guardium), etc
  • Experience in complex enterprise environments and current technology areas like cloud and mobility
  • Effective working with global, virtual teams
50

Technical Lead-data Security Program Resume Examples & Samples

  • Perform capabilities gap analysis of existing platform security tools to determine adequacy for security objectives
  • Develop necessary scripts to improve data loss prevention rates and reduce overall number of false positives
  • Ensure all tools are monitored for capacity, performance, and availability
  • Must develop dashboards or periodic status reports that communicate the health of and risks to data security tools and the business, as well as reporting on key metrics being provided by those tools
  • Establish and maintain strong relationships with security tool vendors to stay on top of new functionalities and find ways to add value with existing tools and quickly resolve problems
  • Manage requests from internal and external auditors on company security controls and provide required evidence when needed
  • Act as a liaison between the security groups, business owners, clients and system managers
  • Perform other security related duties as required
51

Data Security Deployment & Implementation Consultant Resume Examples & Samples

  • Lead the delivery of data protection engagements including discovery and classification
  • · 2 years experience in working on projects related to data security
  • · Knowledge of technology and integration capabilities of Security Products including IBM Guardium, AppScan, and Symantec DLP
  • · Prior experience in delivering DLP solutions
  • · Demonstrable experience in client communications, organization and teaming skills
52

Domain Architect Data Security Resume Examples & Samples

  • Overseeing technically-focussed Solution Architects to ensure production of an architecture that is consistent with the overall security strategy for Arcadia
  • Representing the Customer domain in the Corporate Domain Architecture Review Board
  • Working with the Data Architect and the internal audit team to identify data classifications to ensure that risk analysis can be completed effectively
  • Working closely with a range of Domain and Solution Architects to develop and implement their strategy and roadmaps from a security perspective
  • Engaging teams across the business to provide a deep knowledge of security and compliance, and act as an informed “challenger” to ensure proposed solutions have been considered correctly
  • Architecting and implementing security frameworks within the retail sector
  • Working with QSAa and other security professionals
53

Data-security Change Manager Resume Examples & Samples

  • Act as a trusted advisor for key stakeholders within relevant brands and functions
  • Develop strategic narrative in support of our brands and functions to drive consistent and compelling story telling across the organisation
  • Develop tailored communications approaches and plans for relevant threats and initiatives
  • Build communications capability with key leaders and help them to deliver engaging and authentic communications to our employees
  • Build awareness and educate our global employees on data security issues and topics through innovative communications approaches
  • Work in partnership with the broader Group Security Office and impacted Technology leads on shared programmes of activity
  • Build and maintain an engaging an effective platform to educate users around data security risks in order to meet governance, regulatory and client obligations
  • Support the development and facilitation of internal data security related events, such as induction and training workshops, crisis management scenario simulation exercises
  • Build consistency and fuel curiosity in who we are and what we do and our value proposition to the brands and functions
  • Coach and support our Global Communications Network to deliver effective and engaging global messages
  • Seek out best practice and new approaches to communications to ensure we are leaders in what we do
  • Will be an innovative, resilient and competent change management professional
  • Possess a clear and effective communication style and the ability to influence and engage with employees
  • Previous experience working in a global technology/data/security/compliance business
  • A proven track record of delivering significant programmes on time and to budget
54

Data Security Engineer Resume Examples & Samples

  • Experience with data encryption management solutions, such as Vormteric and CloudLink
  • Experience with PKI management solutions, such as ADCS and External providers
  • Customer service/support experienceSearch Jobs US
55

Finance Global Data Security Specialist Resume Examples & Samples

  • Accountable for the build-out, leadership, governance, maintenance and seamless conduct of Finance Data Security Strategy (50%)
  • B.E. and/or MBA
  • 12+ years of experience in Data Security Management in Transactional and Analytics ecosystems
  • Excellent verbal and written English communication skills and demonstrated experiences communicating across diverse cultures, teams and regions
  • Ability, as exhibited from past experiences, to build and explain a robust data security management operating model and focused culture
  • Experience in Data Security Management in multinational corporations with SAP and Analytics systems
  • Experience in Data security in SAP and Analytics environments
  • Formal degree or qualification in Data Security
  • Formal certification in Data Security Management
56

Data Security Consultant Resume Examples & Samples

  • Lead/perform the delivery of data protection engagements including discovery and classification (structured and unstructured)
  • Gain expertise in the implementing, and performing data security engagements using the iDNA product suite
  • Lead/perform the implementation and configuration of the iDNA application suite
  • Engage with clients to demonstrate iDNA product capabilities, gather and document solution requirements and identify requirements for iDNA deployment
  • Integrate the iDNA product suite with Information Security Products, e.g. IBM Guardium, Symantec DLP
  • Recommend data protection solutions, design approaches and proposals
  • Assist in pre-sales, sales, closure and deliver of security consulting services
  • Engage with product support team for troubleshooting and gathering client feedback
  • Help drive pursuits and engage in complex projects, matching outcomes and meeting or exceeding client expectations
  • Keeps up to date on advancements with respect to the trends and events in the information security industry
  • Broad knowledge of IT, Business and Information Security landscape
  • Excellent organizational, analytical, written, verbal and presentation skills
  • Deep technical knowledge in working experience in at least 2 areas of Information Security such as
  • At least 3 to 5 years experience Interpersonal skills with the ability to establish and working relationships in a project based / client serving model, and work closely with people at different levels of an organization
  • At least 3 to 5 years experience in working across diverse teams to facilitate solutions
  • At least 3 to 5 years years experience in management consulting or Managed Security Services
  • At least 3 to 5 years experience in working with security consulting teams