Endpoint Security Resume Samples

4.5 (76 votes) for Endpoint Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the endpoint security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
JW
J Waelchi
Julien
Waelchi
54421 Bradley Mount
Los Angeles
CA
+1 (555) 116 9286
54421 Bradley Mount
Los Angeles
CA
Phone
p +1 (555) 116 9286
Experience Experience
Boston, MA
Endpoint Security Analyst
Boston, MA
Lindgren Group
Boston, MA
Endpoint Security Analyst
  • Is responsible for monitoring and controlling the performance and status of security safeguards
  • Responsible for operating and maintaining Symantec Endpoint Security Manager
  • Reduce Risk by providing and maintaining Data Leakage Protection tools
  • Support a comply to connect solution to ensure highly mobile DSS users vulnerabilities are mitigated prior to the device and user is allowed on the DSS enclaves
  • Develop and recommend efficiencies and best practices to achieve a higher level of security on the DSS enclaves
  • Conducts assessments and reports vulnerabilities; monitors their ongoing management with the operations teams
  • Analyze endpoint application data in real time to identify potential threats, rogue systems, vulnerabilities, unauthorized devices and/or system changes, and data loss prevention. Report cyber incidents to SOC incident responders
Phoenix, AZ
Endpoint Security / Product Program Manager
Phoenix, AZ
Ernser-Renner
Phoenix, AZ
Endpoint Security / Product Program Manager
  • Provide weekly formal submissions for Program reporting, keep Clarity Program Management tool up to date in accordance with the PGF Framework
  • Manage the technology as a Product, including working with CISO Strategy, Architecture, Engineering and Deployment teams for end to end solution delivery
  • Actively contribute to the development of sound ideas in order to enhance the Information Security posture of the bank
  • Develop and present business cases for decisions and funding new initiatives
  • Budget management of Project and Programs of €5M+
  • Manage the roadmap and version control
  • Prepare and Provide Executive briefings
present
New York, NY
Endpoint Security Specialist
New York, NY
Fay, Windler and Sauer
present
New York, NY
Endpoint Security Specialist
present
  • Detect security issues, create customer tickets and manage problems until closure
  • Disk/File Encryption, Data Loss Prevention, Enterprise Rights Management
  • Centralized management of Anti-Virus software. Maintenance and support of McAfee, Symantec, Trend Micro and Microsoft security products
  • Maintain and manage changes in running environments
  • Provide security monitoring, event analysis, and countermeasure proposals
  • Great opportunity for professional development in the IT field
  • Provide technical support, including monitoring, reporting, tool administration. This is most often done without direct interaction with the end-users
Education Education
Bachelor’s Degree in Engineering
Bachelor’s Degree in Engineering
California State University, Northridge
Bachelor’s Degree in Engineering
Skills Skills
  • Should be able to create the detailed deployment and migration project plans for specific tool deployments and migrations
  • Good experience with customized reporting on compliances for these technology/tools
  • Should have worked on migrations, upgrades, deployement of these tools in medium to large environments
  • Hands on experience with integrating these security tools with the monitoring tools like SIEM
  • Administration, Configuration, Rule set creations, policy finetuning, in-line mode implementations and reporting of Endpoint Security Technologies like : Symantec Endpoint (SEP), Symantec DataCenter Security (DCS), Symantec Host DLP, Malware Bytes and FireEye APT
  • Hands on technical experience working on the above tools in medium to large environments
  • Lead the coordination and direction during virus outbreak situations. Lead the P1/P2 situations occuring off the mentioned tools
  • Work with vendor to request fixed for the identified defects in the products functionality
  • Own the technology roadmap proposals, identifying and implementation of service and security improvement plans
Create a Resume in Minutes

15 Endpoint Security resume templates

1

Endpoint Security Solution Engineering Lead-VP Resume Examples & Samples

  • 10+ years of overall IT experience with a strong understanding of security, threat intelligence, malware prevention, security analytics, and the supporting security solutions
  • 3-5 years of experience in security incident and event monitoring processes, solutions, and technology implementations
  • Proven automation experience via scripting
  • Excellent written, interpersonal, planning, and organizational skills
  • Strong negotiation and mediation skills
  • Must be able to work collaboratively with other areas to advocate information security solutions
  • Must possess a high degree of initiative, motivation, and problem-solving skills
  • Knowledge of the financial industry and topical threats which provide challenges to the data security within the financial sector
  • Team lead or manager
  • Engaged with internal or external auditors
2

Endpoint Security Specialist Resume Examples & Samples

  • Manage EndPoint Security environments and deliver services using End point Security tools (EPTM, HIDS, HIPS)
  • Disk/File Encryption, Data Loss Prevention, Enterprise Rights Management
  • Maintain and manage changes in running environments
  • Prevent incidents or, when they occur, work on and resolve complex incidents
  • Provide technical support, including monitoring, reporting, tool administration. This is most often done without direct interaction with the end-users
  • Maintain a clear documentation of processes and procedures. In delivery, follow the agreed processes
  • University degree in Computer Science or related disciplines. Alternatively, an equivalent level of
  • At least 3 years of IT experience, ideally in support of Microsoft-based environments
  • Fluent verbal and written English
  • Advanced German language skills will be considered a strong advantage
  • Strong technical knowledge of Microsoft operating systems
  • Experience with antivirus products such as McAfee e-Policy Orchestrator (preferred), Symantec Endpoint Protection, Trend Micro, MS Forefront or Checkpoint Endpoint Encryption, McAfee EEPC, SafeGuard Easy will be considered a strong advantage
  • Knowledge about security threats
  • Good understanding and adherence to the ITIL framework (Change Management, etc.)
  • Autonomy and good problem-solving skills
  • Understanding of outsourcing services, preferably with actual experience of outsourcing or service
3

Endpoint Security Senior Analyst Resume Examples & Samples

  • Develop and implement processes and procedures to ensure that Dell Services and the Information Security Operations Center are able to meet its’ customers expectations and deliver quality services within specified Service Level Agreements (SLAs) and contractual obligations
  • Assign responsibilities to each member of the team and hold them accountable
  • Ensure that all Service Management processes are followed and all incident and requests are addressed within the required time to adhere to published SLAs
  • Three to Five years Experience with Symantec Antivirus and Symantec Endpoint Protection
  • Three to Five years Experience with McAfee VirusScan, ePolicy Orchestrator v3.6x, 4.x and 5.x
  • Three to Five years Experience with McAfee Host Intrusion Prevention or Symantec Host Intrusion Detection
  • Efficient communications skills (listen, written, oral)
  • Three to Five years experience with Encryption software (PGP or McAfee SafeBoot)
  • Three to Five years experience with DLP software (Vontu or McAfee DLP)
  • Ability to conduct in-depth forensic analytical studies and investigations
  • Certifications in CISSP, CCSP/CCNP, & CEH are also desirable
4

Endpoint Security Manager Resume Examples & Samples

  • Responsible for leading a team of technology professionals in providing 24x7x365 production support of information protection tools and solutions
  • Recruit, train and develop talent, facilitating good team and succession planning
  • Recognize and support departmental objectives and drive process methodology that will achieve desired business outcomes
  • Manage direct reports; ensuring adherence to federal laws, regulations and Humana policies and procedures
  • Provide constructive feedback, both verbally and in writing, and conduct formal performance appraisals for direct reports
  • Conduct staff meetings and one-on-one meetings with direct reports
  • Develop succession plans; oversee the career development process for direct reports, including the creation and review of individual development plans and competencies required for roles
  • Directly applicable information protection experience
  • Proven ability to quickly earn the trust of sponsors and key stakeholders
  • Focused and versatile team player that is comfortable under pressure
  • Prior experience in technical team leadership role (i.e. team leader, scrum master, technical leader)
  • MBA or Master’s degree in Information Systems or Computer Science
  • Experience using and managing teams supporting network and endpoint technologies
5

Director, Endpoint Security Resume Examples & Samples

  • The primary responsibility for the candidate is to architect, engineer, support, configure, and implement endpoint security controls, of which the CA for Microsoft Certificate Services is an important example
  • Engineering, supervising the deployment of, and operationally maintaining new endpoint security tools and endpoint initiatives to meet business unit and GBTS security needs
  • Provide PKI subject matter expertise covering: user & machine certificates, CRLs, OCSP, certificate enrolment, Certificate Policies, Group Policies, multi-tier CA hierarchy etc
  • Manage and monitor the PKI System to avoid downtime and service outages caused by unplanned certificate expiration
  • Creating/Updating/Enforcing the certificate practice statements (CPS) for the various CAs
  • Manages hardware security modules to enhance the security of the Client certification authority (CA), root certificates, and public key infrastructure (PKI)
  • Participate in defining and developing the strategic plan for PKI for the enterprise
  • Propose and implement improvements to Prudentials PKI in accordance with standard procedures and change control policies/procedures
  • Experience with PKI and certificate management systems
  • Strong knowledge of PKI concepts, policies, and practices
  • Hands-on familiarity with Microsoft Certificate Services and related components
  • Working knowledge of Active Directory (including group policy) and its integration with Microsoft PKI
  • Experience with certificate-enabled applications, such as SSL/TLS, S/MIME, authentication, 802.1X, Code Signing, etc. a major plus
  • General understanding of cryptographic concepts: symmetric/asymmetric cryptography, secure hash, digital signatures
  • Exposure to endpoint security products (for example: AV, HIPS, DLP, Encryption, etc.)
  • Bachelors degree or higher in IT, CS, IS, Engineering or a related field with 5-10+ years of IT infrastructure experience with a focus in security
  • Strong Windows experience (NT6.x and up preferred)
  • Demonstrated expertise in PKI infrastructure
  • Working knowledge of end point security products
  • Enterprise integration and migration experience
  • Ability to coordinate and Support large & complex projects including product upgrades and deployment of new capabilities and enhancements
  • Strong analytical skills to solve problems, perform research and derive solution opportunities
  • Strong drive and passion for the security field
6

Endpoint Security Consultant Resume Examples & Samples

  • Endpoint protection technologies
  • Technologies used for access to secured network environments or remote support
  • Technologies enabling 2-factor security
  • Security audit and compliance technologies
  • Data Classification and tagging technologies
  • Network Access Control technologies
  • Bachelor’s Degree in Information Technology or Computer Science, or equivalent experience
  • One or more of the following certifications: CCNA, CCNP,CCIE, CWNA, CWNP, CWNE, GCIH or GCIA, MCSE
  • Basic understanding of security related technology, including hardware, software and operating systems
  • The ability to troubleshoot complex system problems, and be able to engage and work with the proper technical areas to resolve problems
  • Previous experience in a large Enterprise Security organization
7

Endpoint Security Solution Engineering Architect Resume Examples & Samples

  • 10+ years of overall IT experience with a strong understanding of engineering and architecture principles, security, malware prevention, security analytics, and the supporting security solutions
  • 3-5 years of experience in security incident and event monitoring processes, solutions, and/or large technology implementations
  • Proven experience with intrusion detection systems, intrusion prevention systems, anti virus and end point security solutions
  • Ability to support and liaise with business process owners to incorporate threat management products and provisions into their processes
8

Endpoint Security Solution Engineer Resume Examples & Samples

  • IT experience with a strong understanding of engineering principles and exposure to security, malware prevention, security analytics, and the supporting security solutions
  • Experience in security incident and event monitoring processes, solutions, and/or large technology implementations
  • Proven experience with end point security solutions
  • Experience with various System platforms and Network infrastructure components
  • Ability to automate tasks using a scripting language (Python, Perl, Ruby, etc)
  • Able to articulate and visually present analysis results
  • Conducted desktop, server or network perimeter security audits
  • SIEM product experience
9

Endpoint Security Desktop Product Manager Resume Examples & Samples

  • Manage a number of concurrent activities, with strong multi-tasking, prioritization, organizational and time management skills
  • Work under limited supervision following standardized practices and methods
  • Work with Information Security, Security engineering and Security operations and other teams to deliver state of the art balance between security and usability on desktops (Windows and Mac)
  • Executive sponsorship of endpoint security products
  • Build strong relationships with endpoint security vendors, absorb vendor roadmaps and share with teams and stakeholders – including presenting to senior leadership
  • Review and evaluate new Windows and Mac security products
  • Collaborate with other service owners for the security of compliance of their products
  • Work closely with teams within Operations, Engineering and the Service Desk and review regular dashboards and KPIs for optimal run of services
  • Awareness of trending targeted attacks and advanced persistent threats
  • Manage software agreements and licensing
  • 10 years’ experience in a large complex Windows end user environment
  • Experience of ITIL and coordination in a large global organization
  • Experience in coordinating various levels IT Services personnel across multiple locations and cultural backgrounds
  • Experience with desktop security products such as and not limited to Avecto Privilege Guard, Bromium, Symantec Endpoint Protection, Symantec Endpoint Encryption and Enhanced Mitigation Experience Toolkit (EMET)
  • Understanding of Microsoft Windows GPOs, MacOS security, End user productivity security trends in the enterprise (encryption, biometrics, etc.)
  • Broad technical experience and understanding of having a multi-operating system environment
  • Basic experience with enterprise budgeting/finance
10

Global Endpoint Security Manager Resume Examples & Samples

  • Manage a team of offshore endpoint security engineers
  • Oversee deployment, daily operations and continuous optimization of security softwares
  • Function as subject matter expert for all endpoint security related matters
  • Provide strategy and directions for the team, assign and prioritize tasks
  • Coordinate between various business functions which includes the incident management team, business owners, endpoint security team
  • Manage all endpoint security implementation and deployment projects
11

IT Endpoint Security Analyst Resume Examples & Samples

  • Respond to Infrastructure and Cyber Security incidents
  • Maintain Security infrastructure
  • Achieve and maintain Global Cyber Incident detection and response capability
  • Work with various infrastructure support teams to provide technical direction and address security issues (Engineering, Cyber Security, Enterprise Vulnerability)
  • Implement and customize security scans for individual clients and servers
  • Implement email filtering rules and manage containment of SPAM outbreaks
  • Implement and customize antivirus policy for individual clients and servers
  • Work with product vendor to coordinate distribution of regular updates/patches
  • Develop and maintain support materials
  • Test and implement vendor or Engineering product upgrades
  • Service level-1,2 ticket queues
  • Bachelor Degree in Computer Science
  • 10+ years of experience in security
  • Strong skills in developing processes to support new product deployment
  • Strong understanding of networking technologies
  • Proven project management and implementation skills
  • Motivated, self-starter with ability to manage time effectively
  • Knowledge of Unix/Linux, Windows development or administration
  • Should have ability to mentor and teach others
12

Endpoint Security / Product Program Manager Resume Examples & Samples

  • Lead and own, gathering and managing business & technical requirements with the primary goal to reduce Endpoint Security Risk in the Bank
  • Provide solutions to ensure that devices follow a definite level of compliance and standards
  • Develop and present business cases for decisions and funding new initiatives
  • Ensure that the overall solution is aligned to the Bank’s Security Reference Architecture and meets Regulatory and Industry Standards
  • Own and drive any Audit points or Regulatory findings to closure
  • Manage the technology as a Product, including working with CISO Strategy, Architecture, Engineering and Deployment teams for end to end solution delivery
  • Manage the roadmap and version control
  • Prepare and Provide Executive briefings
  • Centrally manage the Program Budget and allocate to delivery teams as per plan
  • Act as the glue between the various stakeholders and delivery teams to deliver the solutions as an end to end product and service
  • Provide weekly formal submissions for Program reporting, keep Clarity Program Management tool up to date in accordance with the PGF Framework
  • Actively contribute to the development of sound ideas in order to enhance the Information Security posture of the bank
  • Be the primary contact for status of in scope Security Solutions
  • Evaluate, appreciate and manage the implications of all technical changes to projects within the Program
  • Ensure Security Projects and Programs are delivered to scope, quality, time and cost
  • 10+ years industry experience in the field of IT Security
  • Awareness and understanding of IT Security Industry Standards (NIST, ISO)
  • Prefer at least one of the following certifications: Member of the British Computer Society (MBCS) ideally Chartered IT professional (CITP) or comparable , Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), or Certified Information Systems Manager (CISM)
13

Intermediate Endpoint Security Specialist Resume Examples & Samples

  • Works closely with business and enterprise stakeholders on several security initiatives (networks, mobile, endpoint security) shifting focus frequently, as required
  • Reviews the new technology or the solution (network, mobile and endpoint security)
  • Assesses and tests the existing solutions
  • Compares various solutions/options and determine how they will work in BMO environment
  • Works with various stakeholders in a formal evaluation/assessment capacity of the technology
  • Prepares a comprehensive reports/recommendations
  • Adheres to a process/program based approach
  • Leads proof of concept (POC)
  • Assembles enterprise-wide execution plans
  • Provides technical thought leadership to key network, mobile and endpoint security initiatives
  • Leads technology research and solution testing for security capabilities
  • Provides primary guidance to enterprise security standards documentation
  • Coordinates with Information Security and enterprise infrastructure functions to ensure project objectives are aligned with enterprise goals
  • Collaborates with various stakeholders to ensure solutions meet bank architectural standards and assist in improvement of security design and security architecture for several initiatives
  • Evaluates new network threats and vulnerabilities to the Bank’s systems to ensure these items are addressed in strategic projects and initiatives
  • Accountable for requirements and criteria for vendor solution, and proof of concepts
  • Contribute to products recommendation for internal testing
  • Produces topic papers and white papers on emerging technologies
  • Provide recommendations to key stakeholders
  • Contributes to security standards development
  • Performs security knowledge transfer to assist making security part of normal IT and business activities
  • Accountable for security knowledge transfer during project execution and post-implementation to ensure network security solutions are operationally integrated and stable
  • Possesses a university degree/college diploma in Computer Science or equivalent
  • 5+ years of strong experience in IT environment with experience in major Network Security projects
  • 3+ years in security with an emphasis on network, mobile and endpoint security
  • Demonstrates expert knowledge of endpoint security, mobile security and network security control environments and architecture, including, intrusion detection, network architecture, and enterprise threat management
  • Has significant experience working in large-scale, enterprise strategic initiatives
  • Illustrates advanced knowledge of internal and perimeter security controls, network architecture, advanced network security platforms, mobile and endpoint security platform
  • Exhibits expert knowledge of endpoint security controls, including the deployment of next generation security controls for endpoints and mobile
  • Strong knowledge of mobile security and MDM deployments desired
  • Must possess specific information security skill sets, including in depth knowledge and understanding of security classification, security assessment processes, and system and application hardening
  • Possesses solid communications skills, both written and verbal
  • Demonstrates solid analysis skills
14

Infrastructure & Endpoint Security Specialist st Level Resume Examples & Samples

  • Ensures that the security policies and procedures are followed
  • Ensures proper reporting of information security violations
  • Ensure our clients from different part of the World are protected (FR, DACH, Benelux)
  • Overview of security principles
  • Understanding of network security tools
  • Understanding of Networking
  • Good knowledge of Excel
  • Understanding and knowledge of security principles
  • Advanced knowledge of Networking
  • Advanced skills in Excel (VLOOKUP, Pivot tables)
15

Endpoint Security Architect Resume Examples & Samples

  • Requirements analysis, architecture development, product evaluation, design, integration, implementation and planning of a multi-vendor next generation endpoint security (NGES) solution that includes anti-virus, malware detection, virtual containment, whitelisting, asset management, patch management, incident response and other security capabilities
  • Analyze and refine system requirements provided by the Government. Develop overall DODAF compliant systems architecture to satisfy all requirements
  • Lead evaluation and lab testing necessary to provide technical recommendations to the Government based on quantitative assessment of candidate security products
  • Lead team of engineers in creating detailed design, integration, implementation, testing, and deployment activities
  • Lead creation of all required documentation including creation of artifacts required for solution certification
  • Lead team of engineers in creation of detailed deployment plans, instructions and standard operating procedures
  • Act as the overall technical lead and focal point for all program design, integration, deployment, support, training and testing activities
  • Bachelors degree in Computer Science, Information Systems, Engineering, or other related scientific or technical discipline with nine years of experience, seven years with Masters or four years with a PhD
  • Three (3) years experience in creation of DODAF compliant architecture for complex systems comprised of multiple COTS applications
  • Five (5) years experience in design and integration of COTS based solutions
  • Three (3) years experience in leadership of large team performing product evaluation and integration
  • Hands on experience with Cyber Security (specifically endpoint security) products and technologies
  • Experience using open standard protocols and methods for integration of multiple CONTS products into a seamless solution
  • Ability to represent organization as the prime technical contract on the program and interact with senior government, vendor and other contractor personnel on significant technical matters
  • Must have and maintain a DoD 8570 IAT/IAM Level 2 or higher certification
  • Experience with multiple endpoint security products
16

Endpoint Security Specialist Resume Examples & Samples

  • *This is a virtual/remote U.S. based role that requires the ability to participate in a monthly on-call rotation with other team members, and after-hours work may be required
  • Provide security monitoring, event analysis, and countermeasure proposals
  • 2-5 years experience with McAfee VirusScan, ePolicy Orchestrator 4.x and 5.x
  • 2-5 years experience with McAfee Host Intrusion Prevention
  • 2-5 years experience with Encryption software (McAfee Disk Encryption)
17

Endpoint Security Resume Examples & Samples

  • Minimum of 2-4 years of experience in a Workstation Engineering role is preferred, but is not mandatory. Other work experience (IT and Security) will be taken into account
  • Certifications such as CISSP, MCSE, and Security+ are preferred but not mandatory
  • Bachelor Degree requested, but will consider comparable work experience (5+ years) in lieu of degree
18

Endpoint Security Resume Examples & Samples

  • Strong interest in cyber security technologies
  • A strong technical and business understanding of endpoint tools methodologies to securely sandbox working environments
  • Expert knowledge on network technologies, diagrams and troubleshooting
  • Desire to work in a team environment
  • BS or MS in Computer Science or related degree preferred
19

Senior Endpoint Security Consultant Resume Examples & Samples

  • Install, test, evaluate customer ordered equipment and software
  • Train customers on how to use Accuvant installed technology
  • Ensure customer communication and satisfaction when project is complete to be sure project has met all proposal objectives and is completed on-time
  • Maintain professional and technical knowledge by attending educational workshops; reviewing professional publications; establishing personal networks; participating in professional associations such as ISSA
  • Expertise in Endpoint Security implementation and deployment specifically Carbon Black, Cylance and/or Traps
  • Expertise with one or more of our core Technology Areas: Security Event Management, Content Protection (DLP, Encryption, Access Control), Endpoint Security typically obtained in 3-5 years
  • Well-developed negotiation skills
  • Ability to manage multiple tasks in parallel
  • CISSP or other professional certifications
20

Technical Support Engineer, Endpoint Security Resume Examples & Samples

  • Provide Technical Support to customers and partners
  • Provide configurations, troubleshooting and best practices to customers
  • Managing support cases to ensure issues are recorded, tracked, resolved, and follow ups are done in a timely manner
  • Provide fault isolation and root cause analysis for technical issues
  • Publish Technical Support Bulletins and other technical documentation in the Knowledge Base
  • Review of technical documentation for training materials, technical marketing collateral, manuals, troubleshooting guides, etc
  • Travel may be required to customer sites in the event of a critical situation to expedite resolution
  • Provide on-call support 24x7 on an as needed basis
  • BS/MS or equivalent experience required
  • Required experience with supporting end point software products
  • Required strong experience with Windows OS based applications (Installation, troubleshooting, Debugging)
  • Strong experience with MS environment (Exchange, SCCM, GPO, AD, MSSQL, IIS)
  • Experience with end point security software is a plus (Antivirus, DLP, IPS, NAC)
  • Experience with Security is a plus (IPSEC / SSL-VPN / NAT / GRE)
  • Experience with batch scripting is a plus
  • Strong ability to independently debug broad, complex, and unique environments with mixed applications and protocols required
21

Endpoint Security Manager Resume Examples & Samples

  • Candidate should have Bachelors or equivalent degree in any discipline with 10+ years of total IT experience
  • Having 6+ years of hands-on experience on Endpoint Security technologies (Antivirus, Drive Encryption, etc) such as McAfee, Carbon Black, Red Cloak, etc
  • Extensive experience in deploying Antivirus & Endpoint Security tools at global scale
  • Evidence of professional experience in desktop security support / AV / Incident & Problem Management
  • ITIL Foundation certified
  • Experience in managing geographically distributed teams
  • Strong written and oral communication skills to document and communicate technical details, escalate critical issues, and interact with stakeholders at all organization levels within Honeywell
22

Endpoint Security Resume Examples & Samples

  • Administration, Configuration, Rule set creations, policy finetuning, in-line mode implementations and reporting of Endpoint Security Technologies like : Symantec Endpoint (SEP), Symantec DataCenter Security (DCS), Symantec Host DLP, Malware Bytes and FireEye APT
  • Hands on technical experience working on the above tools in medium to large environments
  • Good experience with customized reporting on compliances for these technology/tools
  • Hands on experience with integrating these security tools with the monitoring tools like SIEM
  • Should have worked on migrations, upgrades, deployement of these tools in medium to large environments
  • Should be able to create the detailed deployment and migration project plans for specific tool deployments and migrations
  • Work with all assett owners to gather pre-requisite scan/exclusion/exception requirements and able to perform thorough testing before roll out in productions
  • Lead the coordination and direction during virus outbreak situations. Lead the P1/P2 situations occuring off the mentioned tools
  • Work with vendor to request fixed for the identified defects in the products functionality
  • Own the technology roadmap proposals, identifying and implementation of service and security improvement plans
  • The onsite SME /lead for endpoint security services will be closely working with the customer stake holders including CISO to understand the requirements and shoud be able to convert them into understandable and actionable tasks for both onsite and offshore teams to implement
  • Should be managing the contractual deliverables and enabling the offshore team to meet these deliverables with high quality and timeliness
  • Should be hands on working on these technologies as part of roles and responsibilities in coordination with the L1/L2/L3 teams in onsite/offshore
  • Training/grooming the team members on these technologies
  • Strick SLA adherence for all contractual security related contractual deliverables
23

Endpoint Security Analyst Resume Examples & Samples

  • Perform console management for centrally managed solutions of endpoints security (e.g. antivirus, antispam, encryption, etc.)
  • Is responsible for monitoring and controlling the performance and status of security safeguards
  • Is responsible for the routine testing and analysis of security safeguards
  • Utilizes software and hardware tools to diagnose and resolve security incidents following agreed upon procedures
  • Implements solutions an performs modifications, installation and maintenance
  • Conducts assessments and reports vulnerabilities; monitors their ongoing management with the operations teams
  • Controls, monitors and verifies the compliance of the security controls put in place by the operations team and/or implements the operational components (e.g. software currency)
  • Provides containment recommendations for security incidents
  • Maintains operational documentation
  • College degree in Computer and/or Network administration with directly related practical experience
  • Prior knowledge in PCI-DSS certifications
  • Experience with FIM(File Integrity Monitoring) tools
  • Knowledge in ATP (Advanced Threat protection) and related products/tools
  • Knowledge in network related security solution (Host IPS/IDS, DLP, etc.)
24

Endpoint Security Expert, Gartner Research Resume Examples & Samples

  • Create and maintain high quality, accurate, and in depth documents or architecture positions in information security, endpoint security, anti-malware controls and/or related coverage areas
  • Prepare for and respond to customer questions (inquiries/dialogues) during scheduled one hour sessions with accurate information and actionable advice, subject to capacity and demand
  • Prepare and deliver analysis in the form of presentation(s) delivered at one or more of the company’s Catalyst conferences, Summit, Symposium, webinars, or other industry speaking events
  • Participate in industry conferences and vendor briefings, as required to gather research and maintain a high level of knowledge and expertise
  • Perform limited analyst consulting subject to availability and management approval
  • Support business development for GTP by participating in sales support calls/visits subject to availability and management approval
  • Contribute to research planning and development by participating in planning meetings, contributing to peer reviews, and research community meetings
  • Other duties and roles as assigned that complement the primary analysis and research role
25

Endpoint Security SME Resume Examples & Samples

  • 5 or more years of experience working with DoD mandated End Point security technologies (McAfee HBSS, ACAS solutions)
  • 3 or more years of experience as a Subject Matter Expert in host-based security roles
  • Bachelor's degree in Engineering or Computer Science
26

Endpoint Security Specialist Resume Examples & Samples

  • Knowledge management (KM) support of the ESS Program; ensure accurate version control on an approved document portal
  • Plan, control, oversee and conduct successful installation, development, training, conversion and perform acceptance testing of migration applications
  • Conduct site surveys, site planning, site installation, propose implementation timelines, initial system file and table builds, data acquisition/conversion and installation tests
  • Provide services necessary to convert from legacy systems to new applications including parallel operations
  • Application, system and network administration services
  • Maintenance of documentation related to system and network operations
  • Routine system problem identification and correction
  • Applications and systems modification, testing, installation, quality assurance, and training
  • Data extraction, transformation, and publication capabilities for event, product installation, configuration, and compliance data based on Enterprise deployment guidance and other directives
  • Port new data extraction and publishing requirements to earlier releases of the product
  • Provide data publishing capabilities including Structured Threat Information Expression (STIX), Trusted Automated Exchange of Indicator Information (TAXII), DoD Asset Reporting Format (ARF) and Asset Summary Reporting (ASR), NIST ARF and ASR
  • Provide comprehensive Situational Awareness reporting on threats against the DoDIN and visibility of assets in the DoD Enterprise
  • Support government development of Tactics, Techniques and Procedures (TTPs), SOPs and other documents to meet Situational Awareness program requirements
27

Endpoint Security Specialist Resume Examples & Samples

  • Dealing with viruses, Trojan horses, worms and other malware types. Prevent Incidents or resolve them when they occur
  • Maintenance and support of encryption software. Experience with McAfee EEPC, Microsoft Bitlocker and Checkpoint will be considered as advantage
  • Data Loss Prevention software support
  • Provide technical support, including monitoring, reporting and security software administration. This is most often done without direct interaction with the end-users
  • Centralized management of Anti-Virus software. Maintenance and support of McAfee, Symantec, Trend Micro and Microsoft security products
  • Continuous learning and technical training opportunities
  • Great opportunity for professional development in the IT field
  • Medical insurance
  • Life insurance
  • Good teamwork and communication skills
28

Endpoint Security Resume Examples & Samples

  • Application Management – responsible for understanding & complying with all application inventory and control requirements (SEAL , ARCs, certifications, data accuracy, role management, etc.)
  • Infrastructure Management - ensure applications are supported, inventoried and mapped
  • Technical Requirements Management – manage an inventory of technical requirements per application to ensure functional requirements are met
  • Control Compliance –understand & comply with all applicable IT controls
  • Break Management – conduct application control assessments to identify and subsequently remediate IT risk-related breaks
  • Infrastructure & Compliance Vulnerability Management– actively manage & remediate infra & compliance vulnerabilities on applications underlying system OS’s security vulnerabilities
  • Connectivity Assurance Management – actively manage & certify firewall rules for each application in the product portfolio
  • Alignment w/Tech Ops – coordinate with CTO and Tech Operate to manage incidents, complete control self assessments to drive down recurring incidents attributable to the same root cause
  • Infra Demand – understand and provide a forecast of the product’s multi-year infrastructure forecast
  • Action Plans –coordinate Cybersecurity Technology owned action plans related to the product
  • Release Management –manage all production releases of applications in the product portfolio
  • Third Party Oversight & Process Delivery Management – execute & manage all TPO process related requirements for product and professional service engagements
  • Opportunity Assessment (OA) – initiation for engagement request & provide executive sponsorship and business justification
  • Engagement Design (ED) – define the scope, complete due diligence and combined criticality classification (CCC)
  • Engagement Implementation – develop and execute implementation plan
  • Steady State Monitoring – manage ongoing performance to ensure third-party/vendor maintains compliance
  • Disengagement – notify stakeholders for disengagement, plan and execute disengagement activities
  • Bachelor's Degree in a relative technical field or equivalent field experience
  • Experience in a strategic cybersecurity role focused on incorporating enterprise level technology into various LOB based on business drivers
  • Experience in the area of people management on globally distributed teams
  • Experience in designing, developing and delivering the following as it relates to Cybersecurity in a mission critical environment
29

Infrastructure & Endpoint Security Principal Consultant Resume Examples & Samples

  • Database encryption technologies such as HPE’s SecureData (formerly Voltage), Gemalto’s (formerly SafeNet) ProtectDB, Thales / Vormetric, etc
  • Public key infrastructure (PKI)
  • Application encryption via crypto API integration
  • Large enterprise application encryption projects
  • Sensitive data discovery projects
  • Complex PKI integration projects
30

Endpoint Security Analyst Resume Examples & Samples

  • Support the Endpoint security service (Mcafee)
  • Evaluate and analyse business requirements and design suitable solutions, challenging requirements where necessary
  • Co-ordinate and implement technical project activities
  • Continuous review and development of service model
  • Ensure 1st and 2nd line Support personnel are correctly skilled and following process and standards
  • Maintain a controlled service in line with BIA and external regulators requirements
  • Participate in improvement projects, roadmap and GIS Cyber Strategy items
  • Demonstrable knowledge of Data Leakage Prevention techniques and toolsets
  • Negotiation and prioritisation skills; role will require the ability to negotiate and prioritise activities with stakeholders based on available resources
  • Documentation skills; will be required to provide high quality documentation for internal customers
  • Openness to learning additional Information Security technologies as business requirements change
  • Understands the requirements of strong governance in a large enterprise environment, particularly around change, incident and problem management, project management, business continuity planning / testing and meeting both regulatory and internal control objectives
  • Ability to review business problems / requirements and propose innovative solutions
31

Endpoint Security Analyst Resume Examples & Samples

  • Responsible for operating and maintaining Symantec Endpoint Security Manager
  • Provide subject matter expertise over endpoint access controls and endpoint security orchestration
  • Provide administration & support over the JM Family’s Endpoint Threat Detection & Forensics System
  • Provide administration & support over the Endpoint Protection Platform
  • Identify and communicate strategy and continuous improvements to endpoint security for the environment, mobile devices and cloud security
  • Validate and report on endpoint security compliance for the enterprise
  • Design and deploy endpoint security solutions across the enterprise
  • Evaluate and propose new technologies & solutions for securing the endpoint on premise and in the cloud
  • 5 - 10 years’ experience working in an information security related role managing endpoints in an enterprise environment
  • Advanced understanding with working experience of Endpoint Protection Platforms
  • Preferably Symantec Endpoint Protection versions 11.X or later
  • Advanced understanding of Endpoint Threat Detection and Response platforms
  • Support response to information security incidents
  • Experience documenting technical standards
  • Experience writing technical reports based on security findings
32

Desktop Support / Symantec Endpoint Security Resume Examples & Samples

  • Bachelor's degree in computer science, software engineering or relevant field required
  • 6 to 8 years experience required
  • Modify existing databases and database management systems or direct programmers and analysts to make changes
  • Write and code logical and physical database descriptions and specify identifiers of database to management system or direct others in coding descriptions
  • Work as part of a project team to coordinate database development and determine project scope and limitations
  • Review project requests describing database user needs to estimate time and cost required to accomplish project
  • Verbal and written communication skills, problem solving skills, customer service and interpersonal skills
  • Ability to work independently and manage one's time
  • Basic mentoring skills necessary to provide support and constructive performance feedback
  • Knowledge of the full software development lifecycle: from business/systems analysis, through requirements gathering and functional specification authoring, to development, testing and delivery
  • Ability to troubleshoot issues and make system changes as needed to resolve issue. Knowledge of circuit boards, processors, electronic equipment and computer hardware and software. Knowledge of computer development software across multiple platforms
33

Product Marketing Manager Endpoint Security Resume Examples & Samples

  • Creating impactful and differentiated product positioning and messaging, understanding the market and competitive landscape
  • Managing product launch activities and providing marketing guidance to cross-functional teams working across offering management, performance marketing and sales
  • Developing marketing campaigns materials including collateral assets and compelling marketing offers to drive pipeline and achieve revenue growth objectives
  • Creating thought leadership content including writing blogs, speaking engagements, client presentations and more
  • Creating impactful sales tools and support enablement efforts for sellers and partners with presentations, demos, training, white papers and more
  • Serve as a subject matter expert at IBM and customer events, and webinars including attending and speaking at IBM, customer, partner and industry events, webinars, customer engagements and more
  • Successful candidates will have a thorough understanding of the endpoint security landscape and be able to collaborate cross-functionally with performance marketing, sales, offering management and development
  • Demonstrated writing and content development skills and the ability to create compelling marketing collateral
  • Demonstrated presentation and speaking skills
  • Collaborative across the organization, working across teams in marketing, sales, research, offering management with the ability to navigate across multiple groups
  • Proven track record of executing marketing programs in fast paced environment
  • 5+ years of Security or applicable industry experience
  • Experience or knowledge of sales, marketing and development processes
  • Demonstrated analytical and presentation skills including demonstration skills to handle many assignments simultaneously
  • Bachelor’s/Master's in business or marketing, or equivalent industry experience
  • Able to develop effective relationships and operate with senior level management
34

Endpoint Security Engineers Resume Examples & Samples

  • Minimum of 5 years of experience with the development, integration, and implementation of software packages and endpoint security solutions
  • Experience with multiple endpoint security products (McAfee ePolicy Orchestrator and other Host based Security environments)
  • Minimum 5 years of experience working with DoD mandated End Point security technologies (Intel HBSS, ACAS solutions)
  • Knowledge of McAfee products such as: Enterprise Policy Orchestrator, Anti-Virus, Endpoint Encryption, Agent Handler, and Host Intrusion Prevention System
  • Experience with System Engineering best practice
  • DoD 8570 IAT Level II Certification - e.g. CompTIA Security+
  • Configure, integrate, maintain and optimize the capabilities of the ESS ecosystem
  • Develop, integrate and maintain SHB and other ESS capabilities as a single deployable package
  • Conduct analyses to develop an understanding of the system’s requirements and ultimately mitigate risk
  • Review all applicable documentation such as DoD guidance, policies, directives, and U.S. Code as a part of their on-going analysis
  • Develop data collection tools, conduct surveys, hold meetings with stakeholders, analyze data, and consolidate and refine user requirements to identify essential system functions
  • Compare current HBSS requirements and gaps to determine if the tool is meeting the government’s overall endpoint security requirements
  • Perform cybersecurity feasibility assessments, to ensure ESS capabilities meet government-defined ESS endpoint security requirements
  • Determine if ESS capabilities integrate with existing infrastructure
  • Develop schedules and implementation plans with defined deliverables, including parallel operations
  • Validate interoperability between ESS capabilities, and other Commercial off the Shelf (COTS) and Government off the Shelf (GOTS) solutions (e.g. ACCM, APS, OAM, etc.)
  • Identify, model and verify system interfaces both internal and external to the ESS
  • Maintain ESS architecture and capabilities through testing, validation and integration of application upgrades, hotfixes, and patches
  • Utilize DOORS and MagicDraw to develop System Engineering models and manage requirements
  • Oversee installation, upgrade, and patching of the program systems and products
  • Expert knowledge of McAfee products such as: Enterprise Policy Orchestrator, Anti-Virus, Endpoint Encryption, Agent Handler, and Host Intrusion Prevention System
  • In-depth knowledge of Microsoft, Linux, and Apple Operating Systems
  • Familiar with VMware ESX and demonstrated capability to accomplish tasks using virtual infrastructure
  • Strong systems administration troubleshooting skills
  • Experience with databases including MS SQL, MySQL, Oracle
  • Working knowledge of network engineering including routers, switches, firewalls, VPN and NIDS
  • Familiar with Security Information Event Managers (e.g. Splunk and/or ArcSight
  • Minimum 3 years of experience as a Subject Matter Expert in host based security roles
  • Bachelor's Degree in Computer Science, Cyber Security, or equivalent professional experience
  • Extensive knowledge of capabilities and configurations of HBSS in an enterprise
  • DoD 8570.1 IAT Level II compliant certification
  • Ensure functionality and compatibility requirements are preserved, documented and well controlled as system baseline changes are introducedOversee and conduct integration of current GOTS endpoint products into the ePO 5.3.1 capability and verify internal and external system interfacesISC2 Certified Information Systems Security Professional (CISSP) certification
  • HBSS certification
  • Expertise with the following: ePO Server, Asset Baseline Monitor (ABM), Data Loss Prevention (DLP), Host Intrusion Prevention System (HIPS), Product Coverage Reports (PCR), Policy Auditor (PA) and Policy Auditor Agent (PAA), Virus Scan Enterprise (VSE), Antispyware, McAfee Agent, Rogue Sensor Detector (RSD), Device Control Module (DCM)
  • Minimum 5 years of practical experience in configuration management
  • Experience with IBM Rationale ClearCase, or equivalent software configuration management (SCM) tool
  • Bachelor degree in Business Administration, Computer Science or equivalent practical experience
  • Experience managing the daily execution of the Information Technology Change Management Process
  • Experience planning, executing, controlling, measuring, monitoring and reporting on all configuration management activities impacting applications and infrastructure systems
  • Experience managing and executing the software build and release process
  • Experience documenting and maintaining technical baselines, overseeing Change Request process, and ensuring configuration management system supports agile development processes
  • Experience outlining the status of change management activities and identifying any issues requiring management intervention
  • Three (3) years of Security Systems experience with recent and relevant HBSS background is desired
  • DOD 8570 IAT Level II certification
  • Minimum six (6) years of Security Systems experience with recent and relevant HBSS background
  • Expert on HIPS/NIPS signature development and customization
  • Minimum of three (3) years experience interpreting security vulnerability protection requirements and translating them into IPS signatures
  • Three (3) years experience troubleshooting IPS signatures
  • Three (3) years experience writing cyber security policies
  • Ability to transform custom developed HIPS/NIPS content into a core HIPS/NIPS content package stream for consumption by ePO
  • Ability to transform severity and prioritization of existing “McAfee Default” IPS content into “DoD Default” customized HIPS/NIPS content
  • Minimum of Bachelor’s Degree in Information Systems, Computer Science, Cybersecurity, Computer Engineering, or related discipline
  • Minimum DOD 8570 IAT Level II Certification
  • Background in Microsoft Systems Security and configuration along with use and operation of HBSS
35

Infrastructure & Endpoint Security Senior Consultant Resume Examples & Samples

  • Actively contribute to DXC Security’s solutions portfolio by providing information ranging from technical knowledge to methodologies based on experience gained from customer projects
  • Shape technical direction and technical strategies within the organisation and for external customers
  • Applies advanced subject matter knowledge to complex business issues, and is regarded by others within DXC Security as a subject matter expert
  • Frequently contributes to the development of new ideas/methods
  • Usually works on complex problems or projects where analysis of situations or data requires an in depth evaluation of multiple factors
  • Regularly exercises significant independent judgment within broadly defined policies and practices to determine best method for accomplishing work and achieving objectives
  • Sometimes directs and supervises within area of expertise but does not manage other employees as a primary job function
  • 3-5 years proven track record of extensive experience in enabling installations and configurations products mapping to the DXC Security portfolio
  • Strong networking skills with experience of configuring complex environments are paramount to this role
  • Check Point
  • Blue Coat
  • Fortinet
36

Infrastructure & Endpoint Security Principal Consultant Resume Examples & Samples

  • As trusted advisor create and maintain effective customer relationships so as to insure customer satisfaction
  • Maintain knowledge of leading edge technologies and industry/market domain knowledge
  • Accountable for consistent and significant chargeability levels (or expense relief for internal project teams) and for assisting in meeting or exceeding revenue and customer satisfaction goals
  • Contribute to organisation’s profitability by generating and cultivating new business opportunities and by providing technical support for deal proposal development
  • Leads and/or provides expertise to functional project teams and may participate in cross functional initiatives
  • Provides mentoring and guidance to employees at lower job levels
  • Acts as an expert providing direction and guidance to process improvements and establishing policies. Frequently represents the organisation to external clients
  • FireEye
37

Infrastructure & Endpoint Security Senior Consultant Resume Examples & Samples

  • Hardware security module (HSM)
  • Certificate management technologies (e.g. Venafi)
  • Working knowledge of Oracle and SQL Server databases
  • Enterprise application encryption projects
  • Data tokenization projects
38

Endpoint Security Subject Matter Expert Junior Resume Examples & Samples

  • 3 or more years of experience working with DoD Endpoint security technologies (McAfee HBSS, ACAS solutions)
  • 1 or more years of experience as a Subject Matter Expert in host based security roles
  • Associate's degree in Engineering or Computer Science or applicable military/DoD experience
  • IAT Level II or Higher Certification (DoD 8570.01)
39

Endpoint Security Subject Matter Expert Senior Resume Examples & Samples

  • Event data
  • Product installation data
  • Configuration data
  • Compliance data based on Enterprise deployment guidance and other directives. Employee shall port any new data extraction and publishing requirements to earlier releases of the product(s) and address DoD requirements for scalability and security of Enterprise data reporting requirements
  • 5 or more years of experience working with DoD Endpoint security technologies (McAfee HBSS, ACAS solutions)
  • 3 or more years of experience as a Subject Matter Expert in host based security roles
  • Bachelor's degree in Engineering or Computer Science or applicable military/DoD experience
40

Endpoint Security SME Resume Examples & Samples

  • Symantec Endpoint Suite (Endpoint Protection, Encryption, Data Loss Prevention, PGP)
  • Common attack/exploit vectors and industry-standard mitigation strategy
  • Knowledge of common issues and implementation challenges
  • Knowledge of hardening endpoints and network infrastructure against attack
  • Strong Analytical and Problem Solving Skills
41

Senior Security Infrastructure Consultant Endpoint Security Resume Examples & Samples

  • Identify, assess and upgrade customer information technology infrastructure regarding risks and vulnerabilities
  • Document (textual and graphical as appropriate), communicate, recommend and take appropriate action to resolve, risks and issues associated with security vulnerabilities across the Customer IT Environment
  • Install, maintain, stage, automate and operate Security Services (Services, Equipment and Software), including virus Software and definitions/signatures, patches, host based agents, Data Loss Prevention (DLP), web filtering, spam prevention and other Monitoring software, based upon supplier version release keeping the Customer IT Environment updated at N Release Level at all times, subject to Customer-approved waivers
  • Perform e-mail security management, with a focus to reduce spam, filter inappropriate content, and Viruses
  • Provide, maintain (at N Release Level) and administer end point security management tools: (a) anti-virus (e.g., Symantec, Palo Alto and TrendMicro), (b) data loss prevention (“DLP”) (e.g., WebSense and Palo Alto), (c) web filtering (e.g., WebSense and Palo Alto) and (d) spam filtering (e.g., Proofpoint) across Customer IT Environment, Authorized Users, data center and Network Assets
  • Monitor end point security tool sets, including NIDS, HIDS, DLP Systems, and Network behavioral analysis tools (e.g., Arbor PeakflowX)
  • Document, maintain (at N Release Level) and manage DLP (host and Network) existing Equipment, software and tools
  • Manage DLP rules based on Customer policies and procedures
  • Notify Customer of Viruses and System vulnerabilities or threats that could lead to adverse effects on Customer; such notice shall be provided within agreed SLA of the Virus, System vulnerability or threat being published by industry-recognized sources or identified by Service Provider
  • Work with minimal supervision as an individual contributor and as part of a team
  • 8 - 10 years related work experience
  • 10 or more years of technical experience required, including at least 5 years in security services
  • 2-3 years of hands-on experience in the following technologies
  • WebSense Web Content Filtering
  • TrendMicro Deep Security (HIDS)
  • MobileIron/Mobile Device Management/ProofPoint
  • Strong analytical skills required
  • Must have excellent written and verbal communication skills and be able to
  • Read, analyze, and interpret common scientific and technical journals
  • Document procedures that conform to a prescribed style and format
  • Present information to management, public groups, and/or boards of directors
  • Previous consulting experience within a Professional Services organization
  • Industry certification such as CISSP, CCSE,
  • SANS or other Security certifications, such as GCIA, GCIH, GREM, GPEN, CEH
42

Infrastructure & Endpoint Security Senior Consultant Resume Examples & Samples

  • Network and next-gen Firewalls (Check Point, Fortinet, Palo Alto, Cisco, etc.)
  • Intrusion detection/prevention (TippingPoint, McAfee, Cisco, IBM, etc.)
  • Network access control (NAC) (Aruba, Cisco, etc.)
  • Sandboxing and Analytics (FireEye, Damballa, Check Point, Fortinet, Palo Alto, etc.)
  • Application security (F5, Imperva, Citrix, Akamai, etc.)
  • Network proxies (Blue Coat, Zscaler, McAfee, Websense, etc.)
  • Network admission control (NAC) (Aruba ClearPass, ForeScout, Cisco, etc.)
  • Firewall management and auditing (FireMon, Tufin, AlgoSec, RedSeal, Skybox, etc.)
  • Network packet brokers (Gigamon, IXIA, NetScout, etc.)
  • SSL decryption (Blue Coat, F5, Gigamon, IXIA, etc.)
  • Cloud access security brokers (CASB) (Symantec / Blue Coat / Elastica, Adallom, Skyhigh, etc.)
  • Hardware security modules (HSM)
  • Authentication solutions (RSA, Entrust, smartcard, biometrics, etc.)
  • Endpoint protection (Symantec, McAfee, Bit9, Tanium, CrowdStrike, Cylance, Bromium, etc.)
  • Data loss prevention (DLP) (Symantec, McAfee, Websense, etc.)
  • System management technologies (Symantec, Microsoft, HPE Server Automation, etc.)
  • OS Hardening (Windows, Linux, UNIX, etc.)
  • Virtualization on a large scale (VMware, Microsoft, Citrix, etc.)
  • E-mail security (Proofpoint, HPE SecureData, Microsoft, Symantec, etc.)
  • VM segmentation (VMware NSX, Illumio, vArmour, GuardiCore, etc.)
  • Mobile device management (MobileIron, AirWatch, etc.)
  • Log collection and aggregation (ArcSight, McAfee / Nitro, Splunk, IBM/QRadar, etc.)
  • File integrity monitoring (Tripwire, NNT, etc.)
  • Microsoft Office 365 security
  • Azure and/or AWS security
43

Infrastructure & Endpoint Security Principal Consultant Resume Examples & Samples

  • 10 + Years’ Experience in IT Security and Investigations
  • Demonstrated experience of leading teams of investigators on diverse and complex investigations
  • Mentor and or identify training to personnel
  • Demonstrated experience of SOC, Digital Forensic and Incident Response operations
  • Targeted Threat Intrusions are a complex issue, requiring a logical, intelligence driven human response to counter it
  • Excellent team and case management skills
  • Excellent reporting (written and verbal) skills – Client (to C Level) and internal
44

Endpoint Security Analyst Resume Examples & Samples

  • Provide operations, maintenance, life cycle management, and administration for the DSS suite of endpoint applications
  • Support the integration of EndPoint security into the SIEM
  • Support a comply to connect solution to ensure highly mobile DSS users vulnerabilities are mitigated prior to the device and user is allowed on the DSS enclaves
  • 2 years’ of Cyber Security experience with a Bachelor’s degree in a technical specialty: cyber security, computer science, or similar field (0 years’ with a Master’s). May accept four (4) years of additional relevant experience in lieu of a degree
  • Experience working with a combination of ACAS, SRG, STIGs, IAVMs
  • Understanding of Life-Cycle management of endpoint applications
  • Experience with Endpoint Security and situational awareness tools such as McAfee HBSS
  • Experience with Cyber security policies, operations, and reporting requirements
  • IAT-I or II IA Baseline Certification (SEC+)
  • Computing Environment or OS Certificate
  • Knowledge of particular networking technologies, operating systems, and CND tools, tactics, techniques, and procedures which are part of the systems they support
  • CCNA certification
  • Experience with DoD Enterprise Endpoint Security solutions capabilities
  • Experience with TASKORD, FRAGO, and OPORD
  • Experience with ArchSight, McAfee, Cisco and Juniper product, Forescout