Engineer, Information Security Resume Samples

4.7 (103 votes) for Engineer, Information Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the engineer, information security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
AS
A Stracke
Arnold
Stracke
55975 Lowell Point
Los Angeles
CA
+1 (555) 358 8668
55975 Lowell Point
Los Angeles
CA
Phone
p +1 (555) 358 8668
Experience Experience
Dallas, TX
Engineer, Information Security
Dallas, TX
Shields, Hansen and Stracke
Dallas, TX
Engineer, Information Security
  • Creating, releasing and tracking of SAP Transport Management process
  • Review existing Cardinal Health SAP implementations to identify short & long term recommendations to improve security & controls
  • Perform analysis of existing role structure, provisioning processes and security designs in place and ensure new systems/enhancements support the design
  • Usually determines own work priorities
  • Works independently with minimal guidance
  • Drives major information security initiatives through the system development lifecycle
  • Troubleshoot day to day security issues and provide solutions
Houston, TX
Information Security Engineer / Analyst
Houston, TX
Kulas-Kutch
Houston, TX
Information Security Engineer / Analyst
  • Perform system administration tasks relating to account provisioning (on-boarding and off-boarding, suspension, etc.)
  • Familiarity with NIST 800-53, FISMA, FIPS, Privacy Shield, EU GDPR frameworks and regulations
  • Configure and maintain informational/identity access management, host and intrusion detection tools
  • Collaborate with IT teams to define and establish secure configuration standards for core infrastructure
  • Manage and maintain security to ISO 27001 standards
  • Create, deploy and monitor reports of computer systems (servers, firewalls, routers, applications, etc.) to determine unauthorized access or changes
  • Other services as requested Information Security Leadership
present
Houston, TX
Senior Information Technology Security Engineer
Houston, TX
Denesik, Thompson and Lakin
present
Houston, TX
Senior Information Technology Security Engineer
present
  • Develops metrics and analyzes performance of security processes and technologies based on data
  • Performs independently; informs managers or senior leaders of projects’ progress and issues encountered; recommends solution
  • Seeks ongoing improvements to the organization’s information security processes and procedures
  • Diagnoses cyber security system hardware, software and systems failures using established procedures
  • Evaluates risk, assesses controls, and identifies improvements to mitigate risk
  • Identify security risks and develop solutions to eliminate or minimize them
  • Participate in enterprise security architecture design and documentation of security architecture, processes, procedures, standards, and work instructions
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of Massachusetts Amherst
Bachelor’s Degree in Computer Science
Skills Skills
  • Knowledge of basic networking and computer systems
  • Able to work under pressure and balance work load to ensure measurable progress on multiple high priority projects
  • Ability to manage and prioritize multiple assignments supporting business as usual, user requests as well as special projects
  • Able to work both independently as well as collaboratively achieving results within established timeframes with minimal supervision
  • Works to ensure the stability of security systems/appliances are functional and improved upon for pro-active cyber defense
  • Excellent verbal, written and listening communication skills
  • Ability and willingness to work long or late hours, based on system release and/or network update schedules
  • Superb customer service skills
  • Exemplarily interpersonal skills necessary to interact effectively with team members, project managers, developers, engineers, vendors, users and business analysts as well as executive and senior management
  • Work with security and IT operations to implement remediation plans in response to incidents
Create a Resume in Minutes

15 Engineer, Information Security resume templates

1

Mobile Applications Information Security Engineer Resume Examples & Samples

  • Engagements with project managers and developer leads to ensure proper technology risk considerations are addressed at each phase of the system development life cycle (SDLC) and provide proactive solutions to correct exposures or mitigate risk
  • A minimum of 2 year’s previous experience in mobile application development, security/card product development and product enhancement initiatives
  • Strong knowledge of software development/deployment methodologies in web/mobile based environments
  • Must be able to understand detailed technical procedures, projects, SDLC and Web Development Architecture, Ethical Hacking Process etc
  • Strong knowledge of web application and mobile security
  • Understanding of information security and risk analysis processes
  • Knowledge of cryptographic methods and the ability to security review mobile applications in the assessment of authentication, authorization, encryption/data protection, data validation, session management, logging and auditing, error and exception handling and configuration management based upon threat scenarios as applied to a specific application and network architecture
2

Information Security Engineer Application Resume Examples & Samples

  • 5+ years of IT infrastructure proficiency and experience that could include one or more of: Encryption, Tokenization, Forensics/eDiscovery, Penetration Testing, Firewalls (OS, WAF), Proxies, Gateways, Routers, VPN, etc
  • Foundational understanding of several enterprise environment technologies
  • Cloud, Windows, Unix, iOS and mainframe platforms
  • Oracle, SQL Server, LDAP, MySQL
  • JAVA, .NET, Objective C, AJAX, SOA, CHEF, PUPPET, Ruby, PowerShell, SOAP, CML, JSON, etc
  • Solid understanding of cryptographic processes, techniques, PKI, and key management principles
  • Proven ability to assess, recommend and deploy and integrate Information Security tools
  • Ethical Penetration Testing experience is a plus
3

Applications Information Security Engineer Resume Examples & Samples

  • Security consulting with engineering teams in the areas of chip card (contact and NFC), mobile applications, and new technology initiatives
  • 7 to 10 years in Information Technology and/or Information Security as Security Architect or Application Architect with Security knowledge and skill
  • A minimum of 2+ year’s previous experience in mobile application development, security/card product development and product enhancement initiatives
4

Cyber Information Security Engineer, Junior Resume Examples & Samples

  • 1 year of experience with information security, including developing and providing guidance in the formulation of information security policies and security standards
  • Experience with writing and providing review and updates to security plans and assisting engineers with developing and maintaining security measures to ensure and improve the security posture of the organization
  • Experience with representing organizational mission interests at the technical exchange meetings, sponsor information system program boards, and other information security-related meetings
  • Experience with education and enforcement of information security compliance issues and providing advice, guidance, and interpretation of information security policies and issues within the organization by presenting information security training modules, lessons, and courses
5

Information Security Engineer for Cisco Managed Threat Defense Service Resume Examples & Samples

  • BS/MS in computer science or related degree and 5+ years of experience
  • Extensive experience in network design and support with thorough understanding of
  • Intrusion Detection, flow collection, intrusion prevention technologies
  • Cisco NetFlow, IDS/IPS, ASA, ISE
  • Cisco UCS and virtual machine technologie
  • Sourcefire FireAMP , NGIPS, Snort
  • Anue
  • Silk for NetFlow
  • Various log source such as host, network, DHCP, DNS, AD, 802.1x, NAT, and VPN
6

Senior Engineer, Information Security Resume Examples & Samples

  • Basic understanding of WAN technologies including ATM, Frame-relay, MPLS-IP/VPN, and IPSec tunnels
  • Extensive experience in firewall technologies
  • Understanding of encryption tools and products
  • Manage monitoring and alerting tools
  • Breadth of technical experience in applications including: messaging middleware, service oriented architectures, web services, XML and databases
  • Demonstrated ability to perform troubleshooting in complex environments
  • In-depth knowledge of ports, protocols, and communications at the network layer, including the use of network analysis tools
  • Oversee development and dissemination of help sheets, usage guides, knowledgebase and FAQs
  • Experience with load balancing technologies, such as F5, including layer 7 firewalling, a plus
  • Minimum 3 + years of Information Security experience with a minimum of 2 years dedicated to hands on experience with maintaining information security systems (preferably Enterprise level)
  • Minimum of 4+ years of experience in IT including operational, support
  • Bachelor’s Degree or equivalent experience in Computer Science, Information Security, or diploma in Information Technology/Security
  • CISSP Designation desirable
  • Experience with a financial services related company is desirable
  • Excellent organization, planning and communication skills (written and oral)
7

Information Security Engineer Forensics Resume Examples & Samples

  • Perform Forensic analysis as part of Incident Response process
  • Build and maintain global forensic platform for Autodesk
  • Build reverse engineering capability and develop threat intelligence
  • Experience with host and network based forensic tools including packet captures tools, EnCase, FTK, Sleuth Kit, SIRT, GRR, Carbon black, MIR etc
  • Strong experience in post incident forensics using log analysis and host based tools
  • Experienced in evidence collection and preservation procedures
  • Experienced of or familiarity with operating Threat Intelligence based incident response process
  • Experience with sandboxing technologies, reserve engineering and malware analysis
  • Strong Windows and Unix/Linux experience
  • Advanced interpersonal skills to effectively promote ideas and collaboration at various levels of the organization
8

Information Security Engineer Incident Response & Threat Intelligence Resume Examples & Samples

  • Track down targeted malware and defend against active adversaries
  • Incident response and investigations
  • Gather threat intelligence and build, optimize, and automate systems to consume threat feeds and track adversaries
  • 1-3 years’ experience in the field of information security in at least three of the following areas: application whitelisting, security engineering, incident handling, malware analysis, active adversary threat management, penetration testing, intrusion detection, firewall access control technologies, risk management, vulnerability management, identity management, Windows or Unix security, cloud security, encryption technologies, or endpoint security controls
  • Experience with log correlation engines, application whitelisting, endpoint forensic and visibility, IDS, malware sandboxing, threat intelligence, netflow, packet capture and malware types is a plus
  • Familiarity with python or similar language
9

Information Security Engineer Threat Intelligence Resume Examples & Samples

  • Build, develop and implement a framework for developing threat actor profiles, including adversary TTPs, associated IOCs and known campaigns as well as provide guidance for protecting Autodesk systems
  • Design, develop and implement automated tools to increase incident response efficiency
  • Experience in operating Threat Intelligence based incident response process
  • Experience with Threat management systems and familiarity with IOC sharing standards
  • Strong experience in OpSec and threat intelligence collection
  • Strong Unix/Linux experience
10

Information Security Engineer Threat Vulnerability Management Resume Examples & Samples

  • Plans, develops, and executes vulnerability scans of organization information systems
  • Analyzes data from threat and vulnerability feeds and analyzes data for applicability to the organization
  • Governs enterprise vulnerability assessment and configuration assessment tools
  • Identifies and resolves false positive findings in assessment results
  • Performs compensating controls analysis and validates efficacy of existing controls
  • Generates reports on assessment findings and summarizes to facilitate remediation tasks
  • Researches, designs, and implements information security solutions for organization systems and products that comply with all applicable security policies and standards
  • Works with IT and internal and external business partners to ensure that security is factored in the evaluation, selection, installation and configuration process of hardware and software
  • Review, assesses, and approve work plans, products, and other artifacts to address information security risk
  • Analyzes and makes recommendations to improve network, system, and application architectures
  • Examines network, server, and application logs to determine trends and identify security incidents
  • Assists in the review and update of information security policies, architectures, and standards
  • Assists in responding to audits, penetration tests and vulnerability assessments
  • Coordinate annual and ad-hoc penetration tests and vulnerability assessments and resulting remediation
  • Like learning new things
  • Possess strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
  • 3-5 years of relevant experience
  • Security requirements
  • Ability to identify key controls
  • CISSP, CISA, or Similar work experience
11

Information Security Project Engineer Resume Examples & Samples

  • Assist the project team and the information security manager to develop and maintain security artifacts for the project
  • Review of security design and documentation
  • Work with the project team and operations team to with the user access management
  • Drafting and executing the non-functional security test plan
  • Development of security test cases, and performing UAT
  • Scoping and review of security assessment such as penetration testing and vulnerability assessment
  • Working with external security teams to perform the vulnerability assessment and application penetration testing
  • Assist with the implementation and configuration of security controls
12

Information Security Engineer / Architect Resume Examples & Samples

  • A Bachelor's or Master's degree in Computer Science, Information Systems or other related field; or equivalent work experience. Must have experience coordinating multiple concurrent issues, possibly in high-pressure situations
  • Minimum five years of security work experience with a broad exposure to infrastructure/network and multi-platform environments
  • In-depth knowledge of network protocols, security design, firewall and network architecture, Microsoft Windows and Unix OS, database architecture
  • Must be detail oriented, have excellent communication and documentation skills
  • Must have experience designing and architecting secure public cloud infrastructure
13

Security Information & Event Management Engineer Resume Examples & Samples

  • Act as the subject matter expert for the customer’s SIEM solution
  • Maintain SIEM operations and document current environment
  • Incorporate change management into all system changes
  • Assist in troubleshooting and problem solving a wide variety of client issues
  • Ability to maintain a DoD clearance
  • Minimum of eight years managing/utilizing a SIEM solution
  • Experience in performing infrastructure support at an enterprise level
  • Ability to demonstrate strong knowledge of computer security concepts
  • People skills, and the ability to communicate effectively with various clients with the ability to explain and elaborate on technical details
  • Experience with industry recognized SIEM solutions such as ArcSight, Splunk, LogRhythm, AlienVault, etc
  • Relevant IT certifications such as CCNA, CCNP, JNCIA, etc
  • Vendor certification in a SIEM technology
  • Experience with change control policy and procedures
  • Strong analytical, problem-solving and decision making capabilities
14

Information Security Engineer / Analyst Resume Examples & Samples

  • Performing risk assessments for projects, and providing guidance to leadership on the appropriate course of action
  • Subject matter expertise and guidance to project teams that request or require Information Security participation
  • Lead Information Security specific projects such as network redesign, Active Directory redesign, Network Access Control, etc. This includes filling out all required project artifacts, attending project review meetings and transitioning of knowledge to support teams
  • Other services as requested Information Security Leadership
15

Gcg-information Security Engineer Resume Examples & Samples

  • Design and engineer the security solutions to protect the digital channels
  • Identify, define system security requirements and design system security architecture
  • Explore and evaluate emerging security trends and solutions
  • The individual will work closely with development, architect and business teams
  • Degree in Computer Science or relevant qualifications
  • Through working understanding of Information Security concepts and architecture elements in the area of identity and access management, cryptography, logging and monitoring
  • Experience in security design, threat modeling and risk assessments
  • Strong knowledge of current development technologies (web Services, Service Oriented Architectures, emerging development architecture, such as Microservices, API, Containers etc
16

Security Engineer Technology Information Risk-VP Resume Examples & Samples

  • You will be expected to drive the determination and implementation of solutions (large or small) across authentication and identity platforms
  • You will deliver initial PoCs and document the design and architectures for these solutions
  • You should drive the productionisation of the solution across appropriate engineering and operations teams
  • You role will include researching vendor and open source solutions and determine fit into strategy and architecture
  • You should interface with technical contacts at external vendor providers and other internal teams to ensure a holistic solution
  • Excellent understanding of enterprise authentication and web security
  • Excellent understanding of the internet protocols TCP/IP, HTTP, SSL/TLS etc
  • Good knowledge/experience on Windows as well as Linux based authentication products and services
  • Good knowledge of emerging authentication standards like SPNEGO, OAUTH, OpenID Connect, JWT
  • Proven architectural and design background
  • Proven development experience in OO languages
  • Experience of public key infrastructure
17

Information Security Federated Identity Management Engineer Resume Examples & Samples

  • Security engineer will take the technical lead in the implementation and process definition for the Privileged Access Management roll-out which includes: Enterprise Password Vault, Privileged session management, Application identity, etc
  • Security engineer will integrate the PAM solution with the company IT landscape and define interfaces to the PAM ecosystem e.g. identity & access management solutions (IAM), Security information and event management (SIEM), etc
  • This will include the analysis of the as-is-access control, design to-be-access control and the integration of the PAM solution with the internal business systems & core platforms, job automation methods and their transitioning into the Privileged Access Management solution
  • Develop strategy and approaches and implement the full life cycle of the Identity and Access Management (IAM) program as part of the Information Security services; access, plan, test, report and recommend appropriate remediation measures to ensure Information Security access management processes and standards are maintained
  • Assist in the development of the IAM security architecture, policies, principles and standards; ensure architecture meets best practices based on industry and organizational needs
  • Conduct IAM and Role Based Access Controls (RBAC) review for new applications and scheduled access validation of critical Fund applications; partner with Information Technology (IT) and various business units to discuss access issues, explain access rights and manage process
  • Follow up on access management deficiencies identified in risk reviews, self-assessments, risk assessments, internal and external audits; ensure appropriate remediation measures are implemented
  • Support and engineer cross-functional security initiatives across the enterprise
  • Sound experience in a security domain, preferably in a software development environment
  • Experience with PAM, Identity and Access management (IAM, IDM) & SIEM solutions
  • Good understanding of the Authentication mechanisms and protocols (LDAP, RADIUS), Encryption mechanisms and protocols (Ipsec, SSL) AKA VPN,
  • Software development skills & familiarity with .NET Application & Microsoft technology stack
  • Good overall knowledge of security architecture and risk assessment is a plus
  • Able to understand, analyze and communicate with impact on complex technical issues and concepts. Bachelor’s degree in Information Security or equivalent years of experience required
  • 7+ year’s general information technology experience across different platforms (Windows, UNIX, Mainframe, and Tandem), etc
  • 4+ years of professional experience in management and deployment of security tools
  • Experience troubleshooting information security related problems and incidents; knowledge of security architecture including encryption, firewalls, VPN’s, anti-virus systems and vulnerability management preferred
  • Familiarity with mobile device management (MDM), SaaS and cloud
  • Knowledge of data security and protection techniques
  • Knowledge of Public Key Infrastructure (PKI) and certificate based authentication
  • Knowledge of regulatory requirements and compliance (PCI, SOX, and/or HIPAA)
  • Knowledge of application security and application security practices
  • Professional certifications desired (CISSP, ISACA, GSEC, MCP others)
18

Senior Engineer, Ent Information Security Resume Examples & Samples

  • Undergraduate degree and five (5) years of experience as a Cyber Incident Responder; or equivalent combination of education and experience substituting 1 year of additional experience equivalent to 1 year of education
  • Demonstrative knowledge in information technologies to include computer hardware and software, operating systems and networks
  • Understanding and applied concepts of computer forensics
  • Strong analytical and investigative skills
  • Solid decision-making skills
  • Clear written and oral communication skills
  • Self-discipline and focus with attention to detail
  • Cyber Incident Handling Experience
  • Experience with programing and scripting languages such as: Python, Perl, Assembly, C, C++
  • Experience working with SIEM solution (ArcSight preferred)
  • Innovative problem-solving
  • Certifications: Preferred
  • Experience with high level design architecture, security technologies, Networking, web services and SOA Understanding of encryption, obfuscation, tokenization technologies
  • Bachelors Degree. Computer Science or Information Technology
  • 4 years of college courses in Information Technology, Certifications combined with relevant work experience may be substituted for education requirements
19

Cyber Information Security Engineer, Junior Resume Examples & Samples

  • 3 months of experience with information security
  • Experience with current information technologies as it relates to information security
  • Experience with evaluation and compliance of Sponsor IT systems for the assessment of vulnerabilities and providing appropriate security countermeasures to ensure implemented security architectures comply with enterprise-level security architecture standards
  • Knowledge of Microsoft, Cisco, and McAfee
  • AA or AS degree in CS, Information Systems, Engineering, Business, or a related technical field and 4+ years of experience with information security, BA or BS degree in CS, Information Systems, Engineering, Business, or a related technical field and 2+ years of experience with information security, or MA or MS degree in CS, Information Systems, Engineering, Business, or a related technical field
20

Information Security Engineer, Junior Resume Examples & Samples

  • 2+ years of experience in the Cybersecurity or information assurance field
  • Experience with supporting DoD IT, networks, or systems design and integration
  • Knowledge of government Risk Management Framework (RMF), DoD 8510.01, and NIST 800 standards
  • Ability to lead in a dynamic and challenging IT environment
  • DoD 8570.01-M IAM Level II and Associated Continuing Education (CE) Certification
  • Experience with technical writing and technical documentation
  • DoD 8570.01-M IAT Level III or IAM Level III or Certified Ethical Hacker (CEH) Certification preferred
21

Lead Engineer, Information Security Resume Examples & Samples

  • Configure, document, and maintain various security devices (, proxy servers, email gateways, Host IDS, AV, DLP, DNS servers, Assessment and monitoring tools)
  • Assess organization’s applications to identify and verify common application security vulnerabilities
  • Utilize commercial and open source application assessment tools
  • Provide technical leadership for security strategy
  • Work as a mentor to Information security engineers and analysts
  • 5 to 8 years experience
  • Information security related certification/s such as CEH, GIAC
  • Understanding of UNIX/ Linux and Microsoft Operating Systems
  • Strong understanding of computer networking technologies, architectures and protocols
  • Demonstrable skills in Security devices configuration and troubleshooting
  • Ability to analyze technical risks and provide remediation steps
  • Product specific certifications such as MCSE, CCNA security. CEH will be added advantage
22

Chief Information Security Engineer Resume Examples & Samples

  • 13+ Years of experience in management of IDM systems in an enterprise level environment
  • 7+ Years Oracle Identity Manager experience including the configuration and integration of OIM R2 PS3, OID, OVD, OAM, OES, SOA
  • High level of experience with Linux, Weblogic, PowerShell Scripting, and UNIX Shell Scripting, Subversion
  • Lead the maintenance and implementation of various components of Oracle IAM Suite (OIM, OAM, OID, OVD, OIM Connectors, OES, SOA, OHS, BI Publisher)
  • Experience with Oracle Database, Active Directory, and LDAP
  • Coordinate and lead deployments to OIM
  • Deployment and configuration of IAM system components in a disaster recovery data center, including planning and execution of a disaster recovery plan
  • Work with limited direction, within a complex environment, to maintain the performance and stability of the IAM system ensuring that service level agreements are met
  • Interact regularly with IT management, stakeholders, and customers to provide status
  • Effective writing and communication skills; able to engage with and influence peers, stakeholders, and customers in support of proposed solutions
  • Excellent organizational skills; able to work with a vast array of information and able to cope with rapidly changing information
  • Work with a globally distributed team of IAM team members and customers; sometimes having to provide support outside of normal business hours and on weekends
23

Engineer, Ent Information Security Resume Examples & Samples

  • Ability to understand the threat surface area, identifying attack vectors, vulnerabilities and establishing appropriate controls. Can build a threat model for the systems in focus
  • Evaluation of compliance to a regulation, law or policy using industry standard methodologies (NIST, PCI, CPNI, SOX, etc.) in an enterprise environment
  • Able to evaluate, recommend, and implement commercial hardware and software security products to augment and enhance the Company enterprise security program
  • Ability to learn a new technology and support delivery from ideation through deployment
  • Familiarity with security related technologies, e.g.: Application Security Scanners, Certificate Management, Remote Connection, Network Protection, Data Loss Prevention, File Integrity Monitoring, Security Auditing & Logging, and Vulnerability Management
  • Ability to work with business and technology teams to influence and educate for sound security processes
  • 3+ years of IT infrastructure proficiency and experience that could include one or more years of experience in: Encryption, Tokenization, Forensics/eDiscovery, Penetration Testing, Firewalls (static, WAF), Proxies, Gateways, Routers, VPN, Application Security SAST/DAST, cloud (XaaS), database, big data, telecom, mobile network, etc
  • 1+ years information security experience preferred
  • Ability to assess, make recommendations and influence technical partners
  • CISSP, CEH, CISM, CISA, CIPP, and a computer science background preferred
  • Bachelors or Masters degree in Computer Science or similar work experience
24

Senior Engineer, Ent Information Security Resume Examples & Samples

  • Ability to assess risks and provide innovative countermeasures and solutions that appropriately balance security and business objectives
  • Experience controlling the threat surface area, identifying attack vectors, vulnerabilities and establishing appropriate controls. Can build a threat model for the systems in focus
  • Demonstrated experience in evaluating, recommending, and implementing commercial hardware and software security products to augment and enhance the Company enterprise security program
  • Ability to learn a new technology and drive it from ideation through deployment and integration to fully automated and operationalized
  • Experience in implementing or operating two or more security related technologies: Application Security Scanners, Certificate Management, Remote Connection, Network Protection, Data Loss Prevention, File Integrity Monitoring, Security Auditing & Logging, and Vulnerability Management
  • Experience supporting network, operating system, database, application or data layers across multiple platforms and technologies
  • Ability to work with business and technology teams to influence and educate for sound security structure and repeatable processes
  • 7+ years of IT infrastructure proficiency and experience that could include one or more years of experience in: Encryption, Tokenization, Forensics/eDiscovery, Penetration Testing, Firewalls (static, WAF), Proxies, Gateways, Routers, VPN, Application Security SAST/DAST, cloud (XaaS), database, big data, telecom, mobile network, etc
  • Available for work in Bellevue, WA (Factoria)
25

Senior Information Technology Security Engineer Resume Examples & Samples

  • Identify security risks and develop solutions to eliminate or minimize them
  • Administers, optimizes, and assesses performance or enterprise security tools, appliances, policies, configurations, and threat countermeasures; recommends and implements improvements in collaboration with other Security Team members, IT Operations, and business functions
  • Plans, coordinates and implements CIS Critical Security Controls including maintaining accurate inventories of authorized devices and software, reducing threat exposure, system and network hardening, supports early detection and response to malware threats, proactively protects sensitive data from threats, etc
  • Participates in cyber security incident response; derives and applies solutions from lessons learned and root cause analyses
  • Drive successful enforcement of security policies and procedures
  • Monitor and control remediation of any findings from internal or external assessments
  • Participate in enterprise security architecture design and documentation of security architecture, processes, procedures, standards, and work instructions
  • Leads technical support to customers for escalated incidents involving false positives or service interruptions related to security technology or processes
  • Diagnoses cyber security system hardware, software and systems failures using established procedures
  • Configures, monitors and maintains email applications or virus protection software
  • Develops metrics and analyzes performance of security processes and technologies based on data
  • Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls
  • Strong background in the principles, theories, techniques, practices, and policies and procedures of information security and technical security safeguards
  • Extensive knowledge and practical work experience in implementing the Center for Internet Security (CIS) Critical Security Controls in a corporate IT environment
  • Has recent experience working with the following technologies
  • McAfee E-Policy Orchestrator and Enterprise Endpoint Protection
  • McAfee Web Gateway
  • Proofpoint email security
  • Rapid7 Nexpose
  • Splunk Enterprise
  • Seeks ongoing improvements to the organization’s information security processes and procedures
  • Prioritizes daily tasks to ensure that emerging, urgent issues are resolved without losing sight of longer-term projects
  • Sets standards, timelines, priorities and approaches to help team complete and deliver assignments on time
  • Takes advantage of available resources to complete work efficiently; coordinates with internal and external partners
  • Allocates appropriate amounts of time for completing one’s own and others’ work; develops timelines and milestones
  • Demonstrates effective techniques in holding meetings, planning time, setting priorities, setting timelines and deadlines, and making effective use of time
  • Performs independently; informs managers or senior leaders of projects’ progress and issues encountered; recommends solution
  • Oversees project completion of less experienced team members; provides guidance to senior level team members on highly complex assignments or projects with a major impact
  • Thorough understanding of the concepts, theories, and practices of enterprise IT
  • Evaluates risk, assesses controls, and identifies improvements to mitigate risk
  • Ability to mentor, guide and coach
  • Completion of an undergraduate degree in Information Security, Computer Science, or IT Management
  • Minimum of 7 years of experience in Information Security which includes experience in Enterprise IT Security
  • Relevant certifications such as GCIA, GPEN, GCIH, CASP, CEH, SSCP, or CISSP are a plus but not required
26

Senior Engineer, Ent Information Security Resume Examples & Samples

  • Cyber Incident Handling experience
  • High-level network troubleshooting ability
  • Ability to plan, organize and prioritize tasks to complete independently and within time frame established
  • Knowledge and experience with current cyber threats and landscape to Enterprise environments
  • In-depth knowledge of security technologies such as, but not limited to
  • Intrusion Detection systems (Checkpoint, McAfee, ISS, Snort, etc.)
  • Security Information and Event Management(SIEM)
  • Network Windows/Linux forensics techniques
  • Vulnerability scanning tools (WebInspect, Nessus, etc.)
  • In-depth knowledge of networking and OS technologies such as, but not limited to
  • Diagnostic tools such as packet capture/decode and WAN probes
  • Operating Systems: Windows & UNIX - Solaris, HP/UX, or Linux operating systems administration
  • Networking components including routers, hubs, switches, etc
  • OSI Seven Layer Model
27

Information Security UI / UX Design Engineer Resume Examples & Samples

  • Expert in information architecture and creating highly detailed design specifications
  • Expert knowledge in understanding what engages and motivates users
  • Passionate about perfection
  • Mastery of Photoshop, Illustrator, and other common design tools
  • Experience creating process flow charts, wireframes, and mockups
  • Ability to rapidly prototype with HTML5/CSS3/JS
  • Experience with working directly with developers to ensure the successful implementation of a design specifications
28

Senior Engineer, Ent Information Security Resume Examples & Samples

  • Perform security, compliance, and risk assessments on projects throughout project life-cycle using SDLC, waterfall or RUP methodologies
  • Maintain visibility inside & outside of info security, interfacing with groups such as billing ops, application support, engineering ops, finance, legal, privacy, risk management, etc
  • Support info security policy life-cycle throughout, including intake, creation, review, approval, implementation, publishing, communication & maintenance
29

Information Security Engineer Forensics Resume Examples & Samples

  • Host and Network based forensic tools with packet capture technologies including: EnCase, BlackBag Technologies Suite & Carbon Black and at least 1 of the following: FTK, Sleuth Kit, Autopsy, SIFT, SIRT, GRR, MIR
  • Windows and Unix/Linux log analysis and memory forensics
  • Hands-on Incident Response process
  • Documentation of processes and procedures pertaining to Forensics and e-Discovery
  • Post incident forensics using log analysis and host based tools
  • Evidence collection and preservation procedures
  • Sandboxing technologies, reserve engineering and malware analysis
  • Programming, packet analysis, host and network security tools and encryption protocols; and
  • Smartphone forensics and Internet Evidence examinations with IEF suite
30

Senior Engineer Information Security Resume Examples & Samples

  • Research, evaluate, design, test, recommend and plan implementation of new or improved information security software or devices: analyze new or enhanced software application or tool implementations for implications to existing security software and devices
  • Review operation logs and event console activity to determine cause of security related events or to identify potential security related events
  • Aid in review of security policies and guide the administration of security tools that control and monitor information security, including: access control, alert on and investigating potential misuse or breaches, design computer system access and reports to limit risk and identify possible security violations, document data privacy and protection
  • Specific technical knowledge of security technologies related to any of the following areas
31

Information Security Engineer / Analyst Resume Examples & Samples

  • Assists in auditing computer systems to ensure they are operating securely and that data is protected from both internal and external attack
  • Assists in investigating and resolving matters of significance related to security policy and procedures to ensure compliance with industry standards and customer specific requirements
  • Assists in reviewing system security requirements to determine if security systems are in compliance with established standards
  • Zero or more years of computer science, management information systems or data security experience
  • Experience working with computer programming and operations
  • Security+, Network +, A+ certifications
  • Working knowledge of various security technologies, architecture, networking, engineering and administration
  • Working knowledge of incident response and analysis
  • Experience with working in Windows LDAP/AD environments, Linux administration, technical documentation, and communicating technical information to leadership
  • Working knowledge of firewalls and VPNs, IDS/IPS, site blocking and content filtering tools
  • Working within a cyber operations or network defense operations environment
  • Hands-On experience with ArcSight ESM engineering/administration
  • Preference will be given to candidates who are familiar with SourceFire Defense Center (IDS), Cisco IronPort, FireEye MPS and eMPS, Mandiant Intelligent Response (MIR), McAfee Vulnerability Suite and ArcSight Use Case and Content development, Gigamon taps, Netwitness packet capture, Bit9/Carbon Black
32

Information Security Engineer / Analyst Resume Examples & Samples

  • Manage and maintain security to ISO 27001 standards
  • Create, deploy and monitor reports of computer systems (servers, firewalls, routers, applications, etc.) to determine unauthorized access or changes
  • Implement and direct the development, management approval, and promulgation of objectives, goals, policies, standards, guidelines, and other requirements needed to support information security throughout the organization as well as within its networks (such as intranets and extranets)
  • Coordinate, script, and implement security projects and measures for information systems to regulate access to computer data files, servers, computing systems and prevent unauthorized modification, destruction, or disclosure of information
  • Work with the Security, Hosting, and Development teams to deploy, operate and manage security tools such as: Intrusion prevention systems, Vulnerability assessment and penetration tools, Anti-malware, Security event management devices, and vulnerability management appliances
  • Analyze security events/incidents, identify root cause and determine appropriate steps for incident response
  • Escalate security incidents and problems as required and monitor progress towards resolution until the incident/problem is closed/resolved
  • Collaborate with IT teams to define and establish secure configuration standards for core infrastructure
  • Document computer security and emergency measures policies, procedures, and tests
  • Review violations of computer security procedures and discuss procedures with violators to ensure violations are not repeated
  • Confer with users to discuss issues such as computer data access needs, security violations, and programming changes. Advise on the education of individual information security responsibilities and accountability so that necessary information security activities are performed as needed, according to pre-established policies and standards
  • Perform and/or oversee the performance of periodic risk assessments and audits that identify current and future security vulnerabilities. Recommends remediation plans and solutions to management
  • Establish and maintain strong working relationships with the various other business units (and parent organizations) involved with information security matters (Legal, Internal Audit, Human Resources, etc.)
  • Initiate and manage special projects related to information security that may be needed to appropriately respond to ad-hoc or unexpected information security events
  • Write scripts to automate common security related tasks (i.e. parsing of log files and insert into database, checking and verifying user access list, creating cronjobs, e-mail alerts, etc.)
  • Configure and maintain informational/identity access management, host and intrusion detection tools
  • Perform system administration tasks relating to account provisioning (on-boarding and off-boarding, suspension, etc.)
  • Represent the organization or business division to conduct, support and coordinate internal and external audits; support the remediation of non-conformities
  • Promote awareness of security issues with a focus on platform security
  • Perform other duties as required
33

Information Security Engineer Incident Response & Forensics Resume Examples & Samples

  • Maintain and enhance Autodesk’s formal forensics program that drives Autodesk’s capabilities in Anytime Anywhere Forensics
  • Be part of Autodesk information security incident response program that drives the information security monitoring, detection and response capabilities to protect organizational assets
  • Design solutions to enhance security incidents detection, correlation and remediation capabilities
  • Perform Memory Forensics & Malware reverse engineering, analysis and extract IOCs (Indicators of Compromise)
  • Research emerging technologies and maintain awareness of current security risks in support of security enhancement and development efforts
  • 3-5 years’ experience in the field of information security in each of the following areas: Incident Handling, Intrusion Detections, Forensics, End Point Security solutions
  • Experience with host and network based forensic tools EnCase, FTK, Sleuth Kit, SIRT, GRR, MIR, cyber triage, Blacklight toolset etc
  • Strong experience in post incident forensics using log analysis and end-point detection & response tools. Good working knowledge of SIEM solutions
  • Experience of or familiarity with operating Threat Intelligence based incident response process. Certification in GCIH preferred
  • Experience with sandboxing technologies, reverse engineering and malware analysis. GIAC GREM certification preferred
  • Strong background in packet analysis, host and network security tools and network & encryption protocols
  • Strong Windows and Unix/Linux and OSX experience. Experience with using open source tools for completing analysis
  • Experience in understanding and interpreting complex technical tasks and simplifying them into executive summaries
  • Experience in writing incident reports that are applicable to multiple audience with different levels of technical expertise
  • Certified forensic examiner. Certification in GIAC GCFE or GCFA preferred
  • Knowledge of mobile & cloud security, including experience implementing security controls
  • Programming skills including automation using scripting languages preferably experience with Python
34

Engineer, Information Security Resume Examples & Samples

  • Drives major information security initiatives through the system development lifecycle
  • Define comprehensive solutions that balance information security requirements against business needs
  • Uses deep subject matter/functional expertise, influence and process skills to help internal/external customers and stakeholders identify and meet their high priority needs while considering cultural and diversity implications
  • Jointly develops practical implementation plans that consider cultural sensitivities with other accountable parties
  • Encourages informed Risk-taking and acts as a catalyst for innovation at Cardinal Health; generates practical, sustainable and creative options to solve problems and create business opportunities, while maximizing existing resources
  • Proactively develops and maintains technical knowledge in specialized area(s), remaining up-to-date on current trends and best practices
  • Performs assessments and listens to internal/external customers to understand and anticipate their needs and determine their priorities in the context of the overall enterprise
  • Professional senior individual contributor role
  • In-depth experience, knowledge and skills in information security and risk management approaches
  • Applies knowledge and skills to a wide range of standard and non-standard situations
  • Works independently with minimal guidance
  • Usually determines own work priorities
  • Ability to learn new concepts and technologies
  • Establish strong reporting and metrics to support the program and influence behaviors
  • Administer security of Manhattan systems (WMS & TMS)
  • Troubleshoot day to day security issues and provide solutions
  • Perform analysis of existing role structure, provisioning processes and security designs in place and ensure new systems/enhancements support the design
  • Partner closely with business leads, process owners and IT development teams to design and build security roles to meet the business needs and the controls structure needed to meet company and compliance policies
  • Produce all supporting documentation related to the security design
  • Review existing Cardinal Health applications to identify short & long term recommendations to improve security & controls
  • (MS + 3 yr) or (BS + 5yr) of Manhattan security administration and SAP role design experience
  • Bachelor of Science (BS) Master of Science (MS) in Computer Science Engineering, Business or related field preferred or equivalent work experience required
  • 5+ years of Manhattan (WMS & TMS) security administration experience
  • Experience with security requirements gathering, design, development, testing and implementation required
  • Experience with Manhattan Security Framework Data Administration (MDA)
  • Experience in maintaining permissions, relationships, users and roles
  • Strong understanding of Permissions, Manhattan Identity Provider (MIP) and single sign on
  • Configure security based on best practices and corporate security policies
  • Ability to troubleshoot security defects and determine a plan to resolve it
  • Produce and improve overall documentation related to security administration
  • Exposure to SAP security implementation and operations
  • Understanding of SAP t-codes, authorization objects and security role management
  • Familiar with SAP Transport Management process
  • Strong analytical, problem solving, organizational, and planning skills
  • Knowledge of manufacturing, sales, or finance business process controls
  • Ability to analyze segregation of duty violations and provide recommendations for remediation
  • Excellent communication skills, both oral and written, to effectively transfer knowledge to key stakeholders with the ability tailor messages to the audience
  • Excellent interpersonal skills with demonstrated ability to drive results through influence
35

Engineer, Information Security Resume Examples & Samples

  • Partner with SAP implementation teams to design an appropriate SAP IT control structure that addresses information security and IT regulatory risks
  • Partner closely with business leads, process owners and IT development teams to design and build SAP security roles to meet the business needs and the controls structure needed to meet company and compliance policies
  • Troubleshoot SAP security role defects during and after the implementation effort
  • Review existing Cardinal Health SAP implementations to identify short & long term recommendations to improve security & controls
  • (MS + 3 yr) or (BS + 5yr) of SAP role design and administration experience
  • Experience with SAP ByDesign
  • Experience managing user accounts and provisioning in ByDesign
  • Security role creation/design in ByDesign
  • Experience with GRC 10 Access Controls
  • Understanding of controls (SOX/ Audit/ FDA) as related to SAP Security
  • Completion of two life cycle SAP security implementation including SAP role maintenance skills, design, build, troubleshooting
  • Experience with requirements gathering, design, development, testing and implementation required
  • Experience in SAP security implementations and configuration of ECC, SRM, BI/BOBJ
  • Experience with PI Security, Solution Manager ChaRM, SAP CRM, APO, SAP Portal Security, IDM, LDAP, SSO
  • Understanding of HANA Security & integration with BI/BOBJ
  • Strong understanding of SAP t-codes, authorization objects and SU24 maintenance
  • Creating, releasing and tracking of SAP Transport Management process
36

Information Security Engineer Iaso Resume Examples & Samples

  • Experienced System Administrator Skills (certification is a plus) in some or all of the following: Windows Server 2008, Window 7
  • Must have 2 years experience with information assurance vulnerability testing
  • Responsible for the design, development, implementation, and/or integration of a DoD IA architecture, system, or system component for use within Computing Environment (CE), Network Environments (NE), and enclave environments. Ensure that the architecture and design of Department of Defense (DoD) Information Systems (IS) are functional and secure. This may include designs for program of record systems and special purpose environments with platform IT interconnectivity
  • May also be responsible for system or network designs that encompass multiple CE and/or NE to include those with differing data protection/classification requirements
  • Must have a working knowledge of the functions spelled out in Table C10.T7. IASAE Level III Functions in DoD 8570.01-M
  • Expertise with MS Exchange is a plus
  • Expertise in supporting platform integration issues with Oracle, SQL databases on a windows server is a plus
  • BA/BS and 2-4 yrs of related experience
37

Mgr Information Security Engineer Resume Examples & Samples

  • Bachelor’s degree with 3+ year’s experience
  • Possesses advanced technical knowledge with regard to routed and switched networks, including
  • Understanding and application of common IP layer 2-3 protocols
  • Understanding and application of service provider data security for layers 2-3
  • Reasonable understanding of industry standards with regard to layer 2-3 data security
  • Ability to identify, understand and close common layer 2-3 security attack vectors
  • Ability to test data platforms to identify common layer 2-3 security issues
  • Able to perform typical network planning and engineering design functions with limited supervision, and design moderately complex engineering solutions
  • Capable of managing multiple complex assignments on schedule and within budget parameters
  • Strong written and verbal communication skills for interaction with peer organizations
  • Understanding and application of common IP layer 2-7 protocols and services
  • Understanding and application of service provider data security for layers 2-7
  • Advanced understanding of industry standards with regard to layer 2-7 data security
  • Ability to identify, understand and close common layer 2-7 security attack vectors
  • Ability to test data platforms to identify common layer 2-7 security issues
38

IP Information Security Engineer Resume Examples & Samples

  • Knowledge of security technologies and trends, network topology security principles and applications, Linux, Windows, network security, host-based security, and TCP/IP
  • Ability to work effectively across functional teams
  • Ability to manage and prioritize multiple tasks and projects and assist or advise support engineers with establishing appropriate priorities
  • Security+ Certification within 60 days of hire
  • Ability to self-motivate
  • Possession of excellent time management, organization, and learning skills
  • Possession of excellent client service skills, including working one-on-one with clients
  • BA or BS degree in Information Systems, IT, or CS
39

Engineer, Information Security Resume Examples & Samples

  • Completion of at least two life cycle SAP security implementation including SAP role maintenance skills, design, build, troubleshooting
  • Experience in SAP security implementations and configuration of ECC, MDG, SRM, CRM and BI/BOBJ
  • Experience with PI Security, Solution Manager ChaRM, SAP Portal Security, IDM, LDAP, SSO
  • Experience with SAP GRC 10 or 10.1 Access Controls (ARA, EAM, ARM)
  • Expertise in configuring MSMP workflows and BRFplus rules. Ability to design/modify workflows based on the business needs
  • Experience in HANA Security: Designing and developing HANA analytical privileges, run time and design time roles. HANA integration with BI/BOBJ
  • Experience with creating HANA transports using CTS+
40

Engineer, Information Security Resume Examples & Samples

  • Handles, responds and escalates incidents per the company's incident response plan
  • Conducts host and network based forensics, log analysis and malware triage in support of incident response investigations
  • Monitors logs, network packets, security appliances, system/network protocols for threat analysis and vulnerabilities
  • Work with security and IT operations to implement remediation plans in response to incidents
  • Works to ensure the stability of security systems/appliances are functional and improved upon for pro-active cyber defense
41

Senior Engineer, Information Security Resume Examples & Samples

  • Contribute to the development of standards and guidelines for security infrastructure technologies
  • Contribute to the development of standards and guidelines for security hardening practices in regards to operating systems and network security technologies
  • Assist with Proof of Concept evaluations including vendor selection, test case definitions and scoring criteria metrics based on industry standard criteria
  • Contribute to the analysis and design of existing and new security infrastructure technologies
  • Network security design
  • Good understand of firewalls, threat prevention and detection and application security principles
  • Good understanding of conceptual and applied cryptography and Public Key Infrastructures (PKI)
  • Good understanding of user authentication and authorization principles
  • Assist in defining methods/processes for controlling PKI implementations at the enterprise level
  • Good understanding of Hardware Security Module (HSM) methodologies and integrations
42

Information Security Forensics Engineer Resume Examples & Samples

  • TS/SCI clearance with polygraph (current)
  • Bachelor's degree in computer engineering, computer science, or other closely related IT discipline
  • Certifications in one or more of the following: EnCase, GCFA, GREM, and other forensics certifications preferred, Security + or other DoD-8570 IAT Level 2 certification required
43

Lead Engineer, Information Security Resume Examples & Samples

  • Lead the ISO 27001 implementation/sustainance projects
  • Develops information security roadmaps, business cases and examine existing infrastructure and identify weaknesses and propose remediation
  • Conducts information security risk assessments on the environment and its applications to document any risks and select/implement control selection activities
  • Assist in Audit and incident management activities
  • Contributes towards the design and operation of related compliance monitoring and improvement activities to ensure compliance both with internal security policies etc. and applicable laws and regulations, such as PCI DSS, HIPAA, ISO 27001 etc
  • Contribute in enhancing the Information Security Posture within the organization
  • Bachelor’s degree in Engineering, Computer science or Commerce
  • 5 to 6 years experience
  • Implemented at least 3 complete life cycles of ISO
  • With a lead kind of role at least with one ISO implementation
  • Certified ISO 27001 auditor
  • Candidate should be able to write best practice guides
  • Product specific certifications Certified ISO 27001 auditor
  • Hands-on experience with performing ISO 27001 implementation, PCI implementation to the related business processes
  • Led business continuity and crisis management testing activities that validated the business continuity and disaster recovery plans
44

Information Security & IT Risk Engineer Resume Examples & Samples

  • Coordinate and perform security audits and vulnerability assessments to assess internal security procedures and compliance requirements
  • Work with relevant internal IT Application, Infrastructure, Network and Support teams to ensure that security controls are implemented at all significant and relevant phases of all IT processes
  • Ensure that the IT systems are compliant with applicable regulations, group policies, codes and industry guidance, e.g. performing gap analyses between standards such as SANS Top 20, NIST 800-53, ISO 27001, and the SMBC Information Security Framework. Where gaps are identified, assist in implementation of controls
  • Collate and quality assure data provided to other departments such as Risk Management and Internal Audit
  • Review security event log data and investigate anomalies
  • Perform monitoring activities and risk assessments
  • Respond to, and where appropriate, resolve or escalate reported security incidents
  • Management of security related events and tracking of remediation process
  • Implement and support information security solutions including security architectures, change/configuration management, and the integration of security products as needed
  • Develop and maintain documentation for security systems and procedures and processes. Develop security awareness training for new employees
  • Participate in information security working groups
  • Perform testing to evaluate new products for network and system security controls
  • Maintain logging and monitoring standards, technical investigative techniques and reporting
  • Maintain project scheduling and task follow on security initiatives
  • 5-10 years of relevant experience
  • Cybersecurity solutions and protection
  • System vulnerability tools
  • Security monitoring tools
  • Application security risk assessment tools
  • Creating effective technical educational programs
  • Performing gap analyses within different environments coupled with an in depth understanding of regulatory guidelines as well as standards and best practices related to ISO and NIST
45

Engineer, Information Security Resume Examples & Samples

  • Bachelor’s degree (B.A.) or equivalent; or four years related experience and/or training; or equivalent combination of education and experience
  • Excellent verbal, written and listening communication skills
  • Exemplarily interpersonal skills necessary to interact effectively with team members, project managers, developers, engineers, vendors, users and business analysts as well as executive and senior management
  • Knowledge of basic networking and computer systems
  • Able to work under pressure and balance work load to ensure measurable progress on multiple high priority projects
  • Ability to manage and prioritize multiple assignments supporting business as usual, user requests as well as special projects
  • Must be able to uphold Choice’s Values & Performance Principles of collaboration, performance excellence, sense of urgency, openness to new ideas, inclusion & diversity, integrity, customer focus, and respect
46

Data & Information Security Engineer Resume Examples & Samples

  • Addressing Reporting requirement
  • Responsible for execution and maintenance of the D&I security operation
  • Follow Incident Management process
  • Knowledge on D&IT Security Products (e.g. 2FA, PKI, CCS and RMS ePO NAS, etc.)
  • Ability to perform under high pressure situation
  • 3+ years relevant experience in Security Operation which includes Data & Information Security
  • Follow Incident Management Process
  • B.E / B.Tech. or B.Sc. in Computer Science
  • Exposure in D&I Security products
47

Engineer Information Security Resume Examples & Samples

  • Engineer Information Security would monitor network security events received from IHG monitored servers, workstations, applications and websites, and then take appropriate action based on IHG security policy and procedures
  • Assist IHG Global Security Engineering team resources with security related issues
  • Responsibility for reviewing security related alerts generated by security tools and closing out security tickets after investigation
  • Engineer Information Security also perform analysis of log files. Includes forensic analysis of system resource access
  • Execute incident response process when a security incident has been declared. Escalate to management and pull in appropriate resources for incident
  • Experience with systems administration and in-depth knowledge Windows and Linux servers, good network administration skills and LAN/WAN background a plus
  • Self-motivation and ability to work independently
48

Engineer, Ent Information Security Resume Examples & Samples

  • Perform security, compliance, and risk assessments on projects throughout project lifecycle using sdlc, waterfall or rup methodologies
  • Support information security review of new technologies, designs, and remediation planning efforts
  • Minimum 4 years of experience in info security technology or related field
  • Strong knowledge of multiple security subject areas
  • Knowledge of critical security elements, threats, vulnerabilities, and safeguards
  • Strong written, verbal, and interpersonal communication skills; ability to communicate internally, upward, and cross functionally; ability to interface with cross-functional team members to gain support required to accomplish assignments; able to build coalitions
  • Always act with tact and integrity, and interface with a variety of individuals in a positive and productive manner
  • Strong problem solving / troubleshooting skills
  • Ability to plan, organize and prioritize tasks to complete independently; Ability to work under pressure and meet tight timelines
  • 2+ yrs experience working in a large enterprise; 2+ yrs experience working in telecommunications industry; 2+ yrs experience in a dedicated security engineering role
  • Knowledge of current technological trends and developments in the area of info security
  • Strong presentation skills to large and small audiences
49

Senior Engineer, Ent Information Security Resume Examples & Samples

  • Provide mentoring and skill set knowledge transfers to Scrum team members
  • Review and modify Agile user stories and epics to ensure correct authentication, authorization, and logging
  • Partner with other technology and business teams to develop secure technical solutions
  • Support sprint teams through hands-on technical security knowledge, integration, and development/coding
  • Work with a team of architects and developers, operational leads, and functional owners to plan and implement security technical features
  • Understand how new technologies impact the current environment
  • Champion the adoption of new technologies and drive the implementation into the environment
  • Function as cyber security leader and automation engineer in daily Sprint stand up, and provide ownership for all aspects of security lifecycle in product release
  • Provide cyber security technical thought leadership, and inject secure coding standards and best practices into daily scrums
  • Review and modify agile user stories and epics to ensure correct authentication, authorization, and logging
  • Partner with other technology & business teams to develop secure technical solutions
  • Ability to work in a fast paced, dynamic environment, with shifting priorities; must be comfortable with change and actively driving improvements
  • Champion the adoption of new technologies and drive the implementation into the T-Mobile environment
50

Senior Engineer, Information Security Resume Examples & Samples

  • Support the development of new data analytics techniques
  • Translate analytical findings into security “use cases” that can be implemented within available surveillance capabilities. Recommend changes to SIEM policies, filters and rules to improve event analysis along with creating content within the logging infrastructure to find related attributes
  • Recommend improvements and assist in the setup of surveillance, processes, protocols, skills and tools
  • Serve as a data analysis expert for output from a wide variety of digital surveillance tools to include expansion into Big Data Analytics
  • Analyze and report on threats based on surveillance and intelligence data, both internally and externally generated
  • Assist in discovery of vulnerabilities and investigation of security incidents where required
  • Work across multiple organizations, cultures and service providers to pull together actionable information and management information
  • Establish a strong working relationship with stakeholders
  • This will be a hands-on and very technical cyber security role. As well, it will require good communication & relationship skills to ensure technical issues can be translated into business terms for appropriate decision making around mitigating actions by communicating findings
  • Cyber Security intrusion detection and analysis
  • Packet level analysis
  • Command and Control compromises
  • Complex event correlation techniques
  • IT Architectures, IT Environments, and IT security principles
  • Corporate Industry and Professional Standards
  • Working in a complex global environment with common security appliances such as, IDS/IPS, Network and Host-based firewalls, Proxies, common network device functions - routers, switches, and hubs
  • UNIX operating systems functions: authentication, authorization, syslog, and daemons
  • Windows operating system functions: authentication, authorization, installations, services, sharing, navigation, security issues, authentication, and event IDs
  • Using correlation tools such as Nitro or Splunk
  • Leveraging scripts to handle routine issues
  • Analyzing data for Indicators of Compromise (IOC), Empirical Analysis for trends of compromise, and using threat/vulnerability information to formulate direction on analysis activities that a monitoring function may take
  • Recognizing common attack vectors such as, recon scans, botnet, malware, command and control activity (C2), worms, trojans, and viruses
  • Packet level analysis, exceptions, and compromises
  • Computer forensics with a basic understanding in the reverse engineering of malware