Enterprise Security Resume Samples

4.9 (103 votes) for Enterprise Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the enterprise security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
NL
N Lockman
Norval
Lockman
1509 Hoyt Springs
New York
NY
+1 (555) 147 9372
1509 Hoyt Springs
New York
NY
Phone
p +1 (555) 147 9372
Experience Experience
New York, NY
Enterprise Security Engineer
New York, NY
Reynolds Inc
New York, NY
Enterprise Security Engineer
  • Provide assistance to assigned co-workers, providing support, handing down work assignments, and answering questions as necessary
  • Perform and assist in assessments and security incidents as a security SME
  • Work with problem management to prioritize incidents based on impact and urgency
  • Lead product development teams through remediation activities resulting from application testing, threat modeling and attack and penetration testing
  • Work with the 24x7 Security Operations Center (SOC) handling incoming security threat information and vulnerabilities
  • Work with various Adobe employees to help train and educate on good security practices and specifics about end-user security tools
  • Present project updates, issues, and changes to management and implementation teams
San Francisco, CA
Senior Enterprise Security Analyst
San Francisco, CA
Nolan Inc
San Francisco, CA
Senior Enterprise Security Analyst
  • Conducts and assists with the development of Security Awareness training material
  • Management/Review of network device security configuration and architecture
  • Manage, monitor, and perform signature tuning for IDS/IPS infrastructure
  • Assist in the development of security policies and standards to help ensure compliance
  • Formulating and implementing monitoring, policies, procedures and standards relating to network security
  • Performs security pen-tests for risk reporting and mitigation
  • Definition and enforcement of network security policies
present
Los Angeles, CA
Senior Info Sec Pm-enterprise Security Program
Los Angeles, CA
Schulist-Purdy
present
Los Angeles, CA
Senior Info Sec Pm-enterprise Security Program
present
  • Mastery of project management methodology, tools and templates (includes project planning, schedule development, scope management and cost management)
  • Proactively identify risks and issues on projects - leading team to develop risk management and issues management plans
  • Develop and manage plans to address project strengths, weaknesses, opportunities and threats
  • Manage to the objectives and plan by thorough risk, issue and change management across both business and IT parts of the project
  • Monitors and manages project baseline to ensure activities are occurring as planned - scope, budget and schedule – manages variances
  • Interface and communicate with project team, management and stakeholders
  • Lead the development of the project charter and scope, and ensure delivery of the solution to schedule, budget and scope
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Clark Atlanta University
Bachelor’s Degree in Computer Science
Skills Skills
  • Ability to work with mathematical concepts such as probability and statistical inference, and fundamentals of plane and solid geometry and trigonometry
  • Solid knowledge of security best practices, policies, standards, and guidelines
  • Solid knowledge of security architecture and secure implementation of new technology
  • Prioritizes and completes tasks with a concern for all the details involved; monitors and checks work for accuracy and reasonableness
  • Highly desirable to hold one or more security related certifications
  • Ability to solve practical problems and deal with a variety of concrete variables in situations where only limited standardization exists
  • Ability to read, analyze, and interpret general business periodicals, professional journals, technical procedures, or governmental regulations
  • Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form
  • Ability to apply concepts such as fractions, percentages, ratios, and proportions to practical situations
  • Working knowledge of Microsoft Office Suite
Create a Resume in Minutes

15 Enterprise Security resume templates

1

Enterprise Security Engineer Resume Examples & Samples

  • Candidate will provide support for OS/databases/Application related Risk and Compliance issues and assist with analysis and security product related issues
  • This position will also involve managing third party products such as Symantec ESM/CCS; Qualys Cloud based Network Vulnerability Assessment; Tripwire Enterprise and Skybox Enterprise suites
  • Supporting and developing tools within the Infrastructure Security space to include a wide range of security related tools
  • 5+ years of platform administration or/and Application development. · Experience with Windows or UNIX or database environments combined with at least 3 years of experience with either programming or complex scripting involving interactions with databases and/or very large data sets
  • 5+ years experience with administration of UNIX/Linux or Windows operating systems
2

Enterprise Security Programme Manager Resume Examples & Samples

  • Lead complex and diverse transformation programmes - including managing program schedules, identifying risks and clearly communicating them to program stakeholders
  • Work closely with project managers, architects, developers and testers to ensure project
  • Maintain a close relationship with clients, HP account teams and Delivery teams
  • Scope and deliverables are understood and released on time
  • Act as lead for project managers assigned to different work-streams
  • Develop and track programme milestones and schedules
  • Develop program plans and schedules with well-defined milestones
  • Develop tools and processes to improve software engineering productivity
  • Create and maintain program roadmaps
  • Manage resource needs including forecasting
  • Understand vision and mission of projects and communicate to internal and external stakeholders
  • Develop strong relationships with other leaders within Enterprise Security Services to help garner support for programs and resource alignment
  • Fluent Italian and English language skills
  • PMP certification from the Project Management Institute, equivalent qualification or significant demonstrable experience in leading improvement programs
  • Preferably Security Certifications among the following: Lead Auditor ISO27001, CISSP, CISA, CISM, CRISC
  • Solid experience managing Security projects or programs
  • Experience managing and working to aggressive timelines
  • Excellent communication skills to be the centre of the universe for all questions about release schedules, quality, and progress updates
  • Expertise with standard project management tools and processes
  • Strong business acumen to understand the tasks associated with developing the commercial offering of the programs
  • The ability to present and communicate the details of the various programs to executive-level management
  • Strong interpersonal and negotiation skills
3

HP Enterprise Security Product Fortify Specialist Senior Sales Engineer Resume Examples & Samples

  • Product presentation and technical deep diving to prospects, customers and partners
  • Conducting and documenting successful PoCs and live demos of HP Fortify Static, Dynamic and Real-time Application Security Suite and Fortify on Demand cloud-based solutions
  • Addressing RFI/RFP/RFQ responses in an extensive, formally excellent and timely manner
  • Customization and localization of product documentation
  • Keeping a healthy and positive relationship with key customers and partners, meeting them regularly and keeping them up to date with the latest product releases and new features
  • Representing HP ESP at trade shows and events, also as public speaker
  • Generally speaking representing HP ESP in the specific market with a high standing and leadership
  • 6 to 10 years of real field experience as presales engineer in the information security market or security specialist Robust knowledge of information security fundamentals, market analysis and product verticals (architectural design, technology, hands-on)
  • Excellent skills in code security solutions and web penetration testing: presentation, sizing, design, implementation, customization, troubleshooting
  • Good knowledge of the local IT security market up to C-level (system integrators, resellers, distributors are a plus)
  • Good knowledge of common programming languages (Java, J2EE, .NET, C/C++, Object C, etc.) and software development environments (Ant or Jenkins build mgmt, QA & metrics, application testing, BugZilla, HP Quality Center or Rational Clear Quest bug tracking, Eclipse or Visual Studio IDE, etc.)
  • Ability to communicate the value of the solution in terms of financial return and impact on customer business goals
  • Considered as a plus
  • Open-minded, keen to learn and share, flexible thinker
  • Self-responsible, creative and proactive in managing time-bond tasks and concurrent requests
  • A real and positive-thinking teamworker
  • Confident in diving into different scenarios: from C-level meetings to bit&bytes bake-off against competitors
  • Languages: Turkish, excellent in English both written and spoken, arabic is a plus
4

Principal Software Engineer Boxster Team Arcsight HP Enterprise Security Resume Examples & Samples

  • Develop scalable server applications, middleware in Java from marketing requirement specifications
  • Develop libraries, APIs and frameworks to assist in the creation of applications
  • Provide technical and architectural leadership
  • Participate in full software development lifecycle
  • Review and assist in development of requirements and technical specs
  • Perform unit and integration testing for software
  • Strong database knowledge, including JDBC, SQL, performance tuning, and query optimization, is required
  • Advanced Java J2EE and core Java programming skills in multi-threading environments is required
  • C and C++ programming skills are a big plus
  • Strong Object-Oriented analysis and design skills, and abilities to design and implement complex algorithms to deliver architectural components and business functions, are required
  • Minimum 3 years of software development experience is required
  • Experience with Agile/Scrum development methodologies is a plus
  • Bachelor of Science in Computer Science, Engineering or related field is required. Master’s and Ph.D. degrees are strongly preferred
  • Experience in Web services REST and SOAP protocols, both in client and server
  • Experience in dynamic languages such as python, ruby, groovy, scala
  • Experience in creating frameworks, libraries and APIs
  • Experience with software development tools, version control and UML
  • Strong knowledge of Software Design Patterns as well as best practices in rapid development of reusable software components
  • Experience with Network programming
  • Development experience in RDBMS Databases
5

Enterprise Security Ops Engineer Resume Examples & Samples

  • Improve Autodesk’s ability to detect intrusions on a continuous basis
  • Hunt down targeted malware and defend against active adversaries
  • Reduce enterprise risks through vulnerability management program
  • Design, develop and implement tools and automation to help in effective incident response
  • Gather threat intelligence and build, optimize and automate systems to consume threat feeds and to track adversaries
  • 1-3 years’ experience in the field of information security in at least three of the following areas: application whitelisting, security engineering, incident handling, malware analysis, active adversary threat management, penetration testing, intrusion detection, firewall access control technologies, risk management, vulnerability management, identity management, Windows or Unix security, Cloud Security, encryption technologies, or endpoint security controls
6

Enterprise Security Platforms Resume Examples & Samples

  • Analysis and development of Windows data security solutions
  • Provide consultancy services to other IT Security teams
  • Excellent understanding and experience of engineering Windows data security solutions
  • Project Management Skills
  • Scripting and Development Skills (Powershell, VBscript, C#, ASP/ASP.NET, Rest and SOAP Web Services)
  • Sound knowledge of file system access control (NTFS and NFS)
  • Windows Databases
  • General networking (Firewalls, Routing, NAT, OSI Model, packet trace and analysis, etc)
  • SQL Reporting Services
  • Familiarity with NetApp storage solutions serving NFS & CIFS
  • MS SQL Database Development (T-SQL)
7

Senior Info Sec Pm-enterprise Security Program Resume Examples & Samples

  • Plan for and manage change
  • Close the project to formalize acceptance of the project result and release project resources
  • Manage project work and resources to enable successful and timely completion of the project
  • Delivery of projects aligned to overall business and technology strategies and architectures
  • Work within defined governance processes
  • Manage to the objectives and plan by thorough risk, issue and change management across both business and IT parts of the project
  • Monitors and manages project baseline to ensure activities are occurring as planned - scope, budget and schedule – manages variances
  • Anticipates problems before they occur; defines the problem or risk; identifies possible causes; works with team to identify solutions; selects and implements most appropriate solution
  • Develop and manage plans to address project strengths, weaknesses, opportunities and threats
  • Ability to balance both the "science" of how to perform project management and the "art" of project management, which is learned through experience and skill training/application
  • Analytical skills and problem solving skills needed to manage multiple factors on a project simultaneously
  • Track record of customer focus, based on openness, trust, and delivering on promises
  • IT background with experience across the systems development life cycle with experience in all project phases – plan, initiate, elaborate, design, build, test, implement
  • Knowledge and use of industry-standard project methods, tools and techniques e.g. RAIDS, budget, communication
  • Senior project manager leads project teams consisting of cross functional, global, and virtual groups; directly supervises staff; assigns responsibility to members; monitors progress
  • 10 to 15 years in a corporate IT environment
  • Work experience in a professional services industry, preferred
8

Enterprise Security Manager Resume Examples & Samples

  • SCOPE: Participates with leadership to establish strategic plans and objectives. Makes final decisions on administrative or operational matters and ensures operations’ effective achievement of objectives
  • JOB COMPLEXITY: Works on complex issues where analysis of situations or data requires an in-depth knowledge of the company. Participates in corporate development of methods, techniques and evaluation criteria for projects, programs, and people. Ensures budgets and schedules meet corporate requirements
  • DISCRETION: Erroneous decisions will have a serious impact on the overall success of functional, division or company operations
  • CUSTOMER FOCUS / INTERACTION: Typically interacts with executives and/or major customers. Interactions frequently involve special skills, such as negotiating with customers or management or attempting to influence senior level leaders regarding matters of significance to the organization
  • MANAGEMENT: Directs and controls the activities of a broad functional area through several department managers within the company. Has overall control of planning, staffing, budgeting, managing expense priorities, and recommending and implementing changes to methods
  • Vision: ability to create a vision that aligns to IT and Adobe objectives, ability to clearly articulate a sense of direction accompanied by specific targets and focus on specific objectives
  • Industry knowledge: industry knowledge and strong business sense and acumen
  • Planning: ability to define what you will do, who will do it, when it will take place, and how it's all going to happen. Communicate the plan, follow through
  • Build strong teams: ability to develop a winning attitude among all team members, nurture those who need the help and actively manage those employees who aren't performing. Develops Others/mentoring (e.g. Leads and/or IC’s)
  • Focus resources: ability to prioritize and focus on issues that provide value to the company and are consistent with company needs, keeping IT aligned with the business
  • Lead and motivate staff: by focusing on important issues of the company, producing positive results, and treating others with respect. Demonstrates and foster partnering across functions, geos and BUs. Builds relationships cross-functionally
  • Communicate effectively: ability to communicate proactively and to find ways of facilitating dialogue with groups (i.e. senior management, clients and users, vendors, direct/indirect teams) that keeps the groups updated on the progress of and activities of the IT organization
  • Final authority: accountability for decisions affecting group
9

Enterprise Security Consultant, Public Sector Resume Examples & Samples

  • Expertise- Collaborate with field sales, pre-sales, training and support teams to help partners and customers learn and use the companies Cloud services such as Storage Service, RDS databases, Identity and Access Management (IAM), etc
  • Solution Design - Define and deliver on-site technical engagements with partners and customers. Activities include participating in pre-sales, understanding customers' security, risk, and compliance requirements, and providing advice on solution design
  • Implementation- Working together with our partners, provide advisory services to our customers on the implementation of robust security, risk, and compliance solutions for their Cloud migrations
  • Implementation experience with AWS services
  • Proven track record of successful consulting engagements
  • Prior involvement in regulated industries and satisfying Risk and Compliance needs
  • Strong Program Management capabilities
10

Enterprise Security Sales Engineer Resume Examples & Samples

  • Driving technical relationships with key Enterprise customers and acting as their first technical contact whilst focusing on business development opportunities
  • Providing technical support in sales presentations, product demonstrations and PoC installations, identification of the appropriate Intel Security solutions for customers, and production of RFI/RFP responses and technical proposals across the complete line of Intel Security products
  • Scoping and potentially delivering technical education for customers and partners. This could encompass Requirements Analysis, - Planning, Installation, Configuration, Troubleshooting, Tuning, Ongoing Knowledge Transfer, Documentation etc
  • Driving technical enablement of partner SE’s and drive Partner SE Certifications
  • Developing full knowledge of Intel Security products to ensure optimal technical support in presales situations
  • Maintaining technical/industry expertise in Security Technologies and Security Architectures
  • Engaging customer audience when presenting Intel Security products & services
  • Demonstrating our solutions through on-site or remote customer presentations and evaluations
  • Producing technical documents and proposals
  • Installation & configuration assistance, where customer warrants need for ‘Proof-of-Concept’ Evaluation
  • Building a close working relationship with sales and technical colleagues within Intel Security and our key partners
  • Developing strong relationships in key customer accounts
  • Maintaining/achieving relevant industry certifications such as CISSP, CCNA, CCNP, etc
  • Updating and delivering technical training to sales colleagues
  • Development of professional and personal skills, as relates to major function, related technologies, product and career advancement
11

Senior Security Consultant Enterprise Security Architecture Resume Examples & Samples

  • IT and security governance
  • Experience researching, developing, and applying new methodologies and technologies
  • Ability to present to, communicate and build rapport effectively with business, IT, and security executives
  • Cisco Certifications (CCIE, CCIE-Security, etc.)
  • Certified PCI-QSA Assessor
  • Others as appropriate to specific domain expertise
12

Enterprise Security Consultant Resume Examples & Samples

  • Network security
  • Application security & secure SDLC
  • Security operations
  • Security program development
  • PA-DSS Qualified Security Assessor
  • Local Laws and Regulation
  • International Standards Organization (ISO) 27001/27002/27005
13

Enterprise Security Policy Architect Resume Examples & Samples

  • Security Policy: Leading in the development, maintenance and overall lifecycle management of security policy and standards, and co-ordinating and involving subject matter experts as necessary
  • Security Architecture – Assisting in the development of an enterprise security architecture framework that addresses business needs. In particular, identifying, designing and implementing appropriate technical security solutions such as IDS/IPS, secure remote access, firewalls, encryption, data protection and data loss prevention. Leading in the development of selected security architectures for complex systems, ensuring consistency with specified requirements agreed with both external and internal customers
  • Security Strategy – Assisting in the development of strategic security plans and supporting the investment planning process
  • Providing guidance to the business, as required, on the security implications, use and deployment of technologies
  • Being accountable for ensuring that key risks and issues are identified, addressed and resolved in a manner that satisfies the business
  • Flexible to travel as role requires (noting that responsibilities are global)
  • Ensure that design decisions align with the business vision and maintain security architectural flexibility
  • Ensure compliance with enterprise security architecture, and grant dispensations that are in keeping with the Group strategy and “LOS” (Line of Sight) objectives
  • Will work and report within the Digital Risk & Security function as a dedicated resource representing the Security Policy Architecture function
  • Provide leadership in transforming the DR&S architecture function into a proactive value-added business-focused service provider, while ensuring that risks are identified and managed appropriately
  • Leadership and strategic direction for the function, ranging from planning and budgeting to motivational and promotional activities expounding the value of information security
  • Forms a “centre of excellence” for information security policy management, for example offering internal management consultancy advice and practical assistance on information security risk and control matters throughout the organization and promoting the commercial advantages of managing information security risks more efficiently and effectively
  • Extensive experience of full-time work experience in information security management and/or related functions (such as IT audit and IT Risk Management)
  • Information Security Qualifications such as: CISSP, SABSA and ISSAP preferred
  • Experience of working as an Information Security Policy expert working closely with business stakeholders and Enterprise Architects
  • Strong knowledge and experience designing and implementing technical security solutions such as IDS/IPS, secure remote access, firewalls, encryption, secure protocols, IT network security (secure LAN, WAN, vlan technology, MPLS, and secure network zoning and restricted network design) and database, operating system and application security, data protection, data loss prevention and identity management solutions
  • Experience with the use of the SABSA and ISO 27000 framework with the experience of developing security policies and standards at an enterprise level
  • Strong knowledge of data and information flows, information governance, network protocols
  • Experience of writing security policy and standards, and of the policy development lifecycle process
  • Experience of security hardening techniques and policy development, particularly operating system hardening (e.g. Windows, UNIX, Oracle)
  • Appreciation of wider information security related principles, likely to be gained in industry or from a consultancy background
  • Prior Critical National Infrastructure (CNI) and utility industry experience preferred
  • Experience working with a diverse team of people comprised of internal and external resources
  • Demonstrated strength in relationship building with success influencing leaders at all levels
  • Strong analytical and problem solving skills, negotiation, interaction management, and presentation skills are required with the ability to create consensus and understanding around security policy
  • Ability to multi-task, effectively structure work to handle multiple demands and competing activities
  • Absolutely trustworthy with high standards of personal integrity (demonstrated by an unblemished career history, complete lack of criminal convictions etc.), and willing to undergo vetting and/or personality assessments to verify this if necessary
14

Enterprise Security Engineer Resume Examples & Samples

  • Experience with Splunk ESM or Nitro SIEM tools
  • Comfortable with designing reports and data analytic charts
  • Expert level in core security fundamentals
  • Deep knowledge of data analytics and statistical analysis
  • Strong sense of urgency in recognition of security incidents limiting the overall impact to the InComm environment
  • Document and diagram solutions and system security architecture at all stages of implementation
  • Trend issues and monitor changes to ensure that repercussions on known issues do not escalate
  • Work with problem management to prioritize incidents based on impact and urgency
  • Work with the 24x7 Security Operations Center (SOC) handling incoming security threat information and vulnerabilities
  • Previous experience with security architecture and engineering of security toolsets
  • 4 years' experience building and maintaining secure platforms and systems
  • Minimum Bachelor’s degree or equivalent combination of education and experience in Information Technology/Information Security
  • Experience working with ANY of the following tools: Splunk Enterprise Security, McAfee Nitro, Nitro Security, Palo Alto Networks, Cyber Ark or other Security Information & Event Management Systems (SIEM)
  • Ability to work flexible hours and be available in an on-call rotation in a 24x7 environment
  • Ability to support multiple projects simultaneously, work in high-pressure situations and/or for extended hours
  • The ideal candidate has a deep understanding of how IT components interact and depend upon one another including network systems, server systems, applications, databases, and storage systems
  • Familiarity with IP networking required
  • Linux & Windows operational experience required
  • Must have experience with information security SIEMs, vulnerability scanners and application scanners
  • Must possess a strong customer service mindset
  • Excellent verbal and written communication skills for technical and nontechnical audiences
  • Experience working with customers via the phone
15

Level Enterprise Security Platform Operations Engineer Resume Examples & Samples

  • Provide hotline escalation support through the IT Security Hotline - a customer facing phone line for infrastructure security issues and requests
  • Interpreting customer requests for all IT Security products that our team supports. Our products are spread into 4 domains
  • Perimeter Security (VPN, Firewalls, Proxy, anti-spam, Data leakage)
  • Core Security (Kerberos, Radius, RSA, Encryption)
  • End Point Security (Anti-virus, Device lockdown, End Point Encryption)
  • Identity Management (LDAP, AD, Sun Identity Management, OpenIDM)
  • Web Authentication (SSO, SiteMinder, PingFederate)
  • Day-to-day monitoring of IT Security's Infrastructure technologies
  • Troubleshooting of possible network connectivity or infrastructure related problems
  • Outage Management: investigation, communication, triage and escalation
  • Production changes & turnovers across the firm-s infrastructure
  • Supplement existing, or update documentation as the environment is modified
  • Creation/supplementation of Operational Run-books
  • The position requires customer support experience and interacting with service members of the networking, e-business, UNIX, and PC groups in major metropolitan regions across the globe
  • Two years of experience in firewall and/or network management, preferably in the Financial Services sector
  • Experience with any of the following firewalls : Cisco Pix, Juniper Netscreen, Fortigate, IPFilter or iptables
  • Good understanding of UNIX operating systems
  • Knowledge of networking (e.g. OSI layers + functions + devices)
  • Understanding of cryptographic protocols
  • Had exposure to and performed troubleshoot on common Internet services such as : Email, DNS, HTTP
  • Excellent customer facing skills
  • Active interest in IT Security & authentication protocols
  • Ability to deliver detailed and timely communications to internal and external parties during an outage
  • Knowledge of Information Security
  • Knowledge of UNIX, Kerberos, SOCKS, VPN, BIND
  • Strong interpersonal and communication skills; capable of writing documentation, making presentations to an internal audience, and interacting positively with upper management, colleagues and customers
  • The candidate must be a self-starter but must recognize the importance and value of working as a member of an operations support team
  • Comfortable working in an operations and support team with heavy end user interaction
  • Ability to handle constantly changing flow of traffic; remain productive during slow times, be able to multitask effectively during busy times, exercise patience and professionalism during stressful situations
  • Unix Systems administration experience
  • Perl and/or UNIX shell programming/scripting experience
  • Had exposure to end point protection (anti-virus, device lockdown)
  • (For Transporter) Distributed Database, Dynamic SQL
  • CCNA or equivalent certifications
  • CISSP or equivalent certification
16

Enterprise Security Remediation Task Force Resume Examples & Samples

  • Develop and maintain document library and other shared files and repositories as needed, such as SharePoint
  • Maintain internal Wiki sites and other job aids/tool kits
  • Prepare accurate presentations and reports from verbal and/or written directions
  • Ensures the request process is managed & tracked
  • Create and prepare reports regarding status and distributes to appropriate team members
  • Conduct research on technology risk issues
  • Participate in meetings and assist in capturing minutes and distributing minutes and action items as needed
  • Use professional concepts and company policies to solve a wide range of difficult problems in imaginative and practical ways
  • Conducts workflow, process diagrams and gap analysis
  • Business and process improvement: Identifies opportunities for business or process improvement; makes associated recommendations as appropriate
  • Develops business cases with cost benefit dimensions of proposed work efforts to be used at management and executive levels for funding and scope decisions
  • Accountable for developing and coordinating collateral documents
  • Prepare data to support arguments or points in a presentation or a discussion to appeal to interest and level of others
  • Evaluate and recommend alternative operational efficiencies
  • Communicates and escalates issues in timely manner and to the right level of management
  • Work under limited direction. Plan schedule and arrange own activities in accomplishing objectives
  • Identify and document cross-functional functional requirements, workflows, information sources and distribution paths
  • May assist in planning project kickoff meetings and perform tactical activities, under the direction of more personnel
  • Participates in project meetings to document issues, action items, user requirements, or deliverables from project meetings
  • Identifies and tracks project issues, resolving issues where possible or escalating to more senior project team members when needed
  • May identify risks and participate in mitigation activities
  • Exercises limited discretion within defined boundaries
  • Bachelor's degree in a related field and/or 4 years of equivalent experience
  • A minimum of 10 years of experience in technology consulting including research, synthesis, development, monitoring of technologies and consulting with management regarding recommended technology directions, maintenance and dissemination of standards
  • Total of 3-5 years, to include two or more years in a consulting role
  • Preferred PMP or CISA certification
17

Senior Manager Enterprise Security Programs Resume Examples & Samples

  • Oversees Security Programs for Discover globally
  • Leads and develops Security programs to executive protection, international traveler security support, security investigations & reporting, and workplace violence prevention
  • Develops new programs for the protection of company assets through evaluation of security risk and implementation of risk mitigating strategies
  • Leads and refines a world-class Workplace Violence Prevention Program to include Domestic violence prevention, identification and mitigation of troubled persons, identification and mitigation of troubling situations and handling, with Employee Relations, of employee to employee disputes with a potential for conflict
  • Develops and leads a Training program to ensure the security teams are trained and executing mission according to DFS Physical Security Policy and Procedures
  • Sets the strategies for the communication of Security programs, resources, and requirements to all Discover employees
  • Ensures completion of all Security Operations Policies, Procedures, Guidelines and Job Aids across DFS
  • Bachelors degree and 10+ years experience in corporate security and/or law enforcement
  • Result oriented, demonstrating strong leadership competencies, ability to build partnerships and propensity to innovate and challenge the status quo
  • 5+ years experience in program management and senior organizational leadership
  • Ability to lead and motivate people, matrix manage teams, and lead without authority
  • Demonstrated ability to plan, organize, monitor & evaluate a comprehensive security program
  • Demonstrated analytical expertise, close attention to detail, excellent critical thinking, and ability to learn and adapt quickly
  • Excellent oral and written communication skills; executive presence and the ability to present concepts to all levels of leadership
18

Enterprise Security Remediation Task Force Resume Examples & Samples

  • Accountable for developing, coordinating, and maintaining process documentation library
  • Standard operating procedure gap analysis and creation
  • Documentation, management, & tracking of patch and vulnerability management processes
  • Conduct research on patch and vulnerability management process best practices
  • Develops process diagrams, workflows, and workflow automation of end to end patch and vulnerability management processes
  • Develops business cases with cost-benefit dimensions of proposed work efforts to be used at management and executive levels for funding and scope decisions
  • Work under limited direction, plan schedule and arrange own activities in accomplishing objectives
  • Identify process risks and participate in mitigation activities
  • Communicates and escalates issues promptly and to the right level of management
  • Prepare accurate presentations and reports from verbal and written directions
  • Maintain internal Wiki sites and other job aids/toolkits
  • Total of 6-8 years, to include two or more years in a risk management or cyber security consulting role
  • Preferred Six Sigma, ITIL or equivalent certification
19

Software Developer Lead-enterprise Security Resume Examples & Samples

  • Purpose and functionality of an Identity Management system, and is able to define such terms as “identity”, “role”, “entitlement” and “certification”
  • Security Standards, specifically Logical Identification and Password Access Control
  • Types of identity stores and access control systems such as Active Directory, LDAP, and Top Secret / RACF (Resource Access Control Facility)
  • JAVA and/or .NET C# skills needed to support the tools SQL Queries, Views and SPs Visual Basic/VB .NET, XML/XSL/XSLT
  • Database Services – DB2 Database Services, SQL Security Authentication Services, COBOL, JCL, VSAM
  • Development tools, preferably Visual Studio
  • Windows OS and one or more DBMS systems and Mainframe
  • Server (Windows/Unix) and database (SQL Server, Oracle and DB2) security
  • CISSP certification is a plus
  • Plan, design, code, configure, test and implement security capabilities
  • Tools, workflows and developer skills such as Active Directory, LDAP, and RACF
  • Security Standards knowledge, specifically Logical Identification and Password, and Access Control
  • Understands the purpose and functionality of an Identity Management system, and is able to define such terms as “identity”, “role”, “entitlement” and “certification”
  • Familiarity with the types of identity stores and access control systems, such as Active Directory, LDAP, and RACF
  • Understanding and tool knowledge of SailPoint’s IdentityIQ (IIQ), SPA Suite and Security Batch Cycle
  • Authentication mechanisms
  • Knowledge of Application Access Control and Application security concepts
  • Security Standards, specifically Authentication
  • Centralized identity stores
  • Federation Services – PING, ADFS
  • SSO
  • Depth of knowledge in one or more Application Access Control systems and Application security concepts
  • Bachelor's Degree in an Information Technology, or related discipline (i.e., Computer Science, Information Systems (IS) or Management Information Systems). In lieu of a degree, all related work experience will be accepted
  • 8-10 years of related work experience designing/developing, programming, and supporting software programs/applications in mainframe or client server environments
  • Exceptional working knowledge of software applications, software development life cycle, and computer code/programming languages
  • Excellent interpersonal and communication skills with the ability to interact effectively with others and lead others through change
  • Ability to work in a team-oriented environment and independently organize work resources from current team or other teams to solve technical problems
  • Ability to consider technical decisions as part of a multidimensional problem, balancing standards, principles, project management disciplines (time, cost, schedules), team norms (consultation, decision-making, communication) and process
  • Excellent organization skills with the ability to work on multiple projects and/or assignment simultaneously
  • Ability to support department goals that align with current and future Company objectives and initiatives
  • Excellent negotiation skills with the ability to find successful resolutions for moderate to complex issues, escalating those that require management involvement, when necessary
  • Ability to work in a fast-paced environment with tight deadlines and changing priorities
  • Ability to effectively troubleshoot system problems by identifying and implementing software or process changes that allow business transactions to continue with minimal risk
  • Wellness program with discounts & rewards, and onsite gym at our large locations
20

Enterprise Security Engineer Resume Examples & Samples

  • 3+ years of tenure as application architect or application security engineer
  • 3+ years developing information security policies/programs
  • Professional IT Security Certs - CISSP or GIAC (SANS)
21

Enterprise Security Engineer Resume Examples & Samples

  • Be responsible for helping architect, test, implement, and support secure end-user platforms designed for confidential use
  • Be involved in supporting other privileged access technologies such as password vaults, bastion hosts, key life cycle management, and privilege escalation tools
  • Participate in Integrating these tools to work with one another along with additional enterprise technologies such as directory services, multi-factor authentication, smart card authentication, and single-sign on
  • Work with Adobe's various teams to administer and implement appropriate security controls and workflows
  • Work with various Adobe employees to help train and educate on good security practices and specifics about end-user security tools
  • Work with a team of Security Engineers to handle incoming requests, respond to issues, troubleshoot reported problems, and identify solutions
  • Communicate with customers to address their security requirements and provide guidance
  • Present project updates, issues, and changes to management and implementation teams
  • Develop and maintain O&S Standard Operating Procedures for VDI Environment
  • Assist in ensuring compliance with security policies and procedures
  • Evaluate hardware and software, including peripheral, output, and related equipment
  • Participate in the development and implementation of VDI-related operational procedures and standards
22

Spectrum Enterprise Security Resume Examples & Samples

  • Manages Juniper SRX firewalls that protect the Spectrum Enterprise Servers in regional data centers
  • Manages Juniper EX switches for the Spectrum Enterprise Servers
  • Manages Cisco ACS for Spectrum Enterprise
  • Creates Splunk reports and alerts for security related events
  • Creates and maintains documentation of Spectrum Enterprise Security architecture and authentication systems
  • Post secondary education in Computer Science, Computer Engineering, Information Technology, or similar program
  • Two years firewall administration
  • Five years network administration
  • One Juniper certification from the following: JNCIS-SP, JNCIS-ENT, JNCIS-SEC
  • Experience with Kepner Tragoe is a plus
23

Global Lead-enterprise Security Architecture Resume Examples & Samples

  • Contribute to the implementation of the Technology cyber security strategy through the development of security architecture patterns and approaches that align with the Technology roadmap
  • Drive transformational change across Technology through engagement with Enterprise Architects to achieve business and Technology objectives
  • Manage a global team to assess and develop secure architecture design for existing, new and emerging technologies, aligned with industry standards and recommendations
  • Manage governance over the implementation of Security architecture standards through integration with project management and SDLC processes, ensuring a secure-by-design approach and identifying alternate solutions for securing technology where standards cannot be achieved
  • Engage with all Security capabilities to identify improvements in security reference architectures
  • Support Technology Risk Management processes in enforcing reference architecture standards or recommending viable alternatives that continue to address risk tolerance
  • Lead the development of secure Architecture and expertise for specific technologies such as mobility, networks, application, SCADA and ICS
  • Engage with Strategy and Innovation teams to integrate Enterprise Security Architecture
  • Engage with BHP Billiton procurement, vendors and suppliers to effectively deliver and continuously improve Enterprise Security Architecture
  • Communicate with senior Technology leadership to effectively communicate technical risk and mitigation decisions
  • Serve as the Enterprise Security Architecture SME, providing consultation and advice where required
  • Provide input into Security and Technology strategies where required
  • Support the development of all Enterprise Security Architects in the attendance of relevant training, qualification and development opportunities
  • Develop and manage the Enterprise Security Architecture OPEX and CAPEX budgets within tolerance and to achieve objectives
  • You will have the ability to quickly gain an understanding of complex architectures and technologies with a focus on the securing systems by design, and deep technical knowledge of various aspects and components of information security spanning all layers of the OSI model. With effective verbal and written communications, collaboration and facilitation skills, you will have a proven ability to collaboratively plan, document, and present security strategies and manage the implementation and ongoing support. In addition, you will have experience in: Experience in similar roles in like industries/organisations
  • Defining, implementing and managing Enterprise Security Architecture for larger organisations, preferably with experience across both ICT and OT environments
  • Demonstrated knowledge of Enterprise Security Architecture aligned to multiple industry frameworks such as SABSA, TOGAF,
  • Adapting Security Reference Architectures to achieve changes in business and technology objectives
  • Assessing and translating changes in technology, regulation or strategy into updated security requirements
  • Leading and integrating teams across Security Architecture to achieve security objectives
  • Education of all employees and contractors involved in Technology support to adhere to Security Reference Architecture standards
  • Engaging with technical and operational teams (both internal and third parties) to address weaknesses or improvements in security standards
  • Managing large teams across multiple sites and timezones
  • Engaging effectively with risk owners to provide effective solutions that mitigate risk
  • A Degree is mandatory for this role
  • Industry certifications such as SABSA, TOGAF or CISM are required
24

Manager, Enterprise Security Programs Resume Examples & Samples

  • Develop compliance and metrics system for all applicable security & crisis management requirements
  • Develop and implement a holistic security management system
  • Coordinate with the learning management team to develop and deliver training to employees across the organization
  • Establish and execute communication and project plans for key program stakeholders
  • Design a travel security program to support the organization’s duty of care requirements
  • Serve as a project manager for special projects
  • Manage various security related contracts, including relationships with account managers, with external vendors
  • Design and manage enterprise wide risk based security standards
  • Coordinate and collaborate with various business units across the organization (HR, Legal, IT, Compliance, HSE, etc.) in order to build cohesive risk based solutions
  • Conduct internal investigations as needed
  • Bachelor’s Degree in Business, Security Management, or Criminal Justice is required. Master’s Degree is preferred
  • At least 10 years security management experience (military, government, law enforcement) with a minimum of 5 years in a progressive corporate security organization with experience in overseeing security and crisis management in complex environments
  • Experience in building risk based security practices and standards and successfully integrating them within the business
  • A solid understanding of regulatory programs such as NERC-CIP, CFATS, and MTSA
  • Exceptional analytical skills
25

Specialist, Enterprise Security Ops Resume Examples & Samples

  • Provide 24/7 Enterprise wide customer support via phone and email as it pertains to security and safety issues at all T-Mobile and MetroPCS locations
  • Process customer service requests for access control, CCTV, and other facilities and retail security equipment
  • Provide first line workplace violence response through notifications, processing reports, and support subsequent actions as directed by the Workplace Violence Intervention and Legal teams
  • 2+ years security experience; operations/command center experience preferred
  • 1-2 years working with computer systems and related software
  • Ability to work with cross-functional groups from varied operational backgrounds, preferably in a large corporation
26

Enterprise Security Policy Architect Resume Examples & Samples

  • Security Policy: Leading in the development, maintenance and overall life cycle management of security policy and standards, and coordinating and involving subject matter experts as necessary
  • Flexible to travel as role requires (noting that responsibilities are US focused with alignment to global policies when applicable)
  • Forms a “center of excellence” for information security policy management, for example offering internal management consultancy advice and practical assistance on information security risk and control matters throughout the organization and promoting the commercial advantages of managing information security risks more efficiently and effectively
27

Consulting Enterprise Security Engineer Resume Examples & Samples

  • Serves as an internal information security consultant to the enterprise while balancing the needs of the day-to-day business
  • In the IS Architect role, will provide balanced risk analysis, risk resolution and mitigation recommendations on engagements
  • The consultant will focus on network architecture, system integration, application development, regulatory & business risk management, and technical threat and vulnerability management; and be the leader for the review, development, and approval of the security design and functionality of current and new IT projects, software products, new technologies, and network security
  • Lead a professional Access and Penetration testing team
  • Utilize Ethical Hacking skills to perform relevant security assessments
  • Develop the plan of attack and rules of engagement for various access and penetration assignments
  • Lead a team of security consultants through any engagement
  • Mentor security consultants in their professional development
  • Acquaint new security consultants with the HCA environment and business
  • Provide a security risk assessment summary for executive decision making
  • Develop disaster recovery and contingency plans for Information Security projects and participate in DR planning for other projects
  • Consult on the minimum security configuration for all IT systems
  • Perform vulnerability and intrusion assessments
  • Perform access and penetration testing with regard to legal boundaries
  • Monitors industry security updates, technologies and best practices to improve security management
  • Participates in the development of hardware/software/network security procedures and guidelines that support information security policies
  • Interprets relevant principles for technology architecture modeling requirements from the National Institute of Standards and Technology (NIST)
  • Working knowledge of Ethical Hacking techniques
  • Must be able to work independently or in a close team environment
  • Working knowledge of LDAP Directories
  • Working knowledge of Microsoft Active Directory
  • Ability to analyze all layers of the OSI model from the security stance
  • Working knowledge of Linux, AIX, etc…
  • Prepare and present plans / designs to IT and business leaders
  • Advocate the integration of solutions into the enterprise directory structure
28

Enterprise Security IT / OT Architect Resume Examples & Samples

  • Develop and manage an IT/OT security architecture that addresses business needs holistically – people, process & technology
  • Develop security architectural patterns of the individual components of the end solution (Contextual, Conceptual, Logical, Physical, Component and Operational)
  • Lead development of security architectures for IT/OT, ensuring consistency with specified requirements agreed with both external and internal customers
  • Guide various business and IS teams as needed toward a common architecture and engage stakeholders as advocates of the vision
  • Establish a mechanism for the formal acceptance and approval of the security architecture
  • Identify cross-work stream dependencies and coordinate activities with other areas internal and external
  • Will work and report within the Digital Risk & Security function as a dedicated resource representing the Security Architecture function
  • Flexibility to travel as role requires
  • Educated to degree level (or equivalent combination of education and experience)
  • Information Security Qualifications such as CISSP, SABSA and ISSAP preferred
  • Other Qualifications such as SANs, CCNA, CCNP preferred
  • Experience of working as an Engineer working closely with business stakeholders and Enterprise Architects
  • Knowledge of SCADA protocols like Modbus, IEC 60870-5-101 or 104, IEC 61850 and DNP3 and other major SCADA protocols
  • Experience with the use of NIST, NERC-CIP v3/v5 standards and developing security architectural patterns
  • Working experience of applying security architecture within a large global enterprise
  • Experience of Experience working with a diverse team of people comprised of internal and external resources
  • Strong analytical and problem solving skills, negotiation, interaction management, and presentation skills are required with the ability to create consensus and understanding around security architecture
  • Experience of designing and managing security controls within service providers and the cloud
  • Strong communication, leadership, influencing, and partnering skills to collaborate with, and influence business stakeholders to explore best in class, innovative solutions to business challenges
  • Prepared to challenge business colleagues and have the “difficult conversations” where needed in the interests of National Grid
  • Previous experience of IT/OT technologies and utility industry experience preferred with an awareness of utility specific security threats
  • Demonstrated experience in applying emerging technologies to develop secure solutions across diverse network/communication protocols
  • Must demonstrate strong ethics, influence and negotiation, leadership, interpersonal skills, communication, the ability to effectively manage stress and engage in continuous learning by staying current with relevant technology and innovation
29

Cyber Red Team Lead-enterprise Security Resume Examples & Samples

  • Vulnerability assessments
  • Application (web, mobile, etc.) penetration testing
  • Social engineering testing (e-mail phishing, phone, physical, etc.)
  • Secure code auditing
  • Strong understanding of networking fundamentals (all OSI layers, protocols, etc.)
  • Strong understanding of Windows/Linux/Unix operating systems
  • Strong understanding of operating system and software vulnerabilities and exploitation techniques
  • Strong understanding of web application vulnerabilities and exploitation techniques, covering the OWASP Top 10 as a minimum
  • Strong knowledge of security risk management
  • Ability to deliver high quality reporting on technical issues identified and providing remediation guidelines
  • Excellent customer facing skills in both verbal and written communications
  • Master’s Degree in IT Security, Engineering or Technology related fields a major plus
30

Senior Enterprise Security Engineer Resume Examples & Samples

  • Perform security assessments of a large variety of network environments and technologies... think vulnerability assessments, penetration tests, risk analysis, architecture review, and just plain creative thinking
  • Evaluate cloud and traditional network environments (i.e. AWS, Azure, etc.) to determine security risk, providing guidance to both technical and business leaders... how secure is that cloud?
  • Define and develop technical security standards and guidelines in collaboration with other security staff
  • Evaluate risk of enterprise network architectures, interconnected infrastructure environments, connected devices and propose requirements for reducing security risks
  • Research new technologies, emerging threats and vulnerabilities for strategic planning and business processes improvements
  • Collaborate with infrastructure engineering teams and corporate business units to drive solutions through a secure development lifecycle (influencing architecture, design, road-map development, growth strategies, budgets, and business process integration)
  • Recommend enhancements to Enterprise Security procedures and identify process improvement opportunities
  • Relevant BA/BS degree and at least 3-5 years experience in a security role covering at least three of the following areas: application whitelisting, security engineering, incident response/handling, penetration testing, intrusion detection, firewallccess control technologies, risk management, identity management, Windows, Mac or Linux security, encryption technologies, or endpoint security controls
  • Solid understanding of key network protocols and concepts such as TCP/IP, MPLS, SSH, SSL/TLS, IPSec
  • Familiarity with Intrusion Detection/Prevention Systems (IDS/IPS), Application Layer Firewalls, L3/L4 Firewalls, and Host Based security systems
  • Excellent organizational, problem solving and time management skills, as well as attention to detail. Must be able to work on multiple tasks concurrently and re-prioritize work independently as needed
  • Strong focus on professionalism with excellent written and oral communication skills
  • Ability to communicate complex technical and programmatic information, often in the form of verbal and visual communication, situation reports and briefings
  • A commitment to learning and never ending curiosity of all things security
31

Information Technology Enterprise Security Faculty Resume Examples & Samples

  • As a faculty member you’ll be challenged with adding your professional expertise to instruct a curriculum which is centrally developed with specific learning objectives
  • Provide timely and detailed feedback on a weekly basis and offer student support via classroom, phone, and email
  • Master's degree or higher in the discipline of Cyber Security and all experience specified in the Required Experience section below and a minimum of 5 years professional verifiable work experience in IT with currency within the last 3 years
  • Master's degree or higher plus 18 graduate credits in related discipline of Cyber Security, Information Security, Information Assurance and/or Computer Forensics and all experience specified in the Required Experience section below and a minimum of 5 years professional verifiable work experience in IT with currency within the last 3 years
  • Master's degree or higher in any area and 5 years professional experience in Cyber Security or directly related field with responsibility for cyber security, computer forensics, computer monitoring and/or cyber security related IT processes, or IT staff as a PRIMARY job function (must have all experience specified in the Required Experience section below) and currency within the last 3 years
  • Two years administering enterprise-level systems (i.e., ERP, EDI, Intranet/Extranet architectures)
  • Two-years hands-on experience securing operating systems, networks, web-based and wireless technologies, and/or intrusion detection monitoring systems
  • Experience IT security planning and employing prevention measures/implementing IT security processes
  • Experience in the general use of network communications, operating systems, database and web-based systems
  • Evidence/experience in the development and management of 'Risk Management' in an Information Technology organization or department, to include security, disaster recovery, and back-up systems
32

Senior Enterprise Security Analyst Resume Examples & Samples

  • 3+ years of experience in information security, network administration, or related IT focused discipline
  • Bachelor’s Degree is required, in technology field is preferred
  • Knowledge of common vulnerabilities and attacks associated with infrastructure, applications and operating systems
  • Must be able to work constructively in a fast-paced, team environment, and remain calm and professional under stress
  • Cloud Infrastructure and SaaS experience
  • Willingness to take part on a 24/7 on-call rotation
  • Hire, train and assess performance of direct reports according to corporate policies and procedures
33

Enterprise Security Analyst Resume Examples & Samples

  • Security certifications highly desired: OSCP, CISSP, CEH, Security+, SANS, or similar
  • Knowledge of information security principles and practices, understanding of security protocols and defense in depth
  • Experience with information security tools for performing vulnerability assessment, intrusion detection, integrity checking, event management
  • Strong grasp of TCP/IP fundamentals, Windows active directory, Internet Information Server (IIS) and Microsoft SQL Server
  • Experience with Splunk Enterprise Security is highly desirable
  • Working experience in SaaS is highly desirable
  • Requires knowledge of security issues, techniques and implications across all existing computer platforms
  • Knowledge of PCI compliance
34

Enterprise Security Manager Resume Examples & Samples

  • 15+ years of security experience
  • Professional, customer-centered attitude; executive demeanor
  • Exceptional organizational skills, thorough, detail-oriented and follow-through behaviors essential
  • Possession of or ability to obtain/maintain a Secret personnel security clearance
  • Deep expertise with SIMS, JPAS, and SWFT required
  • Management of SQL specialist required
  • 5+ years’ of management experience of a dispersed workforce required
  • 5+ years’ experience managing a Personnel Security shared services center
  • Willingness to travel in support of DSS Vulnerability Assessments for cleared facilities
  • Extremely flexible - able to prioritize to meet organizational objectives
  • Knowledge of, and ability to manage the integration of corporate and government systems into the SIMS system
35

Enterprise Security Resume Examples & Samples

  • Develop and maintain a security architecture process that enables the enterprise to develop and implement security solutions and capabilities that are clearly aligned with business, technology and threat drivers
  • Develop security strategy plans and roadmaps based on sound enterprise architecture practices
  • Participate in application and infrastructure projects to provide security-planning advice
  • Determine and refine baseline security configuration standards for operating systems (e.g., OS hardening), network segmentation, and identity and access management (IAM)
  • Validate security configurations, including firewalls, IPSs, WAFs and anti-malware/endpoint protection systems
  • Perform regular vulnerability testing of enterprise services and applications, assess results, prioritize, and coordinate remediation efforts with colleagues
  • Ability to leverage SIEM platform for conducting forensic security investigations and identifying potential indicators of compromise (IOCs). Develop and use advanced, customized tools and scripts to enhance security assessments and proactive alerting
  • Review all security reports and logs for unusual or anomalous activities
  • Ability to perform secure application code review, and coordinate with development teams to advocate secure coding practices. Provides guidance for security activities in the system development life cycle (SDLC) and application development efforts
  • Liaise with the vendor management (VM) team to conduct security assessments of existing and prospective vendors, especially those with which the organization shares intellectual property (IP), as well as regulated or other protected data
  • Review all existing and new security technologies, tools and services, and make recommendations to the broader infrastructure team
  • Participate in all information security related incident response activities
  • Stay abreast of information security events, news, trends and evolving legislative/regulatory changes
  • Direct, hands-on experience or strong working knowledge of managing security infrastructure — e.g., firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), endpoint protection, SIEM and log management technology
  • Verifiable experience reviewing application code for security vulnerabilities
  • Direct, hands-on experience or a strong working knowledge of vulnerability management tools
  • Documented experience and a strong working knowledge of the methodologies to conduct threat-modeling exercises on new applications and services
  • Full-stack knowledge of IT infrastructure
36

Program Director, Enterprise Security Resume Examples & Samples

  • In the area of Program Management
  • Defines processes and policies for program/project management
  • Defines risk management procedures for programs
  • Manages individual projects as appropriate
  • Aiding in the negotiation of contracts and contractual changes and coordinating preparations of proposals, plans, specifications, and financial conditions of contracts
  • Ensures projects are completed on time and within budget
  • Acts as advisor to program team regarding projects, tasks, and operations
  • In the area of Cloud and Infrastructure Security
  • Manages individual projects as appropriate including and not limited to planning, risk management, communication, analysis, documentation, coordination with vendors, testing, and implementation
  • Analyzes enterprise level solutions to understand, document and optimize processes
  • Ensures appropriate change controls for both processes and relevant systems
  • In the area of CyberSecurity
  • Works towards minimizing, monitoring, and controlling the probability and/or impact of infrastructure / cloud security related events, or to maximize the realization of opportunities to help achieve a competitive advantage
  • Leads the security cultural transformation within the CIO teams around infrastructure and cloud
  • Performs business impact analysis to help inform the executive team of the impacts to the organization as a result of an infrastructure related security incidents
37

Enterprise Security Speciallist Resume Examples & Samples

  • Provide second level support for end-point related incidents. Sharing on-call responsibilities in a rotational scheduled for off-hour infrastructure support responsibilities
  • Responsible for deploying, managing and monitoring IT security infrastructure
  • Assist in projects and develop solutions for a variety of business aspects involving hardware and software configurations
  • Provide solutions and countermeasures in the event of a network outage
  • Provide project oversight and management, and collaborate with external vendor and partners as required
  • Develop and maintain operational procedures and documentation
  • Develop and refine security plans and procedures to proactively respond to security incidents within RBNA networks
  • Bachelor's Degree in Computer Science or related field is required
  • 4+ year experience with Firewall technologies
  • 4+ year experience with Firewall Virtualization technology solution, such as VMware
  • Experience with network protocols and RFCs
  • Experience with Unix/Linux/Windows
  • Understanding of information security principles as it relates to system and network security
  • Experience using troubleshooting techniques including; system and network logs, network sniffers, syslog
  • Working experience with ITIL Processes and Procedures
  • Proficiency in the foreign languages is a plus: German, Spanish and Portuguese
  • English fluency is required
38

Enterprise Security Escalations Manager Resume Examples & Samples

  • Global implementation of security best practices and industry standards
  • Critically analyze security operations for process improvement
  • Advise internal customers on risk assessment, threat modeling and fixing vulnerabilities
  • Lead on-call incident response
  • Ability to speak a second language to English (Japanese, Chinese, Spanish, French, etc.)
39

AWS Enterprise Security Intelligence Manager Resume Examples & Samples

  • Author risk assessments and threat modeling for internal customers
  • Gather, assess, and brief intelligence reports
  • Support on-call incident response
  • Bachelor’s degree in International Relations, International Studies, Area Studies, or similar
  • 5-10 years’ experience monitoring and analyzing global events, managing crisis communication, and global incident response
  • 5-10 years’ experience gathering intelligence, reporting and briefing a Fortune 500 C-suite, or equivalent audience
  • Expert communications skills, including a mastery of the English language both written and spoken as demonstrated by 5-10 years’ experience authoring detailed intelligence reports where assessments were provided
  • 5-10 years’ experience conducting crisis management, risk management, and incident response
  • 5-10 years’ experience developing and delivering employee or workplace security awareness training programs and products
  • 5-10 years’ experience leveraging security tools and software
  • 5-10 years’ experience with MS Office Suite to include Word, PowerPoint, Excel, and other MS programs to include SharePoint, etc
  • Availability for after-hours calls, occasional night and weekend work, as needed
  • 10+ years’ experience implementing and managing incident response, crisis communications, global event monitoring/analysis, and workplace incident response
  • Experience using publishing tools
40

IoT Connected Assets Enterprise Security Engineer Resume Examples & Samples

  • Apply Connected Asset Program deliverables
  • Provide input and support to MineStar development teams throughout the product development lifecycle on a variety of connected product security requirements, including, but not limited to, security requirements, secure coding and configuration, software testing, third-party component management and security defect management
  • Maintain current knowledge on existing security procedures, directives, secure configuration baselines, data classification and data handling
  • Five or more years experience in Information Security or connected systems/product Engineering such as IoT (Internet of Things), OT (Operational Technology), or Autonomous Vehicle Engineering
  • Experience with relevant industry standards, such as
  • Embedded systems security
  • Threat model development
  • Defense in depth
  • Secure SDLC and product development processes
  • Business process design
  • Web services security
41

Enterprise Security Engineer Resume Examples & Samples

  • Strong experience of leading the design and implementation of wireless and wired networks, and Wireless Intrusion Detection and Prevention
  • Proven record of success of leading the design and implementation of 802.1x user authentication, MAC Bypass Authentication, and Network Access Control device profiling and posture
  • Successful leadership of the design and implementation of Public Key Infrastructure in conjunction with 802.1x device authentication for PCs, Mac OS X and mobile devices. Experience of deployment of smart cards and hardware security modules is preferred
  • Strong experience leading the design and deployment of Privileged Account Management and just-in-time admin rights products
  • Experience of the deployment of Microsoft Enterprise Digital Rights Management
  • Strong experience of the design and implementation of database encryption, Key Management Interoperability Protocol, and data tokenization and masking
  • Prior experience of the deployment of Cloud Access Security Brokers. Experience of Netscope or Skyhigh Networks is preferred
  • Knowledge of Web Application Firewalls
  • 12 years’ progressive experience working in Information Technology with at least half of that directly in Information Security
42

Enterprise Security Engineer Resume Examples & Samples

  • 4+ years experience as a network and/or security engineer in a corporate environment
  • Technical knowledge and understanding of firewall and IDS/IPS technologies
  • Demonstrated analytical, problem solving, planning and organizational skills
  • Proficient in Microsoft computer applications
43

Intern Enterprise Security Solutions Resume Examples & Samples

  • Strong project management, technology, verbal and written communication skills
  • Keen analytical and proven problem solving skills
  • Proven team player with excellent interpersonal skills
  • Proficiency in Microsoft Word, Excel and PowerPoint
  • All positions are based in Dubai
  • Program is open to Undergraduate students graduating in 2018
  • Students must be pursuing a bachelor’s degree and have successfully completed relevant coursework
  • Minimum overall preferred GPA of 3.2 on a 4.0 scale/4.2 on a 5.0 scale
  • Program runs during the months of July and August
44

Senior Enterprise Security Analyst Resume Examples & Samples

  • Assist in the development of security policies and standards to help ensure compliance
  • Performs Vendor Risk Management against external partners and suppliers to ensure security requirements align with Insurance Enterprise Security policies and standards
  • Reviews and develops internal security documents, controls, and procedures on a regular basis
  • Leads the Computer Security Incident Response Team (CSIRT) in the event of a security incident
  • Performs vulnerability scans and assists with the Vulnerability Management process
  • Manage, monitor, and perform signature tuning for IDS/IPS infrastructure
  • Manage Security Event Monitor tools and escalates issues for remediation
  • Performs Security Risk Assessments on new and current technology
  • Recommends controls for Reporting, analyzing, and reducing the impact of security incidents
  • Performs security pen-tests for risk reporting and mitigation
  • Performs forensic investigations for security events and HR investigations
  • Ensuring all changes are assessed for impact on all security aspects, including the Information Security Policy, security controls and attending Change Advisory Board meetings when appropriate
  • Helps ensure services are maintained at the levels agreed in the Service Level Agreements and that they conform to all relevant statutory requirements
  • Conducts and assists with the development of Security Awareness training material
  • Keeps current with security industry standards and appropriate governmental regulations
  • Communicates effectively, verbally and in writing, using a variety of communication methods to build productive relationships
  • Prioritizes and completes tasks with a concern for all the details involved; monitors and checks work for accuracy and reasonableness
  • Must be able to provide guidance and assistance to less experienced staff
  • Must be self-directed and effective working independently, yet equally comfortable contributing in a team environment
  • Ability to synthesize, write, diagnose, collect, extrapolate and review data
  • Working knowledge of Microsoft Office Suite
  • Ability to apply concepts such as fractions, percentages, ratios, and proportions to practical situations
  • Ability to create and modify scripts to automate and assist with performing security assessments
  • Understanding of networking concepts such as the OSI Network Model
  • Solid knowledge of security best practices, policies, standards, and guidelines
  • In-depth knowledge of networking communication protocols e.g. IP, TCP, UDP, SSL, DNS and associated security threats
  • Solid knowledge of security architecture and secure implementation of new technology
  • Scripting ability in Perl, Powershell, VB, or similar language
  • Bachelor degree and/or equivalent combination of education and experience required
  • Must have 5 to 10 years of experience working in an enterprise security organization
  • Solid understanding and experience with compliance standards, including COBIT, HIPAA/HITECH, ISO 27000, OWASP, and PCI
  • Experience with Firewall policy creation, administration, and audits
  • Experience with Governance, Risk, and Compliance (GRC) platforms
  • Hands on experience with Enterprise Security Event Monitoring (SIEM) platforms
  • Experience with vulnerability scanners such as Nessus, Qualys, nCircle
  • Highly desirable to hold one or more security related certifications
45

Manager, Enterprise Security Resume Examples & Samples

  • Develops and manages an enterprise-wide incident response program
  • Plans, organizes and executes processes to restore normal service operation as quickly as possible to minimize impact to service operations
  • Manages a team of engineers assigned to Enterprise Security
  • Develops and manages SIEM rules, reports, and logging
  • Works with application owners and vendors to configure custom logs and alerting such as for brute force attack against Mobile (i.e., working on logs/alerting/rules/reporting for systems outside of the primary SIEM solution)
  • Analyzes and takes action on phishing emails/calls/texts to employees and members
  • Develops rules and monitors procedures for IDS/IPS/NexGen firewall and next generation malware protection
  • Develops and manages incident response training sessions
  • Acts as an escalation point and communicate with senior and executive leadership during major incidents and outages (including the active participation and leadership with troubleshooting, diagnosis and resolution)
  • Performs post-mortem process and reviews; creating a culture of curiosity surrounding events that impact global operations
  • Monitors and tests fixes to ensure problems have been adequately resolved
  • Maintains and updates the corporate incident response plan
  • Manages security forensic activities on potential compromised systems and unauthorized changes to production configurations
  • Manages the chain of custody for all evidence collected during incidents and security investigations
  • Analyzes performance of incident management activities and documented resolutions, identifies problems, and devises and delivers solutions to enhance quality of service and to prevent future problems
  • Tracks and analyzes trends in incident reports and generate statistical reports
  • Researches, reports on and implements new solutions in the area of incident management
  • Develops an application security program and works with the development team to ensure the CIA of WGU software and services
  • Continuously monitors network monitoring, Red Flag Rule, SIEM, SCCM and other alert logs for potential breaches
  • Bachelor’s Degree in related field
  • 5 years minimum experience in Information Security
  • Experience with SIEM and network monitoring tools
46

Enterprise Security Administrator Resume Examples & Samples

  • Candidates must be legally authorized to work in the US (Nucor will not sponsor the need for a visa now or in the future)
  • 5 years’ experience managing Security Infrastructure
  • Cisco Certified Network Associate (or equivalent)
47

Manager, Enterprise Security Resume Examples & Samples

  • Knowledge of NIST, HIPAA, GLBA, ISO, and Network/Infrastructure standards
  • Good written and oral communication skills with the ability to explain complex security problems to client groups
  • Hands-on technical implementation of information systems
  • Excellent analytical, problem solving, and decision making skills required
  • Solution-driven approach to problems
  • Ability to maintain strict confidentiality with regard to sensitive workplace issues
  • Master’s degree in related field
  • Industry security certifications (CISSP, CISA, CISM, or CRISC)
48

Enterprise Security Engineer Resume Examples & Samples

  • Apply Connected Asset Program deliverables to Mining Technology
  • Coordinate, respond, and execute our cybersecurity strategy for Mining Technology
  • Participate and respond to customer and mining industry assessments, workshops, and any incidents
  • Coordinate and communicate status of the mitigation and remediation of vulnerabilities identified in our client's A&P Tests
  • Provide periodic internal stakeholder updates and act as the communication focal point for our client's mining technology inquiries and presentations
  • NIST CSF
  • NIST 800-82
  • ISA 62443
  • SOC Reporting
  • Enterprise security architecture
  • Application Security Expertise
  • Networking concepts (routing, design, TCP/IP)
  • Bachelor's degree in Computer Science, Electrical Engineering or a related field
  • Experience with the product development processes
  • Ability to coordinate multiple teams in accomplishing process review and improvement
  • Experience with cybersecurity threat models and mitigation/remediation techniques
49

Enterprise Security Executive Resume Examples & Samples

  • Develop relationships with customer, CxO level Business and Technical Decision Makers, with a primary focus on CISOs. Drive security solution sales scenarios through understanding the customer’s long and short-term strategy, the industry, and the competition
  • Own the development, creation and updating of the account security plan, aligning with the overall account plan strategy
  • Responsible for security deals orchestration, deal structure, developing value based propositions, crafting and selling solutions mapped to customer business outcomes
  • Drive pursuit strategies including precise opportunity close plans working closely with the local Account and Specialists Teams
  • Ensure opportunities are accurately qualified and mapped to customer budget cycle, aligned with Account Teams
  • Orchestrate both Customer and Microsoft key resources in a virtual team environment to define solution vision and achieve desired business outcomes
  • Manage the overall Security opportunity deal governance working with the customer’s CISO/Security team and the Microsoft local Account and Specialist Teams
  • 8+ years’ experience in Enterprise Security sales, security services solution, sales, technical sales, marketing, business sales strategy, software security and/or security sales business development
  • Proven record of effective account management: planning, opportunity qualification and creation, stakeholder and executive communication, needs analysis, value engineering, services/partner engagement, opportunity management, pipeline management, large dollar licensing and deal negotiation
  • Solid understanding of Microsoft Cloud Platform products and/or complementing solutions. The position requires the ability to articulate and present the business value of Microsoft's solutions and have a firm understanding of Microsoft's strategies and security products relative to major Microsoft competitors
  • Strong knowledge of enterprise software security solutions and platform competitor landscape. Including specific knowledge in key security domains across the entire customer environment, like Identity, Access Management, Threat Protection, Information Protection
  • Strong understanding of partner ecosystems and the ability to leverage partner solutions to solve customer needs
  • Ability to orchestrate and influence virtual teams to pursue sales opportunities and lead v-teams through influence, and integration skills, working with the Account Teams as well as Marketing teams to drive demand generation
  • The candidate must be confident and capable of delivering readiness to sales audiences and be able to represent the Cybersecurity solution sales business locally inside and outside of Microsoft, as well as be able to speak as a subject matter expert (SME) at industry or customer events
  • Bachelor’s Degree required, MBA preferred, relevant industry security certifications desired (i.e. CISSP)
50

Sales Manager, Enterprise Security Resume Examples & Samples

  • 10+ years’ experience in Enterprise Security sales, security services solution, sales, technical sales, marketing, business sales strategy, software security and/or security sales business development
  • Extensive track record of successful sales leadership, including outstanding sales achievement and deal making
  • Strong ability to coach sales teams and lead through both direct and indirect influence
  • Strong track record of delivering WHI at or above average level
  • Depth Knowledge of Enterprise sales processes and a strong track record of cross company collaboration
  • Experience of working with product groups and other Corporate teams to drive Digital Transformation deals
  • Track record of attracting and retaining strong security talent
  • Demonstrated experience and expertise selling to senior business leaders, specifically CISO, by aligning & reinforcing the value of cybersecurity solution to the customer’s overall business pain and/or strategic opportunities and decision criteria
  • Strong knowledge of the Enterprise Security space, with ability to discuss industry trends and security topics outside of Microsoft technologies
  • Bachelor’s Degree required, MBA preferred
51

Senior Director, Enterprise Security Resume Examples & Samples

  • Leads the development and adoption of the principles, policies standards and procedures of an enterprise information security governance and compliance strategy. Possess strong working knowledge of these and act as an expert reference and leader across the business with the Chief Information Officer (CIO), Chief Compliance Officer (CCO), Office of Corporate Compliance, Information Security Program Committee and Executive Management (IT and Business Unit)
  • Leads teams and has direct managerial responsibilities for high-level governance, compliance and technical staff. Hires and manages a team of architects, project management and security principals responsible for delivering against enterprise wide objectives within and outside of IT employees. Defines objectives and development plans in alignment with IT and business objectives. Manages team to achieve business results. Manages on-demand resource needs and ensures the right staff is in place to support operational needs
  • Serve as the Compliance Officer for IT reporting dotted line to the Chief Compliance Officer (CCO) and member of the Office of Corporate Compliance quarterly compliance steering committee
  • Analyze privacy, regulatory, technology and market security industry trends and determine potential impact on business. Recommend policy, technology and security program direction as it pertains to governance and compliance and/or adjustments to incorporate in the business plans
  • Develop and implement IT security training courses across the Liberty Mutual enterprise and to conduct manager training session for the IT manager employees
  • Provide and conduct consulting to security program projects, incident management and risk management for the Enterprise Risk Management team at the Office of Corporate Compliance
  • Works with application teams to identify functional requirements that drive security technology that enables business functionality
  • Program manage and report IT Attestation guidance and assistance across the enterprise to IT Executive Management, SBU Executive Management and external Auditing Senior leadership
  • Bachelor’s Degree in Computer Science or a related discipline and typically 15 years of experience in the security and privacy and data protection successfully launching an Enterprise Security Governance program in a fortune 100 company
  • MBA preferred. Master's preferred. CISA and / or CISSP, IAPP certification preferred
  • Inclusive of the following characteristics; policy management, risk management, governance and compliance
  • Thorough knowledge of financial models and budgeting
  • Thorough understanding of business operations, objectives and strategies including but not limited to, insurance industry, financial services, global business and technology trends
  • Strong leadership, coaching, collaboration and mentoring skills
  • Ability to execute work directly and through non-directly aligned teams