Global Information Security Resume Samples

4.5 (89 votes) for Global Information Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the global information security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
HF
H Fay
Harmon
Fay
196 Beau Valleys
Los Angeles
CA
+1 (555) 740 5662
196 Beau Valleys
Los Angeles
CA
Phone
p +1 (555) 740 5662
Experience Experience
Chicago, IL
Global Information Security
Chicago, IL
Bartell and Sons
Chicago, IL
Global Information Security
  • Manage outsourced vendors that provide information security functions for compliance with contracted service-level agreements
  • Work with GIS leadership to develop budget projections based on short- and long-term goals and objectives
  • Provide SME support for GIDA Fulfillment Centers, Information Security Officers, Application Developers, Business Sectors, and Global ID Administration teams
  • Provide GIDA representation as necessary to global information security working groups, committees, etc
  • Provide system oversight / provisioning support
  • Support problem and incident management for security and identity administration incidents
  • Coordinate measure and report on the technical aspects of security management
Chicago, IL
Global Information Security Cyber Security Fusion Center Advanced Adversary Interdiction
Chicago, IL
Effertz, Torp and Altenwerth
Chicago, IL
Global Information Security Cyber Security Fusion Center Advanced Adversary Interdiction
  • Networking Exposure (Routers, Switches, VLANS)
  • Analyzing DNS, network, honeypot, IDS/IPS, logs, forensic and other common industry hunting tools and feeds
  • Network-based and system-level attacks and mitigation methods
  • Collaborate with leadership to improve internal investigation capabilities for responding to security events through tool building and training
  • 2+ years performing information security incident responses
  • Be part of a team that can perform deep inspection of both current and previous environmental indicators for indications of persistent attacker presence
  • Find/develop new threat intelligence, detection, and suggest hardening strategies
present
Los Angeles, CA
Director, Global Information Security
Los Angeles, CA
Vandervort Group
present
Los Angeles, CA
Director, Global Information Security
present
  • Develop, implement, enforce, and monitor a strategic and comprehensive enterprise information security, IS risk and compliance management program
  • Oversee the selection, development, deployment, monitoring, maintenance, and enhancement of the organization’s security technology and architecture
  • Assist in development and maintenance of GIS policies, standards, processes, and procedures to assess, monitor, report, escalate and remediate risk and compliance issues in relation to IT infrastructure (e.g. networks, databases, endpoints, access)
  • Develop, communicate and ensure compliance with enterprise security policies and standards; proactively work with other functions across the enterprise to implement practices that meet (or elevate) defined policies and standards for information security
  • Administer GIS risk management program and procedures; perform and/or source IS risk assessments, audits, and security incident investigations (with the GIS Operations Manager)
  • Partner with IT and Business leaders to determine security solutions (or secure business solutions). Define project scope and objectives. Develop preliminary project plan and design, determine the necessary resources and project timeline
  • Lead and manage the GIS architecture and engineering team - including recruiting, developing, mentoring, retaining, and coaching members for exceptional performance
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of San Francisco
Bachelor’s Degree in Computer Science
Skills Skills
  • Understand how other business units operate, how their goals align with organizational goals and have budget and profit/loss responsibility
  • Identifies criteria to assess strategic alignment and success of plans tracking against measurable business unit/function success factors
  • Uses knowledge of the business model, and challenges assumptions and conventional thinking to develop new strategies for the business unit or function
  • Perform highly complex, non-routine security assessments and reviews
  • Provides in depth, one-on-one coaching to enable others to achieve performance goals and maximize their potential
  • Works with large amounts of data and identifies highly complex root causes and potential implications; coaches others on data synthesis and analysis
  • Leverages deep understanding of the policies, practices, trends and information that impact the organization and its customers to plan for future projects
  • Apply expertise and understanding of competition and industry trends to projects, strategy, etc
  • Motivates, develops, recruits and retains employees while rewarding and cultivating a culture of high performing teams
  • Functional understanding of log and monitoring management systems, security event monitoring systems, network-based and host-based intrusion detection systems, firewall technologies, malware detection and enterprise-level anti-virus solutions/systems, VPN technologies and encryptions standards
Create a Resume in Minutes

11 Global Information Security resume templates

1

Global Information Security Analyst Resume Examples & Samples

  • Create, modify, and delete user profiles in various systems based on properly authorized request systems/forms, or QA’s instruction
  • Reset passwords, create, and modify user profiles based on the received requests
  • Conduct inquiries from all employees on phone, mail, memo and form
  • Provide customer service regarding the supported applications and systems via phone, mail and virtual ticketing systems
  • Performing inactivity checks and other housekeeping tasks in various systems
  • Keep contact with external security administration/developer teams
  • Ensure all access control activity and administration is strictly applied as per corporate policy instructions
  • Keep procedures up to date
  • Excellent customer service orientation, interpersonal skills and ability to set priorities and work under pressure
  • Has to be able to pay attention to details
  • Has to be able to endure monotonous work and be flexible
  • Ability to work both individually and in team in order to accomplish the team’s requirements
  • Being able to quickly learn to use numerous different system surfaces in basic level
  • 1 year Service Center experience is preferable
  • Good verbal and written communication skills in English and Hungarian
  • Enhanced knowledge of Microsoft Office products, i.e. Word, Excel, Outlook
  • General knowledge of Microsoft Windows XP/Vista desktop operating systems
  • General knowledge of database servers, i.e. Microsoft SQL, Oracle, etc. is preferable
  • Minimum high school degree. College or university degree is preferable
2

Global Information Security Analyst Resume Examples & Samples

  • Provide “can do” attitude
  • Participate in work related projects
  • General knowledge of CitiDirect Security Administration is preferable
  • Project Management certificate is preferable
3

Global Information Security Internship Resume Examples & Samples

  • Excellent communucation skills. We act a consultants to our software developers so we have to be able to communicate effectively with them
  • Strong Java and/or J2EE. We perform mamual applaiton security assessments on Java and J2EE applidations. You have to know Java and/or J2EE, and we can teach you how to do a manual appliation security assessment
  • Excellent understanding of Microsoft productivity software, including Microsoft Office and an email system
4

Global Information Security Resume Examples & Samples

  • Provide SME support for GIDA Fulfillment Centers, Information Security Officers, Application Developers, Business Sectors, and Global ID Administration teams
  • Support critical 24x7 identity security administration functions for a global user base including off hour and on-call support
  • Provide GIDA representation as necessary to global information security working groups, committees, etc
  • Attend meetings in fast paced environment communicating security topics effectively at all levels of the organization
  • Support problem and incident management for security and identity administration incidents
  • Support new application on-boarding activities such as validating proper request / approval methods, entitlement certifications, termination/disablement processes, and other required controls
  • Manage risk by analyzing the root cause of security issues, impact to business, and required corrective actions
  • Develop strong relationships - build and navigate business and technical relationships which add significant value to the organization
  • Provide system oversight / provisioning support
  • Troubleshoot and resolve issues escalated to the SMEs
  • Provide project support and tracking including audit CAPs, Risk Exceptions, and other general issues
  • Operationally support activities for managing roles/groups/profiles that impact large numbers of users
  • Develop process control manuals for application SME processes
  • Provide Audit / MCA support
  • 3+ years information security, compliance, or internal controls function experience preferred
  • Bachelor's degree in Information Security, Information Technology, or a proven track record with information security responsibilities
  • Prior experience with information security, preferably related to a technology area
  • Possess strong working knowledge of application security & identity and access management
  • Must be able to handle a heavy workload while working under pressure
  • Must be organized and thorough with strong administrative skills
  • Must be committed to the delivery of quality customer service and be able to develop strong working relationships
  • Must be a self-starter and have a high level of integrity, initiative, and drive to work with minimal direction
  • Must be team-oriented to invest in the success of peers and the overall team
  • Must be willing to work occasional weekends and public holidays for on-call support
5

Global Information Security Office Internship Resume Examples & Samples

  • Assemble data required for external examinations, internal security assurance and risk reporting, project analysis, metrics, and department project status reporting
  • Retrieve industry research and work with the team to analyze in support of recommendations or business decisions in support of department and company critical initiatives
  • Update documentation, such as policies, processes and procedures, in support of business changes
  • Perform department entitlement reviews and entry-level administrative tasks for department applications
  • Support department and Global Information Security Advisory Council meeting activities (e.g., agendas, meeting minutes, action item follow-up)
  • May participate in information security risk assessments
  • Interdependencies between administrative, technical and physical controls
  • Balance of controls and risk mitigation with business needs and risk appetite
  • Application of conceptual frameworks into a practical working control model
  • Problem solving, customer focus, ownership and accountability, adapt to change, target audience specific communications (self-starter, uses initiative to identify opportunities)
  • Understanding of information security fundamental concepts, frameworks and processes (e.g., ISO 27001, Cobit, NIS
  • Familiarity of risk management concepts and approaches
  • Project management basics and capabilities to organize tasks and priorities
  • Knowledge of the fundamental concepts, frameworks and processes for information technology operations (e.g., SDLC, ITIL)
  • Awareness of insurance and financial industry business operations and products
  • The ability to demonstrate decision making, flexibility and tolerance of ambiguity
  • Exhibits teamwork, customer focus, attention to detail, problem solving and good communication skills
  • Open to coaching and expresses a willingness to continually improve
  • Working towards a degree in Information Technology Management, Computer Science, or Mathematics, as well as any professional designations (e.g., CISM, CISSP, CRISC)
  • Medium to strong skills with Microsoft Office suite, SharePoint knowledge a good asset
6

Global Information Security Year Round Internship Resume Examples & Samples

  • The more you know about programming and application security the better
  • Please have some coding experience, preferably in Java. You must be experienced using a PC, and email. Microsoft office is a plus. If you have taken computer security or application security classes, that’s a plus. You must have excellent communication skills
  • Your schedule can be flexible. School is a priority, and when you’re not taking classes you can participate in our intern program
  • In addition to learning about application security and red team penetration testing activities, you will participate in supporting the static and dynamic security scanning tools that our team uses to detect security defects in our source code being developed
7

Global Information Security Material Risks Manager Resume Examples & Samples

  • Work with key stakeholders to document control gaps, identify solutions, and prioritize efforts to mitigate risks
  • Centralize GIS response to formalized Control Assessments and similar control or regulatory reviews
  • Provide IS risk content for periodic presentations on IS strategy, risk and controls to the CIO Council and IS Committee
  • Collect, assess significance of and document global IS risks at the highest level (i.e. material risks) affecting the safety and soundness of Citi
  • Work with all GIS verticals to assess, review, and action mitigation plans for all material risks
  • Execute on IS risk special projects by evaluating business processes, platforms and/or controls for risk exposure
  • Document proposals for balancing risk / reward for most efficient solutions to meet client needs
  • Ensure all KRI’s and KPI’s for Material Risks are documented and are consistent with Global Information Security Monthly Report, as well as any risk reports that go to the Board of Directors
  • Undergraduate degree required. Advanced degree preferred
  • 5+ years of experience in Information Security, Risk Management, and / or Compliance, preferably in financial services
  • A confident, dynamic individual capable of defining, building, and matrix- managing global teams across technology and business organizations in a constantly evolving environment
  • Excellent oral and written communication, interpersonal and presentation skills, including the ability to present in a format that facilities senior management decision making
  • Ability to manage results through a complex, global / matrix organization
  • Focused on considering business enablement while supporting senior leadership vision and direction
  • CISSP or similar certifications preferred
8

Global Information Security Technology Oversight Resume Examples & Samples

  • Perform analysis of existing assessments to determine gaps in scope and control coverage
  • Integrate controls into existing Risk and Control assessment activities
  • Support efforts to expand assessment activities for international coverage
  • Maintain oversight routines to ensure effective controls are in place for safeguarding customer information in the areas of: Information Security; Vendor Risk Management; Incident Response; Business Continuity and Resiliency, Physical Security; Technology Risk Assessment and Employee Training
  • Support monthly data protection governance meetings with senior business line risk management and second line of defense functions
  • Assess sufficiency of corporate information security and privacy policies and procedures for control of customer information risks and drive improvements, as necessary
  • Support reporting routines, assess the sufficiency of existing GLBA and information risk related reports and drive improvements, where necessary
  • Support the development and publishing of the GLBA report to the Board of Directors
  • Seven to ten years of experience in an applicable risk management environment
  • Experience in FFIEC/GLBA regulatory environment
  • Compliance or regulatory program support
  • Excellent formal business writing and multimedia communications skills
  • Experience collaboration and communicating across lines of business
  • Information security and/or IT audit
  • Professional certifications - CISSP, CISM, CRISC, CRCM, CGEIT, PMI-RMP, CRMA, GRCP, IAPP and IMI
9

Senior VP, Global Information Security Resume Examples & Samples

  • 15+ years of relevant information security and IT operations experience with a minimum of 5 years at a VP/SVP level
  • Experience leading teams within a managed services environment
  • Experience implementing security technologies, including encryption, network security, intrusion detection and digital forensics
  • Direct management of complex budgets in excess of $15M (operating and capital)
  • Demonstrated success leading large, cross functional, sourced, or matrixed teams
  • Proven track record in executive communications
10

Gsoc Director, Global Information Security Resume Examples & Samples

  • Implement organization strategies through the effective direction and management of resources, while being accountable for the business strategies, functional or operational areas, processes or programs. Responsible and accountable for managing and developing a team of 15+ people, setting direction and deploying resources on varying projects, participating in organization-wide projects, while providing guidance and expertise on an as needed basis
  • Understand how other business units operate, how their goals align with organizational goals and have budget and profit/loss responsibility
  • Direct others who develop, test, and validate global solutions to remediate exploitable conditions on devices such as Web servers, mail servers, routers, firewalls and intrusion detection systems. May be an individual contributor on the most complex projects
  • Develop and implement global security policies, procedures, and measures working across multiple disciplines and teams
  • Perform highly complex, non-routine security assessments and reviews
  • Execute functional business plans and contribute to the development of functional strategies, ensuring alignment with current trends and functional/business results
  • Evaluate current business processes and systems, driving cost-savings and risk control
  • Ensure all work in business unit is compliant with regulatory and corporate guidelines
  • Apply expertise and understanding of competition and industry trends to projects, strategy, etc
  • Motivates, develops, recruits and retains employees while rewarding and cultivating a culture of high performing teams
  • Education Degree qualified in Computers Science, Information Systems or other related discipline, or equivalent work
  • 10+ years of related experience, preferably on a Linux environment with additional experience writing scripts
  • Certifications such as CCNP, MCSE; RHCE, CISSP, CISCO, RedHat are a plus
  • Leverages methods and approaches for data collection from other internal/external sources and best practices to address complex problems, situations or issues
  • Works with large amounts of data and identifies highly complex root causes and potential implications; coaches others on data synthesis and analysis
  • Approaches situations from a holistic perspective and considers interdependencies and the impact of actions; synthesizes results and links patterns and trends
  • Utilizes knowledge of the organization’s business model and operations to drive high impact projects and complex analyses that support the organization’s mission
  • Leverages deep understanding of the policies, practices, trends and information that impact the organization and its customers to plan for future projects
  • Utilizes knowledge of the business and financial impact of decisions/solutions to drive high-impact projects that support the organization and contribute to growth in its financial performance
  • Delegates responsibilities to other associates, providing expertise on highly complex assignments; reviews information system assessments, protocols, etc. to determine ways to improve efficiency, establishing new operating procedures as needed
  • Recommends risk management improvements and provides guidance to others on risk management concepts and their consequences
  • Oversees team members to discuss current projects, workload and activities and prioritizes resources accordingly. Improves workload management by supporting others in setting priorities and by postponing less relevant work
  • Inspires others by communicating the vision of the organization and describing individual opportunities
  • Communicates personal investment in the organization and its success to demonstrate commitment to employees and build the sense that “we are in this together”
  • Ensures that employee engagement is measured regularly within the business unit/function and implements appropriate measures to sustain engagement
  • Understands the development needs of direct reports and supports them in the development of their own direct reports to fill in gaps for the future
  • Shapes developmental roles and assignments to balance individual and business unit/function needs
  • Provides in depth, one-on-one coaching to enable others to achieve performance goals and maximize their potential
  • Makes selection decisions with the organization’s overall talent management strategy in mind
  • Encourages leaders to balance strengths and development areas among employees when assigning talent, ensuring a diverse distribution of necessary skills to meet the business unit/function’s goals
  • Demonstrates understanding of ongoing and future talent needs and looks for ways to address those needs through effective recruitment and development of talent
  • Recommends initiatives that strengthen and align talent development with future needs of the business unit/function; provides input for succession planning
  • Uses knowledge of the business model, and challenges assumptions and conventional thinking to develop new strategies for the business unit or function
  • Communicates the organization’s vision to the business unit/function to gain support and motivate others and build a sense of shared purpose
  • Identifies criteria to assess strategic alignment and success of plans tracking against measurable business unit/function success factors
  • Seeks to understand the main business drivers of current and potential customers, and designs solutions accordingly
  • Creates and supports programs that improve the business unit/function’s reputation for providing excellent customer service; understands the external factors that may impact a customer’s perspective
  • Anticipates emerging trends that will impact future customer needs and prepares the business unit/function to respond
  • Frequently communicates the business necessity and benefits of change to employees
  • Translates change initiatives into tactics and operating plans for the business unit/function
  • Identifies and anticipates potential concerns for key stakeholders and uses multiple strategies and methods to gain support for change
11

Global Information Security Project Management Internship Resume Examples & Samples

  • Supports GIS Delivery by helping to manage internal infosec projects
  • Assists the team in developing project plans and timelines
  • Helps manage day-to-day internal project team communications and documentation
  • Sets up and coordinates meetings and conference calls; develops agendas, writes and distributes meeting notes
  • Prepare draft presentations, reports, and material to help prepare CISO and project teams for committee meetings
12

Senior Director, Global Information Security Resume Examples & Samples

  • Manage daily operations for information security management for entire enterprise. This is a global scope for Information Security and Identity and Access management
  • Responsible to develop and maintain the GLOBALFOUNDRIES IT Security operational procedures, and security controls. Manage and facilitate the security management to ensure successful integration with the other areas in IT. Risk-based approach to security operations establishing an enterprise security posture through policy, architecture and training processes
  • Build a high performance Information Security Operations team. Builds and develops the technical talent of members of the team into a well-rounded team through implementing new ideas and improved processes. Bring industry best practices to develop resource and staffing needs. Coordinate resources to support operational needs and build strong relationships with internal partners to effectively strengthen the delivery of this service
  • Interfaces with peers in the End-User Computing, IT Infrastructure and Network organizations as well as with the leaders of the business to share the corporate security vision and to solicit their involvement in achieving higher levels of enterprise security
  • Interfaces with the Global Compliance organization to work on solutions to reduce risk and improve compliance
  • Maintain a high level of expertise in industry trends and technologies related to cybersecurity
  • Deliver Information Security Operational metrics. Utilize a structured and consistent framework for centralized coordination and tracking of all information security operations within the enterprise for performance monitoring, trending, correlation, and reporting of program metrics. Measure the effectiveness of the security operations program by developing metrics
  • Bachelor's Degree in Business, or IT, or related discipline
  • Ten or more years of relevant experiences in security with a minimum of two years in a Information Security Operations management position
  • Familiar with security operational management NIST CyberSecurity framework
  • Experienced in recruiting talent
  • Global management experience
  • Proven leader, mentor and coach
  • Advanced problem solving skills and the ability to work with innovative solutions
  • Knowledge of regulatory standards: ISO 27000, FIPS, NIST, Common Criteria, ITAR, PII
  • Degree/Masters in Engineering, IT or related discipline
  • Professional certifications such as (ISC)2 , CISSP is preferred
  • US Government clearance is preferred
  • Working knowledge in the Semiconductor industry preferred
13

Global Information Security Cyber Security Fusion Center Advanced Adversary Interdiction Resume Examples & Samples

  • Perform cyber threat analysis, alerting, and reporting based on intelligence and information gathered from both internal and external sources
  • Provide understanding of Advanced Persistent Threat (APT) actors, their motivations, skillsets, toolsets and intent
  • Find/develop new threat intelligence, detection, and suggest hardening strategies
  • 3-5 years of related experience in the following areas
  • Forensic analysis, threat intelligence, adversary hunting, anomaly detection and analysis, and the discovery of previously undiscovered cyber threats or attacks
  • IT and InfoSec background including cryptography and network/systems/physical security
  • Scripting (Python, Perl, Powershell, Bash, SQL etc...)
  • Splunk, Hive, Hadoop, Platfora exposure
  • Networking Exposure (Routers, Switches, VLANS)
  • Malware Reverse Engineering
  • Network-based and system-level attacks and mitigation methods
  • Forensics reports and investigation summaries to include the reporting of the why, what, how, and when of a cyber-attack
  • 2+ years performing information security incident responses
14

Global Information Security Intern Resume Examples & Samples

  • Analyze data and resolve data input problems
  • Manage project tasks
  • Complete documentation and learning materials
  • Perform data entry
  • Research and provide recommendations to resolve problems
  • Demonstrated creative/persuasive writing proficiency
  • Strong research skills
  • Basic technical knowledge (end-user technology)
  • Proficiency in Microsoft programs (PowerPoint, Word, Excel, Outlook)
  • Demonstrated interest and general knowledge of Information Security
  • Project management understanding
  • Ability to perform repetitive tasks effectively
  • Microsoft Office Power User (Excel, Word, PowerPoint, Visio)
  • Information Security/ Technology / Computer Science or other closely aligned field of study
15

Director, Global Information Security Resume Examples & Samples

  • Develop, implement, enforce, and monitor a strategic and comprehensive enterprise information security, IS risk and compliance management program
  • Oversee the selection, development, deployment, monitoring, maintenance, and enhancement of the organization’s security technology and architecture
  • Assist in development and maintenance of GIS policies, standards, processes, and procedures to assess, monitor, report, escalate and remediate risk and compliance issues in relation to IT infrastructure (e.g. networks, databases, endpoints, access)
  • Develop, communicate and ensure compliance with enterprise security policies and standards; proactively work with other functions across the enterprise to implement practices that meet (or elevate) defined policies and standards for information security
  • Administer GIS risk management program and procedures; perform and/or source IS risk assessments, audits, and security incident investigations (with the GIS Operations Manager)
  • Partner with IT and Business leaders to determine security solutions (or secure business solutions). Define project scope and objectives. Develop preliminary project plan and design, determine the necessary resources and project timeline
  • Lead and manage the GIS architecture and engineering team - including recruiting, developing, mentoring, retaining, and coaching members for exceptional performance
  • Provide subject matter expertise to the CISO on a broad range of information security standards, best practices and compliance requirements specifically related to the global interactive Entertainment business and marketplace (e.g. content security and distribution, PCI and PII security compliance)
  • Educate and advise technology and business executives as needed on technology risk and compliance issues as well as appropriate mitigation strategies and approaches related to security and risk management
  • Advise technology team members and vendors on technology selection and implementations, enhancements and consider GIS implications balancing information security risks and assessing security vulnerability remediation throughout a project lifecycle
  • Maintain awareness of GIS trends and advances in security solutions and vendor service offerings (e.g. MSS, IaaS, PaaS, SaaS, mobility) and monitor and advise on changes in material legislation in partnership w/ legal that may affect information security
  • Lead the Enterprise Architecture Review Board – with key stakeholders from all aspects of Enterprise Technology Functions
  • Bachelor’s degree in Computer Science, Information Systems, other related field; or equivalent work experience
  • Minimum of 12 years of information security experience in a globally distributed enterprise environment, ideally a media and entertainment organization
  • Minimum of 5 years of management experience in a relevant information security role and 5+ years’ experience being responsible for reviewing, recommending, implementing, and supporting security solutions
  • Prior experience with information security frameworks (e.g. SANS Top 20, ISO)
  • Demonstrated knowledge of recognized security industry standards and leading practices (e.g., PCI, OWASP, NIST, DISA, CIS)
  • Demonstrated understanding of technological trends and developments in the areas of information security, risk management, web architectures and cloud computing
  • Experience with large IT Infrastructure and/or IT Security projects, e.g. global firewall deployment, NAC implementation, web proxy setup
  • Experience in the fields of network engineering, network security, secure network architecture/design, and secure application architecture/design
  • Experience with information security policies, standards and requirements
  • Experience with working in a centralized/decentralized business environment
  • Any one or more of the following preferred
16

Global Information Security Analyst Resume Examples & Samples

  • Learning how information security is managed in Citi’s corporate environment
  • Participating in the information security governance of the company with cooperation of technical experts
  • Learning and working with the state-of-the-art technology solutions and engineering delivery models
  • Learning and finding security weaknesses of different products and following the elimination of the issues
  • Organizing and cooperating with technical and business groups, improve communication with team members and contacting members of the organization for future improvement
  • Projects, goals will be specially chosen for which you will be responsible
17

Global Information Security Resume Examples & Samples

  • Coordinate measure and report on the technical aspects of security management
  • Managing the vulnerability detection function, including enterprise vulnerability management, reporting on all vulnerability findings and providing remediation recommendations
  • Design, coordinate and oversee security testing procedures to verify the security of systems, networks and applications, and manage the remediation of identified risks
  • Experience with leading and managing vulnerability management, penetration testing, and application security programs
  • BS in Computer Science, Information Security,or Management Information Systems
  • Strong project management skills and experience in creating and managing project plans, including budgeting and resource allocation
  • Excellent verbal, written and interpersonal communication skills, including the ability to communicate effectively with the IT organization, project and application development teams, management and business personnel; in-depth knowledge and understanding of information risk concepts and principles as a means of relating business needs to security controls; an excellent understanding of information security concepts, protocols, industry best practices and strategies
18

Director of Global Information Security Resume Examples & Samples

  • Master’s degree and 15+ years prior relevant experience. Generally has 12+ years experience supervising or leading teams or projects
  • Active Top Secret clearance or above
  • Demonstrated ability to engage, influence and foster relations at the executive level internally to company and with senior customers
  • Possess strong writing, verbal and presentation skills. Executive level technical writing-comfort developing reports/briefs for ELT and BoD
  • SME knowledge of Defense-in-Depth models traditional and updated
  • SME knowledge of developing highly functional operational teams that execute at exceptional levels
  • Deep experience developing and implementing Information Security programs
  • Knowledge of multiple Leidos business area customer sets in the US (Defense, Intel, Civil, Health)
  • Detailed knowledge of Leidos non-US business areas including UK, Australia, Europe, Israel, Middle East and Asia
  • Experience directing cyber security consultative-type services to indirect/direct activities
  • Supporting necessary business development activities including demonstrations and discussions
  • Demonstrated success providing executive leadership to projects including
  • Working knowledge of Security Standards/Controls specified under various IT governance and compliance models (NIST, ISO 27001&27002, ITIL, SOX, DFARS/FARS)
  • Telecommunications
  • Network Security: Cryptography (PKI), Operations Security, Physical Security Controls
19

Technical Manager Global Information Security Resume Examples & Samples

  • Manages data outputs of security monitoring tools and proactively drives appropriate security measures to protect the enterprise and end users
  • Determines security requirements for business processes and technology systems based upon generally accepted risk analysis methods, functional and performance requirements, information security architecture principles, and market-leading solutions
  • Develops process documentation, standards, policies, and architecture designs that support efficient security operations
  • Creates, maintains and reports metrics on all security domains. Performs root cause analysis and recommends and implements continuous improvement process opportunities based on the results of such metrics
  • Collaborates with Business Partners and works cross-functionally with departmental team members
  • Presents security concepts, technologies and plans to broad audience groups including Senior Leadership
  • Evaluates, tracks, and drives continuous improvement to the security architecture framework
  • Maintains up-to-date knowledge and understanding of information security threats, vulnerabilities, practices, principles and solutions
  • Proficient in information security frameworks, practices and principles (e.g. NIST, ISO 27X, COBIT, CIS CSC, OWASP TOP 10, GAPP) and experience in creating and implementing metrics to measure and drive high performance referencing such frameworks
  • Expert-level knowledge and hands-on experience in one or more specific technical areas, such as network/cloud security, malware detection/analysis, threat intelligence, cryptography, vulnerability management, incident response, social engineering, or hacking techniques
  • Fluency in one or more programming languages a plus, such as Python, Ruby, Power Shell, C++, C#, Bash, or Perl
  • Experience with cyber intelligence gathering, processing, and IOC development
  • Technical proficiency in both Windows and Linux operating systems
  • Proficient in risk assessment and analysis methodologies
  • Proficient in developing use cases, evaluating alternative solutions, cost justification, recommended solutions, and comprehensive deployment plans
  • Working knowledge of IT-related laws and compliance mandates (e.g. Sarbanes Oxley 404, PCI DSS, HIPAA/HITECH, Personal Information Privacy)
  • Strong analytical, problem solving and conceptual skills to identify and deliver high performing solutions
  • Strong verbal and written communication skills, with an ability to express complex technical concepts in understandable business terms
  • Proficient in project management principles, and ability to delivery of high quality solutions on time, within budget, with minimal supervision
  • Strong interpersonal skills with the ability to work on cross-functional project teams and foster team commitment to tasks as well as collaborate with Business partners
20

Director, Global Information Security Resume Examples & Samples

  • Partner with the Chief Legal Officer, Chief Compliance Officer, and Group Internal Audit as liaison for IT in developing the global strategy for each of the respective areas of responsibilities, developing a road map, and overseeing the execution of the plan with the respective teams in a matrix organization to meet the changing needs of the business
  • Oversee and coordinate Information Security efforts across the company, including Information Technology, Security Communications, Legal, and Compliance Investigation activities
  • Monitor and report the status of IT Security and Infrastructure controls while escalating significant control failings / weaknesses or events that may arise to the CIO and Executive Leadership
  • Serve a primary role on the Cyber Security Steering Committee and serve as point leadership to all of IT teams globally ensuring that engagements are managed properly in regards to the company Information Security
  • Direct the design and engineering of security in all IT supported systems and infrastructure
  • Support HR and Legal where required for investigations related to electronic discovery including testifying as required
  • Govern policies and procedures that relate to Information Security and foster adherence to these policies and procedures through communication, training, monitoring, and reporting
  • Effective communications with the business to elevate the perception and capability of Information Security within the business community
  • Direct (recruit, hire, vet, compensate, train, appraise, promote, and dismiss the personnel of the IT security team as well as directing matrix resources across IT and the business
  • Develop a customer-focused service attitude in IT security staff to enhance both internal and external customer service through simple, user-friendly and effective technology
  • Perform all activities in compliance with the internal and external requirements / standards for Health & Safety, Quality, Regulatory, and Finance
  • Project Management principles and methodologies with several successful implementations
  • In-depth knowledge of global regulations related to quality, financial, and data privacy
  • Management of security and technical resources and their optimized utilization
  • Management of outsourced resources, including external auditors
  • Experience in building consensus and selling ideas