Info Security Analyst Resume Samples

4.6 (106 votes) for Info Security Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the info security analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
CB
C Balistreri
Columbus
Balistreri
3547 Kiehn Valley
Los Angeles
CA
+1 (555) 159 8387
3547 Kiehn Valley
Los Angeles
CA
Phone
p +1 (555) 159 8387
Experience Experience
Los Angeles, CA
Info Security Analyst
Los Angeles, CA
Herman, Dickinson and Jaskolski
Los Angeles, CA
Info Security Analyst
  • Tracking ATO statuses and authorizations with conditions, of 100+ packages and working closely with various ISSMs/A&A leads
  • Disaster Recovery - Follow defined standard designs, and develop backup/restore, server and network technologies and protocols with in accepted standards. Collaborates with IS colleagues to share information and set new DR infrastructure & processing standards. Communicates and trains security and disaster recovery procedures to the IT staff Develops recovery procedure models. Tests contingency capabilities; responsible for recovery exercise preparation
  • Working knowledge of security architectures and devices
  • Working knowledge of threat intelligence consumption and management
  • Working knowledge of root causes of malware infections and proactive mitigation
  • Working knowledge of lateral movement, footholds, and data exfiltration techniques
  • Project Management - Works with project manager to define tasks and create team work plans with moderate supervision. Delegates work to others and monitors progress. Identifies issues affecting work progress and recommends solutions. Communicates schedule variances and potential scope changes in status reports. Controls project costs, communicating any project-related expenses and recommends ways to control costs
Los Angeles, CA
Assoc Info Security Analyst
Los Angeles, CA
Mraz-Feil
Los Angeles, CA
Assoc Info Security Analyst
  • Is primarily responsible for developing documentation, reviewing and suggesting improvements for existing processes within the security department. – 20%
  • Apart from the main core areas are HR driven process improvements, IAM compliance issues and Role-based engineering built
  • Maintains strong working relationships with peer groups and business clients
  • Work within a globally distributed team of IAM team members and customers; sometimes having to provide support outside of normal business hours and on weekends
  • Participate in peer reviews and provide meaningful feedback to ensure that problems are resolved and that platform objectives including service levels are met
  • Be a self-motivated and results oriented individual with an attention to driving aggressive project timelines and schedules
  • Identify process automation opportunities on existing access management practices
present
Phoenix, AZ
Lead Info Security Analyst
Phoenix, AZ
Ruecker, Smitham and Ziemann
present
Phoenix, AZ
Lead Info Security Analyst
present
  • Enabling and fostering a collaborative working relationship with service owners, Cybersecurity, and Operational Risk team leads
  • Support program-level design and implementation of the assessment program, by providing recommendations to enhance existing processes or procedures
  • Participate in risk acceptance and monitoring process and make recommendations for bringing controls into compliance
  • Provide subject matter consulting for ad hoc guidance requests involving IT risk
  • Assist in managing assessment schedules and reporting service status to senior management
  • Mentor and assist with the development of staff, through coaching and training, to accomplish organizational, team and service goals
  • Interfacing with the BISO team to coordinate assessment scheduling with service owners and to maintain the SRA calendar
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Texas A&M University
Bachelor’s Degree in Computer Science
Skills Skills
  • Strong ability to craft and author presentations and end-user documentation
  • Strong attention to detail
  • Strong analytical, problem solving, project management skills, and detail oriented
  • Excellent communication skills and ability to translate complex technical issues to a non-technical audience
  • Ability to read, analyze and interpret general business periodicals, professional journals, technical procedures or governmental regulations
  • Ability to solve practical problems and deal with a variety of concrete variables in situations where only limited standardization exists
  • Strong knowledge of common operating systems and file systems for Windows and UNIX as well as enterprise architecture
  • Strong documentation skills with proficiency in Excel, Word, and OneNote
  • Ability to be available during on-call situations
  • Excellent documentation skills, ability to produce diagrams and schematics that visualize technical solutions
Create a Resume in Minutes

15 Info Security Analyst resume templates

1

Lead Info Security Analyst Resume Examples & Samples

  • Develop and maintain strong business and technology relationships, becoming a trusted partner to key program stakeholders
  • Partner with operational risk management to establish an understanding of the business’ appetite and tolerance for risk
  • Provide subject matter consulting for ad hoc guidance requests involving IT risk
  • Minimum 5 years’ experience working within the information security, IT Risk or audit fields
  • Minimum 3 years’ experience in the financial services industry in a role specific to risk management, audit or information security
  • Working knowledge of Federal Financial Institutions Examination Council (FFIEC) guidance, GLBA, Sarbanes-Oxley and other relevant laws and regulations
  • Basic understanding of application, network, operating system, and core infrastructure security concepts and concerns
  • 10 years experience in working within the information security, IT Risk or audit fields
  • 5 years experience in the financial services industry in a role specific to risk management, audit or information security
2

Lead Info Security Analyst Resume Examples & Samples

  • Own the development of new SIEM content including rules, aggregations and trends, correlations, and alerts that appropriately characterize the importance of events of interest found in the TIAA-CREF operational environment
  • Document and develop tools to assist Security Operations personnel in log collection and review
  • Provide business requirements to peer teams within TIAA-CREF that relate to the governance, development, and sustainability of logging related to security-relevant events
  • Ensure breadth and depth of coverage within the SIEM environment for all security solutions deployed at TIAA-CREF; ensure that technologies are properly being leveraged to provide detective capabilities of security events
  • 7+ years experience in information technology and/or information security
  • 2+ years in log review, analysis, and design of searches / alerts / correlations to bring actionable intelligence from logs
  • Experience in managing, engineering, or developing content for centralized logging solutions with ArcSight, Splunk, syslog, ELK, etc
  • IP Protocol Suite; knowledge of TCP/IP protocols
  • Proficiency with Windows & UNIX
  • Ability to assess the needed log indicators for security incidents quickly and effectively and communicate a course of action to alert on the security incident while mitigating risk and limiting the operational and reputational impact to TIAA-CREF
  • 2+ years Incident Response experience, including the ability to identify key interactions logged by malicious activity
3

Info Security Analyst Resume Examples & Samples

  • Understand the business processes/functions that are automated through the application or technology. Competent to understand how all security components functionally work together to control access to applications or technologies, including: the mechanisms and levels at which authentication and authorization take place; how access may be controlled at multiple levels (application, database, operating system, ect.)
  • Document/audit current state of the access control components and identify deficiencies based on Information Security Governance Standards
  • Assess risks of security and internal control issues and partner with appropriate areas to remediate or file variances requests as needed
  • Develop, implement, and ensure adherence to access provisioning, decision criteria, and overall access controls
  • Develop and perform routine access management activities to ensure automated and manual processes are working effectively
  • Serves as the internal controls and security liaison to all users of assigned applications or technologies
  • Ensures compliance of new business initiatives that change or modify their application or technology
  • Occasional interaction with internal/external auditors and third party application and technology service providers may be necessary
  • Bachelors degree and/or equivalent work experience
  • Broad technology knowledge including mainframe and distributed operating environments
  • 1-3 years of risk, control and analysis experience with may include auditing
  • Strong analytical, problem solving, project management skills, and detail oriented
  • Excellent relationship management, presentation, and writing skills
  • Ability to build new processes for new situations
  • Knowledge of information security and audit concepts
  • CISA, HISP, CPA, CISSP certification preferred
  • Banking experience preferred
  • Experience with the following technologies and management processes is beneficial: business application systems, user access provisioning systems, mainframe zOS operating system, distributed server environments (Unix, Windows, databases (Oracle, DB2, Sybase, SQL), middleware (KeyServer, MQ, Websphere, Webmethods, ect), and networking technologies, preferred
4

Info Security Analyst Resume Examples & Samples

  • Charged with the development, analysis, monitoring and implementation of proactive measures that ensure database security controls while meeting the firms legal and ethical obligations to protect private, sensitive and critical information
  • Management action plan development, maintenance, and monthly status reporting
  • Database activity monitoring expansion, development, maintenance and reporting
  • Management reporting on Database Security related metrics
  • Provide audit, risk, and control related guidance and training as needed to Database Engineering partners
  • Provide terminated user governance and access provisioning oversight
  • Provide password vault/database safe maintenance, governance, and oversight
  • Database security vulnerability identification and remediation, including patching activities
  • Training documentation creation as needed
5

Lead Info Security Analyst Resume Examples & Samples

  • BA/BS or equivalent combination of work experience and professional certifications REQUIRED
  • Minimum 7 years’ of experience working as a technical business analyst REQUIRED
  • Minimum 3 years’ of experience working within information security or IT risk management or possess a strong understanding of IT Risk Frameworks and Solutions REQUIRED
  • Minimum 7 years' of experience in all phases of the Software Development Life Cycle REQUIRED
  • Minimum 3 years' proven ability to lead end user acceptance testing REQUIRED
  • Strong knowledge of user interface design and usability standards
  • Proficient with SQL to access and analyze data
  • Experienced with defining metrics and reporting
  • Proficiency with spreadsheet and presentation tool skills to define and present process, ideas, and designs
  • Experience with IT Resource Security assessments a plus
  • Experience with software product management a plus
6

Lead Info Security Analyst Resume Examples & Samples

  • Improve existing detection content by producing correct and complete feedback to the SIEM content team
  • Provide mentorship and guidance to other detection analysts, to help them develop in their ability to recognize, triage, and report security incidents
  • Perform daily functional oversight and supervisory tasks to ensure detection function is operating effectively and efficiently
  • Minimum 5 years information security experience in Security Operations or related technical security function
  • Passionate about identifying malicious attackers, and understanding attack vectors, threat tactics, and attacker techniques and will distinguish applicants
  • Communicate with strong written and verbal skills
  • 5+ years experience in security operations, and / or experience in functional supervision of an operational team
  • Bachelor's degree in computer science, information technology, or related field is preferred, but not required
  • Experience with enterprise information security data management tools such as ArcSight or Splunk is preferred Solid experience in scripting languages such as (or similar to) Python, PERL, and Ruby is a plus
7

Lead Info Security Analyst Resume Examples & Samples

  • Evaluate, review, and prepare updates to the risk catalog and register
  • Maintain risk rating tables by meeting with internal stakeholders and conducting industry and academic research. Suggest updates, prepare communications, illustrate impacts, and gain consensus amongst stakeholders to make changes
  • Develop and maintain risk aggregation methods and aggregate risk reporting
  • Evaluate results of risk analysis for appropriateness and recommend changes to maintain forecast accuracy metrics
  • Develop, maintain, and report on operational service metrics (KPIs/KRIs)
  • Build relationships and partner with business and IT organizations
  • Ensure alignment of solutions and services to TIAA-CREF IT Risk Framework and business needs
  • Provides periodic updates, reports, and recommendations on various IT/IS related topics
  • Bachelor's in Computer Science/Information Systems, Data Science, Mathematics, Statistics, Data Mining, Operations Research, or related fields
  • Minimum 5 years of IT/IS work experience with exposure to various technical environments and business segments INCLUDING experience in a functional or research capacity in one or more of the following areas: security administration and access management, computer and data breach incident management, data protection and security, third party supplier/vendor management, secure software development, technology policies and standards, IT risk management and controls, technology operations and compliance
  • Minimum 5 years of significant knowledge in information security control structures and information technology processes
  • Working knowledge and understanding of industry standard security and risk frameworks
  • Excellent communication skills and the ability to present information clearly and concisely in both formal and informal settings including creating and delivering public presentations
  • Possesses and demonstrates strong ability to influence others to achieve complex objectives against tight deadlines
  • Demonstrated ability to prioritize alternative solutions, collaborate, drive results, and influence change in a cross-functional, diverse, rapidly-changing environment
  • Required to be a self-starter who can work with minimal supervision
  • Knowledge of Factor Analysis of Information Risk (FAIR)
  • Financial Services Industry experience highly desired
  • CISA, CISM, CISSP, CRISC, PMP certifications
8

Audit, Risk & Info Security Analyst Resume Examples & Samples

  • Prior experience as Audit liaison
  • Prior audit experience
  • Strong risk and control background
  • Ability to Influence at all levels
  • Ability to work in remote environment
  • Advanced Excel knowledge a plus
  • CISA or CRISC Certification preferred
9

Info Security Analyst Resume Examples & Samples

  • Will be a part of the Security Analytics group and involved with Data Engineering activities on Hadoop and Greenplum Data warehouse (GPDB) ecosystem
  • Talented ETL/Data Engineer with experience on working with very large data sets and knowledge of building programs that leverage Massively Parallel Processing (MPP) Data warehouse platforms
  • The engineer will have significant knowledge of Big Data technologies and tools with the ability to share ideas among a collaborative team. Some of the responsibilities include loading data from several disparate, data sets, documentation, performance testing and debugging applications
  • The ETL/Data Engineer will also be an expert with traditional Database Development (SQL, Stored Procedures, User defined functions and ETL Development). The Data Engineer understands Fact Dimensional Modeling and ETL steps necessary to load into Data Warehouse systems
  • Will represent the team in the project meetings
  • The successful candidate should be adoptive to the Visa's agile environment
  • Master’s degree in Computer Science or Information Systems
  • 10+ years of experience, 8+ years Data Engineering/ETL experience with
  • Expert SQL Developer is a must
  • Significant experience with Data Warehousing (Fact and Dimensional modeling) and RDBMS ETL development
  • Understanding of cyber security threat landscape
  • Experience with ETL tools, Talend is preferred
  • Experience building large-scale distributed applications and services
  • Fluent in at least one scripting language (Shell/Perl/Python/Java/etc.)
  • Experience with agile development methodologies
  • Knowledge of industry standards and trends
  • Nice to have: understanding and experience with Hadoop (MapReduce, Streaming, Pig, HCatalog, Oozie, Hive, HBase
  • Ability to create and manage big data pipeline, including Pig/MapReduce
10

Info Security Analyst Resume Examples & Samples

  • Performs information security administration tasks to applications or platforms and conduct periodic user access reviews
  • Manages (maintains and tracks) incoming security access requests for TCF applications
  • Troubleshoot security issues, concerns, and potential problems and escalate when needed
  • Mentor less experienced staff to ensure that they are well trained to fulfill their responsibilities. Provides Tier II support for security incidents
  • In charge of maintaining the integrity of the corporate directory via Ldap functions
  • 3 to 5 years of experience working with Active Directory. Candidate is able to create ldap scripts to maintain user’s records or mass update the directory
  • One to three years of experience in information security or IT. Knowledge of application security controls and administrative processes
  • Experience with current information security industry tools (RACF / Database Security / Oracle / Active Directory)
11

Info Security Analyst Resume Examples & Samples

  • Mentor less experienced staff to ensure that they are well trained to fulfill their responsibilities
  • Effectively manage network, e-mail and vulnerability monitoring tools and report on activity. Utilize monitoring tools and software to perform vulnerability tests and monitor email data
  • Prepare documentation for information steering committee meetings
  • Maintain all information security project forms (third party reviews, application service provider, minimum security requirements and exception forms) and ensure that they are stored effectively
  • Assist with the incident management process and procedures
  • Maintain the relationship with the divisional information security representatives (ISR) and ensure that they are trained on responsibilities
  • Manage information security audit process, procedures and compliance
  • Three to five years experience in IT. In-depth knowledge of application security controls, information security data management and analysis with JCL and TSO
  • Effective verbal and written communication skills
  • Demonstrated knowledge of information security access control software installed
  • Three years experience in application development including database environment, data management and data analysis with in knowledge of JCL and TSO
  • Knowledge of information security monitoring tools (MARS / VAM / Vontu)
12

Lead Info Security Analyst Resume Examples & Samples

  • Provide program level design and implementation guidance for the TIAA-CREF assessment program
  • Manage the assessment master schedule and maintain program reporting and metrics
  • Support Legal and Strategic Sourcing in contract negotiations related to Information Security Terms & Conditions
  • Manage and coordinate security risk assessment engagements and provide oversight to ensure quality service
  • Conduct administrative and onsite supplier assessments based on industry standards (FFIEC, ISO2700X, PCI, COBIT, BITS Sharedassessments.org- in the following focused risk areas: Information Security (IS) & Privacy, Business Continuity Planning (BCP) & Disaster Recovery (DR), Physical Security, Risk Exposure and Reputational Risk, Global Risk & Compliance (GRC)
  • Conduct supplier data center physical security, network security, and business continuity/disaster recovery assessments
  • Conduct contract reviews to identify gaps in formal terms & conditions and include findings in risk assessments
  • Compile assessment work papers and reports using SharePoint and Archer and make recommendations for upper
  • Provide guidance for automating assessments in the TIAA-CREF eGRC solution (Archer)
  • Implement tools used to capture and track risk/findings discovered during all supplier assessments
  • Communicate findings to LOB business partners, Supplier Risk Management (SRM) Operational Risk, application and development teams, and suppliers via meetings and close out letters
  • Bachelor’s Degree or equivalent in computer science, management information systems or equivalent discipline from an accredited college or university REQUIRED
  • Minimum 7-10 years’ experience in Information Technology REQUIRED
  • Minimum 3-5 years’ experience leading teams and overseeing an enterprise assessment program REQUIRED
  • Minimum 3-5 years’ experience in IT Risk Management, Information Security Consulting,Information Security Architecture or IT Audit REQUIRED
  • Demonstrated experience in current understanding of IT assessment best practices,management techniques and industry trends within IT Risk and Security responsibility areas with direct experience performing Supplier Risk Assessments
  • Demonstrated experience conducting contract reviews and negotiating information security contract terms and conditions
  • Master’s Degree or equivalent in computer science, management information systems or equivalent discipline from an accredited college or university required
  • Experience performing secure design, security testing or risk assessments and strong preference for doing so with application software and/or new technologies
13

Assoc Info Security Analyst Resume Examples & Samples

  • Verbal and written communication skills, problem solving skills, attention to detail and interpersonal skills
  • Strong ability to work independently and manage one's time
  • Sound interpersonal and collaboration skills with the ability to develop, maintain and foster constructive relationships with others
14

Lead Info Security Analyst Resume Examples & Samples

  • Manage the development of application risk assessment content, to include the identification and/or definition of application risks, controls, procedures, assessment questions, supporting documentation and evidence
  • Develop, maintain and mature the application risk assessment content management framework, to include processes, standard operating procedure(s) and metrics and reporting
  • Develop approach for evaluating completeness and quality of content on a recurring basis
  • Develop and maintain risk assessment evaluation tools and mappings to automated risk analysis functions, as required
  • Mentor and assist with the development of staff, through coaching and training, to accomplish organizational, team and service goals
  • Support program-level design and implementation of the assessment program, by providing recommendations to enhance existing processes or procedures
  • Minimum 7-10 years’ experience in Information Technology
  • Minimum 5-7 years’ experience in IT Risk Management, Information Security Consulting,Information Security Architecture or IT Audit
  • Minimum 5 years of leadership and/or management experience specifically supporting the IT Risk/Security and/or IT Audit spaces
  • Working knowledge and understanding of regulatory compliance concerns, data protection/ PII and industry standards, security and risk frameworks (i.e., COBIT, Risk IT, Val IT, ITIL, PCI-DSS)
  • Master’s Degree or equivalent in computer science, management information systems orequivalent discipline from an accredited college or university required
  • At least 10-15 years’ experience in Information Technology
  • At least 7-10 years’ experience in Information Security, IT Audit or IT Risk Management at a bank, insurance company or financial services organization
  • At least 5-7 years’ experience performing secure design, security testing or risk assessments and strong preference for doing so with application software and/or new technologies
  • Proficient use of RSA Archer and Tableau Server/Desktop
  • CRISC, CISA, CISM, CISSP, Six Sigma Green/Black Belt, PMP certification
15

Lead Info Security Analyst Resume Examples & Samples

  • Capturing and maintaining the inventory of IT services on a quarterly basis or as information becomes available
  • Interfacing with the BISO team to coordinate assessment scheduling with service owners and to maintain the SRA calendar
  • Researching and documenting service best practices and industry standards
  • Interfacing with the IT Risk Controls Development and IT Risk Identification teams to communicate best practices, industry standards, and to capture a target set of best practice-aligned control standards for assessment
  • Interfacing with IT service owners to introduce, launch, conduct, and document service risk assessments. Communicate and present findings to service owners, BISOs, risk treatment, and other management
  • Supporting the creation, refinement, and maturation of SRA program artifacts and tools including process workflow, templates, calendars, and other operational tools
  • Supporting service owners with creating or updating service artifacts as needed to achieve SRA objectives. This may include supporting service owners with creating service workflows, standard operating procedures, or other related documents that might be required to understand the service’s current state
  • Providing regular status updates on assessment achievements, challenges, and improvements
  • Sharing and communicating best practice ideas and initiatives across the IT Risk Assessment function
  • Supporting engagement and requests from Operational Risk in conjunction with executing the SRA program
  • Enabling and fostering a collaborative working relationship with service owners, Cybersecurity, and Operational Risk team leads
  • Ad-hoc work on Cybersecurity projects or other tasks
  • A solid understanding of the key elements of IT Risk and the risk assessment function via external/internal audit, operational risk or other related risk roles
  • Strong communication skills, both written and verbal, to enable presentations, collaboration with service owners, and communication of assessment findings
  • Broad knowledge and understanding of IT functions and services especially shared functions such as Production Services, Architecture, and Cybersecurity
  • Strong research skills and familiarity with reviewing industry standards
  • Strong process mindset
  • Strong attention to detail and an organized and methodical approach to work
  • A desire to iteratively develop and improve a program amongst changing priorities within a growing organization
  • The ability to demonstrate initiative and follow through on issues
  • The ability to prioritize and manage multiple tasks independently to meet competing deadlines
  • The ability to generate improvement ideas and drive collaborative change
  • Independence and confidence to escalate issues where necessary
  • The ability to make high level judgments and work closely with peers
  • Minimum of 8 years overall experience within the IT field
  • Minimum of 5 years of experience supporting risk-related programs, preferably in IT
  • Experience researching and identifying control standards
  • Experience working in or around a risk assessment function
  • Experience documenting executive-facing analysis, findings, and recommendations
  • Broad knowledge in the following areas
  • IT risk assessment role
  • Client-facing relationship management skills
  • IT risks and controls
  • Proficiency with MS Office and SharePoint
16

Assoc Info Security Analyst Resume Examples & Samples

  • Affects responses to Audit findings and helps provide an understanding of security frameworks within the organization
  • Support CyberArk, SEIM, Vulnerability Management, Compliance Monitoring, Symantec SEPM, Symantec DLP, E-mail Security Appliances, Web Security Appliances and new tools that are built in future
  • Maintenance and installation of IT security server applications and hardware, and implementation, configuration, support and use of security software and monitoring/reporting tools
  • Minimum 1 years Information Security specific experience
  • Experience providing support of security tools
17

Info Security Analyst Resume Examples & Samples

  • Documentation creation
  • Technical schematics drawing
  • Template and documentation standards management and upkeep
  • Documentation review and proofing
  • Develop high quality user manuals for cyber security related products
  • Research, write, release, and maintain user, system administrator, maintenance, and installation documents for Cyber security related products
  • The ability to research content through SME interviews and hands-on use of products
  • Define standard templates and standard operating procedures for five
  • Major Security IT Groups
  • Define templates for user and reference guides as well as update, review
  • And format guides
  • Update, review, and format IT group process documentation
  • Maintain SharePoint site Master Documentation Catalog that lists
  • Procedures, processes, user guides, reference guides, schematics, product catalogs, and processes
  • Adobe Acrobat
  • Adobe FrameMaker
  • Epic XML Editor
  • Microsoft Excel
  • Microsoft Word
  • RoboHelp
  • Microsoft Visio
  • SnagIt
  • IBM RequistePro
  • IBM ClearCase
  • Vasont CMS
  • TestLink
  • WIKI
  • EGRC Archer
  • Adobe PhotoShop
  • Adobe Illustrator
  • C++
  • Visual Basic
  • ©2015 Teachers Insurance and Annuity Association of America-College Retirement Equities Fund (TIAA-CREF), 730 Third Avenue, New York, NY 10017 C23921
18

Assoc Info Security Analyst Resume Examples & Samples

  • Analyze and be well-verse in all aspects of Identity and Access management life-cycle especially on Core processes for
  • On-Boarding
  • Transfers
  • UARs
  • Identify process automation opportunities on existing access management practices
  • Liase with internal and external auditors on IAM related audit and reviews
  • Have a broad and deep background in all aspects of Identity and Access Management end-to-end lifecycle, from HR driven processes (on/off-boarding, conversions, transfer)
  • Provide guidance and direction on access controls and IAM practices to customers
  • Good working knowledge with Excel spreadsheets, analysis of large volume of data
  • Good working knowledge of Oracle Identity Management suites (OIM)
  • Flexibility to work after hours and weekends to accommodate and support the existing servers/applications maintenance windows, global team meetings, and on-call support
19

Info Security Analyst Resume Examples & Samples

  • Actively hunting for and dissecting previously unidentified threats in the environment
  • The role is involved in projects or issues of high complexity that require in-depth knowledge across multiple technical areas and business segments
  • Experience handling security incidents, to include reviewing raw log files, data correlation, and analysis
  • Bachelor’s degree in computer science, information technology, or related field
  • Experience with industry standard frameworks
  • Experience with YARA, regex, or other host/network-based signature development
20

Info Security Analyst Resume Examples & Samples

  • Analyze and perform essential day-to-day operational activities relating to third party vendor security governance and oversight
  • Able to travel within the US to conduct Security Site Evaluations
  • Contribute to the overall success of the department by actively participating in the evolution of the team
  • Identify and implement process improvement opportunities
  • Interact and/or build/sustain collaborative relationships with all Lines of Business, technology groups and others, as appropriate
  • Support and manage the development, maintenance and publishing of process flow diagrams, business procedures, rules and definitions
  • Contribute to Information Security projects and initiatives
  • Provide back up to other associates as needed
  • Assist in training and support of other team members and end users
  • Promote teamwork within the department and the overall enterprise Security Services division
  • Ability to adapt and contribute to departmental change
  • Proven ability to identify and implement process improvement opportunities
  • Proven ability to develop and interpret results of analyses
  • Three or more years of information security related experience
  • Working knowledge of the banks Governance, Risk, and Compliance(GRC) Management tool
  • Proven ability to work with high-level internal clients
  • Demonstrated ability to prepare management level reporting
  • Professional Security Certifications (CISSP, CISA, etc.,)
  • Advanced Degree (MBA, JD, etc.)
21

Info Security Analyst Resume Examples & Samples

  • Proactively anticipate technical risks and design/implement error handling and other mitigation techniques to ensure system stability and security
  • Develop, implement, and use processes, tools, techniques, and practices for assuring adherence to standards associated with accessing, altering, and protecting organizational data
  • Utilize tools and techniques to assess the effectiveness of information security measures and identify potential exposures
  • Develop and implement policies, standards, and procedures intended to ensure the integrity and safety of information
  • Develop and implement safeguards to prevent intrusion, unauthorized access, and assure physical security of organizational networks
  • Participate as a member of the incident response team to quickly contain, eradicate, and recover from information security incidents
  • Bachelor’s Degree required in Security, Computer Science, MIS, or other degrees with high level understanding of network and application security and information systems
  • 3+ years in IT with experience in a security function or relevant experience, required
  • Basic knowledge in IT architecture design and implementation, required
  • Basic knowledge of IT controls such as CIP (NIST, SAS70, SOX, HIPPA, etc.), preferred
  • Knowledge of various forensics concepts, methodologies, and tools. Experience in applying these concepts to effectively execute the incident response life-cycle, required
  • Knowledge of various malware analysis concepts, methodologies, and tools, preferred
  • Knowledge and skill in incident management, response, analysis, and reporting. Ability to triage various incident types and prioritize appropriately. Experience applying computer security incident response processes, mitigation strategies, malware analysis, network traffic analysis, and network system analysis, preferred
  • Knowledge of intrusion detection methodologies and tools for detection of host and network based intrusions. Experience with applying intrusion detection methodologies and tools to identify and develop mitigations to existing and potential threats, required
  • Knowledge of security operations tools. Experience administering and utilizing network traffic analysis tools, Security Information and Event Management (SIEM) systems, firewalls, intrusion detection/preventions tools, web filtering systems, email security filters, and vulnerability scanning tools among other technologies, required
  • Knowledge of threats, vulnerabilities, and attack methodologies, required
  • Ability to communicate effectively verbally and in writing. Ability to clearly and concisely communicate complex technical information to audiences of various technical levels, required
  • 57721
22

Princ Info Security Analyst Resume Examples & Samples

  • Evaluate firewall change requests and assess organizational risk
  • 11 years of recent specialized experience
  • CISSP (or Associate) certification required
  • This position may occasionally require some physical activity; lifting objects; bending; crouching down (i.e. to troubleshoot equipment); and long periods of sitting
  • ITIL Foundation required within 90 days of hire
23

Senior Princ Info Security Analyst Resume Examples & Samples

  • Subject Matter Expert (SME) within the Security Operations Team for GSO SIEM Security technologies
  • Provide backup support for other solutions network security solutions
  • Support client facing / end user help desk and other IT Support Team's escalations 24x7
  • Ensuring support tickets are fully updated with the most current data. Provide proper escalations and hand offs to management and support staff
  • Participate and collaborate on Change Control that involve Servers, Web, App, Networking and Database changes within the Symantec Enterprise
  • Responsible to ensure that supported security technologies are feeding the Security Log Platforms and Symantec Managed Security Services (MSS) 24x7x365
  • Ensure that the operations team keeps all run books and topology / data flow drawings for each solution up-to-date and current
  • Candidate must have (8+ years) working in security operations
  • Expert: Splunk Ver 6.x Principal Splunk Developer – Splunk Training Cert are a Plus
  • Expert: Balabit Syslog-NG
  • Expert: Unix - Red Hat Enterprise 6.x & 7.x – Shell & Perl Scripting – RHEL Cert is a Plus
  • Knowledge: Windows Server 2008, 2012 & Power Shell
24

Lead Info Security Analyst Resume Examples & Samples

  • Minimum 5-7 years of experience working within the Information Security/Cybersecurity or Information Technology fields
  • Minimum 2-5 years of experience in IT Risk Management, Information Security Consulting, Supplier Assessments, or IT Audit
  • Experience managing projects or multiple priorities is required
  • Demonstrated experience of IT assessment best practices, management techniques and industry trends within IT Risk and Security responsibility areas
  • Working knowledge of Federal Financial Institutions Examination Council (FFIEC) guidance, GLBA, Sarbanes-Oxley, FINRA and other relevant laws and regulations, as well as knowledge of and experience with industry-recognized information security-related standards such as ISO2700x, NIST, COBIT, PCI-DSS
  • Proficiency with Microsoft Office (MS Excel, MS PowerPoint, etc.)
  • 2-3 years of experience in the financial industry directly addressing federal financial regulatory requirements as well as knowledge of, and experience with, industry-recognized information security-related standards such as ISO2700x, NIST, COBIT, PCI-DSS
  • CISA, CISSP, CRISC certifications a plus, as is PMP
25

Info Security Analyst Resume Examples & Samples

  • Creates hypotheses for analytics and testing of threat data
  • Shares lessons learned, initial indicators of detection, and opportunities for strengthening signature based detection capabilities
  • Maintains and enhances the documentation standard for discoveries and reporting of malicious tactics, techniques, and procedures
  • Ensures compliance with all applicable configuration standards
  • KNOWLEDGE: Having broad expertise or unique knowledge, uses professional concepts and company objectives to resolve complex issues in creative and effective ways. Some barriers to entry exist at this level (i.e., dept/peer review)
  • JOB COMPLEXITY: Works on complex issues where analysis of situations or data requires an in-depth evaluation of variable factors. Exercises judgment in selecting methods, techniques and evaluation criteria for obtaining results. Internal and external contacts often pertain to company plans and objectives
  • SUPERVISION: Determines methods and procedures on new assignments, and may provide guidance to other personnel
  • EXPERIENCE: Typically requires a minimum of 8 years of related experience. In some companies, the requirement will be less. At this level, graduate coursework may be desirable
26

Experienced Info Security Analyst Resume Examples & Samples

  • Proven experience (4+ years) as an IT info security professional
  • Strong persuasion skills/ability to influence without authority/communicate technical information to a variety of non-technical audiences
  • Awareness of appropriate information sharing to 3rd parties
  • Strong relationship building and communication skills with employees at all levels
  • Strong research, documentation and organizational skills
  • Ability to adapt and adjust in a fast-paced environment
  • Bachelor's degree in computer-related field or equivalent work experience
  • Knowledge of NIST cyber security framework and controls
  • Knowledge of mainframe and distributed environments
27

Info Security Analyst Resume Examples & Samples

  • At least 2 years of experience with processes, tools, techniques and practices for assuring adherence to standards associated with accessing, altering and protecting organizational data
  • Ability to work 2 p.m. – Midnight, Wednesday - Saturday
  • Strong knowledge of common operating systems and file systems for Windows and UNIX as well as enterprise architecture
  • Experience with cyber threat intelligence methodologies
  • Understanding of HTML, JavaScript, ASP and database query languages such as MySQL or Microsoft SQL desired
  • Maintain knowledge of law, regulations, and technology advancement related to cyber threat intelligence or incident response functions
  • Advanced Proficiency in Windows Office Suite (Word, Excel, PowerPoint, Visio, and SharePoint)
28

IT Info Security Analyst Resume Examples & Samples

  • Bachelor’s or Associate’s degree in an IT related field or equivalent work experience
  • Relationship building and management
  • Sharepoint – basic design, use and maintenance
  • Audit background/knowledge – SOX, SOC-1, FICCA
  • Mainframe and distributed environments knowledge
  • Knowledge of Principal business and systems
29

IT Info Security Analyst Resume Examples & Samples

  • 4+ years of experience working in an information systems or risk management related field, with at least 2+ years working within a Network or Security Operations Center required Associate’s or Bachelor's degree from an accredited college or university or equivalent experience
  • Prior SOC or NOC experience including experience investigating vulnerabilities, threats and security events preferred
  • Strong team player that collaborates well with others to solve problems
  • Ability to think strategically; work with a sense of urgency and pay attention to detail
30

Lead Info Security Analyst Resume Examples & Samples

  • Further the design and maturation of TIAA’s Insider Threat program
  • Develop and deliver stakeholder presentations which further the awareness and understanding of the insider threat program and capabilities
  • Propose and execute program initiatives, and collaborate with key stakeholders to create business value
  • Receive, evaluate and initiate the processing of cyber forensic investigations
  • Search and seizure of physical and logical evidence
  • Imaging of hard disk drives and other digital storage media
  • Digital forensic examination and analysis
  • Recovery of deleted files and folders, internet history, deleted emails, identification of attached devices, analysis of event logs and proxy logs
  • Review and direct user activity monitoring strategies
  • Develop strategies to improve the efficiency and consistency of service delivery
  • Provision of report and statements in clear unambiguous language
  • Maintain a strong focus on case logs, repeatability and chain of custody
  • Identification of root cause in partnership with peer groups on remediation of control gaps/failures
  • Interact with and lead discussions with executives across different functions and lines of business
  • Execute high risk cyber security incidents by working in conjunction with response partners
  • Bachelor’s degree/or minimum 5-8 years of equivalent combination of education and experience
  • Minimum of 7-10 years of overall experience in Cybersecurity
  • Minimum of 3-5 years in computer forensic investigations
  • Insider Threat program experience as a focus area within Cybersecurity
  • Working knowledge of Data Loss Prevention controls (e.g. Symantec DLP, McAfee, Websense)
  • Hands on experience with industry standard computer forensics solutions (EnCase, FTK, X-Ways, Cellebrite)
  • Working knowledge of enterprise solutions for searching, monitoring, and analyzing machine-generated big data (ArcSight, LogRhythm, Splunk)
  • Hands on experience with user activity monitoring tools such as ObserveIT or Veriato 360
  • Proven ability to self-direct project outcomes, with minimal supervision, to achieve program goals
  • Experience with scripting environments (e.g. Python, Ruby, Perl, VB Script) to automate technical response
  • Experience with Windows, MacOS, Linux, iOS
  • Ability to build consensus and cooperation as well as the ability to interact, influence, and negotiate with leadership within the firm
  • Ability to navigate and work effectively across a complex organization
  • Possess one or more of the following certifications: CFCE, CCE, EnCE, ACE, GCFA
  • Strong knowledge of User Behavior Analytical concepts and products
  • Experience in financial services including Retirements, Retail/Commercial banking, or another other financial institution line of business (Brokerage, Insurance, or Asset Management)
  • Good understanding of data privacy laws and experience interacting with Legal and Compliance professionals
31

Info Security Analyst Resume Examples & Samples

  • Applies fundamental knowledge of IT tools and processes to perform daily activities
  • Participates in IT research and recommends appropriate solutions
  • Builds working relationships and strategic partnering skills with business partners, team members, and external associates
  • Makes decisions required to resolve moderately complex IT problems and issues
  • Applies expertise and promotes use of IT tools and processes for component, or project work
  • Keeps abreast of security industry trends/best practices for use in strategic and/or tactical planning
  • Conducts IT research, analyzes and synthesizes information; anticipating business needs and its application to Systems processes and potential solutions
  • Comprehends complex interdependencies and navigates the organization to facilitate decision making and issue resolution
  • Ability to build relationships across various levels of the organization
  • Ability to cultivate effective working relationships and empower others
  • Ability to adapt to a changing environment
  • Ability to coach and mentor others, particularly new employees
  • Ability to foster innovation, encourage diversity of thought, and incorporate new ideas
  • Strong familiarity with System Department processes
32

Info Security Analyst Resume Examples & Samples

  • Monitors security incident and event management (SIEM) and logging environments for security events and alerts to potential (or active) threats, intrusions, and/or compromises
  • Assists with triage of service requests from customers and internal teams
  • Escalates cyber security events according to Lowe’s Incident Response Plan
  • Assists with containment of threats and remediation of environment during or after an incident
  • Acts as a participant during Cyber Hunt activities. Act as a Threat Intelligence Analyst researching, analyzing, and applying cyber security threat intelligence
  • Documents event analysis and writes comprehensive reports of incident investigations
  • Bachelor’s Degree in related field or 2 years of experience in Information Security, Network Security, or Information Technology
  • Strong technical, analytical, interpersonal, communication and writing skills
  • Strong verbal and written communication skills with ability to work in a team
  • Basic understanding of fundamental security and network concepts (Operating systems, intrusion/detection, TCP/IP, ports, etc.)
  • 1) “Retail” experience in the Information Technology Industry
  • 2) One or more of the following certifications
  • 4) Experience with malware analysis
33

Princ Info Security Analyst Resume Examples & Samples

  • Perform periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance
  • Provide guidance and work leadership to less-experienced technical staff members, and may have supervisory responsibilities
  • Hands-on experience with command line security audits
  • Must be proficient in MS Windows audit analysis
  • Have working knowledge of MS Windows OS functionality and command line input is essential
34

Info Security Analyst Senior Resume Examples & Samples

  • 10 years' experience as a data architect for multi-terabyte data warehouse projects
  • 10 years' experience with ERwin Enterprise Data Modeler Suite OR equivalent
  • 10 years' experience in logical data modeling - relational and dimensional
  • 1 year experience in Healthcare related data modeling
  • 1 years experience in Oracle DBMS
35

Info Security Analyst Resume Examples & Samples

  • Proven success as a DW architect, delivering solutions for large (multi-terabyte) projects that integrate many diverse technologies and products
  • Excellent documentation skills, ability to produce diagrams and schematics that visualize technical solutions
  • In-depth understanding of DW implementation best practices and application development best practices (SDLC methodology)
  • 5+ years' experience hands on DW technical development; data architecture, data integration, business intelligence and data analysis tools
  • 5+ years' experience leading DW technical implementation teams; data architecture, data integration, business intelligence and data analysis tools
  • 5+ years' experience developing technical architecture for DW implementations
  • In-depth understanding of RDBMS applications
  • In-depth understanding of relational and dimensional data modeling practices and where they are best utilized
  • In-depth understanding of data integration best practices, leading industry applications and features such as master data management, entity resolution, data quality assessment, metadata management, etc
  • In-depth understanding of business intelligence applications and how to integrate with other DW solution components
  • In-depth understanding of security models and methods to protect information in the DW solution
  • Excellent communication skills and ability to translate complex technical issues to a non-technical audience
  • Exposure to Business Intelligence platforms (e.g., Cognos, Business Objects)
36

Principal Info Security Analyst Resume Examples & Samples

  • Advanced knowledge of data security administration principles, methods and techniques
  • Expertise with regulatory requirements for DoD and Intelligence Community IT systems (STIG, DCID, ICD, etc.) and significant experience with Risk Management Framework (RMF) as well as DIACAP and ICD accreditation processes. Emphasis on C&A experience, to include implementing controls and drafting the C&A body of evidence, with DIACAP and DCID 6/3. A plus would be familiarization with ICD 503
  • Provide input on IA compliance during system/application design and implementation
  • Familiar with firewall theory and configuration
  • Familiar with basic networking
  • Familiar with Linux Operating Systems
  • Familiar with Microsoft Windows Operating Systems. 16. Familiar with Microsoft Active Directory
37

Info Security Analyst Resume Examples & Samples

  • Process entitlement, compliance review requests and/or incident/change management handling for Client’s global customer base within established support thresholds
  • Conduct basic housekeeping tasks, such as inactivity maintenance. Perform manual entitlement review maintenance
  • Able to perform ID provisioning such as developer and Admin IDs and basic Functional ID related processes
  • Ensure adherence to pre-assigned SLO requirements for designated requests at a personal and team level
  • Utilize Microsoft applications for creating and maintaining basic files
  • Participate on compliance conference calls and team meetings
  • Understands Service Delivery Process Controls and under supervision, participate in annual review of Process Control documents associated with specific systems assigned
  • Demonstrates basic understanding of Client Lean processes
  • Understands the high-level principle behind Information Security concepts and policies; and applies / implements into day-to-day work
  • Identifies potential compliance issues and raise to management attention
  • Understands Talent Management process and system. Knows how to develop action items to meet goals. Knows how to create a basic IDP (Individual Development Plan). Understands and meets deadlines for system inputs
  • Must be able to exchange information in a concise and logical way as well as be sensitive to audience diversity
  • Ability to manage multiple efforts and adjust priorities with evolving work efforts. Requirement
  • Minimum 2 year related experience for non-degree (Bachelor or higher degree) holder
  • Good command of English language (both verbal and written)
38

Info Security Analyst Resume Examples & Samples

  • Develop and maintain standard operating procedures (SOPs) in the performance of the project and third party risk assessments
  • 5+ years of proven experience in Senior Information Security Analyst / Risk Assessor
  • Experience performing security risk analysis and compliance assessments
  • Mature understanding of information security “best practices” including principles, security protocols and standards material such as OWASP Top 10 and SANS Critical Security Controls
  • Articulate communicator, demonstrating mastery of both spoken and written English, with the ability to tailor deliverables appropriately for audiences ranging from technical to senior executive
  • Experience with common security industry and audit standards, such as ISO 27001/27002, NIST 800 series, PCI-DSS, SOC2
39

Info Security Analyst Resume Examples & Samples

  • Maintains in-house documentation that describes audited system configuration and security control implementation
  • Reviews logs, configurations, rule sets, user accounts, account groups and network traffic for adherence to information security policy/procedure
  • Engages in change/configuration management activities for audited systems
  • Writes reports related to specific information security issues related to audited systems
  • Tickets and tracks operational issues related to the security posture of audited systems
  • Conduct research on products, services, protocols and standards to remain abreast of developments in the information security industry
  • Participate in exercises that test policies, procedures and skills that are required by business and critical operations
  • Acts as a mentor to other analysts
  • Bachelor’s degree in computer science/related field or equivalent experience
  • Two+ years of previous experience in an information assurance or security role
  • Certified Information Systems Security Professional (CISSP) (preferred)
  • The ability to pass a DOD Security Clearance is required for this position
  • Ability to explain security controls including antivirus/malware/host intrusion prevention solutions, file integrity monitoring solutions, intrusion detection/ prevention systems, network access controls, Security Incident Event Monitoring solutions, etc. required; certifications (preferred)
  • Administrator level experience working with Linux, OS X, UNIX and Windows operating systems
  • Ability to read, analyze and interpret general business periodicals, professional journals, technical procedures or governmental regulations
  • Ability to effectively present information and respond to questions from groups of employees, managers, clients and customers
  • Ability to apply concepts such as fractions, percentages, ratios and proportions to practical situations
  • Ability to independently support multiple enterprise security projects
  • Ability to mentor and support junior analysts
40

Info Security Analyst Resume Examples & Samples

  • Develop new SIEM content (Splunk) including rules, active lists, aggregations, dashboards, trends, and alerts that appropriately characterize the importance of events of interest found in the TIAA operational environment
  • Develop metrics and trends that demonstrate the log platform's health and operational state
  • Receive, create, and disseminate threat intelligence from manual and automatic sources (internal and external). Add context to inform the urgency, severity, and credibility of threat indicators
  • Provide business requirements to peer teams within TIAA that relate to the governance, development, and sustainability of logging related to security-relevant events
  • Support for security operations for potential crisis situations, with 24x7 availability as needed
  • Ensure breadth and depth of coverage within the SIEM environment for all security solutions deployed at TIAA; ensure that technologies are properly being leveraged to provide detective capabilities of security events
  • Maintain operational effectiveness of SIEM content rules, accepting requests from Security Operations and elsewhere in the business (within the governance framework) to tune and implement rules to meet emerging threats
  • Assist internal and external customers to define, document, and implement appropriate delivery, parsing, reporting, and retention of security-relevant log information
  • 1 or more years experience in information technology and/or information security
  • 1 or more years industry experience in intelligence collection and analysis or incident response
  • 2+ years SIEM content development experience, including the ability to identify key interactions logged by malicious activity
  • 1+ years in log review, analysis, and design of searches / alerts to bring actionable intelligence from logs
  • Experience in managing, engineering, or developing content for centralized logging solutions with Splunk or comparable solution (ArcSight, ELK, Graylog, etc)
  • Familiarity with a broad range of security technologies and how they function, as well as non-security devices and how their log outputs can indicate security incidents
  • Knowledge of information security threat types, their composition, and which indicators of compromise (IOCs) are useful for detecting, identifying, and mitigating each. Knowledge of attacker tactics, techniques, and procedures (TTPs) useful to assist the response teams (CSIRT) with combatting attacker capabilities
  • Excel or other data mangling & visualization skills
  • Shell scripting, Python, Perl, or other scripting
41

Info Security Analyst Resume Examples & Samples

  • Support IT Risk Central user story analysis for program enhancements
  • Proven Cybersecurity experience in Financial Services
  • Working experience with TIAA’s IT Risk Management Risk Assessment programs and objectives
  • Archer eGRC navigation and report creation
  • Microsoft office (Word, Excel, Powerpoint)
42

Info Security Analyst Resume Examples & Samples

  • Provide guidance and expertise in the field of risk management regarding the protection and security of data
  • Strong communication skills to interact with IT and/or Business Areas
  • Splunk and Tableau experience
43

Info Security Analyst ARA Resume Examples & Samples

  • Support IT Risk Central UAT (functional and regression testing)
  • Tableau development skills
  • Advanced Excel skills
44

Info Security Analyst Data Protection Resume Examples & Samples

  • Perform analysis of Data Loss Prevention policies to measure the policies’ effectiveness and identify opportunities for continuous improvement
  • Assist in the design and implementation of new policies to protect against emerging threats
  • Collaborate with other team members to expand the Data at Rest program, by leveraging capabilities in existing in-house technologies to develop new processes
  • Experience with Symantec Data Loss Prevention (DLP)
  • Must be graduating from the TIAA Technical Associate Program in 2017
  • Strong documentation skills with proficiency in Excel, Word, and OneNote
  • Highly self-motivated and can work on projects independently
45

Assoc Info Security Analyst Resume Examples & Samples

  • 2+ Years of experience in management of IDM systems in an enterprise level environment
  • 1+ Years Oracle Identity Manager experience including the configuration and integration of OIM R2 PS3, OID, OVD, OAM, OES, SOA
  • Some experience with Oracle Database
  • Understanding of Active Directory and LDAP is desirable
  • Perform analysis of IAM related incidents, including documentation of the root cause analysis, and recommendations for remediation
  • Work within a complex environment, to maintain the performance and stability of the IAM system ensuring that service level agreements are met
  • Work closely with IT Management , Development team, and the Quality Assurance team to communicate issues and proposed solutions
  • Participate in peer reviews and provide meaningful feedback to ensure that problems are resolved and that platform objectives including service levels are met
  • Experience in a support role of a platform or framework component within a highly scalable environment
  • Effective writing and communication skills
  • Work within a globally distributed team of IAM team members and customers; sometimes having to provide support outside of normal business hours and on weekends
46

Info Security Analyst Resume Examples & Samples

  • Develop reporting and metrics to measure the service and identify potential risks
  • Act as a subject matter expert for centralized access administration of various applications and platforms
  • Assist in the development of new access models for newly centralized applications and platforms
  • Limited queue processing – requests or INCs outside of normal processes
  • Minimum 2 - 5 years of relevant work experience on the IT Service Desk
  • Minimum 2 years’ of experience with Active Directory, RACF, Automation
  • Four year degree preferred
47

Info Security Analyst IAM Resume Examples & Samples

  • Provide operational support for IAM tools (current: IdM, Varonis; future: SailPoint)
  • Identify security access misconfigurations and recommend remediation options to the lead analyst
  • Analysis and governance of authoritative source systems (AD, RACF, UNIX/BoKs)
  • Minimum 2 – 5 years of relevant work experience on the IT Service Desk
  • Minimum 1 year experience IAM experience (ie, with at least some college training or work experience in an identity and access management role)
  • Tools, and Microsoft Office products
  • Ability to be available during on-call situations
  • Strong documentation and problem solving skills
48

Info Security Analyst Resume Examples & Samples

  • Perform FIPS 199 Security Categorizations
  • Perform Privacy Threshold Analyses
  • Develop Privacy Impact Assessments
  • E-Authentication
  • Update System Security Plans
  • Update Contingency Plans
  • Update Business Impact Analyses
  • Update Incident Response Plans
  • Develop Security Assessment Plans
  • Develop Rules of Engagement
  • Develop Security Assessment Reports
  • Request and analyze compliance and vulnerability scan results
  • Candidate must have 5+ years of IA experience overall with 3 years of experience assessing information systems at a FEDCIV agency using the NIST RMF
  • Must be familiar with NIST 800 series guidance
49

Info Security Analyst Resume Examples & Samples

  • Minimum 6-8 years of experience with complex IT environments with at least 3 years of experience with vulnerability and risk management
  • Experience with vulnerability assessment tools (e.g. Qualys, Nessus, etc.)
  • Strong understanding and experience with Windows and UNIX environments (platform certifications, e.g. MCSE, RHCE, etc. would be desirable.)
  • Experience with data handling requirements for regulatory compliance (PCI, PII, etc.)
  • Proven experience in developing and executing plans, meeting deadlines and operating under tight time constraints
  • Solid communication and interpersonal skills. Distinctive problem solving and analytical skills
  • Demonstrates creative thinking, innovative approaches using multiple technologies, to build constructive business relationships and gain the trust of others
  • Excellent written and verbal communication skills with the ability to explain architecture, design, security controls, and risk to the business. Demonstrated experience assisting general security risk assessments at the business unit or department level
  • Bachelor’s Degree in Information Systems, Engineering, or Computer Science or equivalent education and experience
  • Security certifications are a plus (CISSP, CISM, CISA,)
50

Info Security Analyst Resume Examples & Samples

  • Minimum 1-3 years of relevant IT work experience (including hands-on experience with IT security technologies)
  • Minimum 3 years of experience working in and guiding a team-oriented, knowledge share, and collaborative IT environment
  • Minimum 3 years of experience with Service Now, Sailpoint, Varonis, Powershell and other scripting languages
  • Being available during on call situations
51

Assoc Info Security Analyst Resume Examples & Samples

  • Develops and executes security controls and reports, defenses and countermeasures to detect, analyze, investigate and respond to internal or external attacks or attempts to infiltrate company confidential or sensitive information. Researches attempted or successful efforts to compromise system and application security and designs countermeasures. – 40%
  • Executes with minimal supervision planned Security projects. Act as security SME for other projects as assigned. – 15%
  • Executes with minimal supervision maintenance and enforcement of Security Policies & Procedures. Also handle organization and presentation of any policy documentation required by external auditors – 20%
  • Is primarily responsible for developing documentation, reviewing and suggesting improvements for existing processes within the security department. – 20%
  • Execute various operational security tasks; and respond to security related inquiries from internal and external customers. – 10%
  • Acts as backup for the Manager of Information security, triaging, resolving and escalating day to day departmental issues as appropriate – 5%
  • Review, enhance, implement and manage procedures for verification of activity on Dealertrack systems. – 5%
  • Experience with vulnerability management
  • Demonstrated analytical, problem solving, and interpersonal skills. Must be analytical, organized and detail-oriented in nature
  • Able to build a consensus with both internal and external parties in order to create alignment on security needs
  • Capable of prioritizing and planning own work activities
  • Certification in Information Security – one of SANS, GSEC, CISSP, CISM, CISA, CISSP is required
  • Ability to conduct informal risk assessments and rapidly integrate the results into decision making processes
  • Deep interest and understanding of information security technologies
  • Ability to be on call 7/24 to respond to operational security issues, and work planned after hours shifts as required from time to time
  • · Typical Office Work
52

Info Security Analyst Resume Examples & Samples

  • Participating in the evaluation, development, and implementation of security standards, processes, procedures, and guidelines for multiple platforms and diverse systems environments
  • Ensure compliance with various IT security policies
  • At least 2 - 5 years of Identity and Access Management experience
  • Minimum 2 years of Database Management in provisioning or remediation
53

Info Security Analyst IAM Resume Examples & Samples

  • Approach each situation with a security-focused mindset
  • Drive continuous improvement to access management processes
  • Stay knowledgeable of company and industry security standards
  • Assist with building and modifying database security models for provisioning
  • Help to build and implement security controls within database platforms around account management
  • Provide suggestions to management for improvements on Database account management
  • Guide and assist with centralizing and standardizing accounts across all database platforms
  • At least 2 – 5 years of Identity and Access Management experience
  • Minimum 2 years of experience with Active Directory, RACF, and UNIX
  • Minimum 2 years of experience with Oracle, SQL, and other database platforms
  • Proficiency in Excel and documenting skills
  • Some college training or experience in an identity and access management role
54

Princ Info Security Analyst Resume Examples & Samples

  • Provide continuous monitoring support utilizing Security Analytics, EITA, ALERT, EVSS, HBSS and Red Seal for information systems
  • Validating all information system security reporting
  • Ensuring that the XACTA automated tool, is utilized for conducting security assessment and authorization evaluations, and for reporting required IT security program status information
  • Ensuring DHS encryption policy is implemented and enforced
  • Advising project managers on the implementation of DHS encryption standards
  • Experience must include
55

Info Security Analyst Resume Examples & Samples

  • General SIEM monitoring, analysis, content development, and maintenance
  • Research, analysis, and response for alerts; including log retrieval and documentation
  • Conduct analysis of network traffic and host activity across a wide array of technologies and platforms
  • Assist in incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts
  • Process abuse inbox emails (spam, phishing, etc.)
  • Process tickets assigned to the SOC/CSIRT group
  • 1-3 years of SOC or MSSP experience
  • 1+ years of SIEM experience
  • Working knowledge of security architectures and devices
  • Working knowledge of threat intelligence consumption and management
  • Working knowledge of root causes of malware infections and proactive mitigation
  • Working knowledge of lateral movement, footholds, and data exfiltration techniques
  • Strong time management and multitasking skills as well as attention to detail
  • Comfortable with impromptu tasking and loosely defined requirements
  • Experience with active threat hunting and adversary tracking
  • Experience with one or more scripting languages (e.g., Python, JavaScript, Perl)
  • Experience as a government contractor
56

Info Security Analyst Resume Examples & Samples

  • Perform information security risk assessments for internal and/or 3rd party related assets/applications
  • Duties include but not limited to data gathering, data entry, scheduling and leading discovery meetings, identification of mitigating controls, identification of non-compliance with Policies, Standards, or Baselines, providing recommendations for risk remediation or mitigation, reporting, following up, and escalating issues
  • Provide Information Security consulting to simple or complex business and/or enterprise projects under the direction of the lead Information Security Consultant or Manager
57

Info Security Analyst Resume Examples & Samples

  • Draft and review cybersecurity policy documents that affect organization
  • Run and/or support various working groups
  • Tracking ATO statuses and authorizations with conditions, of 100+ packages and working closely with various ISSMs/A&A leads
  • Develop a method to integrate RMF control profiles (in spreadsheet format) into eMASS authorization packages
  • Reviewing authorization packages and artifacts in eMASS at various RMF steps
  • Analyzing and tailoring security controls
  • Completing risk assessments
  • Updating government SharePoint site with pertinent cybersecurity information and guidance
  • Attending meetings with various system stake holders, A&A leads, ISSMs and presenting technical information and ideas
  • Reviewing architectural and engineering documents to meet cyber requirements for future combat systems
  • Ability to obtain and maintain an DoD Secret Clearance
  • 8570 IAT Level II Certification Required (Sec+CE, GSEC, SSCP, GICSP, or CCNA-Security) or higher
  • DoD IT Experience strongly preferred
  • EMass Training or experience preferred
58

Info Security Analyst Resume Examples & Samples

  • Monitors and advises on information security issues related to the systems and workflow at HMS to ensure the internal security controls are appropriate and operating as intended
  • Supports the development and publication of Information Security policies, procedures, standards, guidelines based on knowledge of best practices and compliance requirements
  • Conducts company-wide assessment and security audits and manages remediation plans
  • Collaborates with IT management, Legal, Safety and Security, and law enforcement agencies to manage security vulnerabilities
  • Creates, manages and maintains user security awareness
  • Conducts security research in keeping abreast of latest security issues
  • Performs other functions as assigned
  • Understanding of Security policy and applicable regulatory laws
  • Knowledge of information security standards, rules and regulations related to information security and data confidentiality (e.g., HIPAA, etc.) and desktop, server, application, database, network security principles for risk identification and analysis
  • Excellent interpersonal and consultative skills
  • Strong PC skills (Microsoft Office, Word, Excel, PowerPoint, etc.)
  • CISSP, CGEIT, or other related certifications desired
  • 5+ years experience in IT Governance, or related fields
  • 2+ years of progressive experience in computing and information security, including experience with Internet technology and security
  • Experience in the Archer egrc Enterprise Solution or related Governance support software
  • Experience in security policy development, security education, application vulnerability assessments, risk analysis and compliance testing
59

Info Security Analyst Resume Examples & Samples

  • Bachelor's degree in Computer Science or Information systems OR a high school diploma (or equivalent) AND 3 years of experience in a security-specific profession
  • Ability to anticipate and respond to changing priorities, and operate effectively in a dynamic demand-based environment, requiring flexibility and responsiveness. This requires the ability to work independently or with team members
  • Exposure to a broad environment of IT systems, applications, and their operational configurations
  • Experience with multiple different Operating Systems to include: Windows, Mac OS, and versions of Linux
  • Understanding of incident phases and attack vectors
  • Experience with intrusion detection systems and threat techniques
60

Info Security Analyst Resume Examples & Samples

  • Working knowledge of security regulations such as HIPAA, PCI-DSS 3.2 and security standards including ISO 27002, and NIST
  • Preferred certification in the following area(s): Certified Information Systems Security Professional (CISSP), Healthcare Certified Information Security and Privacy Professional (HCISPP), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Window Security Administrator (GCWN), GIAC Security Essentials Certified(GSEC)
  • Ability to maintain operational computer and network security, intrusion detection (IDS) and prevention (IPS), vulnerability scanning and data loss protection (DLP)at rest and in motion tools
  • Solid understanding of the Information Security & IT controls, security penetration and vulnerability assessments
  • Demonstrated knowledge of generally known information technology platforms, standards, and software development languages
  • Performs detailed analysis of business need, identified IT Security impacts or considerations and translates into secure, viable technical solutions
  • Develops and maintains documentation and procedure of network security systems. Maintains current knowledge of relevant technologies
  • Assists with developing training and awareness material and conducting training classes
  • Skill and ability to communicate effectively both verbally and in-writing
61

Info Security Analyst Resume Examples & Samples

  • Bachelor's degree or equivalent experience in computer science, business, mathematics or related field
  • Typically 3 or more years of applicable experience
  • Demonstrated leadership on small-mid scale projects impacting strategic priorities
62

Info Security Analyst Resume Examples & Samples

  • 6+ months of information technology experience
  • Basic knowledge and understanding of information security
  • Knowledge and understanding of information security administration
  • Knowledge and understanding of information security principles, policies, and procedures
  • Strong analytical skills with high attention to detail and accuracy
  • Ability to learn and assimilate information from multiple people and sources
  • Ability to work effectively, as well as independently, in a team environment
  • Ability to work in a fast paced deadline driven environment
  • Ability to navigate multiple computer system windows, applications, and utilize search tools to find information
  • Ability to prioritize work, meet deadlines, achieve goals, and work under pressure in a dynamic and complex environment
  • Strong organizational, multi-tasking, and prioritizing skills
  • Ability to coordinate completion of multiple tasks and meet aggressive time frames
  • Experience working in a large enterprise environment
  • Intermediate Microsoft Office (Word, Excel, Outlook, PowerPoint, Access, and Project) skills
  • A BS/BA degree or higher in science or technology
  • Experience in Access Management and/or Access Certification
  • Demonstrated experience with Consumer Lending platforms or applications
  • Experience with Enterprise Collections and Recovery (ECAR)
  • Provisioning experience with Active Directory
  • Provisioning experience with Mainframe applications
  • Experience with CORE and remote access applications
  • Demonstrated experience with ART and IAM request systems
  • Demonstrated experience with Stagecoach
  • Provide technical support for moderately complex security-related issues
  • Assists customers in identifying security risks to their applications
  • Maintains a familiarity with bank security policies and government regulations pertaining to information security
  • May provide guidance to less experienced staff
  • Assists the LOB and team with security consulting and moderately complex security projects related to data access, reporting, and certifications
  • Supports quarterly application certifications, monthly reporting, and participate in a team rotation schedule to support centralized functions
  • Position Hours: Monday ??? Friday 7-4 EST; 8-5 CST; 9-6 MST; 10-7 PST
  • Ability to work on call as assigned
  • Ability to work additional hours as needed
63

Info Security Analyst Resume Examples & Samples

  • Support ARA program annual planning
  • Minimum 3 years of IT experience working hands-on in the areas of business analysis, software testing and end-user training
  • Strong ability to craft and author presentations and end-user documentation
64

Lead Info Security Analyst Resume Examples & Samples

  • Manage GLBA, HIPAA and ad hoc security assessments
  • Consult on GLBA and HIPAA security requirements
  • Represent the team as a thought leader in Information Security and align initiatives with business objectives of the company
  • Work closely with cross-functional teams and develop strong liaison relationships
  • Lead GLBA and HIPAA program functions for Information Security
  • Prepare GLBA and HIPAA program reporting for senior leadership
  • Execute ad hoc security assessments
  • Manage compliance bulletin program which analyzes and responds to various security notifications
  • Partner across TTS and compliance teams to update the quarterly asset inventory which is used to define regulatory scope
  • Serve as Toronto Dominion Relationship Manager
  • Track OKRs across compliance teams
  • Attend partner meetings (Risk Working Group, CISO Ops) for awareness of any compliance program team impacts
  • Participate in special projects and research; prepare management reports and presentations as requested
  • 2 - 5 years of audit experience
65

Biso Lead Info Security Analyst Resume Examples & Samples

  • Lead the identification and prioritization of information security risks. Advise business partners on security requirements and solutions. Ensure compliance to requirements is achieved
  • Communicate risks and impacts to senior leadership
  • Represent team as a thought leader in Information Security and align initiatives with business objectives of the company
  • Facilitates and provides security advisory services to business departments / pyramids that align with business objectives of the company
  • Manage the security work streams for a variety of enterprise projects and initiatives
  • Partner with business owners to drive remediation efforts to mitigate risk
  • Determine and communicate security risk postures to partners and leaders as appropriate
  • Assist in the establishment and implementation of Information Risk Management strategic and operational department activities
  • Conduct analysis and trending (reports, dashboards, status, etc…) on internal or external progress or events affecting information security
  • Partner and establish relationships to work closely with cross-functional teams consisting of representatives in the business
  • Develops strong liaison relationships with key internal business teams
  • Assist in process development and improvements to maximize the efficiency and effectiveness of the department and related programs
  • Supports audit and incident processes, as required
  • Participates in special projects and research; prepare management reports and presentations as requested
66

Info Security Analyst Resume Examples & Samples

  • Perform 3rd Party Vendor Risk Assessments
  • Develop and maintain standard operating procedures (SOPs)
  • Demonstrate understanding of information security “best practices” including principles, security protocols and standards material such as OWASP Top 10 and SANS/CIS Critical Security Controls
  • Leverage skills and experience to further evolve, mature, and improve organizations abilities through continuous improvement
  • Bachelor’s Degree in Computer Science or related field plus 4 years of experience or 6+ years of experience in Information Security
  • 2+ years of experience as a Security Analyst or equivalent
  • Ability to deal with both technical and non-technical personnel
  • Analytical / problem solving skills
  • Knowledge of infrastructure (network and servers), services and security policies
  • Ability to act independently
  • 25% travel
  • Information security certification; one or more of the following (CISSP, CISM, CISA or CTPRP)
  • “Retail” experience in the Information Technology Industry
67

Info Security Analyst Resume Examples & Samples

  • Bachelor’s Degree in Computer Science or related field plus 6 years of experience or 8+ years of experience in Information Security
  • 4+ years of experience as a Senior Security Analyst or equivalent
  • Information security certification; one or more of the following (CISSP, CISM, CISA or CRISC), or relevant certifications
  • Strong ability to articulate business risks of technical issues to non-technical personnel
  • Identify and communicate assessment findings to non-technical personnel
  • Knowledge of core Information Security concepts related to Governance, Risk & compliance
  • Strong analytical / problem solving skills
  • Broad knowledge of infrastructure (network and servers), services and security policies
  • Ability to act independently and exercise good judgment as well as the ability to work cross functionally and create virtual teams is essential
  • Ability to prioritize and manage multiple tasks
  • 20% travel is required for this role
  • Demonstrated understanding of internal security controls
  • Demonstrated initiative and commitment for results and the ability to set priorities and manage multiple and concurrent projects
  • Expert knowledge of information security topics, system architecture and Internet technology
68

Info Security Analyst Resume Examples & Samples

  • Ability to establish priorities and delegate tasks to the appropriate personnel or work independently as necessary
  • Assist Application and System Support representatives in the development and accreditation of Security Plans to ensure policy and best practice compliance of controls in place
  • Business Continuance - Reviews and evaluates IT system development documents to ensure that system safeguards, as a whole, result in an acceptable level of risk. Evaluates configuration controls, reviews security test plans and procedures, ensures that documented security requirements are tested and comply with formal design specifications. Identifies areas where specific IT security countermeasures are required and independently contributes to design and development of those countermeasures. Identifies security requirements to be included in statements of work and other procurement documents (e.g., procurement requests, purchase orders, task orders, and proposal evaluation summaries) as required by CHI IT and Financial policies. Identifies alternative functional IT security strategies to address specific system security issues or situations
  • Business Partnership - Interfaces with business partners to help identify issues and resolve problems. Analyzes business requests for feasibility review, including initial cost/benefit analysis; prioritizes requests and conducts capacity planning
  • Develop and deliver Security Awareness Training Programs to all affiliated entities
  • Develop and implement intrusion detection processes and procedures for both host and network based solutions
  • Develop and implement security policy enforcement technologies
  • Develop and maintain security incident handling processes
  • Develop and maintain service levels with the various user departments and Heath System business units, and creates reports on the attainment of those levels
  • Develop automated routines for account administration and security measure deployment efficiencies
  • Disaster Recovery - Follow defined standard designs, and develop backup/restore, server and network technologies and protocols with in accepted standards. Collaborates with IS colleagues to share information and set new DR infrastructure & processing standards. Communicates and trains security and disaster recovery procedures to the IT staff Develops recovery procedure models. Tests contingency capabilities; responsible for recovery exercise preparation
  • Fulfill departmental requirements in terms of providing work coverage and administrative notification during periods of personal illness, vacation, or education
  • Highly motivated to apply process improvement (CMMI) to increase product and service quality to achieve business objectives
  • In the course of professional activities, conducts themselves in accordance with the highest standards of moral, ethical and legal behavior
  • Perform high risk and sensitive security strength testing and analysis
  • Problem Resolution - Resolves most common and many moderately complex to complex problems/issues/ opportunities. Responds to unfamiliar, undefined, unexpected or unstable situations with the professionally-prescribed standard response
  • Project Management - Works with project manager to define tasks and create team work plans with moderate supervision. Delegates work to others and monitors progress. Identifies issues affecting work progress and recommends solutions. Communicates schedule variances and potential scope changes in status reports. Controls project costs, communicating any project-related expenses and recommends ways to control costs
  • Project Management Skills - Works with project manager to define tasks and create team work plans with moderate supervision. Delegates work to others and monitors progress. Identifies issues affecting work progress and recommends solutions. Communicates schedule variances and potential scope changes in status reports. Controls project costs, communicating any project-related expenses and recommends ways to control costs
  • Provide on-call support at designated times in accordance with the policies and procedures of the Health System
  • Provide service to ISD client community, patients, families and visitors, while protecting the integrity and confidentiality of all data and information through physical and electronic measures
  • Provide support as required by ISD's Disaster Recovery Plan
  • Resolve security issues in complex multi-disciplined environments
  • Review and revise security policies as identified through technology and risk analysis reviews
  • Security Technology Design, Development - Develop security requirements for hardware, software, and services acquisitions specific to the IT security program (e.g., purchase of virus-scanning software or security reviews) and for inclusion in general IT acquisition guidance. Install and operate the IT systems in a test configuration in a manner that does not alter the program code or compromise security safeguards
  • 4 year academic degree includes courses in computer programming, systems analysis, system development, or systems engineering OR has acquired Core IT skills and knowledge via practical experience
  • Demonstrate thorough understanding of the fundamental tools and concepts of one of the information technology professional disciplines (i.e.; Applications, Business Analysis, Customer Service, Data, Networking, Operations, Security, Systems Engineering, etc.) and applies that understanding to make independent practical contributions to IT work within a particular UPMC department or function
  • Meet IT Career Level Criteria for Individual/Team Contributors outlined in the Universal Criteria Leveling Guide. Maintain current knowledge of security techniques and technologies and applies that knowledge to develop security programs that mitigates the security risk of the UPMCHS