Information Protection Resume Samples

4.8 (79 votes) for Information Protection Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the information protection job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
RL
R Legros
Rick
Legros
732 Ted Corner
Phoenix
AZ
+1 (555) 130 6763
732 Ted Corner
Phoenix
AZ
Phone
p +1 (555) 130 6763
Experience Experience
Los Angeles, CA
Information Protection Manager
Los Angeles, CA
Vandervort-Heidenreich
Los Angeles, CA
Information Protection Manager
  • Monitoring and fine tunning IPS policies
  • Maintain a positive attitude and professionalism while dealing with difficult customers
  • Responsible for engineering and operating Secure Mail solutions
  • Audit and Audit Response: Support audit inquiries related to team functions. Provide input, formulate responses and help maintain centralized records associated with inquiries. Ensure team documents and standards remain current by auditing team documentation. Help with ongoing tracking of team-owned risks and ensure action items are completed according to plan
  • Project Management: Facilitate the tracking of team projects and programs through collaborative work with the Program and Project Management teams within the greater CELERITY Information Protection department
  • Internal Customer Care: Support concierge and incident response services to address unique or problematic situations within the team or for specialty and high visibility interactions with other teams. Help ensure that senior leadership requests to the team are delivered in a timely, quality and professional manner
  • Proactively identifies potential security impacts to existing/planned applications and supporting platforms (middleware, database, network assets) and implements remediation
Detroit, MI
Information Protection Senior Spec
Detroit, MI
Johnson-Donnelly
Detroit, MI
Information Protection Senior Spec
  • Provides guidance/training and education to security operations teams for associated products
  • Works with external vendors and their technology support team for any product defect resolutions or enchantments
  • Stays current with security trends and industry security technologies
  • Undertakes complex projects requiring additional specialized security technical knowledge
  • Provides assistance to system users relative to information systems security matters
  • Support preparing, maintaining, and following procedures for logging, reporting, and monitoring security tools
  • Engage all parties involved in audit activities to ensure accurate controls are in place, schedules are agreed to, requests and responses are complete and timely, and reports are correct and comprehensive
present
San Francisco, CA
Associate Director, Information Protection
San Francisco, CA
Roob-Kuphal
present
San Francisco, CA
Associate Director, Information Protection
present
  • Establishes operating procedures that affect organizational units
  • Develops and advocates new programs and directs their implementation upon approval
  • Interfaces with management in order to address information protection, Highly Sensitive Project Support (HSPS), and related areas of concern
  • Manages employees or partnered services who are engaged in information protection
  • Supervises the development, implementation, evaluation and testing of global cyber and information protection initiatives and projects; ensures consistency and compatibility across multiple projects, systems, and divisions to support global objectives
  • Interprets, recommends and executes modifications to organizational procedures
  • Manages or supports HSPS projects, notably in North America
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of California, Los Angeles
Bachelor’s Degree in Computer Science
Skills Skills
  • Ability to handle basic troubleshooting and work within CELERITY's change management/ticketing process
  • Strong interpersonal skills, with an emphasis on the ability to effectively influence others
  • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
  • Ability to manage multiple tasks under a full workload and tight deadlines. Good written and oral communication skills
  • Strong organizational skills and the ability to effectively manage multiple projects and/or responsibilities
  • Strong documentation skills including the ability to draft and/or review walkthrough and testing documentation
  • Ability to configure/use HSMs and Key Management tools (e.g., Luna/Safenet, RSA, etc.)
  • Working knowledge of HIPAA, PCI and common security frameworks and standards (ex: OWASP)
  • Ability to understand mid-level application/infrastructure diagrams and associated business process flows and descriptions
  • 1 to 3 years of experience in Client's hiring and staff management processes or comparable
Create a Resume in Minutes

15 Information Protection resume templates

1

Information Protection Coordinator for Operational Risk Resume Examples & Samples

  • Will take bank, Hedge Fund, Hedge Fund Administration experience working in Operational Risk
  • 7-12 years of experience is ideal
  • Ideally 8-14 years' experience working in financial services in an operational risk or audit role. Consulting, information security, operations, or fund administration background also favorable
  • Experience implementing operational risk or information risk management frameworks within an operational department or across a business
  • Proven ability to lead and motivate teams to embrace high standards of performance
  • Deep sense of personal integrity
  • Executive presence with the ability to develop a rapport with colleagues and clients
  • Outstanding written and oral communication skills
  • Adaptable to complexity, change, and ambiguity
  • Knowledge of the risk management discipline, internal control principles, process control/improvement, risk, DR/BCP, security and regulatory compliance
  • Working knowledge of the global capital markets, products, processes, systems, regulations, and securities operations
  • Risk Management and Performance: Accountable for risk management and performance across the client relationship, including service, technology, confidentiality, and financial performance and productivity. In performing these functions, the IPC will work closely with corporate security, information risk management, compliance, risk, and HR functions
  • Risk Management & Operational Control: the IPC will develop a holistic approach to risk management within the client service team, reporting and tracking all risk incidents, identifying trends, and proposing resolutions. The IPC will develop operational risk metrics and drivers, which will be captured on a risk dashboard. The IPC will oversee a access entitlements and monitoring, and will also be responsible for business continuity and disaster recovery plans, including requirements to extend training on systems globally to other locations for resiliency purposes. The IPC will also maintain a security risk register that identifies additional strategic security risks and potential mitigation approaches
  • Client Confidentiality: Responsible for promoting the client's security culture among service teams and ensuring rabid compliance with all client confidentiality requirements. The IPC will play a leadership role in developing a culture within that takes great pride in meeting -- and then elevating -- the highest standards of confidentiality and security. The IPC will fulfill the role of the single point of contact for the client's On-site Security Representative (OSR). The IPC is accountable for working with Human Resources to ensure that all personnel background checks, NDAs, personal trading policies, and non-competes are completed and on file, and will be the first escalation point for waivers and adjudication. The IPC will also be responsible for the enforcement of confidentiality policies, e.g., secure environment, clean desk, at all US locations and the India team (via a designated IPC deputy in Bangalore)
  • Technology Security: Works closely wit Technology and Technology Risk to ensure the dedicated technology environment is built and maintained according to contractual specifications, and that other technology used by the client, client service team members, and counter-parties comply with technology security guidelines. The IPC will oversee ongoing monitoring of all security guidelines, working closely with management, technology, and human resources to ensure enforcement. Participates in ongoing client / firm strategic technology security reviews, identifying future security risks and developing industry-leading solutions to mitigate and control those risks
  • Relationship Governance: Coordinates participation, agenda, and action items with the OSR and the Client's Back-Office Security Czar, including the Executive Committee, the Operating Committee, the Security & Risk Committee, etc. Coordinates liaison with IT Security, C&IS Risk, and Information Technology teams. The IPC will be primarily responsible for developing and maintaining the security and control guidelines, working closely with the OSR and the Security & Risk Committee. The IPC will establish ongoing monitoring and reporting of all security guidelines, providing regular reports to executive management, the OSR, and the Operating Committee
  • Investor Due Diligence: Supports all security-related aspects of investor due diligence, including on-site visits, questionnaires, etc., coordinating with the shared services teams, the RFP team, and others as required
2

Information Protection Centre Resume Examples & Samples

  • Perform active security event monitoring of the BMOFG Enterprise utilizing a variety of
  • Possesses a university degree/college diploma in Computer Science, IT related disciplines or equivalent work experience, and/or 5+ years of IT experience with at least 3 years of hands-
  • Completion of security certifications (CISSP, GCIA, GCIH, GREM, CEH, CIH, CISA, CISM, etc.) is preferred
  • Demonstrates solid experience with technology and processes related to Anti-Virus, Intrusion Detection/Prevention, Proxy, Firewall, SIEM, and/or Vulnerability Assessments, and Incident Response
  • Displays a solid knowledge/understanding of TCP/IP networks, security and traffic analysis
  • Displays a solid knowledge/understanding of networking principles such as routing, protocols, network applications, etc
  • Displays a solid knowledge/understanding of desktop, server and mobile operating systems and security features/configurations
  • Demonstrates solid knowledge/understanding of the Incident Response life cycle, the Cyber
  • Possesses solid communication skills, both verbal and written
  • Possesses solid analytical skills, including statistical analysis and trending techniques
  • Possesses solid facilitation, conflict and issues resolution and escalation skills
  • Possesses solid knowledge of risk assessment and quantification methodologies
  • Demonstrates potential for leadership and commitment to continuous learning in a dynamic environment
3

Senior Manager, Information Protection Resume Examples & Samples

  • Serve as the resident expert on information protection for the WDP&R business segment
  • Collaborate with senior business leaders to identify, classify, and protect their most critical information assets
  • Optimize the use of information asset handling technologies, such as file sharing, digital rights management, and data loss prevention
  • Maintain liaison with segment IT staff and corporate Information Security to collaborate enforcement of TWDC’s Information Security Policy and Standards
  • Deliver Information Protection training and awareness seminars to personnel involved in critical projects and portfolios
  • Perform risk assessments that are standardized and measurable, while issuing tangible recommendations
  • Ten plus years of experience in security risk identification, mitigation and remediation, policy implementation and organization change enforcement in a rapid growth corporate/non-corporate environment
  • Familiarity with content protection, digital rights management, and data loss prevention preferred
  • Certified Information Systems Security Professional (C.I.S.S.P.) preferred
  • Certified Information Security Manager (ClSM) preferred
  • Certified Protection Professional (C.P.P.) preferred
  • 3-5 years of business experience with corporate security
  • Experience in a corporate environment
  • Bachelor’s degree or international equivalent in related field
4

Information Protection Manager Resume Examples & Samples

  • Strong programming skills in one of the following languages: Python, Perl, PowerShell or Ruby Ability to demonstrate usage of Automation Workflow tools such as Ansible, CA Process Automation, vRealize Orchestrator and/or IBM uDeploy
  • Knowledge of Continuous Delivery methodology for application delivery Subject Matter Expert in Public Key Infrastructure (PKI) and related technologies such as Venafi Trust Protection Platform
  • Ability to configure/use HSMs and Key Management tools (e.g., Luna/Safenet, RSA, etc.)
  • Experience with certificate creation on Windows and Linux systems using various tools (e.g., keytool, openssl, certutil and MMC snap-in) and for various type certs (client and server auth, code signing, etc.)
  • Understanding of Microsoft certificate auto-enrollment process
  • Experience Background and interest in Information Protection
  • Preference for experience with Javascript, HTML, CSS and other client/server side web languages with a background in Agile/Scrum
  • Experience implementing and working with security solutions in a large, global enterprise environment
5

Information Protection Specialist Resume Examples & Samples

  • Prior related IT security experience
  • Knowledge of Exchange Management Tools, PowerShell or equivalent language
  • Knowledge of Microsoft Active Directory, role based access control and/or security role matrices, different authentication methodologies, and the rule of least privilege
  • Knowledge of security requirements influenced by HIPAA, SOX and PCI regulations
  • 2-5 years of basic IT experience required in order to have an understanding to overall IT environment and language
  • Bachelor's degree in Management Information Systems or related discipline and/or business related experience
6

Identity & Access Manager & Information Protection Leader Resume Examples & Samples

  • 10+ years of information security experience
  • 4+ years of experience in a lead role for large-scale complex identity management implementations
  • 2+ years of experience leading Information/Data Protection Programs
7

Senior Information Protection Specialist Resume Examples & Samples

  • An associate's degree or related IT work experience
  • Must be a U.S. citizen with ability to obtain necessary security clearance as required by government contract
  • 6+ months experience with network security protocols
  • Strong analytic and report writing skills
  • Excellent presentation skills to a varied audience
  • Proficiency with at least one scripting language
  • Experience coordinating and leading advanced incident response efforts
  • Able to quickly and accurately assess emerging threats
  • Familiarity with multiple security products; IDS, IPS, Firewalls, Anti-virus systems
  • Strong understanding of network protocols
  • Customer Focused; Strong attention to detail
  • Ability to document analysis and investigations in a clear and concise manner
  • Excellent balance as Individual Contributor and Team Player
  • Self starter who demonstrates initiative and is willing to assume responsibility
  • Adaptive, flexible, and resourceful individual that is results orientated
  • Able to develop procedures for operational tasks
  • Certifications such as Security+, GCIA, GCFA, GCIH, CISSP are a PLUS
  • 1 - 3
  • An associate's degree or related IT work experience - Experience in Unix. - Must be a U.S. citizen with ability to obtain necessary security clearance as required by government contract.Want to create a job search agent? Send this job to a friend
8

Associate Director, Information Protection Resume Examples & Samples

  • Bachelor's Degree/Masters preferred
  • 5+ years of risk management or information security/protection experience in a corporate setting
  • 5+ years of experience in the pharmaceutical or biotechnology preferred
  • Industry proven experience in project management is a plus
  • Proven leadership experience
  • Ability to interact transversally and to influence various functions and people, at all levels of the organization and across cultures
  • Demonstrated consulting skills; ability to challenge; good analytical and synthesis capabilities; defining practical recommendations; action planning and implementation
  • Knowledge of security practices on a corporate enterprise level
  • Team player and self-motivated
9

Information Protection Manager Resume Examples & Samples

  • IT Technical Assessments: Managing a team responsible for third party risk and security assessments. Knowledge and understanding to manage/mentor teams around Technical support for SSAE 16, AT201, SOX, HIPAA, NIST, and more
  • Managing or performing vendor/supplier IT risk assessments as a consultant or internal to an organization
  • Managing or performing oversight in the identification, assessment and/or the implementation of IT risks and controls
  • Strategic experience to help Increase value and reduce costs of security/data protection and compliance-related activities
  • Identifying opportunities for the company and affiliates to effectively reduce IT-related risks and improve business performance
  • Working with company-wide teams—Privacy, Internal Audit, Enterprise Risk Management, IT, Operations, and more—to help identify, assess, mitigate and proactively consider emerging risks and regulations
  • Working in a team environment where strong communication and organizational skills are required
  • Managing or oversight for IT General Controls for internal/external applications, databases, networks based on best practice security standard frameworks—NIST, COBIT, ISO
  • Interacting with diverse stakeholders including external service providers, IT project managers, systems administrators, and business executives
  • Establishes proven success in a role that emphasizes a broad knowledge of technical and operational aspects of the following areas: IT Assurance, IT Risk Management, Information Security, Data Protection, Privacy, Project Management, and/or IT-related Compliance
  • Strong communication skills required during interaction with stakeholders (internal/external) and with the internal team
  • Strong documentation skills including the ability to draft and/or review walkthrough and testing documentation
  • Proven ability to build relationships and to influence individuals at all levels in the organization, as well as with external vendors and service providers
  • Strong resource management and financial/budget management experience
  • Strong organizational skills and the ability to effectively manage multiple projects and/or responsibilities
  • Proven strategic leadership and strong interpersonal skills with all levels of personnel and demonstrate the ability to motivate employees/teams to apply skills and techniques to solve dynamic problems
10

Information Protection Manager Resume Examples & Samples

  • 10-15 years of IT security, risk, governance experience required in order to have an understanding to overall IT environment and language
  • 5-7 years of experience in IT Risk Management and/or IT Audit/Assurance including experience in Information Security, Privacy, Compliance, including, but not limited to, PCI, SSAE 16, SOX, HIPAA, and FISMA
  • Bachelor's degree in Management Information Systems and/or business or IT-related field
  • Certification(s) Preferred: CISM, CISA, CISSP, or other related certifications completed or pursuing
  • Experience with Microsoft Office Suite and proficiency in MS Word and Excel required
  • Strong organizational and time management skills, including the ability to prioritize responsibilities
  • Strong business/systems analysis and project management skills required due to the required interaction and need to further investigate IT control environment of third parties
11

Director, Information Protection Resume Examples & Samples

  • Assess internal threats to TWDC’s most important information assets
  • Coordinate a cross-organizational team toward executing the program governance framework and process workflow
  • Identify, collate, and measure indicators of IP and/or IT systems misappropriation
  • Perform gap analysis of existing logical, physical, and administrative controls to meet program objectives
  • Identify necessary technology, financial, personnel, process, and policy investments needed to build a mature program
  • Develop reporting metrics to keep the corporate management committee informed
  • Improve organizational security awareness training focused on internal threat mitigation
  • Expand training competencies for current staff
  • Organizational and Business Knowledge: Understands organizational dynamics and leverages key decision makers within TWDC corporate function and Business Segment. Understands the media and entertainment industry in general
  • Technical and Functional Knowledge: Maintains expert knowledge of security risks related to media and entertainment business. Maintains perspective on security risk management, and security risk assessments within a media and entertainment organization
  • Demonstrated track record of partnering and developing consensus within an organizational climate of diverse operational activities
  • Demonstrated track record in dealing with the effective communications of complex organizational and human resource issues at all levels of the organization
  • Excellent conceptual and critical thinking skills and sound judgment, with strategic orientation and ability to perform tactically, as required
  • Must be adaptable and flexible with an ability to work effectively in a highly matrixed environment
  • Significant counter-intelligence experience preferred
12

Information Protection Specialist Resume Examples & Samples

  • Bachelor’s degree and 2 years of experience in IT development or as a business analyst or an equivalent combination of education and work experience
  • Knowledge in information systems and ability to apply that knowledge in practice
  • Ability to manage competing priorities
  • Ability to solve problems in straightforward situations by analyzing possible solutions using experience, judgment and precedents
  • Experience participating in IT projects
  • Ability to communicate complex information in straightforward situations
  • Prior experience in corporate security management including vendor management, risk management, audit and/or compliance management preferred
  • Strong technical and analytical skills preferred
  • Proficiency in MS Office products including Excel, PowerPoint and Word
  • Possess the ability to communicate clearly via verbal and written communications to staff, stakeholders and senior management
  • Highly motivated to foster an environment that promotes collaboration to create excellent results
  • Demonstrated ability to interact with all levels within the organization and have frequent contact with other teams within the company
  • Strong analytical, organizational and interpersonal skills
  • The ability to plan, organize, and prioritize multiple and simultaneous projects and assignments
  • Ability to clearly communicate to an audience that may include less technically oriented listeners
13

Information Protection Senior Specialist Resume Examples & Samples

  • Help configure and operate several instances of RSA Identity Management and Governance (previously known as Aveksa)
  • Implement, configure and support CyberArk Privileged Account Management Solution including
  • Experience with an Identity management products such as RSA, Oracle, Courion, or IBM
  • Familiarity with RBAC (Role-Based Access)
  • Experience with installation and configuration of the CyberArk Privileged Security product in large enterprise
  • Experience with the Web Interface (e.g. PVWA Web service where to configure specific items)
  • Experience with PSM server component at an advanced level
  • Knowledge of Guardium agents, operations and troubleshooting
  • WebSeal operations and troubleshooting
  • A minimum of 5-7 years of experience in the Information Technology field
  • A minimum of 3 years of experience supporting web-based applications
  • Technical proficiency in desktop computing
  • Intermediate skill writing SQL – Oracle experience a plus
  • Knowledge in querying LDAP directories, such as Active Directory
  • Ability to write production support scripts in Linux Shell, Perl, or Javascript
  • Experience navigating Linux, UNIX, AIX, Solaris and Windows systems and comfortable with Linux commands
  • Ability to analyze datasets using Excel, MS Access, or SQL
  • Experience with writing Javascript and HTML
14

Information Protection Policy Analyst Resume Examples & Samples

  • Develops, maintains, and distributes information protection policies, standards, and procedures
  • Identifies legal and regulatory patient privacy and security compliance risks
  • Remains current on industry and regulatory requirements and addresses the requirements in the company’s information protection policies, standards, and procedures
  • Participates in third-party privacy and security audit readiness activities
  • Analyzes and presents gap analysis findings to IPD leadership and recommends corrective actions necessary to mitigate identified risks
  • Builds and develops strategic working relationships across all lines of business as necessary to identify, evaluate, and reduce privacy and security risk
  • Collaborates with other functional areas within the department in the development of policies and procedures and other resources (e.g., toolkits, educational documents) to address the required compliance standards and to promote awareness
  • Assists the field community in responding to privacy and security related investigations and audits initiated by HHS and its contractors
  • Builds and maintains strong, effective working relationships with business owners, IT&S leadership, and other stakeholders involved with information security and privacy initiatives. Serves as a liaison between these groups and information security and privacy leadership
  • 1-3 years of relevant work experience
  • Experience in information security, privacy, risk management, IT audit and controls, and information technology in a healthcare environment
  • Proven experience with healthcare industry and federal security and privacy regulations (e.g., HITECH/HIPAA, PCI, SOX)
  • A proven track record in creating and maintaining strong business relationships
  • Drives execution by taking ownership and demonstrating initiative
  • Exhibits analytical skills on a daily basis
  • Excellent written and verbal communication skills; interpersonal and collaborative skills; the ability to communicate privacy, security, and risk-related concepts to technical and nontechnical audiences; persuasive, encouraging, motivating, and inspiring; the ability to listen and understand
  • Experience in developing and assessing technical and process-based controls, managing risk assessments/investigations, and working with organization management to integrate controls into the scope of existing business practices
  • Exposure to strategy, management, and/or operations in a number of healthcare and/or business functional areas
  • Independent, yet collaborative; respected by peers and others
  • High degree of initiative, dependability, and the ability to work with minimal supervision
  • A sense of responsibility and accountability – someone who takes ownership and initiative
  • Creative thinker, always looking for a “better way” to deliver value; not stopped or discouraged by adversity
  • Mission Motivated – intent on making a positive difference in HCA’s primary mission – care of human life – through our work
  • Respect for diversity of experience, characteristics, viewpoints, and opinions
  • Adaptable and flexible, with the ability to handle ambiguity and sometimes changing priorities
  • Ability to define, learn, understand, and apply new technologies, methods, and processes
15

Manager, Information Protection Group Resume Examples & Samples

  • Support the development and implementation of KPMG's global information management and data protection strategy, and policies to comply with applicable laws and regulations and meet client expectations
  • Collaborate and provide guidance on information protection matters to global business groups and KPMG member firms
  • Partner with internal business groups to maintain internal and external information protection requirements
  • Provide advice and recommendations regarding privacy and information protection controls to IT projects throughout the lifecycle
  • Collaborate and provide guidance on privacy or data governance matters to global business groups and KPMG member firms
  • Manage activities to increase awareness of information risk and privacy issues across the network of KPMG firms
  • Minimum five years of experience supporting privacy and information management programs, with at least two years of experience within a professional services or corporate environment
  • Bachelor's degree from an accredited college or university
  • Professional privacy or security qualifications such as CIPP and/or CISSP preferred; or be willing to obtain CIPP if not already certified
  • Demonstrated knowledge of information management and data protection strategy with an understanding of how they relate to a global member firm environment
  • Experience working in a multi-cultural and multi-vendor environment in a multi-discipline team in multiple country locations with sound knowledge in building effective working relationships
16

Information Protection Manager Resume Examples & Samples

  • Health Insurance or Health Care Industry experience
  • 5 to 8 years active and proven active Information Protection Security with leadership experience in various capacities covering the activities outlined above for Information Protection Manager / Level 3 roles
  • Audit experience 5+ years
  • Experience in multiple industries (e.g. Telecom, Financial, Insurance, Healthcare, etc.)
  • Understanding and working experience with industry best practices related to Information Protection Risk Assessments in outsourced business processes
  • Experience with HIPAA, GLBA, Sarbanes-Oxley (SOX), ISO Security Standards, UK Data Protection Act, EU Directive on the Protection of Personal Data
  • BS degree or proven equivalent industry experience
  • Ability to work effectively with other teams and maintain positive relationships
  • Travel required, approximately 25%
17

Information Protection Senior Specialist Resume Examples & Samples

  • Ability to grasp and understand complicated relationships
  • Proven Communication skills, with the ability to write and verbally communicate effectively
  • Experience assessing risk
  • Experience with contracting and negotiations
  • 3 to 5 years active and proven Information Protection Security experience in various capacities covering the activities outlined above for Level 1 and 2 roles
  • Working knowledge of various operating systems, network, databases, identity management, web security practices
18

Information Protection Manager Resume Examples & Samples

  • Works with application delivery team to ensure security best practices are incorporated into both model of delivery (process/tools) and developed assets
  • Proactively identifies potential security impacts to existing/planned applications and supporting platforms (middleware, database, network assets) and implements remediation
  • Works with extended security/application stakeholders to influence, coordinate and support the following activities
  • Familiar with application development processes, tools and conventions. Prior experience in software development preferred
  • Can work with complex, modern distributed application and system architectures
  • Ability to understand mid-level application/infrastructure diagrams and associated business process flows and descriptions
  • Working knowledge of HIPAA, PCI and common security frameworks and standards (ex: OWASP)
  • Understands hosting and development facility security concerns and requirements, and is able to review those from paper based questionnaires and surveys
  • High level understanding of basic network and network security fundamentals
  • Proficient in security analysis and common industry controls and mitigation tactics
  • Health Insurance or Health Care Industry experience desired
  • 3 to 5 years active and proven Information Protection Security experience in various capacities covering software development
  • 5 to 8 years active/proven Information Protection Security with leadership experience in various capacities
  • Hand-on experience with multiple technologies including operating systems, network, databases, identity management tools, web security practices, etc
  • 5+ years of Information security audit experience
  • Working experience with industry best practices related to Information Protection Risk Assessments for outsourced business processes
  • Experience with various compliance standards (ex: HIPAA, GLBA, Sarbanes-Oxley (SOX), ISO Security Standards)
  • Experience with Black/White-hat vulnerability assessments on modern web/mobile applications
  • Experience with modern software development practices (Continuous development, Container/configuration-driven infrastructure, etc.) and languages (Javascript, Node.js, Java, Scala, etc.)
  • BS degree or equivalent experience
  • CISSP, CISA, CISM, CRISC or similar certifications
19

Information Protection Analyst Resume Examples & Samples

  • Gather business and technical requirements as well as assisting with business and technical design/architecture
  • Analyzes Information Protection management processes and workflows
  • Assist in managing stakeholder expectations of Information Protection initiatives, develops communication plans, produce status reports and other similar artifacts
  • Translate business rules into Information Protection policies to manage risk
  • Provide consulting for Information Protection improvement in relevant business processes
  • Document and execute Information Protection relevant processes and procedures
  • Participate in the selection to improve, replace and/or introduce new Information Protection solutions for our portfolio
  • Contribute to and deploy our Information Protection strategy
20

Information Protection Manager Resume Examples & Samples

  • Experience Configuring, Implementing, and Operationalizing Intrusion Prevention Systems, Packet Capture Systems, and Intrusion Detection Systems
  • Hands-on experience with maintaining VMware infrastructure
  • Configuration and monitoring of network packet brokers, bypasses and aggregators such as Gigamon, SourceFire, FirEye, IceBrg, as examples
  • Thorough understanding of complex TCP/IP networks
21

Information Protection Senior Spec Resume Examples & Samples

  • Experience Configuring, Implementing, and Operationalizing email security products such as IronPort and Proofpoint
  • Experience utilizing SIEM (Security Information and Event Management) platforms for enterprise wide monitoring
  • System monitoring tools for availability and performance optimization
  • Metrics reporting
22

Information Protection Senior Specialist Resume Examples & Samples

  • Bachelor degree in computer science or a related discipline strongly preferred, and at least 2 years of experience in all aspects of computer operations or an equivalent combination of education and work experience
  • Has in-depth knowledge of all Archer core solutions and its workflow
  • Preferred: 3-5 years work experience in RSA Archer configuration and administration
  • Preferred: Has contributed to an Archer Upgrade from v5.5 to v6
  • Nice to have: knowledge of IIS settings, Linux, Oracle, SQL Server, Javascript for Custom Objects, Archer API with *Client, .NET and Python, and general coding skills
23

Information Protection Senior Specialist Resume Examples & Samples

  • Strong background in Cyber Security
  • Experience with DevOps and code scanning
  • Ability to work independently and as part of a team
  • Ability to anticipate, recognize, and resolve technical (hardware, software, application or operational) problems
24

Information Protection Manager Resume Examples & Samples

  • An ability to identify and assesses the severity and potential impact of risks and communicate risk assessment findings to risk owners outside Information Security in a way that consistently drives objective, fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance
  • An understanding of the impact of emerging business and end-user technologies have on information security requirements and architecture
  • An understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business
  • Strong decision-making capabilities, with a proven ability to weigh the relative costs and benefits of potential actions and identify the most appropriate one
  • Demonstrated technical expertise in existing security and IT systems and an ability to keep pace with changing security and IT technologies
  • Strong interpersonal skills, with an emphasis on the ability to effectively influence others
  • A team-focused mentality with the proven ability to work effectively with diverse stakeholders
  • An ability to communicate complex and technical issues to diverse audiences, orally and in writing, in an easily-understood, authoritative, and actionable manner
  • Familiarity with application development processes, tools and conventions. Prior experience in software development preferred
  • Working knowledge of HIPAA and common security frameworks and standards
  • Excellent prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part
  • An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization
  • An ability to apply original and innovative thinking to produce new ideas and create innovative security solutions
  • Practical experience with database security, content filtering, vulnerability scanning, and anti-malware
25

Information Protection Senior Spec Resume Examples & Samples

  • Good communication skills, analytical ability, strong judgment and leadership skills, and the ability to work effectively with clients and IT management and staff
  • Ability to participate in customer and partner facing meetings and projects, including those that involve technical topics or technical service delivery
  • Strong understanding of networking protocols and infrastructure designs; including routing, firewall functionality, host and network intrusion detection systems, encryption, load balancing, and other network protocols
  • Experience with log analysis, traffic flow analysis and experience with associated infrastructure and systems to aid in the identification of malware or other malicious behavior
  • Knowledge of Linux and Microsoft Windows Server or other operating systems
  • Knowledge of, and experience with, TCP/IP protocol and an understanding of packet analysis tools such as tcpdump
  • A few years of cyber security focused or related IT experience
  • Working knowledge of common cyber security incident types such as denial of service attacks, malicious software infections, active intrusion techniques, and misappropriate use scenarios
  • Experience utilizing a broad array of security tools including Security Information and Event Management (SIEM) system, intrusion detection systems, web proxy systems, routers, switches, firewall deployment and other tools used to assess network security
  • Understanding of techniques used to analyze network traffic for malicious activity and perform packet analysis
  • Ability to effectively prioritize tasks
  • Scripting ability in Python, Perl and a deep understanding of command line tools such as grep and tcpdump preferred
  • Industry recognized certification in cyber security such as GCIA, GCIH, CISSP or similar are a plus
  • Networking certifications (e.g. CCNA - Security, CCNP) and demonstrated practical experience
26

Information Protection Manager Resume Examples & Samples

  • Experience with deployment/administration of IBM Guardium Database Activity Monitoring in medium/large enterprises including
  • How to translate application security requirements into Guardium policies and rules
  • Experience with application of filters for trusted connections
  • Ability to develop and maintain activity monitoring reports
  • Knowledge of Guardium GIM and sTAP agents, how to install and configure
  • Experience with the installation and configuration of sTAP in the following
  • DB: Mainframe DB2 on z/OS
  • DB: Mainframe IMS
  • DB: UDB DB2 on AIX or SOLARIS or LINUX
  • DB: ORACLE on AIX or SOLARIS or LINUX
  • DB: SYBASE on AIX or SOLARIS or LINUX
  • DB: SQL SERVER 2012 on Windows Server 2012 R2
  • Experience developing and performing Guardium log queries
  • Ability to handle basic troubleshooting and work within CELERITY's change management/ticketing process
  • Ability to manage multiple tasks under a full workload and tight deadlines. Good written and oral communication skills
  • Ability to Engage IBM Guardium support (open PMR's) to identify and resolve
  • Familiarity with range of other Guardium products such as: Activity/Privileged Users Monitor, Vulnerability Assessment, and Data-Level Access Control
27

Information Protection Manager Resume Examples & Samples

  • Incident Handling: Support the Incident Manager and Incident Handling teams as they provide rapid response and management of crisis-level cyber security and data loss incidents. Support documentation of events, assignment of action items, maintenance and proper handling of incident records and tracking of lessons-learned and post-mortem items through to closure. Assist with incident handling plan management and participate in periodic table top exercises
  • Staffing: Help manage the team's staffing requirements from initial identification of the need through on-boarding including creation, tracking and management of To-Be-Hired records, job descriptions, and history. Includes assisting with the tracking and management of hiring-related financial impacts. Help ensure compliance with Clarity and time reporting requirements. Maintain and update staff organization charts and records as is required for department-wide reporting. Maintain entitlements which grant access to team resources. Respond to and perform required team role and access audits and reviews
  • Metrics and Reporting: Assist with the design, creation, refinement and delivery of ad-hoc, weekly, monthly, quarterly and annual metrics and reports for the purpose of demonstrating team results and service level delivery. Identify volume trends impacting workload and staffing requirements. Assist with supporting additional metrics and reporting requests from other areas of CELERITY Information Protection as may be needed for department-wide trending and tracking for cyber security operations, data loss prevention, cyber threat hunting, and threat intelligence
  • Third Party Security Management Program Administration: Support a variety of tasks associated with third party security program management (Telecommunication Cybertrust). Support annual third party penetration testing activities as needed. Assist in the engagement of other internal IT and CIP teams as needed to support remediation of identified vulnerabilities or other issues
  • Audit and Audit Response: Support audit inquiries related to team functions. Provide input, formulate responses and help maintain centralized records associated with inquiries. Ensure team documents and standards remain current by auditing team documentation. Help with ongoing tracking of team-owned risks and ensure action items are completed according to plan
  • Collaboration and Collaboration Tools: Help ensure effective and centralized management of team documentation through ongoing creation, design and management of team collaboration tools such as team share and SharePoint. Support development and maintenance of pathways for information sharing with other CELERITY Information Protection teams, within IT and the business. Assist with the maintenance of the team's roadmap documentation. Support the collection of requirements and analysis to ensure the team's roadmap stays synchronized with the department's roadmap and future plans
  • Procurement of Products and Services: Support the procurement of products and services as is needed to meet team needs. Work with Supply Chain Management to assist the facilitation of effective contractual agreements and operational goals with product and service suppliers. Support management of supplier relationships and track delivery metrics where applicable. Work with Finance to manage and meet both team and department financial goals
  • Processes and Procedures: Assist with the management of the team's process and procedure documentation to ensure currency and accuracy. Monitor and manage team work intake processes, workflows and work completion records. Ensure the management and maintenance of team-owned workflows contained within "The Way We Get Work Done” and other similar company-wide resources. Support benchmarking assessments of the team's deliverables
  • Creative Services and Team Visibility: Create, refine and maintain presentations needed to demonstrate and promote team delivery results. Manage team's brand and image through consistent design. Work in collaboration with other CIP teams to create and manage Board materials and other information / presentations needed by senior leaders. Manage and facilitate creation of content for team meetings
  • Project Management: Facilitate the tracking of team projects and programs through collaborative work with the Program and Project Management teams within the greater CELERITY Information Protection department
  • Internal Customer Care: Support concierge and incident response services to address unique or problematic situations within the team or for specialty and high visibility interactions with other teams. Help ensure that senior leadership requests to the team are delivered in a timely, quality and professional manner
  • General
28

Information Protection Senior Specialist Resume Examples & Samples

  • Experience with installing, upgrading, and configuring Tivoli Federated Identity Manager 6.1/6.2
  • Experience with installing, upgrading, and configuring ISAM/Security Access Manager/WebSEAL version 6.x, ISAM 7-9
  • Experience with administering the ISAM/Security Access Manager /WebSEAL tool, create objects, policies, junctions, adding
  • Identity attributes, fine tuning the configuration for best response time
  • Experience with SAML1.1, SAML2.0, OpenID Connect and OAuth v2 specifications
  • Ability to work closely with vendors, open problem tickets, and product enhancements
29

Information Protection Spec Resume Examples & Samples

  • Experience in auditing
  • Working knowledge of various firewalls, networks, and operating systems
  • Web and software coding best practices
  • Work effectively within a team environment
  • BS degree with 2 - 3 years of industry experience or equivalent preferred
  • Security+, GISF or similar preferred
  • Microsoft Office (Word, Excel, Visio) proficiency
30

Information Protection Manager Resume Examples & Samples

  • Manage and support the Application Security Framework operating model and processes COE
  • Support on-boarding of applications of and new development teams
  • Administer and provide support on technical issues with the Fortify and related tools
  • Perform security reviews of applications at development and QA stage of SDLC
  • Assist development teams identifying and remediate security vulnerabilities
  • Summarize and report status to application teems
  • Automate and integrate manual processes using DevOps Enterprise Tools
  • Maintain an extremely strong relationship with application owners and development teams
  • Support CIP Application Security Review Team
  • Research newly identified vulnerabilities/exploits and how they may affect our application portfolio
  • Research new products and tools to help mature the practice
  • Many years of experience in application security and analysis of software security vulnerabilities
  • Source code reviews and auditing skills
  • Expertise in HP Fortify or similar tools
  • Knowledge of Coding and languages skills such as Python, Ruby on Rails, VB, VBA, Go, Java, .NET and more…
  • Understanding of Web Services, Microservice and Functions as a Service architectures
  • Familiarity with a variety of development and testing tools, including
31

Information Protection Senior Spec Resume Examples & Samples

  • Provides guidance/training and education to security operations teams for associated products
  • Works with external vendors and their technology support team for any product defect resolutions or enchantments
  • Solid problem solving and analytical skills; able to quickly digest issues encountered and recommend an appropriate solution
  • Stays current with security trends and industry security technologies
  • Provides leadership for any security product root cause analysis needs
  • Undertakes complex projects requiring additional specialized security technical knowledge
  • Provides assistance to system users relative to information systems security matters
  • Support preparing, maintaining, and following procedures for logging, reporting, and monitoring security tools
  • Monitor security events from multiple sources, analyze the results and escalate, when necessary, to the appropriate group for remediation. The events will originate from, but are not limited to McAfee Web Gateway, DLP, IDS, IPS, antivirus, firewalls and system security logs
32

International Privacy & Information Protection Manager Resume Examples & Samples

  • Serve on the Team as the primary privacy and information protection subject matter expert
  • Represent the voice of the data protection/privacy stakeholders, Managing stakeholder needs and requests
  • Collaborate on development plans with the Team and leadership covering data governance/IM/IT projects, maintenance and operations aspects
  • Identify, evaluate and communicate to the Team project risks and issues related to date protection and privacy, and assist with prioritizing mitigation activities
  • Participate and /or lead meetings as necessary at the request of the Team
  • Liaise with the domestic and international legal, privacy and compliance teams, operational units, and other corporate resources including, legal, I/T, information protection, Internal Audit, supply chain management, etc. to achieve the goals of the Cyber Privacy Council and the Team
  • Work closely with the domestic and international Information Protection teams on development and implementation of policies to address data security issues
  • Maintain current knowledge of applicable data protection laws and regulations, and monitor advancements in best practices
  • Assist with the development/implementation of corrective action plans for mitigation of privacy and data protection risk, and provide general guidance on how to mitigate such risk
  • Facilitate creation and implementation of policies and best practices to ensure that regulatory requirements and data privacy principles are implemented across the business units
  • Advise on, and lead the development of, policies and practices concerning regulatory compliance and privacy issues in coordination with the company’s leadership, Information Protections, legal, product, technology, sales, marketing, compliance and privacy teams; and
  • Report on a regular basis, and as directed or requested, to keep management informed of Team efforts
  • 5+ years’ experience in the privacy and/or compliance field
  • Legal degree and minimum of 3 years of previous insurance experience highly preferred
  • Experience working with information protection resources /IT functions
  • Strong understanding of insurance-related and data protection laws required
  • Self-starter with proven ability to work independently and prioritize effectively in a high paced environment
  • Strong analytical, planning, and problem solving skills
  • Ability to identify problems, spot issues, and propose creative and effective solutions
  • Strong decision making capabilities
  • Excellent ability to communicate; strong written and oral communication skills and ability to provide guidance on complex matters in a clear and concise manner
  • Ability to present sound, persuasive rationale for ideas or opinions
  • Ability to quickly adjust to presenting priorities
  • Ability to work confidently within groups in a multi-cultural environment and respond to global/cultural sensitivities
  • Team player with positive attitude
33

Information Protection Manager Resume Examples & Samples

  • Ability to handle basic troubleshooting and work within Client's change management/ticketing process
  • Ability to Engage IBM Guardium support (open PMR’s) to identify and resolve
  • Familiarity with range of other Guardium products such as: Activity/Privileged Users Monitor, Vulnerability Assessment, and Data-Level Access Control
34

Information Protection Manager Resume Examples & Samples

  • 1 to 3 years of experience in Client's hiring and staff management processes or comparable
  • 1 to 3 years of experience in documenting and tracking identified risks through to closure, including working with other departments as may be required
  • 1 to 3 years of project management experience
  • 3 to 5 years of experience in MS Office tools, databases and database connectivity, use of MS Access, MS Excel, pivot tables, formulas, custom queries and ODBC connections
35

Information Protection Business & Service Senior Specialist Resume Examples & Samples

  • Several years of experience within IT Governance functions (Risk Optimization, Quality, Audits, etc.)
  • Verbal and Written Communications – ability to translate technical items into meaningful business terms
  • Security Acumen
  • Financial Planning and Analysis
  • Customer Orientation
  • IT functional area understanding
  • Ability to deal with ambiguity and a “blank sheet of paper”
  • Collaborative skills
  • Flexibility
  • Business Area and Industry Acumen
  • Managing Vision and Purpose
  • Professional Savvy
  • Critical Thinking
  • Interpersonal savvy
36

Information Protection Resume Examples & Samples

  • Become the expert on corporate and regional Information Security and Privacy (ISP) regulations
  • Work with management and associates in a non-IT role to implement regulations and monitor compliance level
  • Complete risk assessments to apply an appropriate approach to the regulations to mitigate risk
  • Mitigate risks through the development of awareness material and trainings
  • Collect, organize and maintain documentation
  • Perform audits to ensure compliance
  • Review authorizations
  • Bachelor’s Degree is required; IT, Business or Education preferred
  • Although not an IT role, fundamental knowledge of servers and networks is a plus
  • 2+ years of work experience in a business, educational or customer service driven environment
  • Excellent organizational, verbal, written and presentation skills required
  • Comfortable making presentations in front of small and large groups
  • Excellent computer skills, particularly with MS Office Suite required
  • Ability to travel up to 20%
37

Information Protection Senior Spec Resume Examples & Samples

  • Engage all parties involved in audit activities to ensure accurate controls are in place, schedules are agreed to, requests and responses are complete and timely, and reports are correct and comprehensive
  • Take ownership for security control inquiries, engage appropriate subject matter experts to define solutions and project schedules, and track to completion
  • Maintain accurate and timely information in internal tracking systems
  • Assist with managing customer relationships and exceeding customer expectations
  • Clearly communicate regularly with key stakeholders and other related individuals regarding audit results and recommendations
  • Maintain knowledge of information cybersecurity regulations, trends, and best practices
  • Identify opportunities and implement enhancements to continually improve services provided
  • Build and maintain strong working relationships with team members and departments across the organization
  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or a related field preferred
  • Knowledge of IT Security regulations and frameworks (HIPAA, ISO 27002, NIST 800-53, Cobit 5)
  • Understanding of SOC 2 principals and criteria
  • Project Management skills are a plus
  • Experience with existing security and IT systems and an ability to keep pace with changing security and IT technologies
  • Strong prioritization capabilities, with an aptitude for breaking down work into manageable parts, effectively assessing the priority and time required to complete each part
  • Aptitude for applying original and innovative thinking to produce new ideas and create innovative security solutions
  • Excellent written and oral communication skills, strong meeting facilitation skills
  • Excellent analytical, problem-solving, critical thinking and project management skills
  • Have a positive ‘can do’ attitude
38

Information Protection Senior Specialist Resume Examples & Samples

  • Healthcare, Financial, Insurance, and Telecom industries
  • Auditing
  • PCI, HIPAA, SOX, ISO, NIST, SSAE16, HITRUST
  • Various firewalls, networks, and operating systems
  • SIG, CAIQ industry standards a plus
  • Excellent written and verbal communication
  • Work effectively within a team environment (collaboration)
  • Maintain positive working relationships
  • Ability to multitask and grasp complicated issues
  • Looking for a personable candidate (may be communicating with Business, IT, PM's, Managers, Help Desk, VP, Sr. VP)
39

Manager Information Protection Resume Examples & Samples

  • Thorough understanding of technology models and solid theoretical knowledge of technology implementation techniques. Ability to see the big picture and conceptualize and document creative solutions
  • Experience supporting organizations performing enterprise Application Development utilizing complex systems
  • Cloud architecture, control concepts, terminology, and solutions
  • Previous or current hands-on technical experience desired
  • Experience in designing, modeling, developing and supporting enterprise technology infrastructure
  • Strong interpersonal skills at all levels of management and excellent teamwork skills
  • Presentation and vendor negotiation skills are preferred
  • Ability to weigh various technical solutions against the original business needs and recommend the most effective solution
  • Training, guidance and leadership responsibility for Information Protection team leads, SOC Personnel, and engineers as assigned
  • Experience working with security protocols and standards like SSL/TLS, PKI, Certificates, PCI, ISO standards
  • Knowledge and usage of design methodologies, patterns, best practices such as TOGAF, Gartner Methodology, or similar approaches, as they apply to information security architecture
  • Understanding of infrastructure technologies and deployment processes as they relate to middleware and security
  • Experience with common technologies/platforms such as SIEM, IDS/IPS, technologies such as Arcsight, Rapid 7, Encase, FireEye, Forcepoint WCG/DLP
40

Associate Information Protection Analyst Resume Examples & Samples

  • Collaborate with cross-functional teams to develop detailed business requirements, work processes, use cases, user interface designs, and/or preliminary data models needed to document and deploy operational account management processes
  • May assist in preparing value proposition or business case for new or improved solutions
  • 30% Partner with other Product/Business Analysts, primarily within IAMS team, to facilitate increased automation of account management processes to
  • Excellent technical writing skills
  • Ability to communicate effectively with cross-functional teams
  • Ability to operate and communicate effectively while under pressure
  • Strong organizational and problem solving skills are essential
  • Professional demeanor, appearance, and positive attitude
41

Information Protection Senior Spec Resume Examples & Samples

  • Requires prior work experience in a web development position
  • Requires prior work experience in a vulnerability management position
  • Requires a strong working knowledge of security controls of web application environment
  • Requires an understanding of the role of information security within a business model
  • Requires excellent interpersonal skills and the ability to effectively communicate with staff, management, project team members and other various IT departments
  • Background in Information Security-Experience with tools like AppScan Standard/Enterprise/Mobile or similar
  • Bachelor's degree desired but not required-Industry certification(S) such as CEH, OSWE, GWAPT, C-WAST or similar
  • Requires experience in IT and Information security with a broad range of exposure of operating systems, applications and networks. Demonstrate the ability in developing effective security solutions to diverse and complex business problems
  • Requires the ability to work in a fast paced environment and maintain focus on multiple work efforts at the same time
42

Privacy & Information Protection Team Lead Resume Examples & Samples

  • Must have significant experience as either privacy counsel or privacy and data protection consultant, ideally in a global or multi-national business and with a working knowledge of the General Data Protection Regulation (GDPR)
  • Ideally you will also have an IAPP or BCS Chartered Institute of IT (formerly ISEB) qualification in data protection
  • Must have significant experience of compliance and risk management methodologies
  • Must have significant practical experience of delivering a number of large cross-functional projects or programmes
  • Must be flexible, pragmatic and an excellent communicator
43

Information Protection Manager Resume Examples & Samples

  • Responsible for engineering and operating Secure Mail solutions
  • Design and build new Cloud based Global Server Load Balancing (GSLP)
  • Responsible for operational policy routing decisions for ingress/egress mail
  • Accountable for operational availability of all email security tools
  • Understand related relevant email technologies: LDAP, Domain-based Message Authentication (DMARC), DomainKeys Identified Mail (DKIM), SPF, SMTP, HTTP
  • Extensive experience working with Internet Messaging Headers, Policy Based Routing, and Anti-Spam countermeasures
  • Communicating with multiple areas within IT and some business areas
  • Conflict management, problem solving, customer service skills
  • Ability to ensure activities are in alignment with the business objectives and risk management framework
  • Bachelor degree in computer science or a related discipline strongly preferred, and at several years of experience in all aspects of cyber security and computer operations or an equivalent combination of education and work experience
44

Information Protection Manager Resume Examples & Samples

  • Bachelor degree in computer science or a related discipline strongly preferred, and several years of experience in all aspects of cyber security and computer operations or an equivalent combination of education and work experience
  • Previous SIEM operations and engineering experience preferred
  • Application development experience preferred with working experience of Tomcat
  • Working knowledge of Linux, LDAP, TCP/IP networking stack, and regular expressions
45

Information Protection Manager Resume Examples & Samples

  • Extensive experience with Database Activity Monitoring and Protection platforms and solutions
  • Extensive experience with Vulnerability Assessment and Management for enterprise database platforms
  • Bachelor’s degree in Computer Science or a related discipline, several years of solid, diverse work experience in IT, or the equivalent in education and work experience
46

Information Protection Manager Resume Examples & Samples

  • Develop solutions to implement new functionality and resolve application bugs
  • Implement vender software patches
  • Diagnose customer technical problems and provides creative solutions and alternatives that meet business needs
  • Maintain a positive attitude and professionalism while dealing with difficult customers
  • Identify opportunities for process improvement and problem elimination
  • Assist with management of the group’s HPSM work queue
  • Interact with customers directly via phone and/or chat to resolve tickets
  • Responsible for maintaining and updating in-house product documentation as fixes and enhancements are made to the product
  • Several years of experience in the Information Technology field
  • A few years of experience supporting web-based applications
  • Proficiency with MS Office tools (Excel, Word, Outlook, Visio)
  • Experience with Oracle and with reading/writing SQL
  • Experience with writing javascript and HTML
  • Comfortable working in a fast-paced environment and quickly able to change priorities
  • Experience navigating Linux systems and comfortable with Linux commands
  • Experience supporting an Identity & Access Management System – Aveksa/RSA IMG tool is a huge plus
  • Experience with a third party workflow engine
  • Experience with VB scripting
47

Information Protection Manager Resume Examples & Samples

  • Driving evaluations or and on-boarding of new vulnerability assessment products
  • Monitor for / Assess zero day vulnerabilities and manage the effort to determine exposure to Cigna globally
  • Manage the drive to remediate critical vulnerabilities identified in the Cigna environment
  • Schedule and oversee 3rd party testing activities – Red Team, Pen Test
  • Own the VM reporting processes that delivers vulnerability data to the IT SLT
  • Manage the day to day operations of the network VM team
  • Have a ‘can do’ positive attitude and comfortable in high pressure situations
  • Team player with proven ability to manage working relationships within a matrix organization
  • Demonstrate excellent interpersonal skills
  • Several years of experience in documenting and tracking identified risks through to closure, including working with other departments as may be required
  • Several years of project management experience
  • Several years of experience working on or closely with an information protection or cyber security team. Knowledge of core security principals, frameworks and risk models
  • CISSP, CISA, CISM or equivalent is desired
48

Information Protection Manager Resume Examples & Samples

  • Strong programming skills in one of the following languages: Python, Perl, PowerShell or Ruby
  • Ability to demonstrate usage of Automation Workflow tools such as Ansible, CA Process Automation, vRealize Orchestrator and/or IBM uDeploy
  • Knowledge of Continuous Delivery methodology for application delivery
  • Subject Matter Expert in Public Key Infrastructure (PKI) and related technologies such as Venafi Trust Protection Platform. Ability to configure/use HSMs and Key Management tools (e.g., Luna/Safenet, RSA, etc.). Experience with certificate creation on Windows and Linux systems using various tools (e.g., keytool, openssl, certutil and MMC snap-in) and for various type certs (client and server auth, code signing, etc.). Understanding of Microsoft certificate auto-enrollment process
49

Information Protection Senior Spec Resume Examples & Samples

  • Support project engagements in the enablement of web security infrastructure into an application’s design
  • Experience with Single Sign On, various authentication mechanisms and authorization schemas
  • Experience with administering the ISAM/Security Access Manager /WebSEAL tool, create objects, policies, junctions, adding identity attributes, fine tuning the configuration for best response time
  • Experience resolving federation challenges
  • Working knowledge of protocol analyzer (i.e. WireShark), Fiddler, JavaScript, JAVA, JSON, PERL/CURL, XML, SOAP, WS-Security
50

Information Protection Spec Resume Examples & Samples

  • Experience with installing, upgrading, and configuring ISAM/Security Access Manager/WebSEAL version 6.x, ISAM 7-9, Tivoli Federated Identity Manager 6.1/6.2
  • Experience troubleshooting access issues in Web Application Experience resolving federation challenges
  • Working knowledge of LDAP SUN Directory or IBM Directory Server, WebSphere Application Server, IIS, IBM HTTP Server
  • Working knowledge of Unix/Linux Environments, AIX, Solaris, RedHat
  • Working knowledge of systems management tools and practices for application monitoring