Information Security Administrator Resume Samples

4.8 (132 votes) for Information Security Administrator Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the information security administrator job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
GB
G Bernier
Gerardo
Bernier
654 Bednar Inlet
Chicago
IL
+1 (555) 404 9322
654 Bednar Inlet
Chicago
IL
Phone
p +1 (555) 404 9322
Experience Experience
Los Angeles, CA
Information Security Administrator
Los Angeles, CA
Gerlach, Sipes and Robel
Los Angeles, CA
Information Security Administrator
  • Identifying and managing Security exposures in the business and ensuring either compliance or dispensation
  • Taking action on requests from ITG and the business units for network and systems access
  • Participating in ongoing security reviews and audits and taking action on associated items
  • Monitor and manage ISA database to keep users profile up to date for audit purposes
  • Assists in determining methods of implementing and enforcing Information security policies and standards
  • Confers with other IT and business staff to identify and implement security plans for data, software, applications, hardware, telecommunications, and computer installations
  • Assist in developing and supporting necessary compliance within the PCI DSS regulations set forth by the major credit card companies
present
Houston, TX
Information Security Administrator
Houston, TX
Muller Group
present
Houston, TX
Information Security Administrator
present
  • Developing security measures to safeguard information against accidental and/or unauthorized modification, destruction, or disclosure
  • Ensuring adherence to the 'User Access Management' Policy
  • Carrying out reporting on non-compliance to the Policy
  • Ensuring adherence to the 'Chinese Walls' Policy
  • Reporting for System Access Reviews as per documented policy
  • Advising and educating the business users on security standards and policies
  • Reviewing and striving for improvement of the Security Administration processes
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Georgia Southern University
Bachelor’s Degree in Computer Science
Skills Skills
  • Highly motivated, self-directed and has a strong interest in security
  • Vulnerability management
  • Knowledge of System policies for compliance
  • Ability to stay calm and focused in a stressful environment
  • Able to work unsupervised, self-starter attitude
  • Expert knowledge in Authentication, Authorization and Accounting systems
  • Incident management (e.g. tabletop exercise or participated in a IRT, so on)
  • Provide education, guidance, and assistance to the DS Administration members to grow and develop their ability to handle common problems
  • Demonstrated strong aptitude for troubleshooting technical problems with an emphasis on network
  • Vulnerability/Compliance scanning
Create a Resume in Minutes

8 Information Security Administrator resume templates

1

Information Security Administrator Resume Examples & Samples

  • Support the Equities business by performing timely and accurate Information Security Administration functions for critical Equities applications
  • Entry and maintenance of filter values and limits within the Equities applications
  • Action user set-ups and deletions within agreed Service Levels for local applications
  • Assist business users in the creation of new security user groups and security matrices for various systems
  • Assist business users with the annual review of security matrices for various systems
  • Work with Technology and Project Teams to understand and assist in the smooth implementation of system changes
  • Monitor and manage ISA database to keep users profile up to date for audit purposes
  • Identify opportunities to improve the performance and efficiency of the ISA team
  • High level of accuracy and attention to details
  • Accurate and reliable record keeping skills
  • Knowledge of System policies for compliance
  • Ability to stay calm and focused in a stressful environment
  • Able to work unsupervised, self-starter attitude
2

Information Security Administrator Resume Examples & Samples

  • Oversee and coordinate internal security functions, IT auditors and solution vendors who safeguard the Company's assets and computer systems, sensitive customer data
  • Identify protection goals, objectives and metrics consistent with corporate strategic plan and IT governance requirements
  • Participate in annual IT risk assessment process
  • Lead annual IT security policy review process
  • Manage the development, implementation and maintenance of security policy, standards and procedures to ensure ongoing maintenance of security
  • Day-to-day oversight of Chanel’s Information Security Operations and management of the Company’s security calendar
  • Maintain relationships with external regulators such as credit card associations, IT auditors, Payment Processors and PCI Standards Council
  • Maintain organizations’ knowledge of regulatory requirements and emerging threats
  • Oversee incident response and BCDR planning as well as the investigation of security breaches, and assist with disciplinary and legal matters associated with such breaches as necessary
  • Oversee Change Management, System Development Life-Cycle and other security operations processes including system acquisition/disposal, patch management, testing, sensitive data handling, encryption key management and access control procedures
  • Work with outside vendors as appropriate for items such as scanning, BCDR, incident response and penetration testing
  • Must have 5 years’ experience working in an IT security position
  • Relevant bachelor’s degree and CISSP, CISA, CISM, GCIA, CCM and/or QSA technical certifications preferred
  • Must be an articulate and persuasive individual who can serve as an effective member of the management team, manage cross-functional teams and communicate security-related concepts to a broad range of technical and non-technical staff
  • Must demonstrate meticulous attention to written, technical and procedural detail
  • Excellent time management skills with ability to manage projects and security/business continuity incidents under high-pressure and tight deadlines
  • Must have working knowledge of the PCI-DSS and ISO 27001 Standards
  • Must have experience with business continuity planning, auditing, and risk management, as well as contract and vendor negotiation
  • Must have working knowledge of pertinent law and the law enforcement community
3

Information Security Administrator Resume Examples & Samples

  • B.S. Degree in Computer Science, Management Information Systems, or a related technical/business discipline or equivalent work experience is required
  • 5+ years progressively responsible experience with information security
  • Ability to pass a 7-year background investigation required
  • Preferred certifications: GSEC, CISSP
  • Able to communicate security-related concepts to a broad range of technical and non-technical staff
  • Requires strong analytical skills and experience
  • Able to perform on-call duty after hours as needed
  • Excellent ability to communicate, both verbally and in writing; ability to tolerate long periods of continuous sitting
4

Information Security Administrator Resume Examples & Samples

  • Expert knowledge in Authentication, Authorization and Accounting systems
  • Expert security admin knowledge of three of the six listed platforms; Networking, RACF, First Data Resources, Report Distribution Systems, LDAP, Novell IDM, and Microsoft Active Directory
  • Ability to function as a member of a project team and translate business requirements into executable solutions
  • Provide education, guidance, and assistance to the DS Administration members to grow and develop their ability to handle common problems
  • Demonstrated strong aptitude for troubleshooting technical problems with an emphasis on network
  • Have successfully worked in a customer service capacity
  • Ability to follow and enforce the defined UMB Change Management practices
5

Information Security Administrator Resume Examples & Samples

  • Able to view current processes and procedures as opportunities for enhancement, tuning and improvement
  • Understanding of role-based security administration
  • Microsoft Exchange
  • DBArtisan, Sybase, SQL and Oracle
  • Microsoft Office 2007 and newer versions
6

Information Security Administrator Resume Examples & Samples

  • Leverage expertise with routers and routing protocols to drive firewall configuration and support, VPN configuration and support, and network administration
  • Run recurring vulnerability scans and prioritize remediation efforts
  • Evaluate and identify partners and tools to help us meet our security goals
  • Educate the front-line helpdesk staff and all SolarCity network users about security best practices
  • Identify, recommend changes and new designs, and implement new security controls
  • Support current environment with a core infrastructure of firewalls, load balances, routers and switches
  • Drive capacity planning and forecast network growth to meet the business need
  • Assist in the architect, design and testing of new security related solutions to take advantage of emerging technology or changing requirements
  • Monitor all networks within organizational assignments and provide reports on a regular basis on security related activities
  • Train, direct and monitor the quality of work performed within organization assignments
  • Maintain detailed logs of all security control changes
  • Establish a security incident response process
  • Key point of contact for all security related vendors
  • Minimum of 2 to 4 years in a similar role
  • General understanding and knowledge of regulatory requirements, security concepts and privacy
  • Experience with vulnerability mitigation strategies for workstations, servers, and network hardware
  • Experience working with network forensic tools
  • Sound understanding of TCP/IP fundamentals and experience with SOX control requirements
  • Experience with security tools - NAC, Antivirus, File Integrity Management, Intrusion Prevention, Network and Application Firewalls, Web Proxy, Logging & Monitoring, and DLP
  • Experience with Malware detection tools, techniques, investigation and remediation
  • Several years of experience with Information/Network Security/Security Operations/IP Networking
  • Solid base experience with security fundamentals (policies, encryption)
  • Able to partner with management and technical staff to resolve complex security matters and critical policy creations
  • Active Security Clearance is a plus
  • Detail-oriented, resourceful and able to manage shifting priorities
  • Ability to work well with others in a collaborative team environment
7

Information Security Administrator Resume Examples & Samples

  • Three (3) plus years of related technical experience in the IT field
  • Certified with Defense Information System Agency (DISA) Host Based Security System (HBSS) administrator advanced level ePO (301) qualification
  • Possess Comp TIA Security+ certification or an equivalent DoD 85770 IAT II baseline certification
  • Specific experience and in-depth knowledge with McAfee ePolicy Orchestrator (ePO) Server
  • Hands on experience deploying and troubleshooting HBSS products (e.g. HIPS, VSE, and DLP)
  • Knowledge and experience working with the McAfee Host Intrusion Prevention System, McAfee Data Loss Prevention Endpoint, and McAfee product policy tuning
  • Knowledge and experience in working with Assured Compliance Assessment Solution (ACAS)
  • Knowledge and experience with Continuous Monitoring and Risk Scoring (CMRS)
  • Solid understanding of Microsoft operating system and networking
8

Information Security Administrator Resume Examples & Samples

  • Perform user and access administration on designated systems and applications, in accordance with the defined policies, standards and procedures of the organization
  • Perform system security administration on designated technology platforms, including operating systems, applications and network security devices, in accordance with the defined policies, standards and procedures of the organization, as well as with industry best practices and vendor guidelines
  • Perform normal and exceptional processing of user access and change requests, escalating such requests when appropriate
9

Information Security Administrator Resume Examples & Samples

  • 3-5 years of experience in Information Security
  • Experience with IBM Identity and Access Management software a plus
  • Knowledge of perl and shell scripting a plus
  • CISSP, CISA, or CISM certifications a plus
  • Ability to work effectively with people at various levels throughout the organization
  • Must be able to work well under pressure, grasp new ideas quickly, and think outside the box
  • Work well independently with minimum supervision
10

Information Security Administrator Resume Examples & Samples

  • Professional and discrete manner
  • Initiative to manage queries and improve processes
  • Relationship management
  • Ability to follow complicated procedures and make suggestions for improvements
  • Discretion and ability to communicate with a range of individuals including senior management
  • Accurate record keeping that will be subject to in depth audits
  • Ability to manage own workload, organise and prioritise work
  • Experience in handling confidential and sensitive issues
  • Ability to meet tight deadlines and to work under pressure
  • Excellent IT skills including the use of MS Office
  • An interest in security is useful but not essential
11

Information Security Administrator Resume Examples & Samples

  • Maintain and oversee enforcement of policies, procedures and associated plans for system security administration and user system access based on industry-standard best practices
  • Monitor server logs, firewall logs, intrusion detection logs, and network traffic for unusual or suspicious activity. Interpret activity and make recommendations for resolution
  • Review and assess security systems and their corresponding or associated software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus software
  • Administer and maintain end user accounts, permissions, and access rights
  • Manage connection security for local area networks, the company Web site, the company intranet, and e-mail communications
  • Perform and/or oversee penetration testing of systems in order to identify system vulnerabilities
  • Implement and report on security system and end user activity audits
  • Recommend, schedule (where appropriate), and apply fixes, security patches, disaster recovery procedures, and any other measures required in the event of a security breach
  • Work with IT staff and end-users regarding security-specific issues. Consistently seek to identify, troubleshoot, and resolve Information Security and related issues, problems and questions resulting in increased security
  • Must be able to provide on-call support 24x7
  • Stay current with system technology and architecture plans
  • Adhere to corporate and departmental policies and procedures for data security and disaster recovery
  • General Security Certification (one of the following is required)
  • Highly motivated, self-directed and has a strong interest in security
  • Strong organizational, fact-finding skills and problem solving skills are required
  • Must possess strong communication skills including verbal, written, and telephone etiquette
  • Should be organized and able to prioritize and manage time effectively
  • Be able to work well with various personalities and work as a team
  • Must be detail-oriented and able to multi-task and meet deadlines in a fast-paced, high-pressure environment
  • Should be independent and self-motivated – able to work and accomplish goals with little to no supervision
  • Security Policy/Process/Procedures (e.g. creating or maintaining)
  • Standards and Framework (e.g. PCI, NIST, ISO, HITRUST, so on)
  • Workstation Forensic or better
  • Vulnerability/Compliance scanning
  • Incident management (e.g. tabletop exercise or participated in a IRT, so on)
  • Application whitelisting
  • SIEM management (e.g. reporting, sourcing, configuring,
  • Privilege Access or Escalation Management
  • Key and Certificate Management
  • Application Security (SSDLC)
  • Network Hardening
  • Network Technology (e.g. firewall, routers, switches, protocols, so on)
  • Windows workstations and servers support
  • Windows Hardening
  • Unix/Linux support
  • Network segmentation
  • Business Continuity/Disaster Recovery
  • Application coding
12

Information Security Administrator Resume Examples & Samples

  • Maintain systems to protect data from authorized users
  • Identify, report, and resolve security violations
  • Enforce compliance with security policies and procedures
  • Ensure network security access and protect against unauthorized access, modification, or destruction
  • Maintain firewall technologies that secure internet facing systems
  • Review security logs generated by our security systems
  • Review and analyze security alerts and vulnerabilities from vendors and other security sources
  • Work with other information security staff to ensure that daily security issues are responded to as defined by IT policies and procedures
  • Administer proximity (“PROX”) system that controls who is authorized to go where in the controlled areas and at what times
  • Administer web filtering software to monitor and block access to unwanted internet content
  • Administer antivirus software to prevent viruses, worms, and Trojan horse infections
  • Administer LanDesk software to ensure compliance to established standards
  • Review project and work assignments to ensure work product meets requirements
  • Proactively learn and utilize new technologies, concepts, and procedures as appropriate
  • Develop written processes, including configuration checklists and best practices, in order to increase availability for assigned systems
  • Create, and maintain written Disaster Recovery (“DR”) documentation and procedures for assigned systems
  • Perform DR testing in our internal test lab and at our DR vendor site at least twice yearly; also provide written reports of the DR test results
  • Respond to production emergencies related to assigned systems on a 24/7 basis as necessary
  • 4-6 years’ experience with Microsoft Windows Server Systems
  • 4-6 years’ experience with Cisco routers and Checkpoint Firewalls
  • 4-6 years’ experience with Websense Enterprise Suite
  • Self–starter/responsible
  • Attention to detail and accuracy a must
  • Strong organizational skills and follow-up abilities
  • Strong sense of teamwork and initiative
  • Motivated, focused and strong desire to learn
13

Information Security Administrator Resume Examples & Samples

  • Monitor, identify, report and mitigate security weaknesses and prevention, detection, containment and correction of security breaches
  • Interface with team members and partners of varied levels from across the organization to ensure that business requirements are met without compromising security
  • Enforce Information Security policies and procedures
  • Works with vendors, IT associates and user departments to enhance information security
  • This is an entry level position suited for an individual who has a technical background and an interest in Information Security
  • B.S. Degree in Computer Science, Computer Engineering and no experience OR 2 years related experience
  • Experience in some or all of the following areas desirable: OS Security (Window, Linux, Sun), firewalls, IDS, routers and switches
  • Excellent listening, verbal and technical writing skills
  • Complete required Information Security compliance tasks by collecting the required evidence, performing analysis on the evidence to ensure compliance with existing security controls and taking action when necessary to resolve identified issues
  • Responsible for developing and maintaining metrics around specific security areas, analyzing supporting data, and contributing to regular updates and releases of security metrics
  • Review, analyze, follow-up on security events collected from systems across the company environment
  • Document the results of assessments and perform follow up of recommendations to assure timely remediation efforts
  • Identify and analyze business practice irregularities including information security violations and infractions
  • Monitor external sources for newly identified vulnerabilities, evaluate the risk such vulnerabilities pose to the organizations information and systems
  • Participate in research project to identify current trends in risk management and provide recommendations for continues improvements