Information Security Consultant Resume Samples

4.8 (75 votes) for Information Security Consultant Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the information security consultant job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
KF
K Fritsch
Kitty
Fritsch
802 Bernhard Groves
San Francisco
CA
+1 (555) 689 1961
802 Bernhard Groves
San Francisco
CA
Phone
p +1 (555) 689 1961
Experience Experience
San Francisco, CA
Information Security Consultant
San Francisco, CA
Bosco, Zboncak and Balistreri
San Francisco, CA
Information Security Consultant
  • Applies a theoretical knowledge-base to work to achieve goals through own work
  • Provide weekly status reports as requested by the customer project manager and/or resource manager
  • Provide updates to business through established communication channels
  • Review controls and make recommendations on improvements to eliminate risks
  • Coordinate with Project Managers and Technical Teams to manage the clients’ expectations and demands while maintaining good client relationships
  • Have managed networks and systems for both Windows and Unix platforms (even if it's the half-dozen systems stored under your bed)
  • Follows continual improvement best practices by identifying and diagnosing improvement opportunities
Dallas, TX
Privacy & Information Security Consultant
Dallas, TX
Cruickshank-Schaden
Dallas, TX
Privacy & Information Security Consultant
  • Apply project management methodology to the privacy program work efforts to ensure project or phase goals, budgets and timelines are met
  • Plan, organize and manage projects and process enhancement work efforts
  • Provide general guidance/direction or train junior-level support and professional personnel
  • Contribute to the development and deployment of security and privacy training and awareness materials for company-wide use
  • Create consensus across cross-functional Technology teams and the Business for win-win approaches to managing security and privacy risks
  • Facilitate process and workflow review, documentation, and re-engineering to meet company privacy and security goals
  • Lead training and education sessions for product, development, testing, and operations teams
present
Houston, TX
Senior Information Security Consultant
Houston, TX
Herman-Wiza
present
Houston, TX
Senior Information Security Consultant
present
  • Build successful working relationships with team members, key customers and stakeholders that improves the value of the security services being performed
  • Provide knowledge sharing and technical assistance to other team members
  • Provide guidance and support for team in Attack and penetration testing and web, mobile, thick client application security reviews
  • Consult and assist stakeholders with mitigation and remediation efforts from penetration testing results
  • Assist in the growth of Atkins information security services
  • Assist in driving security awareness to the end users through presentations and classes
  • Work in partnership with clients to implement security controls in pragmatic ways that deliver investment value and support business operations
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Texas A&M University
Bachelor’s Degree in Computer Science
Skills Skills
  • Advanced analytical skills: able to use prior experience and knowledge to seamlessly incorporate new knowledge or information during client interactions
  • Knowledge of common security systems, practices- Information Security experience is highly desirable
  • Advanced problem solving skills: able to use prior experience and knowledge to address new situations; especially during interactions with clients
  • Excellent interpersonal skills; comfortable dealing with a large span of people from middle tier management to Compliance Analysts
  • An excellent understanding of business ethics and the ability to keep sensitive information confidential
  • Strong communication skills including strong verbal presentation skills
  • Broad knowledge of Risk Management, Vulnerability Management, Third party Risk Management, Control Design, Execution and Monitoring, Policies & Procedure
  • Good knowledge of Security technology and standards, ISO-27001, PCI, DLP, IPS, IDS, Network Security, OS, Web Security, Mobility, Pentesting, etc
  • Ability to drives deliverables and decisions
  • Strong organizational skills; ability to balance multiple tasks simultaneously
Create a Resume in Minutes

15 Information Security Consultant resume templates

1

Senior Information Security Consultant Resume Examples & Samples

  • Act as Subject Matter Expert (SME) in responsible technologies and have deep technical understanding of responsible portfolios
  • Experience providing and validating security requirements related to cloud security for private, public and hybrid
  • Knowledge of OWASP top 10 and remediation’s of attacks against web applications. The ability to convey the risks to IT and business stakeholders
  • Working experience with more than one of these technologies, i.e. Java, .NET, Oracle, SQL, C , webSphere, Sharepoint, IIS, Apache, etc
  • Working experience with Cloud solutions, Business Intelligence and Data Analytics platforms
  • Ability to work well within global virtual teams
  • Candidates are preferred to hold or be actively pursuing related professional certifications within the GIAC family of certifications or CISSP, CISM or CISA
2

Lead Information Security Consultant Resume Examples & Samples

  • Lead the strategic development and innovation for new tools and processes related to improving the impact of GIS into the IT lifecycle
  • Develop close working relationships with the RBB & CIBWM Demand and Design offices to manage clients’ expectations and demands proactively while maintaining good client relationships
  • Own GIS communications to key stakeholders in both Business and IT communities, ensuring technical details and security details are understood allowing senior leaders to make informed decisions regarding security control implementation and risk management
  • Good leadership, relationship management and communication skills
  • Knowledge of the Barclays’ key lines of business, organisational structure and business objectives (or those of comparable financial services businesses)
  • Knowledge of the role and services provided by Barclays Internal Audit
3

Information Security Consultant Resume Examples & Samples

  • Consulting and Advisory
  • Governance and Control
  • Consulting and Advisory: Work closely with portfolio personnel, stakeholders, and senior management to identify Information Security related risks and controls, primarily in supplier arrangements
  • In cooperation with Strategic Sourcing and Outsourcing & Supplier Governance, participate as required in contract due diligence reviews for any supplier agreements involved in the portfolio
  • Lead and/ complete supplier assessments of large and more complex new or existing supplier arrangements, including site visits and evaluation of RFP responses, where appropriate
  • Review supplier assessments conducted by other Information Security Consultants to provide quality assurance for the supplier risk assessment process
  • With the assistance and guidance of the Safeguarding Customer Information Program Senior Information Risk Consultant review and revise the supplier risk assessment process as appropriate
  • Evaluate and assess emerging information security threats and vulnerabilities in the supplier portfolio and work with portfolio personnel to identify appropriate controls
  • Be an advocate for IS solutions and standards
  • Ensure compliance to standards specific to the local organization, consistent with IS policies and guidelines, and with Outsourcing & Supplier Governance control frameworks
  • Escalate IS potential or unresolved issues to management for resolution as appropriate
  • Identify and report IS trends by reviewing portfolio risk assessments and compliance risk reports
  • Report on portfolio of ISME’s, complete trending analysis and collaborate with other Information Security Officers (ISO’s) to determine and report on aggregate risk exposure and develop and propose joint solutions
  • Chief Information Security Officer (CISO)
  • Business Executives
  • Lines of Business
  • Corporate Support Areas
  • Corporate Risk Areas
  • In depth knowledge of Information Security risk, ITGC Controls, supplier governance, and industry best practices with a minimum of 5 years relevant experience
  • Working knowledge of the technical areas such as data warehouses, mainframes, networks, applications etc
  • Expert knowledge of BMO Corporate Policies, Standards, and operating procedures relating to information security risk
  • Possess good consulting skills
  • Possess solid negotiation/ mediation skills
  • Possess good Project Management skills
4

Information Security Consultant Resume Examples & Samples

  • 4 To provide Tier-3 Support for Cisco products 7609-S, 7206VXR, ASA 5510, ASR 1001, c3560, 3570, 4500. Hands on Experience on these products are a must
  • 4 Identifies, analyzes, and resolves complex problems with Avaya Equipment installed at Customer locations
  • 4 Remotely providing break-fix support to SME level
  • 4 Mentor team members
  • 4 Lead customer accounts as Prime engineers for their ongoing issues
  • 4 Contribute significantly to client satisfaction and interface with clients with defined tasks
  • 4 Expected to be process champ
  • 4 In depth understanding of Routing Protocols like BGP, OSPF
  • 4 In Depth knowledge of VPN technologies like IPsec, GRE etc
  • 4 In Depth understanding of switching technologies like STP, MSTP, RSTP, VLAN, VRF etc
  • 4 Hands on experience with configuring, troubleshooting of the above mentioned devices and protocols
  • 4 In Depth understanding of VRRP/ HSRP / GLBP
  • 4 Adaptability to work on different technologies and products like Avaya ERS 8600, 4500, 5600, Secure Router etc
  • 4 Knowledge of Sniffer Analysis will be an added advantage
  • 4 Engineering Degree in CSE/IT/ECE/EEE, MCA
  • 4 Certification: Cisco Certification in R&S or Security (CCNA/CCNP/CCIE)
  • 4 5+ years’ experience at L2/L3 level
  • 4 BGP configuration and Troubleshooting
  • 4 Addition, modification and deletion of firewall rules
  • 4 Good written & verbal Communication Skills
  • 4 ITIL model service delivery, understanding of SLA’s, Contract Penalties etc
  • 4 Substantial exposure to supporting global customers, working in 24*7 environment
  • 4 Preference: Prior Avaya, exposure in serving Global Customers, Willing to work 24*7 environments, Demonstrated Oral & Written Communication skills, Team Player
5

Information Security Consultant Resume Examples & Samples

  • Successful candidates must exhibit CIBC’s values of trust, team work, and accountability
  • Must have Bachelors or equivalent degree in related field
  • Must have 5 years of consulting experience and knowledge of approaches, tools, techniques and roles and responsibilities in providing technical or business guidance to clients within and outside own area
  • Must have a good understanding of application security assessments
  • Must have a good understanding on penetration testing processes and procedures
  • Must have experience presenting risk reports and making recommendations
  • Must have 5 years of application and web security assessment experience/expertise
  • Must have CISSP, or CISA or CISM
  • Must have excellent verbal and written communication skills
6

Information Security Consultant Key & Certificate Lifecycle Management Resume Examples & Samples

  • Familiarity with Public Key Infrastructure (PKI) concepts
  • Bachelor degree in Information Systems, Computer Science, or Business preferred
  • Experience with Key and Certificate Lifecycle Management
7

Information Security Consultant Resume Examples & Samples

  • Conducting Technical Assurance Reviews which include infrastructure, application, OS, database assessment and web scanning
  • Reviewing and evaluating IT operations, physical security, hardware/software configurations, IT systems and operating procedures in use throughout the Humana for compliance with established controls, policies, standards and procedures
  • Evaluating technical tools and technology solutions
  • Conducting web vulnerability, static and dynamic code and database scanning
  • Conducting Application Security Reviews
  • Serving as the SME for scanning tools and technology
  • Recommending improvements in policies, procedures, processes, operations and systems across Humana
  • Broad IT, Information Security and IT audit experience, preferably in a large corporate environment
  • Bachelor’s Degree or equivalent; Graduate degree a plus
8

Information Security Consultant for Role Based Access Resume Examples & Samples

  • Initiates contact with the business communities and briefs them about the goals, timelines of the RBAC Program
  • Receives input from Role engineers and Access engineers, prepares necessary documentation for the role approval process once role development is completed, initiates and monitors role approval process for corresponding business community through to completion
  • Works with Business Community Role Owners, Application Owners, System Administrators and other required personnel to test the application accesses defined in the roles
  • Monitors the RBAC team mailbox and attends to role related requests to aid in the various RBAC processes
  • Builds Trust: Consistently models and inspires high levels of integrity in decisions, speech, and actions. Lives up to commitments, taking responsibility for the impact of one's actions. Exercises the courage to prioritize principles and values over personal or professional gain
  • Ability to work with multiple individuals from several departments within the enterprise and multitask in the face of aggressive timelines
  • Ability to work in a fast paced, dynamic and changing environment while managing multiple tasks simultaneously
  • Experience with RBAC implementations
9

Business Information Security Consultant Resume Examples & Samples

  • Six or more years in IT project delivery
  • A strong understanding of information technologies
  • Demonstrated capability to adapt and learn new technologies and business domains
  • A passion for enabling business through security
  • Bachelor’s in technical field such as computer science or information technology a plus
10

Information Security Consultant for the Security Advisory Team Resume Examples & Samples

  • Archer Administrator
  • Maintain Archer GRC platform components for various clients– Server hardware, SQL databases, Windows services, Archer product software
  • Should independently manage the assigned project/engagement with minimal oversight/guidance from the manager
  • Minimum 6 years of overall Security Industry experience with 3 years of experience in GRC
  • Qualification: UG - B.Tech /B.E. - Any Specialization - Any Specialization
  • Ability to perform Presales activities, such as presales calls, RFP responses, Proposals,
  • Lead teams in projects, review deliverables, project management
  • Should be a good team player
  • Should prioritize and manage multiple tasks and multiple clients
  • Full engineering life cycle support for Archer GRC platform
  • Archer GRC 5.x developer and/or administrator experience
  • Business Process Modelling, Workflow Development
  • Maintain Archer GRC platform components – Server hardware, SQL databases, Windows services, Archer product software
  • Providing estimate to complete implementation of the solution and validating implementations
  • Design, configure, implement and trouble shoot RSA Archer GRC solution
  • Create, review, maintain and update related design and configuration documentation
  • Understanding of vendor management, risk, compliance, business continuity, audit, Sarbanes Oxley(SOX) and governance processes
  • Design and document processes to support Archer at a platform level (maintenance, patches etc.)
  • Day to day administration of access control and on going configuration requests
  • Knowledge of core Information Security concepts related to Governance, Risk, and, Compliance
  • Participating in the solution development process and ensuring that customer requests and needs are represented within the product
11

Information Security Consultant Resume Examples & Samples

  • Define security configuration standards for platforms and technologies
  • Develop appropriate risk treatment and mitigation options to address security risks identified during security review or audit
  • Ability to team globally to facilitate and enhance the understanding & compliance to security policies
  • Ability to work effectively with customers, management, staff members, vendors, and consultants and articulate findings and recommendations
  • Strong English communication and writing skills are required
  • Candidates are preferred to hold or be actively pursuing related professional certifications such as CISSP, GSEC, CISM or CISA
  • Experience with providing security consulting services for global deployments
  • Working experience with mobile applications and mobile enterprise application platforms
12

Information Security Consultant Resume Examples & Samples

  • In depth knowledge of the technical areas supported e.g. networks, infrastructure, operating systems, applications, mainframes, etc
  • Working knowledge of Operating Group businesses and Global Resourcing Initiatives
  • Information Security certification is encouraged e.g. CISSP, CISSLP, GIAC etc., but not mandatory
  • Experience equivalency is also acceptable
  • Negotiation/ mediation
13

Information Security Consultant Resume Examples & Samples

  • Drive pre-assessment planning and kickoff agenda items and associated activities
  • Business risk analysis to support risk reduction and remediation of current and future solutions and projects
  • Provide confident consultation throughout the engagement process – from kickoff to post-engagement
  • Conduct technical and customer experience reviews of engagements for improvement, efficiency and accuracy
  • Significant, positive and collaborative interaction within the team
  • Lead and conduct interviews as part of discovery process for consulting engagements
  • Work load triaging and prioritization
  • Escalate engagement and customer related issues, where appropriate
  • Provide thought leadership in the security space
  • Provide communications for solution ideas or modifications throughout the organization
  • Provide training/mentoring to new or more junior members of the team
  • Identify areas where processes could be implemented to streamline service line offerings
  • Maintain professional and technical knowledge by attending educational workshops; reviewing professional publications; establishing personal networks; participating in professional associations such as OWASP, ISSA, etc
  • Experience managing customer relationships and team relationships; setting and managing expectations
  • Strong presentation and verbal communication skills
  • Understanding of common regulatory or standards based control frameworks such as PCI-DSS, ISO 27001/2, NIST 800-53, etc
  • Superior detailed composition writing skills
14

Information Security Consultant Resume Examples & Samples

  • Relationship Management--Ability to establish and build healthy working relations and partnerships with clients, vendors and peers
  • Systems Software Infrastructure--Knowledge of the existing and planned software technology and the global, regional and local software architecture and infrastructure components
  • IT Environment--Knowledge of organization's total Information Technology (IT) environment
  • Oral Communications--Ability to express oneself and communicate with others verbally; recognizing that verbal communication is more than just language - it includes tone, style and structure
  • Interpersonal Relationships--Knowledge of approaches, tools and techniques for working with individuals and groups in a constructive and collaborative manner
  • Influencing--ability to impact decisions within and outside own organization
  • Decision Making and Critical Thinking--knowledge of tools and techniques for effective use of a broad range of factors, assumptions, frameworks and perspectives when solving problems
  • Consulting--Knowledge of approaches, tools, techniques and roles and responsibilities in providing technical or business guidance to clients within and outside own area
  • Information Security Consultant, Application Consultant - Level 8
15

Information Security Consultant Resume Examples & Samples

  • Minimum 2+ yrs experience in web or Mobile or thick client application security pen testing and reviews
  • Good Knowledge of OWASP and Secure SDLC standards
  • Knowledge of various security tools and Distros. Should be familiar with various penetration testing and application testing methodology and tools. Knowledge on tools like Nessus, BackTrack etc. is a definite plus
  • Knowledge OS/DB configuration reviews - desirable
  • Minimum 1+ yrs experience in web or Mobile or thick client application security pen testing and reviews
  • Knowledge hosting environments and network architecture- desirable
16

IT Infrastructure Information Security Consultant Resume Examples & Samples

  • Development and implementation of global standard GTI risk assessment plans and practices into the region
  • Assist the GTI region in preparation, fieldwork, ongoing reporting and risk mitigation related to IT risk for internal & external audits
  • Assess IT security risk at the planning stage of new or changed GTI systems
  • Schedule and lead workshops to help GTI identify potential IT risks and devise possible controls or actions to mitigate vulnerabilities
  • Drive development of GTI staff training resources with specific IT risk management focus and regional specific factors
  • Assist GTI in working with BCP organization on developing, implementing and testing BCP capability
  • Drive good review practices in the GTI region on a risk based approach
  • Assist the GTI region in general and specific IT risk discussions with our supported business end users
  • Ensure IT security is part of the physical design of the region’s work premises
  • With the IT Risk Centre of Governance, drive the understanding and compliance execution practices required to comply with the region’s IT relevant country laws, legislation and industry guidelines from a IT risk based approach
  • Protective measures: advise on best-practice risk prevention of disruptive events such as digital and physical incursions
  • Mitigation measures: advise on risk parameters in minimising severity of disruptive events
  • Recovery measures: advise on risk parameters involving activities to bring back disrupted systems
  • Contingency measures: advise on risk parameters pertaining to contingency processes to bypass catastrophic disruptive events
  • Shared accountability with the GTI regional head to ensure compliance for the region in GTI Risk Mgmt executive reporting and dashboards
  • Leads key internal audit reviews (pre, during and post audit fieldwork), including regular proactive tracking, reporting and alerting of identified issues until remediated. A sense of shared ownership is required on any audit issues raised and opened against the GTI region. Approval authority to close off regional audit issues through active review of closure evidence. Analyses risk patterns and issues for proactive mitigation including other GTI regions
  • The lead for the active and regular review of any open risk points for the GTI region to appropriately manage the action plans to mitigate the risk
  • Regional lead for 1st line on external audit reviews (ie client and regulatory) that will be routed through from IT Risk, working closely with 1st line technical resources and 2nd line to provide appropriately balanced responses to external audit due diligence reviews
  • Proactively identifies areas of risk mitigation in a risk based prioritised approach for the GTI region. These could include; logical access, developer access to production, vulnerability management, Data Centre, change & incident management, BCM & DR, database, storage & backup, platform specific reviews, networks & telecoms, end user services and vendor management. These will be done to a complex technical level
  • Leads the technical security design of tactical solutions to meet the region’s complex needs where GTI solutions are not viable for legitimate reasons
  • Reviews and challenges GTI’s requests for exceptions and provides alternative options prior to approving the exception route
  • Leads the region’s governance oversight for exceptions to ensure they are being regularly and proactively managed to remediate risk
  • Accountable for sufficient governance and oversight for the regional compliance of GTI security solutions, including providing escalations where required for unacceptable levels of residual risk being carried by RBC
  • 5 – Access Management/Administration and Data Loss Prevention – 10%
  • Provides expert advisory and leverages GTI & IT Risk teams and solutions where viable, on the range of access management/administration including Data Loss Prevention frameworks, regular access reporting and data governance disciplines. This is an advisory service and not an execution function. The business unit’s requirements will typically come through the IT Risk 2nd line of defense team
  • Where GTI & IT Risk solutions are not viable for valid reasons, to recommend tactical solutions where required
  • The lead engagement point for other line of defence functions such as 2nd line IT Risk, Compliance, Privacy Risk Management, Operational Risk and 3rd line internal infrastructure audit
  • Proactively manage complex and sometimes competing relationships with key local, regional and global stakeholders on a regular basis
  • Extensive proven IT experience
  • Proven full time experience in the whole broad range of Information Security services
  • Defining and implementing security policies, standards and procedures across multiple platforms, with compliance checks
  • Defining and constantly improving security awareness across multiple regions using different delivery methods
  • Systems security planning & development, working with global security groups
  • Trouble-shooting complicated issues related to security incidents
  • Ability to provide information security advisory to new systems, business setup, products or services, including 3rd party on-site reviews
  • Proven experience interacting with regulators, internal auditors and/or external auditors
  • Expert knowledge of WMI’s specific security threat landscape, culture and regulatory expectations, as well as an ability to stay current with this required level of knowledge
  • CISSP, CISA, CISM, CRISC or CGEIT active certifications
  • Telecomms (IPT, Turrets, Networks, Firewalls, VPN)
  • Operating Systems (Wintel and Unix)
  • Storage (SAN and NAS)
  • Database (SQL Server, Oracle, Sybase)
  • Virtualisation (VMWare, Citrix)
  • Middleware, Messaging and Webservers
17

Information Security Consultant / Manager Resume Examples & Samples

  • Extensively delivered multiple Information Security projects to a high standard
  • Excellent stakeholder management and engagement
  • Must hold at least one relevant Information Security qualification e.g. MSc, CISSP, CISM etc.
  • Very strong understanding of Network Infrastructure, LAN's, Firewalls, Switchers, Routers, Intrusion Detection & Vulnerability Management/Scanning
  • Strong knowledge of Vulnerability Assessments and methodologies
18

Information Security Consultant Resume Examples & Samples

  • Experience in designing IT Security controls
  • Strong learning attitude
  • Ability to work in a fast paced, dynamic and changing environment while managing multiple projects simultaneously
  • Knowledge of network and system architectures
19

Senior Information Security Consultant Resume Examples & Samples

  • Manage and schedule overall team activities
  • Review reports , manage client meetings,
  • Provide guidance and support for team in Attack and penetration testing and web, mobile, thick client application security reviews
  • Excellent Knowledge of OWASP and Secure SDLC standards
  • Good Knowledge of various security tools and Distros. Should be familiar with various penetration testing and application testing methodology and tools. Knowledge on tools like Nessus, BackTrack etc. is a definite plus
  • Good knowledge of Linux administration, TCP/IP, Network Security- definite plus
20

Information Security Consultant Resume Examples & Samples

  • Willing and able to be a pro-active team member
  • Desire to continue personal growth through continuing education and technical knowledge
  • Basic understanding of TCP/IP, routing, switching, and Internet architecture
  • Microsoft Windows Servers and Workstations
  • Databases (SQL, Oracle, etc.)
21

Senior Information Security Consultant Resume Examples & Samples

  • Experience with ERD (Entitlement Reporting System) or Oracle Identity Analytics
  • Extensive knowledge of processes, tools, techniques, and practices for assuring adherence to standards associated with accessing, altering and protecting organizational data
  • Proficient in MS Access and Excel
  • Ability to provide technical and business guidance to clients
  • Ability to establish and build healthy working relations and partnerships with key stakeholders
  • Proven leadership abilities with effective team management and building experience
  • Excellent communication skills, written and verbal
22

Information Security Consultant Resume Examples & Samples

  • Accountable to the Business Owner to drive Information Security project execution and delivery success
  • Accountable to ensure the Business Case/Charter incorporates project vision, strategy, and end state objectives
  • Ensure identification of stakeholders and collaborates to ensure business requirements are properly identified and documented
  • Provides input that minimizes operational impact, mitigates risk and/or improves client experience
  • Participates in project task identification, issue/defect resolution, user acceptance (UA) testing, and implementation
  • Serves as a senior process owner for various information security activities for the corporation
  • Promotes the availability, integrity, and confidentiality of company data, regardless of medium
  • Provides direction, guidance, and opinions regarding information security awareness, communication, policies, and standards
  • Serves as an internal information security consultant and liaison to all areas of the organization as a daily activity
  • Gathers and communicates the practical implications of information security decisions, issues and plans to the organization
  • Possesses expert knowledge of area or function
  • Expert in at least one core discipline
  • Serves as Subject Matter Expert with knowledge of both the technical and business aspects surrounding Security
  • Maintains an understanding of relevant federal and industry regulations and effectively communicates as appropriate
  • Provides support for coordinated regulatory reviews and audit issue monitoring
  • Bachelor degree or equivalent work experience
  • Five to seven + years of security experience including technology-related auditing, consulting, and/or operational banking experience
  • Excellent interpersonal, facilitation, negotiation, customer service and relationship management skills
  • Process management, time management and organizational skills
  • Proficient use of personal computers and Microsoft Office Suite
23

Information Security Consultant Resume Examples & Samples

  • Strong academic or professional qualifications
  • CISA/CISSP/SSCP/OSCP/CEH/SANS/Cisco/MSFT etc. - not essential
  • 2 - 10 years of relevant professional experience in the field of IT Security
  • Client facing experience desirable
24

Information Security Consultant Resume Examples & Samples

  • 10+ years of experience in law or sourcing with a background in technology and/or information security
  • 5+ years of experience in Third Party management inclusive of negotiations of large strategic contracts
  • Must display strong subject matter experience in laws, regulations, information security and/or technology for EMEA and APAC regions
  • Excellent negotiation, influencing and problem resolution skills
  • Risk and Contract Management
  • Experience in laws, regulations, information security and/or technology for Americas
  • Ability to drives deliverables and decisions
  • Collaborates with risk partners on info security critical priorities
  • Participates in senior LOB specific Risk Management Routines
  • Leadership/Strategy
  • Builds strong relationships with Stakeholders and key partners
  • Drives agreement on key priorities for stakeholders and key partners
25

Information Security Consultant Resume Examples & Samples

  • Bachelor degree in Computer Science or a related technical discipline
  • Experience in a security consulting role
  • Knowledge of IT security frameworks / system security architecture
  • Strong technical writing and communication skills
  • Project / program management experience
  • Experience with direct interaction to senior stakeholders and stakeholder management
  • Relevant security industry certification
  • Experience performing network and / or application security assessments
  • Experience with security analysis tools and vulnerability scanners
  • Experience with cyber threat intelligence gathering
  • Experience in a financial services environment
  • Experience scoping engagements and developing technical proposals
  • Knowledge of software development practices, system administration concepts, basic system, network and operating system architectures or similar areas a plus
26

Information Security Consultant Resume Examples & Samples

  • Perform security assessments for clients through security assessments (e.g. security risk assessment, IT network infrastructure review, technical configurations review, etc
  • Evaluate and analyze threat, vulnerability, impact and risk to security issues discovered from security assessments
  • Advise clients on the security issues, including explanation on the technical details and how they can remediate the vulnerabilities in the processes and controls
  • A recognized university degree in Computer Science, Computer/Electrical Engineering, Information Technology or equivalent, together with at least one year of relevant experience
  • Candidates who possess professional certifications such as GIAC Penetration Tester (GPEN), Certified Information Systems Auditor (CISA) and / or Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), ISO27001 are preferred
  • Knowledge in security controls, scripting (Python pro/ Regex/ VBScript), networks and operating systems would be an added advantage
  • Experience in leading teams on projects
  • Strong interest in the field of information security
  • Excellent communicator with strong analytical, interpersonal and writing skills
27

Information Security Consultant Resume Examples & Samples

  • Experienced with Regular Expressions (RegEx), YARA and SNORT rules
  • Working knowledge of Windows/UNIX/Linux operating systems, computer hardware and networking
  • Working knowledge of security tools such as packet capturing tools, DLP, Web Proxy, IDS and IPS
28

Information Security Consultant Resume Examples & Samples

  • Become the consumer and understand IT security challenges
  • Dialogue and Interact with Humana EIP management about security user experience challenges, perceptions, awareness/value, and impact
  • Stay abreast of new training and awareness technologies
  • Develop short and long term strategies to enhance Information security consumer awareness
  • Develop and publish Information Security communications to consumers/market
  • 2 years of corporate IT experience, with Windows XP Pro and general networking skills
  • Prior IT Security experience
  • Strong written communication skills
  • Associate’s or Bachelor’s Degree in Computer Science, Information Technology or a related field
  • Prior IT Security training experience
  • IT Security Certifications
29

Information Security Consultant Resume Examples & Samples

  • Conduct technical and business review of engagements for improvement, efficiency and accuracy
  • Experience managing customer relationships and team relationships
  • Understanding of common regulatory or standards based control frameworks
30

Senior Information Security Consultant Resume Examples & Samples

  • Create, maintain and drive technology strategies and roadmaps within the area of the responsibility, e.g. Application Security
  • Create, maintain and implement Security policies, standards and guidelines applicable to application security
  • Consult and assist stakeholders with mitigation and remediation efforts from penetration testing results
  • Consult various stakeholders, like IT, business and 3rd parties on implementation of security controls and measures
  • Sound knowledge of information security principles & technical security controls
  • Specialist knowledge in one or more of the following areas
  • At least 5 years of technology experience as a penetration tester
  • At least 5 years in application development
  • Substantial knowledge of information security practices and technology
  • Basic level of understanding in Compliance (PCI, CoBIT)
31

Information Security Consultant Resume Examples & Samples

  • Contribute to the ongoing information security initiatives and improvements development, implementation and maintenance of information security for the line of business (LOB)
  • Possess strong development and/or application security background; with solid knowledge of SDLC from design, testing, deployment to post production and the different risk elements associated with each step
  • Acts as a point of contact to the LOB during information security incidents
  • Monitors information security trends internal and external to the bank and keeps LOB leadership informed about information security-related issues and activities affecting the organization
  • Manages quality control and reporting
  • Experience with modern programming languages (such as Python, Ruby, or Java)
  • Worked on the development of systems requires identification and authorization of users
  • Implementation and/or management of encryption on an application. Either the transmission of data or the storage of data and/or the management of the keys and certificates to protect the information/communication. 
  • 2 - 5 years of experience in technology and 5 + years in information security
  • 2 - 5 years of experience in application development or application security
  • Must display subject matter experience in application security, vulnerability testing, system testing, and/or Agile lifecycle management
  • Strong LOB knowledge/experience for the type of business they are aligned to (e.g..CSBB/GBM)
  • 1 - 2 years of information risk management experience or direct participation in information risk management processes, including application risk classification and/or application control assessments
  • Creative problem solver
  • Good data management skills for presentation and trend analysis
32

Information Security Consultant Resume Examples & Samples

  • Conduct and lead Information Security Projects, including
  • Minimum 2-4 years of business experience in the areas of Information Security
  • Experience within consulting or professional services, or at leading industry public companies is preferred
  • Knowledge of security areas such as Auditing, Policy, Database Security, Firewall Design and Implementation, Risk Analysis, Identity Management, Access Management, or Web Services is very desirable
  • This position requires national travel
  • CISSP, CCSK, CEH, Microsoft, Cisco, HPUX, other vendor, application, or system certifications
33

Information Security Consultant Resume Examples & Samples

  • Analyze and perform essential day-to-day operational activities relating to third party vendor (domestic and global) security governance and oversight
  • Review documentation provided by service providers in order to assess security controls in place, and identify potential gaps
  • Identify and rate the severity of the gaps based on requirements and/or industry standards as input to the security risk aspect of the business decision, and communicate those gaps to management
  • Ability to multi-task, and manage quarterly deliverables on time
  • Assist in contract language review, that is specific to security to assess suitability of the contract based on type, scope, requirements, and make recommendations regarding potential gaps
  • Assist in developing management reporting and presentations
  • Provide consulting support to concurrent requests and/or projects
  • Translate information security terminology into terms understandable to diverse groups
  • Provide analytical support to assist in development and documentation of internal processes and procedures
  • Contribute to information security related projects and initiatives
  • Act as a liaison between the lines of business and technology
  • Promote teamwork within the department and the overall Enterprise Security Services division
  • Able to travel to conduct Security Site Evaluations
  • 5+ years of security risk management experience, technology-related experience, consulting, compliance/operational risk, and/or banking experience
  • Strong research skills coupled with strong problem solving/analytical skills and ability to effectively summarize findings
  • Results oriented, self-starter with ability to work with general direction
  • Knowledge of financial industry
  • Ability to motivate people and excel in a team environment
  • Resourcefulness and creativity in solving business problems
  • Five or more years of information security related experience
  • Cross-functional knowledge of Key business units
34

Information Security Consultant Resume Examples & Samples

  • Execute penetration-testing assessments on applications (Standalone, web and mobile) and devices
  • Review source code for security vulnerabilities and support developers on remediation activities
  • Assist in driving security awareness to the end users through presentations and classes
  • Preferably 5 years of technology experience as a penetration tester
  • Preferably 5 years experience in application development
  • Thorough knowledge of internetworking, including TCP/IP, IPsec, routers, IP internetwork configuration and design is a great plus
  • Experience with standards work in security, such as ISO, ANSI, IETF, etc would be ideal
35

Information Security Consultant Resume Examples & Samples

  • Assessing client environments and advising them on issues of risk, security and compliance
  • Penetration testing/ethical hacking (if your skill sets are worthy)
  • Researching tools and database security
  • Consulting with clients on high-level strategic initiatives as well as highly-technical and detailed regulatory compliance projects
  • Learning the tricks of the trade from experienced mentors
  • Blogging about your new security finds
36

Information Security Consultant Resume Examples & Samples

  • A minimum of seven years in an information security role of which at least 3 must have been in a security design, architecture or consultancy capacity
  • A bachelor's degree in information systems or equivalent work experience; an M.B.A. or M.S. in information security is preferred. Professional certifications such as CISSP, CISM are highly regarded and must have knowledge of security standards and best practice such as ISO 27001 and NIST
  • The ability to interact with Pacific Life personnel, build strong relationships at all levels and across all business units and organizations, and understand business imperatives
37

Information Security Consultant Manager Resume Examples & Samples

  • Oversee and conduct information security vulnerability assessments and penetration testing projects
  • Evaluate client’s information security policies, processes, and technical controls through interviews, documentation reviews, and comprehensive technical assessments
  • Develop detailed risk assessment reports which explain identified security weaknesses, describe potential business risks, and create prioritized recommendations with estimated costs and effort levels for remediation
  • Helping our clients understand and prepare for common regulatory or standard-based control frameworks such as PCI-DSS, ISO 2700X, NIST 800-53, HIPAA/HITECH, and privacy laws
  • Follow industry best practice methodologies for penetration testing (e.g., OWASP guidelines), and be able to perform both manual penetration testing and automated testing
  • Knowledge and experience with information security assessment and network penetration methodologies, tools and techniques
  • Experience conducting incident response readiness exercises
  • Familiarity with Social Engineering tools and techniques
  • Strong technical skills related to information security, network security, Windows security, UNIX/Linux security, web application security, and wireless security
  • Familiarity with backend databases like MS SQL, Oracle, MySQL, etc
  • An understanding of how to perform SQL injection attacks and how to identify SQL injection vulnerabilities in applications
  • Familiarity with web service technologies and attack vectors
  • Able to apply leading information security frameworks to client’s environments, identifying gaps in policies and processes
  • Participates in strategic and tactical objectives to include new product offerings, identify additional client needs, and generate new business leads
  • Bachelor's degree required, candidates must possess significant analytical skills with preferred degree in Information Security, Computer Science, Computer Engineering, or Information Systems
  • Minimum 4 years of business experience in the areas of Information Security
  • Experience in auditing, planning, design, implementation, testing security processes in client’s environment
  • Writing and interpersonal communication skills are expected to be of a high quality
  • The ability to handle multiple projects concurrently is a must
  • Ability to present on information security topics to client and industry seminars is desired
  • Financial institution experience is highly desired
  • Knowledgeable regarding Sarbanes-Oxley Act, Payment Card Industry (PCI), and Service Organization Control reports (SOC1 and SOC2)
  • Experience within consulting or professional services is strongly preferred
  • Ability to develop innovative approaches, ideas and solutions and participate in business development
  • Candidate must be willing to travel a minimum of 30%
38

Information Security Consultant Resume Examples & Samples

  • Experience as GRC/Thrid Party/Vendor Risk Managment
  • Broad knowledge of Risk Management, Vulnerability Management, Third party Risk Management, Control Design, Execution and Monitoring, Policies & Procedure
  • Experience in reviewing SOC2 and SSAE16 reports
  • Ability to leverage learned technical skills in support of team objectives
  • Effective communication in working with others in complex situations
  • Ability to interact effectively with, and influence, internal and external customers
  • Information Security related certifications and/or education (e.g. CISM, CISSP, CISA)
  • General knowledge and experience with HIPAA
  • Knowledge and experience with security controls frameworks and audit protocols including: ISO27001, SOC2, HITRUST Common Security Framework, US FedRamp, EHNAC, PCI
  • 5-8 years practical experience in Risk and Compliance, Third Party Risk Management, Vulnerability Management, Control Design, Execution and Monitoring, Policies & Procedure and consulting services or related experience
  • Interact with third party supplier and collect evidence
  • Interact with internal Stakeholder to understand the business process
  • Review evidence, security risk questionnaires and third party security certifications or audits
  • Documents any gaps in system of record
  • Update security risk questionnaires in system of record
  • Provide all deliverables in a high-quality and timely fashion in compliance with all customer specifications
  • Provide weekly status reports as requested by the customer project manager and/or resource manager
39

Information Security Consultant Resume Examples & Samples

  • Must be able to map Client Information Security requirements to an enterprise capable, secure managed file transfer solution that supports encryption & data compression on the endpoint
  • Must be able to show how each of a solution's controls can meet Client Information Standards & various other Client Technical Standards
  • Must be familiar with information security concepts and products
  • Must have strong IT/Technical skills (understanding of software, hardware, networks, etc.)
  • Must have strong technical documentation skills
  • Must have a sound understanding of the principles related to change control
  • Must be able to create detailed requirements and test plans for secure managed file transfer solution that supports encryption and data compression on the endpoint
  • Must be able to follow the CATE Technology Development Life Cycle which details the tasks needs to perform certification
  • Must follow issues through to resolution on a timely basis
  • Must be able to work under pressure and with tight deadlines
  • Must have a strongly understanding of the concept of segregation of assets, roles, privileges, change reconciliation, password management, key management, change reconciliation, log reviews and reconciliation
  • Must have experience developing, testing, customizing and troubleshooting information security systems and solutions to ensure protection of IT assets, business functions and requirements
  • A sound knowledge of cryptographic algorithms and peripheral technologies is an advantage
  • Sound understanding of cryptographic key management protection requirements to include distribution, storage, changing/updating keys, dealing with compromised keys/key revocation, archival and auditing key management related activities
  • A sound understanding of Tomcat/Jboss web applications, and interaction with Oracle Databases
  • Knowledge of the bTrade Secure Managed File transfer solutions
  • Proficient in MS Word, Excel, and MS PowerPoint to produce metrics charts
  • Proficient in basic Windows administration
40

Information Security Consultant Resume Examples & Samples

  • BA/BS (or equivalent experience) required
  • 5+ years’ experience in IT, IT Audit, or equivalent risk management experience
  • Strong critical thinking and problem solving skills; knows when to escalate issues and risks to upper management
  • Strong communication skills – verbal, listening, written, and presentation
  • Strong technical skills (MS Powerpoint, Word, Excel, SharePoint, Project, Visio etc.)
  • Capable of working independently, as well as in team / collaborative settings
  • Demonstrate knowledge in ISO, COBIT or other information security / IT controls frameworks
  • Understanding of IT audit, compliance, and risk management methodologies and/or approaches
  • Basic understanding of present Information Security frameworks, risks, and industry/common technologies
  • Strong organizational skills; ability to balance multiple tasks simultaneously
  • Excellent interpersonal skills; comfortable dealing with a large span of people from middle tier management to Compliance Analysts
  • Strong relationship management skills; recognizes the benefit of investing in relationships
  • An excellent understanding of business ethics and the ability to keep sensitive information confidential
  • 3+ years of IT policy, controls, assessment and audit experience or equivalent
  • 3+ years of IT audit, governance, risk or compliance (GRC) experience or equivalent
  • Prior experience working within an IT organization, supporting enterprise level IT functions and processes required
  • Prior experience at Big 4 or comparable a plus
  • Provide compliance, risk, and controls expertise to support various IT Risk & Compliance initiatives and activities
  • Perform targeted compliance reviews on behalf of the IT Risk & Compliance department
  • Address audit related matters when needed, including oversight, internal facilitation, review and remediation efforts
  • Develop and maintain controls necessary to address regulatory, contractual and executive information security requirements
  • Participate actively in the risk management process
  • Develop internal compliance and risk dashboards
  • Perform remediation activities for non-compliance and monitor implementation progress (as necessary)
  • Routinely report on status of compliance initiatives and remediation activities
  • Demonstrate entry level knowledge in ISO, COBIT or other information security / IT controls frameworks
  • Guide junior team members where necessary to ensure productivity and service fulfillment
41

Information Security Consultant Resume Examples & Samples

  • Applies a theoretical knowledge-base to work to achieve goals through own work
  • Characterized by specific functional expertise typically gained through formal education
  • May provide guidance to others as a security advisory using technical expertise and background
  • Requires in-depth knowledge and experience needed to operate independently with limited guidance and oversight
  • Applies a new perspective on existing solutions to solve complex problems
  • Makes decisions within guidelines and policies that impact a range of customer, operational, process, or project activities
  • Manages corporate initiatives and projects at Europe level
  • Report to Iberia Information Security Officer
  • Helping to implement key security programs for the business, including
  • Bachelor’s degree in Computer Science or an equivalent combination of education and experience required
  • Between 4 and 6 years of security experience
  • Strong communication skills including strong verbal presentation skills
  • Viewed as an expert in information security with strong analytical skills who is able to interpret complex information and adapt as needed
  • Experience working in matrix environment with globally diverse team members
  • CISSP, CRISC, CISA or related certification is a strong plus
  • Good knowledge of Security technology and standards, ISO-27001, PCI, DLP, IPS, IDS, Network Security, OS, Web Security, Mobility, Pentesting, etc
  • General knowledge and high interest on the state of art of security, malware, ransomware, virus, dark web, social engineering, data breaches, new threats, etc
  • Fluent English, spoken and written, is a must
  • The position might require travelling regularly to UK for short stays
42

Senior Information Security Consultant Resume Examples & Samples

  • Bachelor’s degree and 8 years of experience in IT security or an equivalent combination of education and work experience
  • Deep specialized and/or broad functional knowledge
  • Sound understanding of business and organizational strategies and processes
  • Ability to interpret internal and external business challenges and recommend best practices. Ability to lead complex projects
  • Sophisticated analytical skills and the ability to solve highly complex technical and business problems
  • Ability to influence others at senior levels to adopt a new perspective. Strong verbal and written communication skills
  • Bachelor’s degree in computer science or related focus
  • Certification in related focus (e.g., CISA, CIA, CISSP, CISM)
  • 7+ years progressive experience in Enterprise Information Security, systems development and/or Banking Operations, including the following
  • Knowledge of Information Security industry standards and best practices
  • Familiarity with key laws and regulations that impact Financial Institutions such as FFIEC, SOX and GLBA
  • Knowledge of the software development lifecycle and development skill in C,C#, Go, Python, Perl, Java, JavaScript and/or TCL
  • Proficient in UNIX, SAS, and SQL
  • Moderate networking and web development knowledge
  • Strong time and priority management skills and the ability to work on numerous projects/activities at the same time
  • Strong presentation skills in order to address small or large groups of all levels of employees or management
  • Ability to effectively communicate with management and peers and facilitate meetings
  • Must be analytical, detail-oriented, self-motivated and professionally assertive
  • Deep understanding of internet based technologies and services
  • Background in the banking or financial services industry
  • Experience with RSA, SilverTail, identity management, device identity, and other client security tools
43

Senior Information Security Consultant Resume Examples & Samples

  • Identify client security risks within their operational environment and determine appropriate remediation based on business risk appetite that protects information assets from loss, misuse, leakage or corruption
  • Create client security policies and procedures to meet corporate and regulatory requirements
  • Mentor others within the security team in a technical and consultancy capacity
  • Assist in the growth of Atkins information security services
44

Information Security Consultant Resume Examples & Samples

  • Provide security advice and guidance for clients in ‘business as usual’, technical refresh and new project environments
  • Identify and establish good security governance to meet client business requirements
  • Create client security policies and procedures to meet corporate and regulatory requirement
45

Senior Information Security Consultant Resume Examples & Samples

  • Network security monitoring over Bank information processed through joint venture/strategic alliances and third party arrangements ensuring that the Bank’s customers’ information continues to be protected as expected
  • Network security monitoring of the Bank’s Internet resources ensuring the appropriateness of resource settings, configuration & usage
  • Align with Security Operations to understand best practice
  • 1 Recommend, design, assess, implement, deploy and maintain network security controls required to protect Scotiabank networks for our clients
  • The Sr.Manager Security must be able to manage relationships with all levels of management and technical support personnel in order to provide relevant information and recommendations whenever the Bank's critical processing deadlines could be in jeopardy, and/or unacceptable information security risk may exist
  • As the focal point manage all aspects of virus and malicious software attacks and ensures that all applicable areas receive in a timely manner, applicable updated virus signature (DAT) files and virus scanning engines to maintain optimum anti-virus protection throughout the Scotiabank Group
  • Conduct specific investigations where necessary as dictated by monitoring, requests from Security & Investigations and/or Executives
  • Advanced knowledge of the Bank’s Network Security Strategy, associated policies, platform specific standards and control objectives as they relate to functional control systems (e.g. Logical Access Control, Change Control, Trusting Operating Systems Configuration, Key Management)
  • Extensive knowledge of network security applications including RealSecure, System Scanner, Internet Scanner, nMap, Encase, eTrust, Phone Sweep and Bank specific reporting (Solarwinds, Big Brother, Neotrace, Angel, Demon Dial, etc.) Detailed knowledge of TCP/IP protocols and associated risks, vulnerabilities and associated ‘best practice’ control mechanisms
  • A working knowledge of the Bank’s operating policies, procedures, ethics and values, and a familiarity with CPA/CBA standards, confidentiality/privacy codes and data integrity expectations of regulatory agencies are necessary
  • Ability develop risk based network security programs and translate them into periodic checks supported by documented procedures
  • Ability to lead a team to identify, address and investigate complex operational problems and out-of-policy issues that will frequently have a direct impact on customer service. The incumbent is expected to be able to communicate/escalate concerns/issues in an effective and consultative manner to ensure that they are understood and acted upon as expected. Sound judgment, based on practical experience will often need to be exercised in crisis/urgent situations, and the ability to explain and address conceptual, policy, risk management, and data processing architectural matters are essential skill-sets. The incumbent is required to be able to identify and communicate operational risk and control concerns to all levels of Management and to be able to evaluate conflicting needs. The management of conflict and need for consensus building will continuously arise
46

Information Security Consultant Resume Examples & Samples

  • Conducting vendor due diligence and identifying risks as they relate to Third Party’s information security practices
  • Conducting internal product and service risk assessments and determine inherent information security risk
  • Evaluating compliance with customer data protection requirements
  • Identify policy, process and system issues and propose enhancements as appropriate
  • 2-5 years of information security, risk management, and/or global privacy experience
47

Information Security Consultant Resume Examples & Samples

  • Business continuity & IT Disaster recovery plan design, test and implementation
  • Security assessments, secuirty benchmarking
  • Risk assessment, quantification and controls design
  • Processes design, managing risk mitigation plans and reporting
  • Preparation for ISO 27k (ISMS) (re)-certification audits
  • Compliance assessments, track compliance implementation and reporting
  • Bachelor’s Degree in information technology or similar
  • Minimum of 5 years of experience in risk assessing and applying information security and data protection controls
  • Minimum of 5 years of experience in developping continuity and disaster recovery plans
  • Must hold a security certification such as CISSP, CISA, CISM CRISC, etc
  • EGRC software tools e.g. RSA Archer or similar
  • Technical vulnerability assessment and management skills
  • Service management processes / ITIL, experience from IT operations
  • Implementation of Information Security Management System
48

Information Security Consultant Resume Examples & Samples

  • Align with and support the execution of the Information Security Office VSEM
  • Provide assistance in the implementation, maintenance, and monitoring of the information security program into in-scope operational areas (gap analysis, risk assessment, audit support, third party assessments, procedure/specification development, execution of recurring procedures, incident response)
  • Proactive administration, monitoring, maintenance, and troubleshooting of DLP application
  • Implement and manage an effective Information Security Awareness program
  • Provide leadership and support to SOX/MAR team to ensure program is effective and efficient
  • Special projects related to information security
49

Information Security Consultant Resume Examples & Samples

  • Execute Attack and penetration testing on web, mobile, thick client applications
  • Support the development community with guidance on remediation of the identified vulnerabilities
  • Role requires constant updating of skills and knowledge on the new vulnerabilities and come up with effective ways of identifying them
  • The role needs to drive the priority and time management of their own efforts and others (as applicable) to support/resolve assigned activities and communicate results and findings to the project team
  • Have a passion for application security testing and be able to share your passion and learnings with teammates and customers
  • Self-motivated and a self-starter. (If you have a question, find the answer, ask somebody, figure it out, and communicate.)
  • Strong Web application and Web services security experience with through understanding of application vulnerabilities, automated/manual testing, auditing and remediation techniques
  • Experience in database, application, and web server secure design, implementation & review
  • Understanding of application security guidelines/requirements from OWASP, OSTMM
  • Experience with application security architecture, Threat Modelling and Code Review
  • Familiarity with at least one network (Nessus ) and web application vulnerability scanners (HP Web Inspect, IBM AppScan, source code analysis tools (Fortify))
  • Strong experience with Unix/Linux and Windows operating systems
  • Basic understanding of any scripting languages like python, pearl, bash etc
50

Information Security Consultant With English Resume Examples & Samples

  • Offers consultancy advice and practical assistance on information security risk control matters throughout the organization
  • Works on information security strategies, architectures and remediation plans
  • Delivers consultation, cooperates on assessments, building, testing and deployment of business continuity and IT disaster recovery plan
  • Conducts information security risk assessments and control selection activities
  • Designs security delivery methods and tools
  • Definition and development of security control including those required to support external regulations
  • Designs and executes information security awareness training and educational activities
  • Very good knowledge of information security risk assessment, IT operational risk management and/or IT service (business) continuity management
  • Very good spoken and written English
  • Ability to work in multinational and virtual teams
  • Ability and willingness to travel and work at client site
  • Knowledge of IT and information security principles, techniques and technologies
  • Familiar with industry security standards such as ISO 27000, project management and ITIL
  • BC/DR Plan development methods
  • Experience from IT operations
  • Experience with IT Governance, Risk and Compliance and BCM software tools
  • Information security certification like CISSP, CRISC, CISM, CBCI or similar
  • Knowledge of a second foreign language
51

Information Security Consultant Resume Examples & Samples

  • Assist the system support, service desk and security operations center staff to properly operate and respond to service requests and security incidents relative to endpoint security
  • Participate in the Incident Response process and ensure endpoint protection solutions are properly maintained and operating. Interface with support teams and product support personnel
  • Lifecycle management of endpoint security products
  • Design, implement, management and maintenance of enterprise endpoint security infrastructure and products
  • Develop architecture for enterprise endpoint security to secure server, desktop, and laptop systems
  • Building, documenting, updating, planning, and testing endpoint security controls (anti-virus, encryption, file integrity monitoring, data loss prevention, etc.)
  • Support of endpoint security products
  • Design, implement and support endpoint security solutions to assist operational support staff in the resolution of advanced problems
  • Proactively monitor endpoint security infrastructure to ensure system uptime
  • Maintain documentation of processes and procedures to guide operational support staff in the operation of endpoint security solutions
  • Act as an advisor to incident response and operational teams on endpoint technology solutions and processes
  • Analyzes endpoint security threat information and produces reports to assist in the enhancement of capabilities within the Incident Response Process and inform management of threat trends
52

Information Security Consultant Vulnerability Remediation Resume Examples & Samples

  • You work in a virtual team for world-wide vulnerability remediation, tracking and monitoring the successful remediation of discovered vulnerabilities, respecting agreed deadlines
  • You are responsible for driving the remediation of vulnerabilities in all affected units revealed by automatic security scanners (e.g. IPINS and IPINSplus) or manual penetration tests, keeping the number of escalations at low level
  • You analyze vulnerabilities in co-operation with other vulnerability management units, prioritize their remediation and propose adequate measures
  • You identify affected assets and communicate with the owner/service manager
  • You clearly understand and communicate risks associated with vulnerabilities and describe technical residual risks for risk acceptance candidates
  • You facilitate vulnerability remediation strategies considering their feasibility and implementation efforts
  • You will take over the functional lead of team members in world-wide hubs (e.g. India)
  • You have a strong academic background holding a master degree in computer science or similar technical studies
  • Ideally you are certified as CISSP, CISM, GIAC or similar
  • You have long-time work experience in information security or IT infrastructure operation
  • You have a good understanding of vulnerability scanning, penetration testing, network security, system security and vulnerability remediation or vulnerability management
  • You have solid knowledge of protection concepts, ISEC policies, security assessments as well as CERT measure plans
  • You have already gained experience in information security or other IT projects, ideally as sub-project leader
  • You have a profound IT-know-how in operating systems, applications as well as middleware
  • Intercultural experience would be a plus
  • Your English and German is business fluent combined with strong communication and analytical skills
53

Senior Information Security Consultant Cyber Security Firewalls TCP IP Resume Examples & Samples

  • Evaluation of network architecture(s) and the appropriate deployment of intrusion detection monitoring systems within the Bank’s Internet; evaluation and sign off of change requests to the Bank’s firewalls assuring that only authorized changes are reliably implemented
  • Have a high understanding of escalation and urgency
  • Monitor intrusion detection probes, scans, attacks and asses through analysis appropriate actions for incident handling and reporting including active membership on the Bank’s Computer Incident Response Team (CIRT)
  • The Information Security Consultant must be able to manage relationships with all levels of management and technical support personnel in order to provide relevant information and recommendations whenever the Bank's critical processing deadlines could be in jeopardy, and/or unacceptable information security risk may exist
  • The incumbent will work closely with Global Security Operation Services and Enterprise Security Services, and will be responsible for IS&C Caribbean intake, as well as liaison with the Caribbean VP groups to ensure their security requirements are addressed
  • Perform server hardening and network vulnerability scanning of all Bank external Internet usage in a timely manner
  • A current, working knowledge of the Bank’s technical platforms particularly AS400, TCP/IP, Solaris, UNIX HP/UX, Win/NT and WIN/2000, hardening of operating systems, cryptographic key management concepts, and familiarity with other technical platforms is expected
  • Ability to effectively communicate period check results, both verbally and written within the IS&C department and externally to Bank management and internal audit
  • Ability to deal with highly technical issues and extremely complex diverse systems in the context of their impact on both the Bank’s data processing, business development and Scotia Service objectives
54

Information Security Consultant Resume Examples & Samples

  • Bachelors Degree and 4 or more years of experience in the Data Security area OR
  • Insurance or Financial Services Industry Experience
  • Background in risk assessments, general information security, measuring and assessing IT Security Controls
  • Experience developing detailed system security plans
55

Information Security Consultant Resume Examples & Samples

  • Participates in requirements gathering activities to understand business and technical requirements and infrastructure impact
  • Works along with the Product Owner and stakeholders to clarify business requirements, map them to systems capabilities, and implement technical solutions
  • Convert business requirements into technical terms for the development team, perform high level data analysis & detailed designs. Map the Business requirements into user stories in Rally tool
  • Works with Stakeholders to resolve requirements gaps uncovered in design or within specifications or requirements
  • Prepares and keeps technical documentation current for platform, service or package technical components
  • Effectively utilizes standard enterprise tools to develop or implement technical components
  • Utilize eGRC tools to develop or implement core and on demand solutions. Work on various Archer Integrations e.g. Datafeed, Data Import, integrations with other tools
  • Participates with the Stakeholders in defining operational readiness requirements and also helps in the user acceptance testing along with the stakeholders. Partners with the Stakeholders to write test cases in the form of user stories and report on the test results
  • Helps to verify implementation success. Provides ongoing configuration and development support post project implementation and act as the support partner for delivered Archer solutions. Helps in resolving all functional and technical incidents that are escalated
  • Follows continual improvement best practices by identifying and diagnosing improvement opportunities
  • Be the lead for the team
  • Partnering with stakeholders to understand the business value, problem and needs, document and analyze as-is and to-be processes, business data and success criteria –
  • Provide feedback and shape the design- Report out status to the product owner
  • Leads & partners with businesses and partner teams through the process of user acceptance testing and ensures that quality standards are met
  • Adheres to change and incident management standards and expectations
  • Stays current with capabilities of platform and other components
  • Collaborates with team to promote re-use and develop consistent implementation and support processes
  • Participates and leads the team in creating prototypes or proofs of concepts to review with the stakeholders
  • Experience in Java, C++ and other programming languages-
  • Experience /High level understanding of database structure Basic SQL, Relational database structure
  • Has in-depth knowledge of all Archer core solutions and its workflow
  • Maintains technical/functional knowledge within areas of expertise
  • Stays current with new and evolving RSA Archer versions via formal training and self-directed education
  • Knowledge of IIS settings, SQL Server, Javascript for Custom Objects, Archer API with .NET coding skills is a plus
  • Ability to understand and communicate design issues to users and stakeholders
  • Excellent communication skills to consult and understand stakeholder's requirements
  • Knowledge of common security systems, practices- Information Security experience is highly desirable
  • Experience using AGILE to manage projects SCRUM
  • Required Bachelor's/ Master’s Degree in Engineering or the equivalent experience
  • 7+ years total work experience (lead)
  • 5+ years work experience in RSA Archer configuration and administration
  • RSA Archer Admin certified
  • Security certifications, such as GSEC or CISSP, are a plus
56

Information Security Consultant Resume Examples & Samples

  • Infrastructure security controls (network and end user, including Identity and Access Management)
  • Cyber threats and intelligence, web security and applications security
  • Security risk assessment on projects, including business processes and third party suppliers. Promoting security awareness culture, including training and comms
  • Contributing to and maintaining the Information Security framework, meeting RSA Group Policy and regulatory requirements
  • Managing and monitoring performance of security controls, engaging with internal and external stakeholders including strategic technology partners
  • Providing Information Security advice, support and assistance to the business to ensure compliance with Policies and Standards
  • Engaging in governance processes to ensure change and projects comply with security policy
  • Manage existing and emergent information security risk
57

Senior Information Security Consultant Resume Examples & Samples

  • Subject Matter Expertise - Leads as information security subject matter expert to business areas, project teams and vendors to apply and execute appropriate use of technology solutions and leads efforts to examine technology vision, opportunities and challenges with regard to security standards and the impact of the technology
  • Project Oversight - Assesses project risk and complexity. Oversees project handoffs including preparing documentation, educating and supporting to ensure smooth transitions. Leads the selection and design of tools that allow reuse of design components and patterns between projects
  • Vendor/Tool Selection – Leads the research, evaluation, proof-of-concept, selection and implementation of technology solutions. Negotiates with vendors. Provides detailed analysis of pros and cons and build vs buy options. This includes interaction with vendors, IT and business area contacts to facilitate flexible, and scalable solutions. Ensures that the technical design considers security controls, performance, confidentiality, integrity, availability, access and total cost. Oversees working solutions or prototypes and resolves any issues that arise
  • Strategy & Architecture - Leads security strategy, architecture and tools in accordance with company standards, policies, procedures and other formal guidance, ensuring security technology standards and best practices are maintained across the organization
  • Process Improvement - Promotes implementation of new technology, solutions and methods to improve business processes, efficiency, effectiveness and value delivered to customers. Oversees operational, architectural and design documentation including procedures, task lists, and architecture blue prints
  • Information Security Risk Management - Matures information security risk management processes, program and strategy. Aligns information security activities with PCI, SOX, and GLBA regulatory requirements and internal governing enterprise risk management policies. Identifies security gaps and deficiencies by conducting risk assessments; recommend corrective action of identified vulnerabilities and weaknesses. Leads the planning, testing, tracking, remediation, and risk acceptance for identified security risks. Oversees the creation and publication of internal controls. Ensures requisite compliance monitoring is in place to identify control weaknesses, compliance breaches and operational loss events. Ensures adequate compliance resources and training, fostering a risk and compliance focused culture and optimizing relations with corporate compliance members and regulators
  • Due Diligence –Leads enterprise due-diligence activities including security monitoring and security metrics to evaluate effectiveness of the enterprise security program and established controls
  • Incident Response - Leads security incident response activities and post-event reviews of security incidents. Ensures the clear and professional documentation of root cause and risk analysis of all findings. Reviews and leads action plans for issue resolution. Leads investigation and reports contribution of security threats and incidents
  • Secure Application Development – Leads highly technical/analytical security assessments of custom web applications, mid-tier application services and backend mainframe applications, including manual penetration testing, source code and configuration review using a risk-based intelligence-led methodology. Identifies potential misuse scenarios. Advises on secure development practices
  • Secure Testing - Oversees security testing projects according to a structured process, including writing test plans, test cases and test reports. This may include configuration and deployment of security testing software and application of results to security analysis. Leads basic proof-of-concept exploits of vulnerabilities
  • 6-10 years of IT experience that includes at least 5 years in information security and 2 years in management
  • Indirect reporting structure with conflicting deliverables and timelines
  • Support 6500+ users across North America
58

Information Security Consultant Resume Examples & Samples

  • IT Assurance (30%): performs security metrics collection, end user platform quarterly health check, recertification review and design, and firewall reviews
  • Security Incident Response (15%): reviews application test result and remediation
  • Technology Implementation (15%): security system infrastructure and development consulting
  • Security Assessment (20%): assesses risk of systems and data centers
  • Initialization of application security test: (20%): review the results and guide the remediation efforts
  • Provide a single point of Information Security contact for Business Unit and IT Infrastructure
  • Proactively engage the businesses and IT to identify, document and drive remediation of information security/data risks and non-compliant activities
  • Escalate significant risks for information, remediation or action
  • Demonstrate continuous Information Security improvement by assessing and promptly reporting Corrective Action plan
  • Ensure that appropriate stakeholders are aware and familiar as to the state of controls and that they understand responsibilities for effective risk mitigation and remediation
  • Ensure timely engagement and delivery on information security, business and/or technology initiatives and projects
  • Engage with Business Managers and business staff to ensure non-compliant items are addressed
  • Identify systems access issues, troubleshoot and drive towards resolution at the speed of business
  • Strong risk management background
  • Bachelors degree or higher with a concentration in Information Technology, Business Information Systems, Risk Management or a related discipline
  • Technical aptitude, understanding of networking protocols and infrastructure designs required for role
  • Excellent problem solving abilities and analytical skills. Ability to see the big picture with high attention to critical details
  • Demonstrated ability to work effectively as part of a team, as well as, independently
  • Effective communicator; excellent writing and verbal skills
  • Ability to recognize technical issues, troubleshoot and resolve at the speed of business
59

Information Security Consultant With English Resume Examples & Samples

  • Security assessments, security benchmarking
  • Processes design, management of risk mitigation plans and reports
  • Technical vulnerability assessment and management skills, vulnerability assessment software tools
  • Knowledge of ISO 27001 (ISMS), experience with (re)-certification audits
  • Knowledge and experience with service management processes / ITIL, experience from IT operations
60

Information Security Consultant With English Hiring Resume Examples & Samples

  • Risk assessments, quantification and controls design
  • CISSP, CISA, CISM, CRISC or similar information security certification
  • Experience with eGRC software tools such as RSA Archer or similar
  • Knowledge of cloud security and disaster recovery principles
61

Information Security Consultant Resume Examples & Samples

  • Subject Matter Expertise – Serves as information security subject matter expert to business areas, project teams and vendors to apply and execute appropriate use of technology solutions and leads or participates in efforts to examine technology vision, opportunities and challenges contributing input with regard to security standards and the impact of the technology
  • Project Oversight - Assesses project risk and complexity. Oversees or performs project handoffs including preparing documentation, educating and supporting to ensure smooth transitions. Leads or assists with the selection and design of tools that allow reuse of design components and patterns between projects
  • Vendor/Tool Selection – Leads participates in the research, evaluation, proof-of-concept, selection and implementation of technology solutions. Negotiates with vendors. Provides detailed analysis of pros and cons and build vs buy options. This includes interaction with vendors, IT and business area contacts to facilitate flexible, and scalable solutions. Ensures that the technical design considers security controls, performance, confidentiality, integrity, availability, access and total cost. Develops working solutions or prototypes and resolves any issues that arise
  • Process Improvement - Promotes implementation of new technology, solutions and methods to improve business processes, efficiency, effectiveness and value delivered to customers. Creates operational, architectural and design documentation including procedures, task lists, and architecture blue prints
  • Information Security Risk Management - Matures information security risk management processes, program and strategy. Aligns information security activities with PCI, SOX, and GLBA regulatory requirements and internal governing enterprise risk management policies. Identifies security gaps and deficiencies by conducting risk assessments; recommend corrective action of identified vulnerabilities and weaknesses. Leads or assists with the planning, testing, tracking, remediation, and risk acceptance for identified security risks. Leads or assists with the creation and publication of internal controls. Ensures requisite compliance monitoring is in place to identify control weaknesses, compliance breaches and operational loss events. Ensures adequate compliance resources and training, fostering a risk and compliance focused culture and optimizing relations with corporate compliance members and regulators
  • Due Diligence –Leads or assists with enterprise due-diligence activities including security monitoring and security metrics to evaluate effectiveness of the enterprise security program and established controls
  • Incident Response - Leads or performs security incident response activities and post-event reviews of security incidents. Creates clear and professional documentation of root cause and risk analysis of all findings. Troubleshoots, recommends and/or executes action plans for issue resolution. Leads or performs investigation and reports contribution of security threats and incidents
  • Secure Application Development – Leads or performs highly technical/analytical security assessments of custom web applications, mid-tier application services and backend mainframe applications, including manual penetration testing, source code and configuration review using a risk-based intelligence-led methodology. Identifies potential misuse scenarios. Advises on secure development practices
  • Secure Testing - Leads or assists with security testing projects according to a structured process, including writing test plans, test cases and test reports. This may include configuration and deployment of security testing software and application of results to security analysis. Demonstrates basic proof-of-concept exploits of vulnerabilities
  • Mentoring –Interfaces with peers and senior leadership, communicates at all levels. Provides guidance to less experienced Information Security team members
  • 4-6 years of IT experience that includes at least 3 years in information security or Information Risk
  • Dallas based position (with limited telecommuting)
62

Information Security Consultant Resume Examples & Samples

  • Searching and Reporting
  • Creating Knowledge Objects
  • Creating Dashboards & Visualizations
  • Configuring lists & lookups
  • Correlation Searches
  • Common Information Model
  • Bachelors Degree and 5 or more years of experience in the Data Security area
  • Strong knowledge of information security concepts and security trends and practices
  • Familiarity with Enterprise Splunk and Splunk Enterprise Security strongly preferred
  • Tanium experience highly preferred
  • Programming or Scripting experience in Python, Powershell, Bash, etc
  • Written & verbal communications skills
  • Agile development experience
  • GAIC Security Certifications, CISA, CISM, or CISSP preferred
63

Information Security Consultant Login to Save This Vacancy Resume Examples & Samples

  • Provide SME consultation to enable project and supplier assurance
  • Determine the most effective way to protect computers, networks, software, data and information systems against any possible attacks
  • Keep abreast of security standards, security systems and authentication protocols
  • Plan, research and design robust security architectures for any IT project
  • Respond immediately to security-related incidents and provide a thorough post-event analysis,
  • Train fellow employees in security awareness and procedures
  • Coordinate security plans with outside vendors
  • Review and approve installation of firewall, VPN, routers, IDS scanning technologies and servers
  • Represent Information Security in Change Management
  • Anticipate new security threats and stay-up-to-date with evolving infrastructures
  • Collaborate with departments to improve security compliance, manage risk and bolster effectiveness
  • Experience of an Information Security role within a retail or similar organisation
  • An good level of knowledge in technical security protocols and mechanisms
64

Information Security Consultant Resume Examples & Samples

  • Conduct and lead Information Security Projects
  • PCI Data Security Assessments
  • IT Risk Assessments
  • IT Security Technology Implementations
  • Evaluate and/or Implement IS solutions and controls to ensure data security and integrity for our clients
  • Prepare reports or other necessary documentation to detail results of evaluation and otherwise meet the objectives of the Project
  • Submit recommendations to client for corrective action or to support a recommended approach to solving the client’s needs
  • Participate in planning and implementing client information systems, including structure, process, and security
  • Participates in strategic and tactical objectives to include new product offerings, identify additional client needs, and generating new business leads
  • Correspond with a variety of clients and communicate security issues, recommendations, and deliverables effectively
  • Bachelor's degree required, candidates must possess significant analytical skills which likely evolved from early academic training in Business Administration, Computer Science, Engineering, Information Systems or similar discipline
  • Experience with Payment Card Industry, payment applications, or POS/UAT/ATM hardware is preferred
  • Knowledge of point to point encryption, tokenization, Chip and PIN (EMV), and mobile payment solutions
  • System and network administration experience on UNIX (any flavor) and Windows platforms is essential
  • Knowledge of security areas such as Auditing, Policy, Database Security, Firewall Design and Implementation, Risk Analysis, Identity Management, Access Management, or Web Services, Application development is very desirable
65

Information Security Consultant Resume Examples & Samples

  • Provide guidance on building and/or maturing information security programs, detecting and responding to computer security incidents, and implementation of tools and technologies used for enterprise security
  • Evaluate client needs, coordinate design for a solution, and clearly communicate the value proposition of complex and highly technical subjects
  • Implement and/or assess existing security controls
  • Provide expert level knowledge of tools and technologies used for enterprise security
  • Interface with clients to address concerns, issues or escalations; track and drive to closure any issues that impact the service and its value to clients
  • Proven ability and understanding of the components that comprise a successful information security program
66

Senior Information Security Consultant Resume Examples & Samples

  • Responsible for design and implementation of security strategy, architecture and platforms
  • Accountable for adhering to enterprise architecture standards, ensuring security technology standards and best practices are maintained across the organization and contributing to enterprise architecture strategy-setting
  • Participates in IT security efforts across all business areas and client groups
  • Troubleshoots, recommends and executes action plans for issue resolution
  • Investigates and reports on security threats and incidents
  • Conducts post-event reviews of security incidents
  • Maintains operational, architectural and design documentation including procedures, task lists, and architecture blue prints
  • Establishes and maintains relationships with IT and business area partners to evaluate designs and controls
  • Health care industry related experience is preferred
  • Florida Health Care Plans "FHCP" related experience is preferred
  • Platform as a Service "PaaS" design, build, deploy, govern
  • Information Security Authentication and Authorization development, SAML, Single Signon, Federation
  • CA-SiteMinder/IdentityMinder
  • Experience using Agile methodology
67

Information Security Consultant Resume Examples & Samples

  • Bachelor’s degree in computer science or relevant field or equivalent demonstrable experience
  • 7+ years of experience in security field specially around security assessments or audit field
  • CISA, CISM, PCI QSA or comparable certifications preferred but not required
  • Ability, drive, motivation to research and provide the right guidance and find possible solutions. Ability to push back where the risk outweighs the benefits
  • Process driven, and has eye for detail, automation and efficiency to improve programs/processes
68

Information Security Consultant Resume Examples & Samples

  • Conduct DST associate user provisioning for TA2000 access, PeopleSoft Financials, AWD, and Powerselect. Encryption certificate management for both public key private key encryption and SSL encryption
  • Conduct security risk assessments and application security assessments. Also tracks and reports on open issues through remediation
  • Develop and maintain the enterprise security awareness program. This includes the annual security exam, security awareness videos and job specific security training
  • Responsible for the Cyber Security response
  • Bachelor’s degree and 5+ years of applicable information security experience demonstrating a comprehensive knowledge of information security practices, standards, industry trends, etc
69

Information Security Consultant for Role Based Access Control Resume Examples & Samples

  • Schedules the first round of role engineering workshops for a business community
  • Sends remediation actions to Access Management team for all systems analyzed during role engineering
  • Communicate with various members of the role management team, systems managers and business community as necessary during the role management
  • Initiate and monitor role life cycle events
  • Provide feedback on role engineering and maintenance processes to help improve efficiency
  • Accountability: Meets established expectations and takes responsibility for achieving results; encourages others to do the same. Employs focus, attention to detail, reliability, and appropriate prioritization to drive outcomes. Sees opportunities to contribute and takes the initiative to create solutions
  • Interpersonal Effectiveness: Understands oneself, effectively manages emotions, and displays awareness of how one's actions affect others. Listens and communicates with respect and empathy toward others. Builds trusting relationships through accountability and integrity in actions
  • Ability to positively and effectively represent the Role Based Access Control (RBAC) Program to the business community and System Managers
  • Microsoft Office and Outlook skills required
  • College degree in Information Systems, Computer Science, or Business
  • Experience with Segregation of Duties program
70

Information Security Consultant Resume Examples & Samples

  • Support divisional security program activities like conducting/facilitating application security assessments, and providing
  • Support the development and enforcement of Global information security policies and standards; work with business
  • Two years or more of progressive technical security and information risk management experience in multiple disciplines /
  • Relevant professional certifications (e.g., CISSP, CISM, CISA) preferred
  • University Degree (Computer Science, Business or Finance preferred)
  • Excellent communication skills (oral and written) including presentation skills and demonstrated ability to present at all
71

Information Security Consultant Resume Examples & Samples

  • Information Security governance
  • Minimum 4-6 years professional experience with 4+ years in information security or related fields
  • Risk management and IT security skills
  • Experience in a complex matrix environment
  • CISSP, CISA, and CISM certifications is a plus
  • General, working understanding of security concepts and architectures
  • General, working understanding of IT security and compliance controls
  • Understanding of operating system platforms and security models
  • Understanding of holistic set of IT technologies and processes (operating systems, databases, networking, web/application, change management, SDLC, disaster recovery, monitoring, help desk)
  • General knowledge of regulatory requirements relevant to the business
  • Local language skills plus English language proficiency
72

Information Security Consultant Resume Examples & Samples

  • Best Practice Information Security Policies
  • ISO 27001/ISO 27002 Standards
  • Process/Solution Design
  • Policy/Standards Documentation
  • Change Management
  • Data Analysis and Modeling
  • Work as a team with others
  • Build strong relationships with colleagues
  • Identify opportunities
  • Identify personal priorities
  • Demonstrate enthusiasm
  • Deliver work to high standard
  • Solve challenging problems
  • Be driven to improve yourself and the way things are done
73

Information Security Consultant Resume Examples & Samples

  • Provide overall information security governance in Greater China (including China, HK & Taiwan) and ensure the information security missions are consistently and effectively executed across the region
  • Collaborate with Risk Management team to assess Cyber risk exposure for business units (BUs) and share Regional and BU level IT security dashboard to help management to understand the IT security risk exposure
  • Engage the business units to perform various kind of assessment and drive remediation, including Cloud Security assessments, Vendor assessments, Business / IT application assessments, Regulatory assessments, IT Compliance assessments, IT Risk assessment, Themed Security Reviews, etc
  • Collaborate with internal stakeholders to ensure application security controls are implemented throughout the application development life-cycle
  • Facilitate the Global Security Awareness & Education initiatives and drive the programs at BU level
  • Coordinate and facilitate IT Security incidents response and forensic investigations
  • Communicate the Cyber threat alerts to the BUs and ensure the actions recommended by Global Cyber Threat Intelligence team are completed at BU level
  • Minimum 4 years of relevant experience in information security or related areas
  • CISSP, CISA, CISM certification is preferable
  • Strong in stakeholder management
  • Strong communication skills, especially the ability to communicate the security-related concepts to a broad range of technical and non-technical staff
  • Sound knowledge in cyber risk management, security architecture, regulatory compliance, etc
  • Good understanding of operating system platforms and security models, holistic set of IT technologies and processes, including networking, web/application, change management, SDLC, disaster recovery, monitoring, help desk, etc
  • Good command in both spoken English and Chinese
74

Information Security Consultant Resume Examples & Samples

  • Our client will train all new personnel to execute these duties according to our policies and procedures. Conduct assessments of existing IT architecture for compliance with security requirements from applicable security frameworks (such as FISMA, ISO 27001, etc.)
  • Two or more years functioning in an operational IT role with exposure to diverse IT architectures, demonstrating progressive growth of skills and responsibility
  • Advanced writing skills: able to clearly articulate ideas for executive level consumption as well as technical staff consumption
  • Intermediate presentation skills: able to interview engineers on technical subject matter as well as brief executive level stakeholders
75

Information Security Consultant for Segregation of Duties Resume Examples & Samples

  • Participate in enterprise-wide projects providing guidance on security best practices
  • Facilitate the onboarding of new technologies and processes, including documentation, communication, training, and implementation
  • Serve as designated SME for Segregation of Duties program
  • Provide control guidance and control recommendation to internal IT and business partners
  • Deliver training on current and new processes and provide coaching and feedback to associates
  • Provide feedback on corporate standards and policies
  • Work independently while providing consistent feedback to leadership
  • Lead problem identification, root cause analysis, and implementation of solutions
  • Represent Enterprise Information Security in cross-functional meetings
  • Provide guidance to peers on issues related to Information Security
  • Collaborates: Engages others by gathering multiple views and being open to diverse perspectives, focusing on a shared purpose that puts Humana's overall success first. Develops and strengthens networks and relationships, both inside and outside the organization, that support company performance. Proactively and transparently contributes information and energy toward creating value with others
  • Two years of corporate IT security experience
  • CISSP (or comparable security certifications), PMP preferred
  • Audit process experience desired
  • Business process experience desired
  • Typically requires a Bachelor’s degree and 5 years of related experience; Or Advanced degree and 3 years of experience or equivalent work experience
  • Ability to positively and effectively represent the Segregation of Duties (SOD) Program to the business community and System Managers
  • Experience with Segregation of Duties implementations and methodologies
  • Basic understanding of business processes (financial, customer administration)
  • Proficiency with the Microsoft Office Suite, including Visio
  • Ability to work in a fast-paced, dynamic, and changing team-based environment
  • Ability to perform root cause analysis leading to problem resolution of information security issues
  • Ability to lead project activities to meet established objectives
76

Senior Information Security Consultant Resume Examples & Samples

  • Responding and investigating reported incidents within a defined service level agreement
  • Providing computer forensic services including the examination of computers and other digital devices and interpreting forensic evidence and information as appropriate
  • Identification, acquisition, recovery, cleansing, mining and securitization of information assets
  • Ensuring proper chain of custody is maintained and that all evidence recovery and collection methods are conducted, managed, and archived in a manner consistent with maintaining preservation and protection of data and evidence in its original form
  • Performing root cause analysis and post mortem reviews as appropriate
  • Ensure highest standards of integrity are maintained at all times throughout an investigation
  • Provide technical expertise in development and support of all activities, processes, procedures and tools used for validating and ensuring the integrity of information security
  • Provide technical support to clients, management, security operations and network operations
  • Define and support implementation of the optimal security configuration for all IT hardware and software
77

Privacy & Information Security Consultant Resume Examples & Samples

  • Implement privacy and security strategy and tactics; including execution of Security triage, Privacy Impact Assessments, privacy and security risk remediation, and management of Security projects
  • Partner with the business and assist in determining and implementing privacy and security requirements for new business and technology projects
  • Conduct risk assessments and communicate both detailed and summarized results to key Technology, Legal and business process stakeholders
  • Collaborate with departments across the company on privacy and data protection matters, ensuring that adequate procedures are in place to comply with privacy laws, regulations, and company policies
  • Communicate privacy policies and practices to stakeholder groups
  • Communicate security and privacy issues and champion ideas for remediation
  • Create consensus across cross-functional Technology teams and the Business for win-win approaches to managing security and privacy risks
  • Keep current with privacy legislation and industry trends, analyze and deftly communicate potential impacts to existing business practices
  • Plan, organize and manage projects and process enhancement work efforts
  • Directly contribute to major projects or programs within the department or functional area
  • Apply project management methodology to the privacy program work efforts to ensure project or phase goals, budgets and timelines are met
  • Lead training and education sessions for product, development, testing, and operations teams
  • Contribute to the development and deployment of security and privacy training and awareness materials for company-wide use
  • Provide general guidance/direction or train junior-level support and professional personnel
  • Champion established strategic vision and drive adoption of key long term goals with clear communication of security risks and objectives to Technology and Business partners
  • Determine patterns and gaps at a strategic level and recommend appropriate course of action to support privacy and security strategy and company goals
  • Facilitate process and workflow review, documentation, and re-engineering to meet company privacy and security goals
  • IAPP privacy certification (e.g. CIPT, CIPP, CIPM)
  • Bachelor's degree in a technology field, or equivalent experience
  • 5 or more years of experience in Privacy, IT Security, Compliance, Audit, Legal, or Systems/Application Development or related technology field
  • Ability to independently perform assignments with instructions limited to results expected
  • Ability to clearly summarize complex problems and tailor messaging for intended audiences
  • Familiarity with project management principles and methodologies
  • Motivated team player with history of collaboration and willingness to learn and adapt quickly within changing environments
  • Excellent strategic thinking skills, creative problem solving and analytical skills
  • Strong verbal and written communication skills, including meeting facilitation and stand-up presentation skills; excellent interpersonal skills
  • Strong ability to communicate with internal clients and stakeholders regarding the importance of privacy and security
  • Strong attention to detail, well-organized and able to manage time effectively
  • Demonstrated ability to produce high quality work in a timely fashion
  • Proven ability to maintain discretion and confidentiality
  • Ability to travel as required; estimate 25%
78

Senior Information Security Consultant Resume Examples & Samples

  • Working knowledge of industry frameworks and standards such as ISO 27001/27002
  • Experience with designing, developing and implementing security processes, controls and technologies
  • Working experience with Vulnerability Management, IDS/IPS, and Incident Response
  • Experience with reporting security metrics (dashboards, KPIs, KRIs)
  • Ability to operate effectively within Windows and TCP/IP network
  • Understanding of Web applications and Layer 7 network protocols
  • Ability to operate independently as an information security advisor and, where necessary, a hands-on contributor on technology deployments and other projects