Information Security Engineer Resume Samples

4.6 (106 votes) for Information Security Engineer Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the information security engineer job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
GG
G Grant
Gaetano
Grant
89987 Arlo Brook
Los Angeles
CA
+1 (555) 177 5273
89987 Arlo Brook
Los Angeles
CA
Phone
p +1 (555) 177 5273
Experience Experience
Phoenix, AZ
Information Security Engineer
Phoenix, AZ
O'Keefe-Gislason
Phoenix, AZ
Information Security Engineer
  • Provide training, presentations and coaching on project management and/or process improvement
  • Assist the Network Engineer in the development of technical policies and procedures regarding LAN/WAN activities
  • Work closely with development teams to implement and maintain a robust Security Development Lifecycle
  • Provides central contact point for user support and problem management for managed security applications (Firewall, IDS, Encryption, SIEM, EIQ, Web filtering)
  • The selected qualified candidate will be expected to lead aspects of the framework development and improvement. Specific responsibilities include
  • Assist product management and development teams with security guidance, expertise and training
  • Develops automation routines to assist in daily workflow of security requests and incidents
present
Philadelphia, PA
Information Security Engineer
Philadelphia, PA
Klein-Kertzmann
present
Philadelphia, PA
Information Security Engineer
present
  • Work directly with Network and System engineers to understand and document network control systems/equipment, network diagrams and firewall configurations
  • Perform network monitoring and capacity planning, ensure network performance meets SLAs (5%)
  • - Working knowledge in Telos XACTA Information Assurance Manager software and DoD Risk Management Framework (RMF)
  • Work closely with the Information Security Officer (ISO) to develop and execute on security initiatives and risk management
  • Routinely conducts security risk assessments and provides recommendations to management to improve the security of the systems/network
  • Work with Engineering to maintain Data Loss Prevention system performance and health
  • Establish and maintain effective working relationships with end users, vendors, and managers
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Iowa State University
Bachelor’s Degree in Computer Science
Skills Skills
  • Exceptional oral and written communication skills, ability to work independently with minimal supervision, and results-focused mindset are highly desirable
  • Demonstrating an ability to work under stress/pressure to meet deliverables, timetables and deadlines
  • Excellent interpersonal skills and a professional demeanor; ability to work effectively with all levels of Firm personnel and vendors
  • Knowledgeable in DLP, SIEM, AV, APT and Vulnerability Analysis principles
  • In-depth knowledge of web application vulnerabilities and ability to articulate their impact to business users
  • Able to work under pressure and balance work load to ensure measurable progress on multiple high priority projects
  • Strong working knowledge of remote access types and their security implications
  • Ability to automate basic scripting and reporting tasks via secure coding standards
  • Strong working knowledge of Cisco ASAs including software versions 7.x, 8.x and 9.x
  • Excellent knowledge of Information Security standards, frameworks, and best practices for large corporate environments
Create a Resume in Minutes

15 Information Security Engineer resume templates

1

Information Security Engineer Resume Examples & Samples

  • Implement technical solutions to contractual requirements supporting SSAE16, FISMA, ISO 27001
  • Recommend and coordinate the application of fixes, patches, disaster recovery procedures in the event of a security breach
  • Research emerging technologies in support of security enhancement and development efforts
  • Conduct risk assessments, penetration tests and diagnose internet/extranet security, intrusion attempts, and cyber-crime response
  • Solid familiarity with application and network security
  • Must be able to perform hands-on support for a wide range of security technologies including, but not limited to: SEIM, IDS/IPS, HIDS, malware analysis and protection, content filtering, logical access controls, identity and access management, and data loss prevention, content filtering technologies, application firewalls, vulnerability scanners, LDAP, forensics software, security incident response, Identity Management (IdM)
  • This position can be located either in our Los Angeles, CA or Englewood Cliffs, NJ offices!
  • Bachelor’s Degree in Computer Science or related field; or equivalent post highschool education and/or work related experience
  • Three (3) years in a system administration (e.g., Network, Windows) role
  • Experience in working with compliance and regulatory program requirements
  • Experience analyzing network, event and security logs, and/or IDS alert logs
  • Excellent written communication skills, demonstrating the ability to write with purpose, clarity, and accuracy
  • Excellent teamwork skills
2

Information Security Engineer Resume Examples & Samples

  • 5+ years information security experience on Windows, Unix, and Linux platforms
  • WebSphere, WebLogic, Tomcat, Apache
  • Cloud, Virtual, Wireless, Mobile, and ActiveSync technology exposure a plus
  • Proven ability to assess and influence capital project design and delivery decisions
  • Familiarity with current legal and regulatory requirements around information security and privacy, including PCI, SOX, HIPAA, GLBA, etc
3

Information Security Engineer Resume Examples & Samples

  • Strong practical & theoretical understanding of security strategies and technologies including secure global network design, remote computing, desktop and server hardening, Compliance Auditing, Secure Software Development, Software Auditing, Penetration Testing and Security Monitoring
  • Good awareness and understanding of the Barclay’s business unit responsibilities and structure
  • Ability to identify specific information security technical build guides and best practice deficiencies within the global organization
4

Information Security Engineer Resume Examples & Samples

  • Perform threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from known vulnerabilities
  • Apply patches where appropriate and, at the direction of the Senior Manager, Information Security, remove or otherwise mitigate known control weaknesses, such as unnecessary services or applications or redundant user accounts, as a means of hardening systems in accordance with security policies and standards
  • Participate in infrastructure projects to develop, plan, and implement specifications for network and distributed system security technologies in support of key information systems
  • Locate and repair security problems and failures
  • Collate security incident and event data to produce exception and management reports
  • Strong customer/client focus, with the ability to manage expectations appropriately, provides a superior customer/client experience and builds long-term relationships
  • Experience in developing, documenting and maintaining security procedures
  • Knowledge of information security principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management
  • Technical proficiency with security-related systems and applications especially firewalls and web proxies
  • Experience with Fortigate, Cisco ASA, Cisco Ironport Email Gateway, AirWatch MDM, AirTight IPS, Windows Servers, RedHat Linux, McAfee ePolicy Orchestrator and LogRhythm SIEM a plus
  • Strong knowledge of TCP/IP and network administration/protocols
  • 5+ years of information technology experience including at least 3 years information security experience with solid background in information security and data privacy protection
5

Information Security Engineer Resume Examples & Samples

  • Work in collaboration with Nordstrom IT Infrastructure and Development teams to apply security best practices at the right level to meet business objectives
  • Evaluate, recommend, and implement commercial hardware and software security products to augment and enhance the Nordstrom enterprise security program
  • Act as a technical advisor for a variety of information security projects that arise from current business and technological developments
  • Ability to assess risks and provide innovative countermeasures and solutions that balance between security and business requirements
  • Ability to evaluate, troubleshoot, and identify issues with security infrastructure technologies at an enterprise level
  • Provide guidance to security analysts, business partners and IT staff when new projects are introduced to the business through all phases of the application life cycle
  • Evaluate threat intelligence information in order to identify trends, patterns, and indicators within the environment
  • Hands-on experience installing, configuring, and supporting security related hardware and software such as Enterprise Anti-Virus/Malware, Data Loss Prevention, File Integrity Monitoring, Encryption, and Security Auditing
  • Strong understanding and experience in computer security incident response activities for network intrusions, virus infections, and internal security violations
  • Create and maintain project plans related to security systems analysis and implementation
  • Participate in department on-call rotation
  • 5+ years IT infrastructure proficiency and experience including: Encryption, Tokenization, Forensics/eDiscovery, Penetration Testing, Web Application Firewalls, Firewalls, Proxies, Routers, VPN, etc
  • Strong knowledge of application development with a focus on information security
  • Development experience with a variety of common scripting languages - .NET, Java, PowerShell, PERL, VB, etc
  • Experience with a variety of common relational database systems and LDAP a plus
  • Wireless, Mobile and ActiveSync technology proficiency is a plus
6

Information Security Engineer Resume Examples & Samples

  • Conduct security administration tasks including security infrastructure management and monitoring in the areas of network monitoring, vulnerability assessment, data and compliance monitoring
  • Lead information and technology security-related incident handling and incident response activities
  • Research and provide notification to the organization of emerging security threats
7

Information Security Engineer Resume Examples & Samples

  • 3+ years of experience with integrating security COTS tools
  • 3+ years of experience with administering multiple operating systems, including Linux and Windows
  • 2+ years of experience with the analysis, detection, and handling of security events
  • 2+ years of experience with Security Information and Event Management Tools
  • 2+ years of experience with developing and deploying solution proof of concepts and capability demonstrations
  • Knowledge of IT security principles
  • Experience with using regular expressions (REGEX) with a scripting language
  • Experience with deploying and managing Splunk or equivalent SIEM technologies
  • Experience with one or more high-level Open Source scripting languages, including Shell, PERL, or Python
  • Experience with Open Source monitoring tools
  • Experience with Linux scripting, including SH, BASH, or KSH
  • Experience with designing, developing, and implementing identity and access management solutions and technologies
  • Knowledge of information security best practices
  • Knowledge of threat mitigation technologies and techniques
  • BS degree in Information Security, Information Systems, or a related field
8

Information Security Engineer Resume Examples & Samples

  • Provides information to security management in the maintenance, development and deployment of new and existing policies, processes and systems
  • Provides multi-domain expert level Information Security guidance and direction to business, IT, and audit and control organizations
  • Provides technical input for the design, deployment and operation of security management software and hardware devices including, but not limited to: antivirus defense, intrusion detection, encryption systems, authentication and access control systems, network scanning and vulnerability assessment, etc
  • Provides senior level technical and analytical guidance for the security incident response team. Applies forensic investigation techniques to document root cause and impact of detected computer security incidents
  • Supports EISM, ISE I, and ISE II in information security assessments or audits of internal networks and systems with the EISM. Document findings in written reports with recommendations for remediation
  • Provides input for plans and helps coordinate technical security architecture, design and development
9

Information Security Engineer Resume Examples & Samples

  • Responsible for personal development through enhancement of technical skills and active participation in the performance management process
  • Continues to grow a personal support network by developing and building relationships throughout all of Technology, Operations and Information Security
  • Develops effective leadership and teamwork skills
  • Takes actionable intelligence and creates detection rules in a variety of security sensors
  • Engineers and configures integration with SIEM product
  • Develops advanced scripts for manipulation of multiple data repositories to support analyst requirements
  • Develops advanced reports to meet the requirements of key stakeholders
  • Develops scalable security management tools and processes
  • Develops automation for security tools management
  • Develop and implement appropriate policy rules for monitoring and alerting
  • Documents requirements, processes and procedures
  • Collaborates with key stakeholders within IS and the VSIRT to develop specific use cases to address specific business needs
  • Advanced knowledge of content creation concepts and best practices
  • Minimum of 2-5 years working with Web Application Firewalls (WAFs) in a large, mission-critical enterprise environment
  • System administration experience in a Windows and Unix environment
  • Experience securing web applications
  • Database security experience
  • Experience integrating solutions in a multi-vendor environment
  • Understanding of Information Security policies specifically around threat detection and mitigation
10

Information Security Engineer Resume Examples & Samples

  • The candidate should be a self-starter who is highly motivated and willing to learn a constantly evolving skill set
  • Candidate should have at least 5 years of experience supporting a multiple customer base in a fluid system and network environment
  • Candidate should have excellent verbal and technical writing skills, as well as the ability to effectively convey information security concepts and requirements to a non-technical audience, including both internal and client-facing engagements
  • Experience with advanced malware solutions such as FireEye
  • Executes established processes to correlate and assess security events
  • Works on investigations and forensic analysis activity in support of Legal Compliance/Corporate Investigations
  • Serves as the primary liaison between Information Security and Legal ensuring efficient, secure data collection and evidence from various sources required for litigation or investigation; defines and maintains data collection processes and procedures, including comprehensive documentation; ensures data retention practices are intact to support litigation e-discovery demands
  • Maintains security event and discovery/detection tools
  • Develops security solutions using structured development methodology in accordance with corporate standards
  • Provides timely and sufficient response to security incidents and assessment services. Documents findings
  • Promotes security awareness
  • Works towards exceeding service levels and customer expectations
  • Assists in defining processes to carry out all security operationsfunctions
  • Continuously works to improve the quality of information security services
  • Provides data for operational metrics and progress reports
  • Hands on experience with vulnerability scanners
  • Security or network certifications including the CISSP (Certified Information Systems Security Professional) and CCSP (Cisco Certified Security Professional) Experience in a 24x7 SOC (Security Operations Center)
  • At least 5 years’ experience in information security
  • Bachelor’s degree in computer science, specialized systems training, or equivalent work experience
  • Experience in an operational and/or user support organization maintaining IDS/IPS infrastructure
  • Experience responding to and resolving security based incidents
  • Strong, organizational, analytical, and interpersonal skills
  • Ability to communicate complex technical concepts effectively both orally and in writing
  • Ability to execute with a sense of urgency
11

Information Security Engineer Resume Examples & Samples

  • Data Loss Prevention policy creation and management
  • Monthly Data Loss Prevention policy tuning
  • Endpoint testing following standard testing methodologies
  • Integration of Data Loss Prevention data with SIEM, metrics, and ticketing systems
  • Work with vendors and internal teams to respond to escalations
  • Work with Operations to decrease false positive events and improve response and remediation processes
  • Work with Engineering to maintain Data Loss Prevention system performance and health
  • Advanced knowledge of Data Loss Prevention and Endpoint Protection
  • Advanced knowledge of Macintosh operating system
  • Working knowledge of Websense DLP technology
  • Ability to work with multiple teams to resolve complex issues
  • Ability to manage multiple projects and tasks
  • Five years of progressive experience with increasing responsibility in Information Technology, Information Security and/or Compliance that includes a combination of technical and project leadership responsibilities
  • Five years or more experience with requirements gathering, system analysis, system development, and implementation
  • Familiar with compliance regulations such as SOX, PCI-DSS, and GLBA
  • Excellent communication and technical writing skills
  • CISSP, CISA, CISM, GIAC or other information security certifications preferred
  • Bachelor’s degree (or equivalent) in Computer Science, Computer Information Systems or a related field
12

Information Security Engineer Resume Examples & Samples

  • Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems and databases, including fraud threats
  • Research, recommend, and implement changes to enhance systems security
  • Educate and communicate security requirements and procedures to all users including new employees
  • Writes and edits to transfer information to individuals involved in systems support process
  • Expertise in fraud prevention, mitigation, and intelligence gathering techniques and control development
  • Proactive mind set
  • Requires a Bachelor’s in Computer Science, Information Systems or related field
  • 4+ years of IT and security work experience with a broad exposure to systems analysis, applications development, database design and administration or other directly related experience. A combination of education and experience may meet requirements
  • Extensive knowledge of data security issues practices and procedures
  • Knowledge of network security, application security, database administration, programming , systems analysis procedures, database software and operating systems
  • Ability to communicate complicated concepts in writing
  • Ability to evaluate information security controls and identification of potential risk
13

Information Security Engineer Resume Examples & Samples

  • 5 years of increasing responsibility in a security analyst or engineer role
  • Engineering experience with: RSA Authentication Manager, FireMon appliances, SNORT, Cisco IronPort web and mail proxies, Log aggregation and SIEM technologies, Symantec Endpoint Protection
  • Security , SSCP, other IT Security certifications preferred
14

Information Security Engineer Resume Examples & Samples

  • Responsible for coordinating and executing vulnerability testing and reporting on internal and 3rd party systems
  • Responsible for coordinating and executing network penetration tests of Intranet and Internet networks
  • Responsible for coordinating and executing application, web and mobile services as required
  • Partners with application owners on remediation tracking and reporting to ensure that identified vulnerability are addressed in a timely and reasonable manner
  • Responsible for coordinating and executing application architecture and engineering reviews to help ensure that new services are secure by design
15

Information Security Engineer Resume Examples & Samples

  • Associates degree or Apprenticeship
  • 6-8 years of experience
  • CISM, CISA, CCDP, CCNP, CCSE, CCSA preferred
  • Experience and skills necessary for this position
  • System engineer, network engineer, security engineer, ISE I
16

Information Security Engineer Resume Examples & Samples

  • Improve Autodesk’s ability to detect intrusions in real-time
  • Build intelligence feeds integrations with security alerting and response systems
  • Participate in peer groups to enhance Autodesk’s ability to track threats and threat adversaries
  • Gather threat intelligence (OSINT and Private) and build, optimize, and automate systems to consume threat feeds
  • Strong background in programming, packet analysis, host and network security tools and encryption protocols
  • The following certifications are desired: GIAC (various), Security+, CEH, Microsoft, CISSP alternately you have authored or contributor to a security or other tool
17

Information Security Engineer Resume Examples & Samples

  • Design, develop and implement process, tools and automation to help in effective security operations
  • Implement solutions for continuous improvement of exiting process for vulnerability management, hardening, security monitoring and security operations
  • Evangelize secure operations in the team and act as a mentor to other team members
  • Master’s degree (M.S) in computer science or related field, or Bachelor's degree (B.A.) and equivalent work experience, education requirements can be relaxed for the right candidate
  • 3+ years in the area of information technology in three of the following areas: systems engineering, networking, applications engineering, security, databases, storage, client-side technologies or systems' administration, experience requirement can be relaxed if the candidate as authored tools or have published research papers
  • Advance system administration skills on Linux and Windows environments
  • Excellent analytical and organizational skills, ingenuity and the ability to work as part of a team
  • Experience with vulnerability assessment and patch management tools like Qualys, Nexpose, Nessus, WUSU, SCCM, Chef, puppet, etc
  • Up to date with security attacks and latest security research
  • Advanced interpersonal skills to effectively promote ideas and collaboration at the various levels of the organization
  • Experience working with security vendors, including submitting feature requests, evaluating products and analyzing security functionality of a diverse set of product
  • Any of the following certifications a plus: GIAC (various), Security+, CEH, Microsoft, ITIL
  • Experience with securing cloud environments
18

Information Security Engineer Resume Examples & Samples

  • 2-4 years of Technical Security Experience
  • 2-4 years of Penetration Testing and Vulnerability Scanning Experience
  • Knowledge of network protocols (SSL, DNS, NTP, Syslog, SMTP, SNMP, Radius, and LDAP)
  • Programming skills (One or more Java, Perl, Ruby, Python) with focus on exploitation
  • General knowledge of operating Cloud Computing environments and security issues related to those environments
  • Ability to prioritize multiple projects
19

Information Security Engineer Resume Examples & Samples

  • Enrolls various applications in security monitoring tools
  • Minimum of 5 years working with Web Application Firewalls (WAFs) in a large, mission-critical enterprise environment
  • Experience working with multiple security sensors
  • Experience integrating solutions in a mutli-vendor environment
  • Minimum 5 years of network or systems security experience with minimum 3+ years’ experience deploying, configuring, troubleshooting, and maintaining security sensors
20

Information Security Engineer Resume Examples & Samples

  • Daily IAM tasks
  • AD project tasks via tickets
  • Production support
  • SOX PCI Project analysis & design
  • Direct requirements to RACF engineers
  • Maintain existing Power Shell scripts
  • Banking/financial services experience
  • Information security experience in enterprise environments
  • Cisco, Firewalls, Nokia, McAfee, RACF, Windows, and UNIX experience
  • One or more industry recognized technical or security certifications: Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), etc
21

Information Security Engineer Resume Examples & Samples

  • A bachelor�s degree in a technical discipline and a professional certification, CISSP, CISM or related SANs certifications preferred
  • 1-8 years of professional work experience in the information security realm
  • Ability to communicate and collaborate effectively with other team members in a geographic and culturally diverse workforce and to convey concepts related to cybersecurity to both technical and non-technical audiences
  • Strong data analysis skills, both quantitative and qualitative
  • Security Incident and Event Management (SIEM) and Analysis � Working knowledge of SIEM tools and analysis of security incident trends and root cause analysis
  • Security Analysis / Assessment - Assess the security posture of vendors, software products, services, and/or infrastructure. Investigate and recommend available tools and countermeasures to remedy gaps, and recommend solution and best practices. May assist in the creation, implementation, and/or management of security solutions. Experience in Unix/Linux systems a plus
  • Scripting / Programming � Strong working knowledge of scripting languages such as Python, Perl, regex, etc
  • Malware / Malware Defenses - Working knowledge of how both exploits and malware work as well as common delivery mechanisms
  • Security Technologies - Experience with technologies used as part of a toolset to prevent, detect, and/or identify security breaches, as well as advanced network and endpoint solutions to detect and/or prevent advanced attacks
  • Support for Operation Workflows � Ability to support existing operational workflows in a timely, effective and detailed manner
22

Information Security Engineer Resume Examples & Samples

  • Multi-domain Security Experience - 8+ years
  • Multiple professional certifications in IT security and/or audit acquired or obtainable within 6mo's
  • CISSP, CISM, CISA, GIAC, GSEC, CSSP, CCIE-Sec, CEH, PCI ISA, etc
  • Hiring preference is given to individuals with
  • Knowledge of and verifiable experience with security issues related to diverse technical platforms including Windows Active Directory, IBM i-Series, AIX, Windows Server, Linux, Sun Solaris, Oracle, TCP/IP, data networks, Internet /Intranet, routers, switches, firewalls, and WAN connectivity
  • Extensive knowledge and experience with vulnerability and penetration testing tools (Qualys, Nessus, Nexpose, Metasploit, and other open source equivalents)
  • Extensive knowledge and experience with event correlation tools (Cisco Mars, SIM, Tripwire, etc.)
  • Extensive knowledge and experience with Data Loss Prevention (DLP) tools
  • Knowledge of HIPAA, GLBA and SOX legislation as it pertains to information security and data privacy laws
  • Strong knowledge, experience, and familiarity with standards based encryption practices such as PKI, PGP, SSL, etc
  • Familiarity and experience developing, writing, and enhancing enterprise grade security policy and procedure
  • Effective analysis in reviewing current practices, identifying improved approaches, and proposing same
  • Ability to work with small teams of high-performance professionals with direct or indirect matrix relationships
  • Proven project and resource management skills
23

Information Security Engineer Resume Examples & Samples

  • Working closely within a team on data loss protection monitoring and engineering. This includes operating DLP controls and research and analysis on data movement events related to email, database activity, endpoint, employee use of critical third party services, and others
  • Analyze system events for diagnosis, trending, and measuring of system health, capacity, and configuration efficiency
  • Participate in an Incident Response Team to help in analyzing, forensics, containing, and coordinating technical elements of response
  • Provide excellent written and verbal communication in working with teammates and customers
  • Knowledge of TCP/IP and networking concepts
  • Candidate must have demonstrated strong analytical, technical, and problem solving skills
  • Experience with systems administration/management with commercial or open source security tools and products
  • Experience with data analysis and SQL
  • Knowledge of and experience with SMTP, Windows, Linux
  • Experience with disk and memory forensics a plus
  • Experience with scripting such as shell, Perl, Python, Ruby, or PHP is a significant plus
  • Have a strong curiosity, initiative, willingness to experiment, and persistence in providing solutions to tough technical challenges
  • Proven record of taking initiative and being self-driven
24

Information Security Engineer Resume Examples & Samples

  • Overall responsibility of security design through the evaluation, creation, and monitoring of the Bank's security architectural and design models. Reviews application and system development for security issues
  • Performs detailed and ongoing risk analysis to determine IT security vulnerability. Leads network architecture and information system vulnerability assessments for the Bank's infrastructure, whether in-house or outsourced. Uses initiative and sound judgment to make appropriate recommendations for information risk mitigation
  • Reviews the monitoring process of security logs and alarms certify that Security Analysts are reviewing logs, alarms, following procedures and policies; escalates issues to management as appropriate
  • Monitors all Intrusion Detection Systems and takes actions as appropriate. Supervises and monitors the effectiveness of intrusion and prevention of firewall, (IDS and IPS) systems, adjusts controls as needed
  • Produces reports and presentations for management including security recommendations, on technology security vulnerabilities, both planned in place, and future direction
  • Bachelor's Degree in IT, Computer Science or related field
  • 3 – 5 years experience in developing and monitoring an information security function; 1 – 2 years of Banking/finance Industry
  • Hands-on experience needs to be concentrated in networking, network and information system security, vulnerability assessments, and penetration testing
  • Ability to understand networking and network protocols analyzers (i.e. Tcpdump and Wireshark)
  • Understanding of vulnerability and risk management
25

Information Security Engineer Resume Examples & Samples

  • Minimum 5 years IT experience with a at least three of those years focused on IT Security
  • An In-depth understanding of information security, network management, operating systems, software development, database systems and information technology is required
  • Practical experience with the following principles; Two Factor Authentication, Encryption, Identity and Access Management, Password vaulting, Data Loss Prevention, Federation
  • Strong analytical, organizational, and problem-solving skills are required
  • Determines operational feasibility by evaluating analysis, problem definition, requirements, solution development, and proposed solutions
  • Collaborate with Secuity Architecture organization as needed
  • Operates independently; has in-depth knowledge of business unit/function; Accomplishes engineering and organization mission by completing related results as needed
  • As subject area expert, provides comprehensive, in-depth consulting and leadership to team and partners
  • Updates job knowledge by studying state-of-the-art development tools, programming techniques, and computing equipment; participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations
26

Information Security Engineer Resume Examples & Samples

  • Service Oriented Architecture (SOA) experience
  • Web Technologies (XML, AJAX, Web Services, etc)
  • SSO technologies and security standards (SAML, WS-Security. etc)
  • SSL/Certificates/PKI
  • Identity Management (Novell preferred)
  • Java/.Net development experience (preferred)
  • Reverse Proxies (Novell Access Manager preferred)
  • Multi-Factor Auth (RSA Adaptive Auth, SecurID preferred)
  • LDAP (eDirectory Preferred)
  • Demonstrates knowledge and ability to work with firewalls, intrusion detection systems, authentication, authorization and accounting systems (AAA); application security concepts and tools
  • Demonstrates ability to relate complex business requirements and associated risks to technology design/implementation for security-related and other areas of technology
  • Demonstrates ability to effectively adapt to rapidly changing security technology and threat vectors to be able to apply findings to business needs and requirements
  • Demonstrates knowledge and understanding of business needs, with the ability to establish and maintain a high level of customer trust and confidence in the team and individual
  • Demonstrates strong team-oriented interpersonal skills; ability to effectively interface with a wide variety of people
  • Demonstrates aptitude for troubleshooting technical problems with emphasis on network
  • Demonstrates ability to serve in a customer service capacity with knowledge and ability to deploy new technology utilizing accepted "Best Practice" methodologies
  • Multi-Factor Auth
  • Identity Management (Novell)
  • Java/.Net development experience
  • Reverse Proxies (Novell Access Manager)
  • Multi-Factor Auth (RSA Adaptive Auth, SecurID)
  • LDAP (eDirectory)
27

Information Security Engineer Resume Examples & Samples

  • Lead threat modeling, mitigation discovery, and manual/automated verification of mitigations
  • Implement automation of vulnerability scanning & detection
  • Set policy & best practices for application security and lead security education in the engineering organization
  • Build and deploy automation for monitoring our network, applications, and infrastructure. Find the bad guys
  • Build tools and infrastructure for automating incident response
28

Information Security Engineer Resume Examples & Samples

  • 2 + years' hands on technical experience with a range of security technologies, including firewalls, intrusion prevention systems, vulnerability assessment tools, endpoint protection and VPN's
  • Strong understanding of IT technologies as well as strong technical aptitude
  • Relevant security certifications (CISSP, GIAC, etc) are a plus
  • Experience in leading major technical projects at a global level
29

Information Security Engineer Resume Examples & Samples

  • Perform independent assignments in the troubleshooting, problem diagnosis, problem resolution and ongoing production support for APT technologies (FireEye, Bit9, Carbon Black) within the Security Tools environment
  • Responsible for designing, reviewing, approving and deploying robust, stable and manageable solutions while minimizing hardware/software/network downtime
  • Periodically assist in the procurement, configuration, and integration of new technologies
  • Proactive Monitoring & Preventative Maintenance
  • Ensure the up time and response time SLAs/OLAs for services are met and or exceeded
  • Pro-actively monitor the stability and performance of various technologies within the Security Tools space and takes appropriate corrective action prior to an incident or problem occurring
  • Ensure patching and regular maintenance are performed as required
  • Actively collaborate with fellow members of the team and contractors/vendors on bridge calls to prevent or resolve incidents/problems in an expeditious manner
  • Recommend, deploy and document strategies and solutions for software/hardware/network engineering problems/incidents based upon comprehensive and thoughtful analysis of business goals, objectives, requirements and existing technologies
  • Independently identify key issues, patterns and deviations during the analysis
  • Recommend robust solutions utilizing pragmatic judgment, creativity, and in-depth technical knowledge and evaluation that comprehensively meet the needs of the business
  • Leadership & Partnerships
  • Manage effective relationships and works in partnership with leadership, team members, vendors, and contractors to deliver robust technical solutions ensuring that service level commitments and project time lines are maintained
  • Processes, Standards & Best Practices
  • Participate and provide input in the continual refinement of processes, policies and best practices to ensure the highest possible performance and availability of technologies
  • Create, maintain and update documentation of detailed design documents, diagrams, engineering specifications, build changes, models, troubleshooting and support guides, systems metrics, Disaster Recovery plans, Business Continuity plans and Standard Operating Procedures as required to ensure operational excellence
  • Continuous Learning
  • Continuously develop specialized knowledge and technical subject matter expertise by remaining appraised of Industry trends, the direction of emerging technologies, and their potential value to the business
  • Bachelor’s degree in Computer Science, Engineering or related field; or equivalent work experience
  • 5-7 years of relevant experience in Information Security
  • 1-3 years of experience supporting or designing Advanced Persistent Threat (APT) solutions
  • Ability to provide support, working outside of normal business hours to provide after hour or "on-call" support when necessary to solve high profile incidents/problems
  • Highly innovative problem solver with strong analytical and customer service abilities required
  • High reasoning aptitude and ability to quickly understand complex operating environments
  • 1-2 Years of experience supporting FireEye HX/NX/EX, Bit9, and Carbon Black in large environments
  • 1-2 Years of experience in information security operations
  • Experience with and knowledge of Active Directory, Endpoint Protection, Encryption, Firewalls, Identity and Access Management, IPS/IDS, Web filtering, and Security Tools
  • High level understanding of Cisco (LAN/WAN), Storage Area Network (SAN/NAS), Disaster Recovery, Application Recovery, Cloud Computing concepts, Grid computing concepts, Web\Database Farm concepts
  • Domains: Network, Hardware, Infrastructure, Service Management, Firmware, Active Directory, Info Security
30

Information Security Engineer Resume Examples & Samples

  • Minimum
  • 5 years IT experience with a at least three of those years focused on IT Security
  • An In-depth understanding of information
  • Practical experience with the following
  • Strong
  • Must be highly flexible
31

Information Security Engineer Resume Examples & Samples

  • Consult with application teams in configuring automated validation processes between the IdM and the application
  • Perform Gap Analysis on application security structures
  • Have an understanding of business needs and commitment to delivering high-quality, prompt, and efficient service to the business
  • Bachelor’s degree in Information Security, Computer Science, Management Information Systems, or related technical field; or equivalent work experience
  • CISSP Domains
  • Directories/LDAP (Active Directory, Oracle, etc.)
  • Databases/RDBMS (Oracle, SQL, DB2, etc.)
  • Experience working in the financial services industry or other highly regulated/compliance oriented environments
  • CISSP, CISA, or similar security certifications
  • Identity & Access Management/Governance Suites
  • Development / Programming / Scripting
  • Oracle SQL / MS SQL
  • J2EE Hibernate
  • Java Script
32

Information Security Engineer Resume Examples & Samples

  • Assist in the design and implementation of information security infrastructure and services needed to minimize threats to Customer, Corporate, and Employee information
  • Participate in InfoSec team and Business Partner meetings as required
  • Work with InfoSec teams to accomplish project and services specific goals
33

Information Security Engineer Resume Examples & Samples

  • Configure and manage vulnerability management platform and ability to validate exploits
  • Configure and manage all encryption environments
  • Configure and manage application whitelisting environment
  • Configure and manage antivirus and anti-malware platforms
  • Performs on-going security threat avoidance analyses
  • Understanding of advanced security protocols and standards
  • Experience with software and security architectures
  • Analyzes new systems (hardware and software) and provides recommendations concerning their security
  • Assist in the development and knowledge transfer to all junior team members, as well as other IT group members
  • Maintain current security certifications and attend industry seminars and networking events
  • 3 to 5 years of experience in information technology or security
  • Strong knowledge of Ethical Hacking
  • Organized, responsive and highly thorough problem solver
  • Ability to relate to non-technical users in user-friendly language
  • Ability to understand technical implications of security threats
  • Ability to manage multiple concurrent objectives or activities, and effectively make judgments in prioritizing and time allocation in a high-pressure environment
  • Ability to gauge one’s strengths and limitations
  • Ability to deal with changes and adapt to a changing environment
  • Ability to work in a multi-office environment and willingness to travel to other offices as required
34

Information Security Engineer Resume Examples & Samples

  • Identify security issues and risks associated with security events reported by L1 or L2 InfoSec teams, or via alerts from various security tools, and develop remediation and/or risk mitigation plans
  • Participate in incident response and investigations of suspected information technology security misuse or compliance reviews as requested by Gap’s Security Council, InfoSec management, or as required when alerts are received from InfoSec threat monitoring tools and threat intelligence sources
  • Monitor current and proposed laws, regulations, industry standards, and ethical requirements related to information security and privacy
  • Bachelor's degree in computer science or related field, preferred
  • In-depth knowledge of information security risks and counter-measures for Windows and Unix/Linux platforms
  • Understanding of the Payment Card Industry (PCI) data security standards (PCI DSS) and the payment application data security standards (PA DSS) as well as experience in the implementation of controls to mitigate PCI issues
  • Experience with multi-national large-scale enterprises
35

Information Security Engineer Resume Examples & Samples

  • Three or more years in information security architecture, assessment, or control engineering
  • Five or more years in combined information technology / information security experience
  • Technical experience in security control design and engineering including technologies such as firewalls, web proxies, user directories, networking, operating systems, middleware, endpoint security, VPNs
  • Basic Windows and UNIX operating system knowledge including network connectivity, security, and use of system tools and utilities
  • Experience scripting and/or programming (shell, ruby, python, perl, java, c, etc.)
  • A strong curiosity, initiative, willingness to experiment, and persistence in providing solutions to tough technical challenges
  • A bachelor’s degree in a technical field such as computer science or information technology or equivalent work experience
  • Information security experience in the financial services industry is a plus
36

Information Security Engineer Resume Examples & Samples

  • Intrusion detection and malicious software analysis
  • Network perimeter device and system log analysis
  • Maintenance of information security services
  • Assist in the implementation of information security strategies and solutions in support of Studio initiatives
  • Participate in projects, executing and closing assigned tasks to produce required deliverables
37

Information Security Engineer Resume Examples & Samples

  • Maintain McAfee ePO Infrastructure
  • Knowledgeable in Tanium and real time incident response
  • 5+ years of system administration experience
  • Experience with monitoring IDS/IPS, AV, DLP, etc in a large enterprise
38

Information Security Engineer Resume Examples & Samples

  • Bachelor’s degree in Computer Science, MIS or Technology Forensics or related technical field; or equivalent work experience
  • 5+ years experience installing, monitoring and maintaining information security solutions - including policy design and implementation
  • 3+ years experience evaluating and designing security solutions for technology projects
  • Strong/diverse technical background in enterprise networking, firewall, storage options, server infrastructure, operating systems, database technologies, and desktop operating systems and security
  • Effective organizational, analytical and independent problem solving skills
  • Strong presentation skills with experience addressing and interfacing with executives and technical staff
  • 1-3 years of experience supporting or designing IPS, IDS, or Firewall solutions
  • 1-3 years of experience supporting or designing ArcSight or SIEM solutions
39

Information Security Engineer Resume Examples & Samples

  • Participates in the development, planning and implementation of a variety of platforms including SEIMs, IDS/IPS, Firewalls, WAFs, AntiVirus, Encryption/HSMs, DDOS services, configuration management, vulnerability scanning, PKI, penetration testings and more
  • Participates in the design and implementation of security controls built and enginered to meet compliance controls including internal controls, as well as SOX and PCI controls
  • Participates in security incident response activities
  • Ensures documentation is created for hand off to the Security Operations Center (SOC) Team operations team
  • Understanding of OSI model and threat/attack types
  • Microsoft Word, Excel and PowerPoint
  • Knowledge of and ability to apply process improvement principles
  • Strong written, verbal and active listening skills
  • Ability to balance multiple priorities and meet deadlines
40

Information Security Engineer Resume Examples & Samples

  • Hands-on experience with 5 of the following: vulnerability scanning, firewall, proxy, IDS/IPS, log correlation tools, SIEM, DLP, forensics, NAC, and application firewall solutions
  • Must possess or obtain within 18 months from date of hire, an industry recognized information security certification, such as a CISSP, SSCP, or equivalent
  • Knowledge of TCP/IP protocols including HTTP and DNS
  • Knowledge of OS – Linux (CentOS preferred), Windows
  • Knowledge of SQL databases – PostgreSQL, MySQL – and non-SQL databases e.g. Cassandra
  • Knowledge of regular expressions and scripting languages
  • Teamwork and communication skills
  • English written and spoken
41

Information Security Engineer Resume Examples & Samples

  • 8 to 10+ Years experience
  • Multi-domain Security Experience - 8+ years required
  • Multiple professional certifications in IT security and/or audit acquired or obtainable within 6mo's required
  • Required Certifications: CISSP, CISM, CISA, GIAC, GSEC, CSSP, CCIE-Sec, CEH, PCI ISA, etc
  • Extensive knowledge and experience with event correlation tools (Cisco Mars, SIM, Tripwire, etc)
42

Information Security Engineer Resume Examples & Samples

  • Engage in malware hunting, search logs and other network activity for indications of potential compromise
  • Leverage a wide range of security technologies including, but not limited to: SIEM/syslog, IDS/IPS, malware analysis and protection, content filtering, logical access controls, identity and access management, data loss prevention, content filtering technologies, application firewalls, vulnerability scanners, and security incident response
  • Understanding of the Payment Card Industry (PCI) data security standards (PCI DSS) and the payment application data security standards (PA DSS) as well as Experience with multi-national large-scale enterprises
  • The demonstrated ability to work effectively in a collaborative team environment as an individual contributor
  • Must be resourceful, creative, innovative, results driven, and adaptable
43

Information Security Engineer Resume Examples & Samples

  • Bachelor's or Master's degree in Computer Science with an emphasis on information security engineering
  • Relevant internship is preferred
  • Exposure to several of the following: Java programming, Linux and/or Windows operating systems, scripting languages, network engineering, computer forensics and incident response, OWASP, malware, penetration testing and related items
44

Information Security Engineer Resume Examples & Samples

  • Work across product, cloud and business systems teams to enhance and evangelize security in cloud infrastructure
  • Lead initiatives to develop and build security utilities and tools that will enable others to operate more efficiently and securely in cloud environments
  • In-depth knowledge of AWS and other public and private cloud infrastructures
  • Strong Unix/Linux experience with familiarity with Windows environments
45

Information Security Engineer Resume Examples & Samples

  • Configure, patch and maintain vulnerability scanners; perform vulnerability and modem scans and review with management for follow-up
  • Monitor intrusion detection systems and appropriately react to anomalies
  • Contribute to the development and maintenance of security related procedures
  • Examine malicious code and report findings to minimize/prevent harm to systems and networks
  • Collaborate as appropriate to address wireless security issues
  • Perform and coordinate communications regarding tier 2 remedy triage
  • Conduct information security courses for designated personnel and confer with GT faculty regarding security issues
  • Education:Bachelor's degree in Computer Science, Electrical & Computer Engineering, Information Security or related field or equivalent combination of education and experience
  • Work Experience:Three to four years of job related experience
  • Certifications:Systems Security Certified Practitioner (SSCP) (will be required to obtain)
  • Skills:This job requires working knowledge of computer systems and network security monitoring and reporting techniques, processes and practices. Skills in analysis and problem solving are required as is advanced knowledge of systems and components specific to area of assignment
  • Preferred Education:N/A
  • Preferred Work Experience
46

Information Security Engineer Resume Examples & Samples

  • Bachelor’s Degree with 8-10+ years of experience
  • Dev 4+ level coding/development experience or Senior Architect experience, particular in web/e-commerce frameworks
  • An understanding of Java / JBoss design techniques and architectures
  • An understanding of OWASP testing methods and procedures
  • Development and architectural experience with Micros/FRY OCP framework
  • Automated secure code review tools
  • Experience in Web development frameworks such as Struts, Spring etc
  • Experience or obtainable experience performing application penetration testing on web, thick-client, and mobile applications
  • Knowledge of security risks related to web, mobile, web services, and client/server architectures
  • Familiarity with common web stack technologies and platforms
  • Understanding of encryption schemes and how they may be applied in an application architecture
  • Working knowledge or obtainable working knowledge of application security tools
  • Experience performing code review of the following: Java, JavaScript, PHP etc
  • Familiarity with web servers and application servers such as Apache, Tomcat, JBoss, Weblogic
  • Familiarity with web widget/3rd party web site integration and inherent security concepts
47

Information Security Engineer Resume Examples & Samples

  • Maintain and improve existing security application tool set
  • Develop security and compliance technology roadmaps and evolution strategies
  • Translate compliance and security requirements into project / process deliverables
  • Guide project teams on data governance principles, policies and standards
  • Develop strategies for securing and protecting Coty’s data assets in alignment with Information Security Policies and Standards
  • Consult and provide guidance to IT colleagues in the approach and design of secure solutions
  • Provide options for approaching specific technical problems, along with corresponding high-level estimates, costs, and benefits
  • Keep current on industry trends and the direction our competitors are heading with respect to business capabilities and technology
  • Perform research, formal evaluation and prototyping of leading/emerging technologies
  • Master’s Degree in Information Security, Cyber Security or Information Assurance
  • Professional certifications in information security management, such as a CISSP or CISM
  • Expertise on multiple aspects of an enterprise’s technology landscape
  • Experience with implementing and maintaining global security solutions in a complex technical landscape
  • Demonstrates a detailed understanding of relevant and emerging technologies and how they may be applied to the business
  • Interpersonal and collaborative skills and the ability to communicate security and compliance related concepts to technical and nontechnical audiences
  • Uses information sources both inside and outside the organization
  • Innovative, creative, curious and passionate about security and information technology
  • High degree of initiative, dependability and ability to work with little supervision
48

Information Security Engineer Resume Examples & Samples

  • Responsible for all activities within the security Incident response lifecycle. These activities include: detection, triage, analysis, containment, recovery, and reporting
  • Provide timely detection, identification, and alert of possible anomalous and misuse activities, and be able to distinguish from benign activities
  • Manages and executes processes responsible for the advanced analysis of security threat intelligence (malicious code, industry events, hackers and zero day exploits, reverse engineering malware, phishing, etc.) in order to proactively prepare for security events
  • Periodic handling of Incident alerts and incident handling in order to eradicate threats
  • Identify false positives and false negatives from alerting
  • Ongoing management and maintenance of security products used to monitor, correlate and alert
  • Responsible for liaising with internal customers and vendors in order to handle incidents and to conduct threat analysis
  • Responsible for verification of web applications, network, and system level vulnerabilities (manually and through security tools)
  • Bring innovation to overall incident response lifecycle process for better management and to improve efficiencies
  • Work with Global Information Security team to provide awareness and training to employees on Security aspects in Information ecosystems
  • Minimum 3 year experience of Cyber Security Incident Response handling and event management with experience assisting the resolution customer escalations, incident handling and response
  • Solid understanding of Information Security including vulnerability and compliance management, DLP, web application security and emerging threats and attacks
  • Strong understanding of perimeter and core infrastructure security and architectures and knowledge of all OSI model layers
  • Understanding of OWASP security concepts and common application security risks such as XSS, XSRF, SQL injection, Cookie Manipulation
  • Experience with reviewing raw log files, data correlation and analysis (i.e. user and system access, application, firewall, network IDS, system logs)
  • Experience with Anti-Virus, Intrusion Detection Systems, Firewalls, Active Directory, Vulnerability Assessment tools and other security tools found in large network environments
49

Information Security Engineer Resume Examples & Samples

  • Acts as security liaisons with software developers globally
  • Conducts security architecture reviews for new development and modifications to existing ones
  • Conducts internal and oversee external penetration tests
  • Designs and implements Secure SDLC program (policies, methodologies and tools) across the company globally
  • Executes formalized Information Security programs and processes, such as vulnerability management, event monitoring, data loss prevention, and incident response
  • Evaluate, implement and support information security related technology
  • Respond to information security alerts and analyze events for appropriate action
  • Conduct security awareness training for software developers
  • Bachelor’s degree in Computer Systems Engineering, Computer Science, Mathematics or equivalent
  • Minimum of 2 years work experience in application security
  • Minimum of 5-7 years of IT or software development experience
  • Experience with programming languages: .net, Java, Visual Basic, COBOL, C Sharp
  • Experience with code analysis tools (e.g., Veracode, IBM Appscan Source, HP Fortify)
  • Experience with web and Mobile application development and Cloud Security
  • Knowledge of DB/2, ZOS
  • Knowledge of network architecture and protocols
50

Information Security Engineer Resume Examples & Samples

  • Help define Backcountry’s security architecture, in terms of technology landscape as well internal and external processes
  • Engineer, implement and monitor security measures for the protection of computer systems, networks and information both on premise and in the cloud
  • Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks
  • Configure, troubleshoot and monitor security infrastructure devices
  • Having a level understanding of business needs, Engineering/IT capabilities, and security requirements to insure a proper balance is maintained
51

Information Security Engineer Resume Examples & Samples

  • Improve Autodesk’s ability to better protect its environment through design, development, and implementation of security analytics, assessment, and correlation and response systems to effectively use Autodesk’s security investments
  • Work across operations, incident response, risk and compliance and product security teams to solve critical security problems
  • Master’s degree(M.S) in computer science or related field, or Bachelor's degree (B.A.) and equivalent work experience
  • 2-5 years’ experience in relevant field
  • Experience with network and host security monitoring, detection and response tools and capabilities including IDSes, malware sandboxes, log correlation engines, flow collectors, memory forensics, etc
  • Strong programing background in Linux, Windows and Macintosh
  • Knowledge of developing and debugging C/C++ and Java
  • Knowledge of HTML5, PHP, Bash, Python or Perl
  • Knowledge of RDBS, NoSQL, Hive/Hadoop is a plus
52

Information Security Engineer Resume Examples & Samples

  • Review, update, and maintain Information Security technologies and processes (e.g., firewalls, IDS / IPS, SIEM, Anti-Virus, etc.)
  • Review and implementation of substantive security control changes, including firewall rules, VPN configuration changes and third-party connectivity
  • Creation, modification, review and disposition of proposed Information Security policies, standards and guidelines for approval by the relevant leaders
  • Review of vulnerability scans and reports that are generated by the security operations team, and approval of the reports prior to submission to leadership
  • Keep abreast of the latest Information Technology Security Trends
53

Information Security Engineer Resume Examples & Samples

  • Assist with and define, both team and service key performance indicators (KPI’s)
  • Coordinate security investigations based on internal processes and procedures
  • Experience in managing Customer Service and client expectations
  • Ability to coordinate resources to resolve problems
  • At least two (2) industry certification. IE CCISP, CISM, CEH, Etc…
54

Information Security Engineer Resume Examples & Samples

  • Act as a primary point of contact for all issues related to Information Security Operations
  • Act as a technical or security advisor for less experienced Security Analysts
  • Lead incident response and investigations of suspected information security events, misuse or compliance reviews
  • Coordinate maintenance of security-related systems (Anti-Virus, Intrusion Detection, Logging, Content filtering, etc.)
  • Provide input to enterprise- Information Security policies and standards
  • Trains new Security Analysts on Apollo’s cutting edge security technologies
  • Bachelor’s degree and/or a combination of equivalent education or work experience in related disciplines
  • Four (4) or more years of progressive experience in Information Security related roles
  • Four (4) or more years of experience with network and Security components, including firewall, intrusion detection/prevention systems, anti-malware products, forensics tools, data encryption, VPNs, vulnerability scanners, multiple operating systems (Windows, UNIX, Linux, etc.), and directory services (Active Directory, LDAP)
  • Prefer a Bachelor’s degree in Computer Science, Business or related area)
  • Experience managing a varied and heavy workload
  • Security related certifications e.g., CISSP, CISM, CISA, SANS (GESC, GCIA, etc.)
  • Knowledge of industry frameworks related to information security (e.g. ISO 27000, NIST, etc.)
  • In-depth knowledge of Information Security risks and counter-measures for Windows (PC and servers), MAC, Unix/Linux platforms
  • Experience with risk management methodologies and frameworks
  • A practical understanding of implementing technologies and processes in support of regulatory requirements (PCI, SOX, GLBA)
  • Strong business analysis skills
  • Strong communication skills required to discuss and present complex engineering principles
  • Ability to work effectively in a collaborative team environment as an individual contributor
  • Ability to provide support after normal business hours, as needed (e.g. on-call rotation participation)
55

Information Security Engineer Resume Examples & Samples

  • Engage in both strategic and tactical security design and services to protect highly sensitive data
  • Work hands-on with emerging technology and actively monitor systems for security issues
  • Work with software engineering to proactively identify and fix coding issues resulting in vulnerabilities
  • Implement Information Security Systems and Programs
  • Create Information Security Process and Procedures
  • Respond to Information Security Incidents
  • Train Information Security Personnel on newly implemented technologies and processes
  • Automate Information Security Processes and Procedures
  • Conduct Red Team testing
  • Participate in the 24 x 7 on-call rotation
  • Produce Information Security related reports and present results to management weekly
  • Reviews Information Security policy, procedures, standards and guidelines for accuracy and
  • Participate in company compliance audits
  • 7 yrs Information Security Experience
  • 15 yrs Information Technology Experience
  • Expert in Information Security and Assurance programs, concepts, and appliances
  • Expert level knowledge in networking, Unix and Windows based systems, Virtualization Technologies, and applications
  • Expert scripting in Perl, Python, Bash, and/or Power Shell
  • Knowledge of financial regulatory standards including PCI-DSS, GLBA, FFIEC
  • Bachelor Degree in IT related field and/or Security Related certifications required
  • Master’s Degree in IT related field and Security related certifications preferred
  • Familiar with OS Level Protections: including ASLR, DEP, SEHOP
  • Intermediate or Expert level in ArcSight Management and Use Case Creation
  • Knowledge of the disassembly and debugging tools: IDA, OllyDbg, WINDbg, GDB
  • Knowledge of Windows internals
  • Experience with server orchestration tools: Puppet, Chef, Salt, and GPO
  • Experience with languages such as C, C++, Java, .NET, and Ruby
  • As provided in NetSpend's Background Check policy, eligible candidates may be subject to drug, criminal history, and credit checks, which will be conducted and used in accordance with applicable local, state, and federal laws
56

Information Security Engineer Resume Examples & Samples

  • Bachelor’s degree in Engineering or Computer Science preferred
  • 3-5 years application and network penetration testing experience including use of commercial and open source toolsets
  • 5 plus years application and network assessments experience
  • Scripting and development experience including Python, Perl, C, C++, etc
  • Aptitude to create working exploits against systems and applications
  • Experience with secure architecture/design principles
  • Working knowledge of multiple operating systems (Windows, Linus, AIX, UNIX, etc.) and server hardening processes
  • CISSP Penetration Testing Certification preferred (GPEN, GWAPT, OSCP, CEH, etc.)
  • Highly proficient administering firewalls
  • Understanding of wireless networking and associated security protocols. Strong understanding of both security and network fundamentals and protocols
  • Excellent communications skills and customer focused
  • Ability to translate complex technical issues into common language
  • Willingness to learn new technologies rapidly and remain at the cutting edge of technologies
57

Information Security Engineer Resume Examples & Samples

  • Experience with Information Security and Certification and Accreditation (C&A)
  • Knowledge of the DoD or NIST IA instruction series
  • Knowledge of system security
  • CISSP or CISM certification
58

Information Security Engineer Resume Examples & Samples

  • Experience with Windows Server 2008R2 and 2012R2, UNIX, Linux, Windows 7 and 8, TP/CIP, DNS, Local Area Networking, AD, GPO, and IA-related documentation
  • Knowledge of DCID 6/3, ICD 503, system accreditation and security documentation
  • DoD 8570.1M IAM II Certification
  • Experience with supporting intelligence or DoD clients
  • Experience with system administration or system test verification and validation
  • Knowledge of Windows Enterprise AD architecture and VMware Virtualization
  • Ability to support flexible schedule in support of 24x7 staff
  • CISSP, Security+ or equivalent, CAP, GSLC, or CISM Certification
59

Information Security Engineer Resume Examples & Samples

  • Experience with vulnerability assessment tools, including ACAS, HBSS, SCAP, and DoD STIGs
  • Knowledge of NIST 800-53A security controls
  • Ability to generate DIACAP or RMF packages
  • DoD 8570.01M Certification, including CISSP, CAP, or Security +
  • DoD 8570.01M Computing Environment Certification, including OS level for Windows of Linux
  • Experience with Navy DIACAP Collaboration Meetings
  • Knowledge of RMF Security Authorization Package components
  • Ability to scan, remediate, and mitigate vulnerabilities in a Windows or Linux environment
60

Information Security Engineer Resume Examples & Samples

  • 1+ years of experience with working in an IT- or IA-related role
  • Knowledge of IT network infrastructure or information assurance
  • Ability to prepare Cyber assurance documentation, brief clients, conduct or rapidly learn scan procedures, prepare client required briefings, and produce and monitor Plan of Action Milestones for mitigation implementation
  • BA or BS degree in Engineering, IT, or Information Assurance
  • DoD 8570.4M Security+ Certification for IAM or IAT within six months of hire
61

Information Security Engineer Resume Examples & Samples

  • 1+ years of experience with Information Assurance and Certification and Accreditation (C&A)
  • Experience with Microsoft Visio
  • Knowledge of advanced networking
  • CISSP or CISM Certification
62

Information Security Engineer Resume Examples & Samples

  • Assessment of information system security requirements, functionality, and the effectiveness of security solutions against present and projected threats
  • Implement solutions by planning, training, and installing/configuring information systems while ensuring DoD Risk Management Framework (RMF) compliance under Configuration Management process
  • Assist management with producing formal and informal reports, briefings, and input to the customer regarding security and functionality requirements, system architecture, security designs, policies and procedures. Conduct risk assessments throughout assigned program life-cycle as well as continuously monitoring security relevant changes of the environment
  • Perform manual assessments in accordance with the latest DISA STIGs, with limited assistance on multiple Operating Systems to include but not limited to LINUX, UNIX, Microsoft products, and various network components
  • Interpret RMF controls accurately with regard to system security posture, policy updates and configuration for information systems with regard to security and event logs
  • Draft system security plans and other artifacts to satisfy certification and accreditation requirements; conducts periodic reviews to ensure compliance with established policies and procedures; ensuring all software, hardware and firmware changes are recorded as required by established configuration management procedures; ensuring systems are operated, maintained and disposed of in accordance with applicable federal security policies and procedures
  • Conduct investigations of security incidents as well as providing protective and corrective measures in efforts to reduce incidents and risk
  • Create, update and review Plan of Action and Milestones (POA&M) documentation for accreditation review and to maintain I/ATO status
  • Work with appointed IASO, ACA and other accrediting team members to remediate and mitigate findings
  • Work with all team members to resolve issues and perform tasks in parallel
  • Coordinate activities with internal and external customers as necessary
  • Attend onsite/offsite meetings to include teleconferences (travel may be required)
  • Bachelors degree and 8 years experience, or HS diploma and 12 years of experience
  • Previous experience working with DoD Information Assurance Certification and Accreditation Process (DIACAP), DoD Risk Management Framework (RMF) and National Industry Security Program Operating Manual (NISPOM)
  • Must satisfy 8570.01-M IAT level II training requirements
  • Must have one of the following certifications, Certified Information Systems Security Professional (CISSP), Security Plus, Security +, GSEC, SCNP, SSCP, or other approved qualifying 8570.01 certification
  • Must be experienced using Audit tools S-CAP tools, Retina, NESSUS, WASP, and/or Gold Disk
  • Must have strong technical skills in a variety of the following areas; networking, system engineering, CISCO, Windows OS platforms, Red hat, database design/admin
  • Be willing to travel CONUS (~25%)
  • Be willing to work long hours and / or non-regular hours with minimal notice
  • Possess an active Top Secret/SCI clearance
63

Information Security Engineer Resume Examples & Samples

  • Draft System Security Plans in coordination with the sponsor ISSM
  • Monitor intrusion Detection Systems (IDS) for anomalies and perform further network forensics / analysis as necessary
  • Perform Penetration testing against system test beds to evaluate effectiveness of system configurations
  • Perform in-depth inspection of network traffic captures focused on TCP/IP Protocol analysis
  • Serve as the sponsor’s subject matter expert (SME) on incident response and coordination with Information System Security Manager (ISSM) in response to Information Assurance concerns
  • Support sponsor to ensure compliance with applicable security regulations
  • Support vulnerability assessments including evaluation of specific device configurations and software applications on both Windows and Linux platforms
  • Bachelor degree in computer engineering, computer science, or other closely related IT Discipline is required
  • Certified Information Systems Security Professional (CISSP) or equivalent knowledge and experience is required
  • Foundational knowledge of network engineering concepts and protocols a must; the candidate should understand at a minimum TCP/IP, DNS, DHCP, FTP, SFTP; advanced knowledge is preferred
  • Cisco certification (e.g., CCNA, CCNP, or CCIE) is preferred
  • Advanced knowledge of Linux operating systems is desired; basic understanding is required
  • Advanced knowledge of Windows 2008 R2 and 2012 R2 environments is desired; basic understanding is required
  • Basic understanding of enterprise storage systems and storage area networks is required
  • The candidate must have the ability to make technical presentations to audiences of all levels
  • Strong organization skills are necessary
  • Strong technical writing skills a must
  • Prior experience with virtualization technologies is desired
  • It is desired the candidate have working knowledge of system monitoring tools for
64

Information Security Engineer Resume Examples & Samples

  • Areas of responsibilities include, but are not limited to, IT Security Strategy, Cyber Security, and Compliance and Risk Management to protect the customer’s information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording and destruction
  • Applies information security engineering experience to perform functions such as systems requirements analysis, functional analysis, timeline analysis, trade studies, requirements allocation and interface definition, technical management, system integration, configuration management, quality assurance testing, or acquisition and resource management
  • Analyzes designs, develops, implements, tests, or evaluates software, components, or systems related to engineering or functional requirements of military weapons systems
  • Establish a system security engineering (SSE) process and strategies to plan, organize, and manage program efforts to achieve maximum security and survivability of the system
  • Research, develop, implement, test and review a software system’s information security IAW DoD/NIST RMF/ICD-503/DIACAP requirements to protect information and prevent unauthorized access. In this role, the ISSE candidate will direct the contracting team about security measures, explain potential threats, implement security measures, and monitor applications in order to meet or exceed all DoD/NIST RMF requirements, resulting in faster and more accurate software releases
  • Develop and maintain system-specific Security Controls Test Matrix (SCTM), Security Assessment Report, Risk Assessment Report, POA&M, Application Security and Development Checklists, and other artifacts supporting certification and accreditation paperwork in accordance with RMF and JSIG
  • Work closely with software engineers supporting and troubleshooting the deployment of software
  • Perform within an agile program environment
  • BS degree and 12 – 15 years of prior relevant experience or Masters with 10 – 13 years of prior relevant experience. May possess a Doctorate in technical domain
  • Understanding of DoD 8510, NIST 800.53 Risk Management Framework, ICD-503, DIACAP
  • Familiarity with the security aspects of a variety of technologies in the following areas: IdAM, hardening tools, communications protocols, Windows OS platforms, database design/admin, hand held devices
  • CISSP certification or willingness to achieve a CISSP within six months of employment to satisfy the requirement of a Level III IASAE, in accordance with DoDD 8140.01 (nee, 8570.01)
  • Demonstrated experience driving cybersecurity products to multiple different programs and teams in accordance with each program’s schedule
  • Able to multi-task, self-assign work, and function in a dynamic, fast-paced environment
  • Experience in an agile software development environment
  • Experience with HBSS, Fortify, and ACAS/Retina
  • Experience dealing with certification and accreditation of web services, web clients, and Android applications
  • Experience with AFATDS, Army Common Operating Environment (COE) or other PM MC systems
  • Currently possess an active DoD SECRET security clearance
65

Information Security Engineer Resume Examples & Samples

  • Respond to incidents and requests in ticketing system for multiple products
  • Design system security architecture and develop detailed security diagrams
  • Troubleshoot security infrastructure appliances
  • Adhering to high-quality standards and best practices, high performance, and scalable, repeatable processes and deliverables in accordance with applicable regulations
  • Evaluate systems using vulnerability scanners and manual techniques to verify system security settings and configurations
  • BS degree in Computer Science or related field
  • 6 or more years of experience in Information Systems Security field
  • Active Directory Services with a focus on integration with other authentication services
  • Certificate services
  • Key management
  • Threat and vulnerability management systems
  • Anti-virus, whitelisting or content filtering technologies
  • Thorough understanding of system and network protocols and their relationship to the security infrastructure
  • Industry recognized certifications a plus
  • A strong knowledge of Linux, Windows, TCPIP, SMTP, HTTP and DNS (and other internet protocols) is essential
  • Experience troubleshooting, auditing, and performing forensic analysis on TCPIP based networks through utilization of log analysis, protocol analyzers, and network-sniffing technologies
66

Information Security Engineer Resume Examples & Samples

  • Administer, monitor, and perform security operations tasks around Healthways’ technical security solutions [e.g., firewalls, anti-malware, logging/monitoring systems (SIEM), data loss prevention (DLP) solutions, etc.]
  • Review information security-related events from multiple sources and work with other team members to respond appropriately
  • Perform daily, weekly, and monthly security operations tasks
  • Conduct and/or oversee information security technical assessments (e.g., vulnerability scans, application code reviews, third party penetration tests, etc.), evaluate findings, document results and report to management, and provide recommendations for remediation
  • Provide initial triage of reported information security incidents and work together with other incident response team members and IT outsourced partners to provide rapid response to security threats
  • Conduct incident investigations utilizing forensic toolsets
  • Evaluate enterprise risks and coordinate with other teams for risk mitigation
  • Participate in evidence collection for audits and assist in company audits/assessments such as ISO 27001, SOX, SOC2, HIPAA, HITRUST, etc
  • Assist with vendor and product/solution security assessments
  • Maintain tracking of information security corrective actions and exceptions
  • Provide security metrics that can be used by various groups and teams including senior management
  • Write and contribute to the creation and maintenance of information security-related documentation (e.g., policies, procedures, standards, work instructions, etc.) as required, and maintain Healthways Security Wiki and SharePoint sites
  • Develop and maintain ongoing service relationships between Information Security and third party representatives
  • Lead and/or assist in implementation of Healthways Information Security projects as directed
  • Provide change management consultative support
  • Provide technical guidance and training where necessary/appropriate to IT staff
  • Create and maintain relationships with various teams (e.g., programmers, auditors, IT support, management, etc.) to facilitate implementation and maintenance of information security controls and processes across the enterprise
  • Degree in a related field of study such as Information Security, Computer Science, or MIS/CIS, or additional experience in the field
  • Have an understanding of principles in network technology, incident response, data loss prevention, security architecture, cloud security, virtualization, and information security policy
  • Understanding of web application security risks such as SQL injection, XSS, CSRF and other risks covered in frameworks such as OWASP
  • Experience conducting vulnerability assessments and articulating security issues to technical and non-technical audience is a plus
  • Hands-on experience with information security tools such as vulnerability scanners, exploit frameworks, and web application testing tools
  • Have the ability to learn technologies and platforms quickly
  • Experience as a network, server, database, or application administrator (preferred)
  • Experience managing security infrastructure such as firewalls, IDS/IPS, SIEM and VPN (preferred)
  • Requires excellent verbal and written communication, interpersonal, and customer service skills with the strong ability to interact professionally with a diverse group, executives, managers, and subject matter experts
  • Experience with writing security and IT-related documentation (e.g., white papers, procedures, technical specs, etc.), training peers, and presenting information to peers and leadership as required
  • Ability to work independently and complete projects in coordination with other team members
  • Holds/maintains information security-related certification(s) (preferred)
67

Information Security Engineer Resume Examples & Samples

  • Structure, populate & quality assure a library of strong information security patterns
  • Provide effective leadership and subject matter expertise in Information Security topics to management and to effectively support our Technology and Business partners
  • Partner with subject matter experts to determine overall risk and appropriate remediation for unfamiliar technology stacks
  • Help shape and deliver Secure Application development for Asset Management via both direct project engagement and governance programs
68

Information Security Engineer Resume Examples & Samples

  • Must be able to perform hands-on tier-3 support for a wide range of security technologies
  • Work closely with the IT Security and Compliance organizations to review, recommend and engineer security technologies in line with corporate information security program
  • Participate in vulnerability assessments and penetration testing activities
  • Develop detailed designs for implementation of key security infrastructure upgrades and platform recommendations
  • Define implementation and testing procedures
  • Provide inputs for formulating security architecture recommendations and design of security services
  • Ensure adherence to best practices in accordance with information security best practices, industry standards, and corporate policies and procedures
  • Participate in User Awareness initiatives
  • Participate in various projects as required
  • Develop and maintain appropriate Information Security technical documentation as well as providing reviews and updates of existing policies and procedures
  • Identify opportunities and recommend solutions for improving service, efficiency and effectiveness
  • Perform Information Security analysis and provide metrics and reporting as required
  • Provide timely updates to Management regarding projects currently taking place
  • Stay up-to-date with latest techniques and technology
  • Ensures compliance with all audit requirements including change control procedures and data security
  • Provide 24x7 support as appropriate
  • A proven track record in identifying, selecting and deploying common security tools and products
  • Strong interest and knowledge of security technologies and trends
  • Ability to manage and prioritize multiple tasks and projects
  • Experience working in collaborative, team-oriented environments with commitment to results and a proven track record of accomplishments
  • Bachelor’s degree in Computer Science or Information Systems, or the equivalent combination of education and training
  • 5+ years of demonstrated experience as an information security engineer
  • 3+ year’s Working knowledge of various privacy, risk, security standards and practices
  • 3+ years of Experience in working with server & endpoint security platform (AV, encryption, HIPS, etc.), firewalls, intrusion prevention, enterprise security event log management, two factor authentication, OS/platform security standards, vulnerability management, data loss prevention and patch management
  • Up to 30% travel
  • CEH, GCIH/GCIA/GPEN, CISSP or other equivalent security certification
  • Cisco, Microsoft, Linux and other vendor certifications
  • Experience with two or more of following vendor solutions
69

Information Security Engineer Resume Examples & Samples

  • Perform intrusion analysis, computer forensics, app sec testing and analysis of malicious code and exploits
  • Have knowledge of the diverse methods and technologies used to protect web/mobile/desktop applications, SaaS infrastructure, and data
  • Think critically, work well under pressure, and possess strong analytical, written, verbal, and interpersonal skills
  • Have a data and metrics driven approach
  • Design, implement, and manage security methods, automation and tools/infrastructure (Automated data collection from endpoints/servers/applications, log parsing and analysis,
  • IDS/IPS, vulnerability scanners, anti-malware, SIEM, WAF, DLP)
  • Maintain innovative security methods and services
  • Deliver visibility for security activity via dashboards, measurements and metrics
  • Develop high-confidence alarms and detection methods. Document repeatable processes and successfully transition consistent, repeatable processes to other teams and analysts
  • Identify technical security risks. Develop and implement mitigation plans
  • Ensure availability and functionality of security tools
  • Proactively find and fix application and infrastructure security issues
  • Conduct security monitoring and lead digital forensics and incident response activities. Work with internal and outside parties to respond to events, conduct investigations, and minimize impact of events
  • Prepare post-event reports for security incidents
  • Project delivery of technical safeguards and compliance requirements
  • Analyze data, identify trends and patterns, summarize key findings, and make recommendations
  • Develop and execute system acceptance test plans
  • Participate in security compliance and customer due diligence activities
  • Evaluate and recommend new and emerging security methods and tools
  • Participate in tier 3 security on-call rotations
  • Evangelize security within the company, share knowledge with other teams, and be an advocate for customer trust
  • Degree in Information Systems, CS, EE or other Engineering Program
  • 2+ years experience working in security, IT, cloud operations and/or telecommunications
  • Knowledge of cloud technology stacks in traditional data centers and cloud environments, DevOps tools, web service and application architectures, and VoIP
  • Knowledge of common attacks, vulnerabilities and remediation techniques for networks, operating systems, mobile, and web applications
  • Knowledge of encryption, key management, authentication and security tools and methodologies
  • System administration experience with Linux and Microsoft Windows
  • Experience with a wide selection of open source and commercial security tools (e.g. Kali Linux, Backtrack, Metasploit, Snort)
  • Knowledge of network and web related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS)
  • Experience with scripting or programming (e.g., UNIX shell, Power shell, Python, etc.)
  • Excellent technical documentation and presentation skills
  • Results driven, creative, persistent, quality oriented, and self-motivated work style
  • Ability to work global hours when necessary, including U.S,. EU, and APAC time zones
  • Experience with incident response and security monitoring
  • Experience preparing reports and documenting security events
  • Experience configuring syslog, packet capture, and Windows Event Log tools and infrastructure
  • One or more SANS GIAC certifications preferred but not required
70

Information Security Engineer Resume Examples & Samples

  • This individual will be part of the people, processes and technologies involved in providing situational awareness through the detection, containment, and remediation of IT threats
  • As a SOC administrator you will manage security incidents for the enterprise, ensuring they are properly identified, analyzed, communicated, actioned/defended, investigated and reported
  • The SOC also monitors applications, servers, and operating systems to identify a possible cyber-attack or intrusion (event) and determine if it is a real, malicious threat (incident), a weakness which allows an attacker to reduce a system's information assurance (vulnerability), and if it could have a business impact
  • SOC administrator will also be responsible implementing new solutions as directed by the Office of the CISO, managing, and maintaining them to make sure they are running optimally
71

Information Security Engineer Resume Examples & Samples

  • 2+ years of experience with administering Windows Server environments, including managing Active Directory
  • Ability to write documentation, including Standard operating procedures, system security plans, and combined status reports
  • Ability to execute CLI commands in the cmd prompt
  • Ability to edit the windows services, registry, and group or local policies
72

Information Security Engineer Resume Examples & Samples

  • Ensure adherence to ESI's network security design principles and information protection policies
  • Works as an escalation point for issues related to network security technology
  • Able to troubleshoot and assist in the remediation of complex network security related issues
  • Works with network security engineering team to understand and assist with documentation and support of new capabilities
  • Documents and provides capability turnover to level 1 support team
  • Helps to recommend areas of focus for network security engineering team based on current security infrastructure and services
  • Mentors L1 network security engineers
  • Assists in the support and execution of network security related lifecycle programs
  • Consults with IT application owners on security issues and architecture
  • Monitors ongoing performance and capability of systems and recommends requisite engineering items
  • Plans and executes changes to network security infrastructure
  • Works closely with the risk management organization (incident response, vulnerability management, audits, design, new capabilities, etc.)
  • College degree in Information systems/security, related technical field or equivalent work experience
  • 5-8 years’ experience in network security concepts, tools and support
  • The Applicant should demonstrate good working knowledge with management/troubleshooting of some of the following technologies and concepts
  • Application delivery and load balancing technology (configuration, design, troubleshooting, etc., F5 experience a plus)
  • Firewall and DMZ environments (troubleshooting, policy design and administration). Check Point experience a plus)
  • VPN technology (remote access, site to site, IKE/IPSEC lifecycle, troubleshooting, concepts, etc.)
  • E-mail and SMTP security (basic SMTP protocol knowledge, routing, SPAM, phishing, targeted attacks, spoofing, troubleshooting, etc.) Proofpoint experience a plus
  • DNS, DHCP & IPAM (DDI) protocols and security (Basic DNS and DHCP concepts, IPAM, IP addressing, VLANs). Infoblox experience a plus
  • HTTP/S proxy servers and security (web proxying, HTTP protocol knowledge, troubleshooting, browser interaction, web security, filtering/authentication) Bluecoat experience a plus
  • WAF (Web Application Firewall) systems and concepts (application onboarding, latest application vulnerability concepts, etc.) Imperva or ASM experience a plus
  • DLP (Data Loss Prevention) technology and concepts (endpoint, network, SMTP, web, DB, etc.) Websense/Forcepoint DLP a plus
  • Familiar with risk management and governance concepts such as digital forensics, incident response, threat and vulnerability management and support for regulatory audits
  • TCP/IP based networking (addressing/sub netting, troubleshooting, routing, OSI model, etc)
  • Packet capturing and protocol analysis (TCP, UDP, ICMP, packet dissection, etc)
  • Basic administrative experience with Unix/Linux operating systems
  • Strong ability to clearly document solutions and conduct knowledge transfer to L1 engineers
  • Familiarity with health care of PBM industry helpful
  • Willingness to work a flexible schedule to accommodate project deadlines
73

Information Security Engineer Resume Examples & Samples

  • Planning, designing, configuring, implementing, and monitoring information security solutions for the protection of Gore’s electronic information
  • Identifying and defining security requirements by understanding business processes and requirements
  • Identifying and evaluating security related vulnerabilities
  • Implementing technical solutions and new security tools to mitigate security vulnerabilities and automate repeatable tasks or implement compensating technical controls and security counter-measures
  • Analyzing information security systems and applications, and recommend additional security measures to protect information against unauthorized access or loss
  • Developing detailed security designs in partnership with security architecture
  • Preparing and documenting standard operating procedures and protocols
  • Partnering with Security Operations to troubleshoot security solutions
  • Participating in Incident Response and Disaster Recovery activities as needed
  • Remaining current on emerging security practices and standards
  • Bachelor's degree (or advanced degree) in information technology, information security, computer science, mathematics or a related field or commensurate experience
  • Minimum of 10 years of experience in Information Security
  • Possess a security-related industry certification
  • Knowledge of risk assessment procedures, technical policy enforcement, role-based authorization methodologies, authentication technologies and security attack pathologies
  • Broad exposure to all aspects of information risk management, security engineering, and security operations
  • Technical proficiency in security-related hardware and software, forensics, and other security systems and tools
  • Technical proficiency in broader areas of IT, including networking, servers, virtual machines, cloud, desktops and mobile devices
  • Exceptional oral and written communication skills with the ability to present and discuss technical information in a way that's understandable for non-technical audiences
  • Ability to contribute to technical teams and project teams across multiple business functions
  • Strong problem solving and deep analytical abilities
  • Strategic thinking and relationship management
74

Information Security Engineer Resume Examples & Samples

  • 3+ years of experience with conducting DoD network assessments
  • Experience with analyzing and communicating network security issues to peers and to management
  • Experience with using and analyzing results of mobile code, malicious code, and anti-virus software
  • Knowledge of networking and router technologies and network security issues
  • IAM II-DODI 8570.01-M Certification within 6 months of start date
  • Certification in one or more CCRI review areas within 6 months of start date
  • 5 years of experience with conducting code reviews
  • 4 years of experience with conducting ICS/SCADA inspections
  • 2 years of experience with conduction training
  • Experience with CCRI
  • Experience with using and analyzing results of security, system auditing, and hacking tools, including ACAS, HBSS, Splunk, Log Event reviewer, HB Gary, Web Inspect, FOCA, Backtrack, LanSweeper
  • Ability to run data harvesting tools to locate and test ICS/SCADA system on the MCEN
  • Industry certifications preferred, including CISSP, CEH, RHCE, CCIE, Windows Certification, GIAC, Fortify, SSLP, or eWPT
  • CCRI Certification
75

Information Security Engineer Resume Examples & Samples

  • Provides customer support in solving all phases of complex INFOSEC - related technical problems
  • Reviews and recommends INFOSEC solutions to customer problems based on an understanding of products/systems test results
  • Conducts systems security analysis and implementation, system engineering, electrical design, design assurance, testing, software engineering, program design, configuration management, integration and testing of INFOSEC products and techniques
  • Solutions are based on a firm understanding of government/industry policy, practices, procedures, and customer requirements
  • Ensures INFOSEC solutions are fully compatible with or engineered into the customer’s network design
  • Review and updated Information Security documentation, POAM, Scans, STIGs, SSAA, SRTM, etc
  • Implementation and operation of the system or component of a Government customer’s information systems
  • Ensures all information systems are functional and secure in operations and poly knowledge of IA policy, procedures and structure to develop, implement, and maintain a secure information system
  • Develop, implement, and integrate information security standards and procedures through the IA process as required
  • Write comprehensive security analysis reports including assessment-based findings, outcomes and enter this data into DoD Information Assurance Management databases for evaluation by Authorizing Officials to support the receipt of an Authority to Operate (ATO) for the systems
  • Identifies and defines system security requirements and correlates/documents them by analysis of organizational standard security operating procedures (SOP) and protocols
  • Prepares and completes action plans; defines production, quality, and military unit standards; resolves problems; completes security audits; identifies security and threat trends; determines system improvements; defines system security change requests
  • Recommends improvements by assessing current security implementations and anticipating new security requirements
  • Maintains system security by implementing and maintaining security controls
  • Travel required 10% to 25%
  • Bachelors Degree in Computer science/systems, Information systems/technology is required. Or 10 years experience in lieu of degree
  • Must meet 8570 certification criteria
  • CISSP certified or able to obtain certification in a timely manner (6 months after hire)
  • JWICS, SIPR, and/or CENTRIXS accreditation experience and Risk Management Framework (RMF) knowledge
  • Experience in heterogeneous computer networking technology and work in protocol and/or interface standards specification
  • Experience analyzing and resolving INFOSEC technical problems
  • Familiarity with network and information system security principles and test practices
  • Familiarity with applicable NRO, IC, DoD policies, procedures and operating instructions related to IT, IA and IM
  • Experience developing security accreditation/certification documentation, and creating and maintaining security policy and procedures
  • Vast knowledge of Government security policies and familiarity with security-related technologies and auditing tools
  • Experience providing security engineering analysis on a variety of information systems
  • Advance skills at developing security accreditation/certification documentation, and creating and maintaining security policy and procedures
  • Experience performing security certification engineering analysis, vulnerability assessments, and risk assessments
  • Must be capable of designing and configuring security tools
  • Experience developing test procedures, establishing test environments, executing security certification test/demonstrations/evaluations, documenting results, and developing reports, conclusions, and recommendations
  • Must be capable of conceptualizing and implementing security systems and architectures
  • Must be willing to travel up to 10% to 25%%, both statewide and overseas
  • Experience in DAMI certification policies and procedures
76

Information Security Engineer Resume Examples & Samples

  • Secret clearance required
  • GPS Security Certification
  • Experience with eMASS or ACAS preferred
  • Experience in the Army with DIACAP or RMF preferred
  • Knowledge of position, navigation, and timing a plus
  • Knowledge of network and application security threats, attack techniques, and mitigation options preferred
77

Information Security Engineer Resume Examples & Samples

  • Identify, acquire, analyze, test, and implement Information Assurance Vulnerability Alerts and Security Technical Implementation Guidelines in order to maintain proper security posture for a cleared system. This includes assessment of the current state of the system, impacts to the system based on newly identified vulnerabilities and designing and executing an implementation plan to mitigate all vulnerabilities
  • Will implement a multi-tiered cybersecurity risk management process to protect U.S. interests, DoD operational capabilities, and DoD individuals, organizations, and assets from the DoD Information Enterprise level, through the DoD Component level, down to the IS level as described in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-39 (Reference (o)) and Committee on National Security Systems (CNSS) Policy (CNSSP) 22)
  • Develop and execute a security implementation plan to achieve the certification and accreditation requirements
  • Engage and collaborate with Government Information Security Management Officer, technical leads and subject matter experts to implement technical security measures in support an Risk Management Framework Authority to Operate processes
  • Design and implement a Risk Management Framework Continuous Monitoring Suite in accordance with DODi 8500.01 to achieve acceptable security standards and posture
  • Bachelor’s degree with concentration in Information Security or Cyber Security preferred
  • Minimum of 4 years of professional IA experience, appropriate computing environment certification, and IA WORKFORCE SYSTEM ARCHITECT AND ENGINEER (IASAE) SPECIALTY qualified in accordance with standards spelled out in DoD 8570.01-M and the Army Information Assurance(IA) Training and Certification Best Business Practice, corrected 6 Aug 2010 �
  • Additional applicable years of experience may be accepted in lieu of degree
  • Currently possess an active Secret clearance with ability to obtain and maintain a Top Secret clearance
  • Advanced degree is desirable
  • Experience with the Force XXI Battle Command, Brigade and Below (FBCB2)/Joint Capability Release (JCR) is preferred with thorough understanding of the operational lab architecture; the Network Operations Center; and how all the and integration of networks
  • Familiarity with CECOM Software Engineering Center Post Production Software Sustainment (PPSS) processes
78

Information Security Engineer Resume Examples & Samples

  • 2+ years of experience with IA and Cybersecurity
  • 2 years of experience with cross domain solutions (CDS)
  • Knowledge of CDS policy and process and IA and Cybersecurity policies, including DIACAP, RMF, AR 25-2, AR 380-5, DoDD 8510.01, and DoDI 8500.1
  • 1 year of experience with Program Protection preferred
79

Information Security Engineer Resume Examples & Samples

  • Ability to work as a team member & as an independent contributor based on requirement from a fast paced environment
  • Knowledge of Tivoli Access Manager (TAM) or similar technologies
  • Troubleshooting and debugging skills
  • Development and scripting skills focused in the areas of JavaScript, Perl, shell scripting, C/C++, Java, and MS .NET Framework are a plus, but not a requirement
  • Problem Definition, Resolution – Ability to assess criticality of the problem and seek solution in the appropriate timeframe; gain acceptance of proposed solution from impacted stakeholders; seek to establish win-win solutions that benefit all involved parties; involve the appropriate people to resolve complex cross-organizational problems
  • Interpersonal Relations – Ability to work with people of varying styles, personalities and backgrounds; gain commitment of colleagues and customers; be recognized as a leader in building teamwork and open, honest communications
  • Results/Goal Orientation – Ability to use efficient processes and procedures to get the work done; set aggressive measurable goals and objectives and be measured against them; set challenging but achievable goals for the department
  • Resource Planning – High level of ability to work with internal customers, IR groups and outsourced vendor staff to understand resource requirements on a regular basis; proactively incorporates these requirements into personal work plans; makes long term plans for personal work that effectively utilize resources
  • Minimum of 7+ years of experience in any one of the following Tivoli Access Manager (TAM), Tivoli Directory Server (TDS), Tivoli Directory Integrator (TDI) & PingFederate
80

Information Security Engineer Resume Examples & Samples

  • Perform hands on security testing of products and services to proactively discover risk and track them to resolution
  • Understand, balance and communicate business risk with security risk
  • Includes keeping better communication with other engineers, consultants and leadership in order to conduct other job duties in the above as a team
  • Certifications such as CISSP, CEH, GIAC, GSSP-JAVA preferred
  • Minimum of 2-4 years of experience in Application Security is preferred
81

Information Security Engineer Resume Examples & Samples

  • React to evolving threat conditions and advise technology teams on risk and threat remediation
  • Work closely with development teams to implement and maintain a robust Security Development Lifecycle
  • Identify and quantify the organization’s information risks and guide the organization in mitigating risk to an acceptable level
  • Help create an information security engaged and accountable culture within IT
  • 5+ years of experience implementing network, systems, and application security
  • 3+ years of experience in Security Engineering, Security Risk Analysis, Policy, and Procedures
  • Software development experience a big plus
82

Information Security Engineer Resume Examples & Samples

  • Superior interpersonal and communication skills (oral and written)
  • Standard security practices
  • Network architecture, routing and TCP/IP protocols
  • Administrating and analyzing Unix, Novel and Microsoft operating systems
  • Risk and threat assessment process and practices
  • Project planning and management
  • Business continuity planning, documentation and evaluation
  • Managing the evidentiary process
  • Strong customer service skills; mediation process; presentation and public speaking
  • Use of Third Party Applications and native scripts and languages
  • Maintaining the chain-of-custody process and procedures
  • Extensive skill in investigation and coordination of security anomalies and events
  • Extensive skill in performing a security incident investigation or forensic analysis of a security incident or event
  • A+ & Security+ certifications
83

Information Security Engineer Resume Examples & Samples

  • Current security certification (CISSP, Security+, CCNA Security, CISA, etc. ) or other relevant certification preferred
  • Experience in primary network topologies, LANs/WANs (Ethernet), TCP/IP protocol and other common network standards
  • Experience in the secure design, implementation, and continuous monitoring of enterprise services
  • Experience in security incident response, perform fault isolation, and service restoration
  • Experience developing and validating baseline security configurations and policies
  • Familiar with NIST Risk Management Framework
84

Information Security Engineer Resume Examples & Samples

  • 7+ years of experience as an information systems security engineer (ISSE)
  • Experience with working as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, or integration of secure networking, computing, and enclave environments
  • Experience with supporting the government in the enforcement of the design and implementation of trusted relationships among external systems and architectures
  • Experience with supporting security planning, assessment, risk analysis, and risk management
  • Experience with identifying overall security requirements for the proper handling of government data by interacting with the customer and other project team members
  • Ability to serve as the primary security engineering representative on engineering teams for the design, development, implementation, evaluation, or integration of IA architectures, systems, or system components
  • BA or BS degree or 11 years of experience as an information systems security engineer in lieu of a degree
  • DoD 8570.01-M Compliance Certification, including IASAE Level 2
  • BA or BS degree in CS, Information Assurance, Information System Security Engineering, or a related field
85

Information Security Engineer Resume Examples & Samples

  • Participates in the research, analysis, design, testing and implementation of complex computer network security/protection technologies for company information and network systems/applications
  • Assists customers in identifying security solutions for the company's networks and virtual private networks, application systems, key public infrastructures, authentication and directory services to ensure the security of the network and confidential data
  • Performs periodic vulnerability scans of networks to identify security vulnerabilities and provides remediation alternatives and conducts security risk assessments to ensure compliance with corporate security policies and adherence to best practices
  • Performs round-the-clock intrusion detection monitoring of company networks and systems
  • Participates in computer security incident response activities and the technical investigations of security-related incidents
  • Participates in the evaluation of vendor proposals, new and existing security designs, and emerging security technologies and systems
  • May provide technical guidance to less experienced staff.: 5+ years of experience in security applications and systems
  • Candidate should have 2-3 years information security experience with a diverse technical background
  • Strong time management skills, ability to prioritize work, work in dynamic environments for aggressive timeframes
  • The candidate needs to be a critical thinker and highly self-motivated. Strong verbal and written communication skills
86

Information Security Engineer Resume Examples & Samples

  • Improve Autodesk’s ability to protect its environment through design, development, and implementation of secure software development(SDL) practices
  • Work across Incident response, risk and compliance, product security and development teams to solve critical security problems
  • Research emerging technologies and maintain awareness of current security risks in support of security enhancement and software development efforts
  • Develop and enhance automated security testing in an Agile and CI/CD environment
  • Develop secure coding practices and provide hands-on training to development teams
  • Participate in red teaming exercises and other internal security awareness activities
  • 2 to 3 years’ experience in Application Penetration Testing
  • Experience with performing Threat Modeling and designing secure architecture
  • Experience with SAST static web application and services testing tools – HP Fority, Checkmarx, etc
  • Experience with DevOps and Secure DevOps
  • Experience and knowledge of developing and debugging C/C++ and Java
  • Experience of RDBS, NoSQL, Hive/Hadoop is a plus
  • Experience with securing cloud and container environments
87

Information Security Engineer Resume Examples & Samples

  • Conducts IA risk and vulnerability assessments
  • Ensures enterprise IA policies fully support all legal and regulatory requirements and ensures IA policies are applied in new and existing IT
  • Identifies IA weaknesses and provide recommendations for improvement. Monitors enterprise IA policy compliance and provides recommendations for effective implementation of IT security controls
  • Evaluates and assists IT activities
  • Makes periodic evaluation and assistance visits, notes discrepancies, and recommends corrective actions
  • Audits and enforces the compliance of IA procedures and investigates security-related incidents
  • Assists in conducting IT forensic investigations
  • Manages the IA program and monitors emerging security technologies and industry best practices
  • Performs or supervises activities such as detection and protection of IT resources using IA and IA-enabled tools
  • Provides real-time intrusion detection and firewall protection for all IT resources
  • Responsible for IA oversight or management of national security systems during all phases of the IT life cycles
  • Ensures the CIA of IT resources
  • Operates and manages IA tools and IA-enabled tools
  • Integrates tools with other IT functions to protect and defend IT resources
  • Provides CIA by verifying IA controls are implemented in accordance with DoD and SOCOM IA standards
  • Analyzes risks and/or vulnerabilities and takes corrective action
  • Ensures appropriate administrative, physical, and technical safeguards are incorporated into all new IT resources through certification and accreditation; and
  • Protects IT resources from malicious activity
  • Must have a current Secret clearance or higher (TS/SCI preferred)
  • Must have Bachelor's degree and at least five to seven years' experience
  • Working knowledge in Telos XACTA Information Assurance Manager software and DoD Risk Management Framework (RMF)
  • Familiar with NIST 800-53a and Assured Compliance Assessment Solution (ACAS)
  • Strong documentation, research, testing, and evaluation skills
  • Experience in accreditation of communication systems in the Risk Management Framework at the federal/ DOD level
  • An advanced degree is desirable
88

Information Security Engineer Resume Examples & Samples

  • Document assessments, findings, outcome, and recommendation for enhancements
  • Develop technical solutions and new security tools to help mitigate security vulnerabilities
  • Automation and development of security tools to increase efficiency of daily tasks
  • Liaise with development, architect and business divisions
89

Information Security Engineer Resume Examples & Samples

  • Lead and develop plans to safeguard computer configurations against accidental or unauthorized modification, destruction or disclosure and to meet emergency data processing needs
  • Research, design and advocate new technologies, architectures and security products
  • Participate in and lead internal audits, in cooperation with the Information Security Office; develop appropriate criteria needed to assess the level of new/existing applications and/or technology infrastructure elements for compliance with enterprise security standards
  • Perform security risk assessment and mitigation. Inspect system and network data for computer and network usage policy compliance, system integrity and incident response
  • Develop and deliver educational information to system administrators and users. Lead the development and documentation of information security standards, best practices and guidelines
  • Develop, implement and manage policies and procedures related to IT security and operational support systems in collaboration with the Information Security Office
  • Develop and implement ongoing test plans to ensure compliance with standards and processes (selecting sample, verifying documentation and other requirements)
  • Mentor and train team members and peers on cyber security solutions and actively participate on system and application improvement project teams
  • Maintain a state-of-the-art awareness of information security issues, incidents, problems, utilities, legal requirements and solutions for all major information system platforms in use at Stanford
  • Other duties may also be assigned
  • Proven system administrator and operations experience in an enterprise environment with Windows and Unix servers
  • Solid experience as Linux server system administrator in an enterprise production environment, including design, implementation, hardening servers, troubleshooting, forensics and security utilities
  • Strong knowledge and experience of IT process automation
  • In-depth knowledge of authentication protocols, encryption algorithms and other security fundamentals
  • Strong knowledge and understanding of industry standard information security practices
  • Advanced knowledge and understanding of networking protocols, principles and devices
  • Extensive experience with debugging, troubleshooting, forensics, and security utilities
  • Excellent communication skills and the ability to explain complex technical ideas to non-technical audience and work with individuals at all levels
  • In-depth knowledge and understanding of IT industry trends and emerging technologies and an ability to relate them to Stanford and its mission
  • Demonstrated experience in leading/mentoring team members and providing technical guidance to customers and stakeholders
  • High level of integrity and excellent judgment concerning proprietary and privacy issues
  • Experience with security tools such as OSSEC, Qualys, BigFix, AirWatch, Bit9, EMET and Splunk
  • Experience in ELK, Elastic stack, and configuration management tool, such as Puppet
  • Experience in Linux and storage (NetApp) system administration
  • Experience in process automation and/or application development
90

Information Security Engineer Resume Examples & Samples

  • 3+ years of experience with information security
  • Ability to prepare Cyber assurance documentation, brief clients, conduct scan procedures, prepare client required briefings, and produce and monitor Plan of Action Milestones for mitigation implementation
  • Security+ or higher level DoD 8410.1M for IAM II or IAT II Certification
91

Information Security Engineer Resume Examples & Samples

  • Minimum of 5 years of experience in security discipline
  • Experience with hardening mainstream end user computing operating systems, such as Windows 7, 8 and 10 and McIntosh OSX
  • Experience developing security baseline configurations for end user computing operating systems
  • Understanding with group policy development via active directory
  • Experience with enterprise orchestration tools for endpoint platforms, such as McAfee ePO, IBM Bigfix, and Casper for OSX
  • Experience with third party endpoint security controls, such as HIPS, AV, and sandboxing technologies
  • Coordinates delivery of project/changes milestones, ensures projects stay on target, escalating and identifying roadblocks
  • Ability to quickly diagnose the problem areas and come up with solutions and/or workarounds
  • Understand the requirement and analyze on a technical feasibility and design
  • Able to work effectively with remote locations including onsite offshore stakeholder streams
  • Microsoft Windows certifications
  • Understanding of cyber security operations fundamentals
  • Some project management experience
92

Information Security Engineer Resume Examples & Samples

  • Responds to all information security relevant events (hacker intrusions, virus infections, denial of service attacks, ect.)
  • Configuration and troubleshooting of ArcSight ESM and associated infrastructure
  • Maintain a solid working knowledge of information Security principles and practices
  • Leads the configuration, support, and secure deployment of systems that support the security monitoring program
  • Offers technical information security consulting services to distributed personnel who are responsible for one or more information security systems; these people include Network Administrators, Systems Administrators, Software Developers, and Database Administrators
  • Participate in knowledge sharing with other team members to advance the security monitoring program
  • Meet with regulators and customers to explain security programs
  • Liaison with the business to harmonize and leverage the controls to support compliance related activities from a business perspective and utilize and enhance existing technologies that are in place
  • Maintain an understanding of Global Security Regulations and Compliance Controls
  • Complete project work accurately and within deadlines as required
  • Communicate with project team and keep project information up to date
  • Work with third party assessors that evaluate Diebold solutions with PCI, SOX and GLBA requirements
  • Bachelor's degree in security, information technology, accounting or finance is required or equivalent experience
  • Minimum 4 years of technical experience in the security aspects of multiple computer platforms, operating systems, products, network protocols and system architecture
  • Proven experience working as part of a global information security program
  • Expertise with security technologies such as various monitoring and log aggregation platforms, penetration testing frameworks, vulnerability scanners, and endpoint security solutions
  • Experience designing, implementing, and managing a SIEM environment (Arcsight, Splunk, etc.). Previous experience with ArcSight ESM and Logger appliances is a plus
  • In depth knowledge of vulnerability analysis, security monitoring, and the threat landscape
  • Broad understanding of the IT systems, technologies, and solutions, and how security controls integrate with these systems
  • Demonstrated ability to understand business drivers and requirements in order to be able to communicate their requirements to the technical staff as well as security requirements to the business itself
  • Solid understanding of design considerations for complex, high volume transaction systems with high availability, reliability and manageability requirements
  • Advanced understanding of operating systems and server infrastructure
  • A solid foundation in at least one or more of the following
93

Information Security Engineer Resume Examples & Samples

  • Responsible for Application Security, Certification and Accreditation and Security Operations in coordination with Information Assurance Manager (IAM)/Information System Security Manager (ISSM) and DISA
  • Provide an Information Assurance Vulnerability Alert (IAVA) Plan of Actions and Milestones (POA&M)
  • Responsible for the prevention, detection, investigation and response with respect to security threats and attack
  • Provide advice and program assistance on complex Security and Suitability IT issues
  • Researches, designs, develops, and implements monitoring and administration of a variety of network security and remote access services
  • Configures and validates secure systems and tests security products and systems to detect security weakness
  • Maintain a system that can be certified and accredited in accordance with (IAW) Army, DISA, and DoD security requirements and policy, in reference to the ATO renewals using DoD Instructions 8500.01 and 8510.01
  • Reviews proposed new systems and software designs for potential security and privacy risks; make recommendations for mitigation or countermeasures based on National Institute of Standards and Technology Risk Management Framework NIST SP 800-53 V4 to ensure that security and privacy issues are appropriately and consistently addressed throughout the investment and system life-cycles
  • Maintain and update the HQAES security concept of operations document, architecture documentation, risk assessments, risk mitigation plans, and other supporting documents required to support DIACAP or RMF for DoD IT accreditation
  • Manage and maintain the HQAES Ports, Protocols, and Services list
  • Work with HQAES COR to introduce security thresholds in the HQAES Software Development Life-Cycle (SDLC)
  • Coordinate with DISA on alerts for HQAES and, upon direction, HQAES end users of security issues or updates to the applications and systems in use
  • Ensure the system and installed applications have current patches, security updates, and configuration settings in coordination with DISA
  • The A&A Specialist shall have the following experience and qualifications
  • Demonstrate knowledge of DoD Information Assurance Certification Accreditation Process (DoD 8500.2) and DoD Risk Management Framework (DoD 8510.01)
  • Demonstrate knowledge of system artifacts
  • Demonstrate knowledge of DISA circuit registration processes
  • Demonstrate mid-level knowledge of DoD and Army standards, C&A techniques, actions and best practices related to C&A
  • Maintains senior affiliations with national and international organizations associated with information security
94

Information Security Engineer Resume Examples & Samples

  • Bachelor’s degree in Computer Science, Computer Engineering or other related discipline; equivalent experience may be acceptable
  • Three to five years’ experience working with cloud services
  • Knowledge of cryptography technologies
  • Proficient in written and verbal communication
  • Experience working with globally distributed Development teams
  • Ability to multitask and work on multiple projects
  • Familiarity and maintenance activities of ISO 27001 and HIPAA compliance; including some oversite of security policies and procedures governing data, networks, and application systems
  • Familiar with open source technology, software development and scripting languages
  • Excellent knowledge of Information Security standards, frameworks, and best practices for large corporate environments
  • Experience managing information security in a medical devices manufacturing environment
  • Direct experience with SOX, HIPAA, FDA, Safe Harbor and other security and privacy governance
  • Experience working in an FDA regulated and/or ISO compliant environment; and,
  • Monitoring tools and hardware
95

Information Security Engineer Resume Examples & Samples

  • RSA Two-Factor Authentication, knowledge of configuring Authentication Manager, Radius, Self-Service Portal, and create custom reports
  • May make technical presentations to Atos management and/or clients
  • Works professional hours which may include extended or after hours support
  • Approach problems with a wide degree of ownership to determine solutions
  • Able to effectively prioritize and organize multiple tasks
96

Information Security Engineer Resume Examples & Samples

  • Install and configure EPO and SQL servers
  • Create, distribute, maintain Agents and Repositories
  • Configure Root Product Policies and Tasks
  • Perform database maintenance
  • Install, deploy product updates
  • Install and configure EPO upgrades
  • Configure, deploy, monitor Rogue System Sensor environment
  • Produce and distribute weekly reports to identify the state of the environment. Specifically, identify non-compliant platforms for EPO agent, Product (i.e. VSE), and Engine components
  • Maintain documentation for exceptions to EPO standards
  • Assist site administrators with EPO environment issues
  • Primary interface for external/internal audits of EPO
  • Assist/Coordinate Situation Mgr tasks to contain and resolve virus outbreaks or McAfee related issues
97

Information Security Engineer Resume Examples & Samples

  • Bachelor’s degree in telecommunications, computer science, information technology or 5+ years of progressive technical training/experience is required
  • Certifications: CCNA is preferred
  • In-depth understanding of the OSI Reference Model and its security implications
  • Must be capable of working well independently as well as in a highly collaborative team environment
  • Must have good knowledge of Cisco ACS 5.x version or Cisco ISE
  • Strong working knowledge of remote access types and their security implications
  • Working knowledge in system, UNIX, Windows, and network device administration
98

Information Security Engineer Resume Examples & Samples

  • Researches attempted or successful efforts to compromise systems security, determines causes of security violations, and designs countermeasures
  • Routinely conducts security risk assessments and provides recommendations to management to improve the security of the systems/network
  • Recommends adjustments to network security devices such as IDS/IPS, proxy servers, NGFWs, etc. depending on incident
  • Develops automation routines to assist in daily workflow of security requests and incidents
  • Evaluates new products on an as needed basis to determine their use case and effectiveness within SAS’ environment
  • Assists in penetration testing of internal and external networks
  • Researches latest security best practices, staying abreast of new threats and vulnerabilities and helps disseminate this information to appropriate groups within the organization
  • Coordinates and executes security projects for the organization
  • Performs management reports regarding security status and the impact on the business
  • Provides support to Information Security Engineers
  • Assists in responding to security incidents as part of the Security Incident Response Team
99

Information Security Engineer Resume Examples & Samples

  • Establish and maintain productive and respectful relationships with other internal business units
  • Provide consistent and professional deliverable documentation
  • Participate in, identify and recommend improvements in methodology and internal process
  • Professional security consulting experience, typically obtained in 6+ years
  • Vast technical experience with the multitude of varied security solutions and products
  • Examples include: PCI-DSS, ISO 27001/2, NIST 800-53, etc
100

Information Security Engineer Resume Examples & Samples

  • Perform daily, weekly review of malware activity and engage in virus response activities as part of our Malware Defense program
  • Help track and remediate vulnerabilities as part of our Vulnerability Management program
  • Assist in the development, processing, and delivery of security related metric reports
  • Provide project support for key security projects as needed
  • Help review, edit and update Security Standards, Best Practices Guides and/or Daily Run Documents
  • Help build and maintain internal Security Team Site
  • Help with automation of Security Operations tasks
  • Help field and work security tickets in our helpdesk system
  • Demonstrated knowledge of Information Security principles, technology and control processes
  • Hands on Security Operations experience dealing with events and incidents
  • General knowledge of Windows/Linux Operating Systems and networking
  • Strong technical troubleshooting skills
  • Scripting/Programming knowledge (Python, Perl, VBScript, JavaScript, etc)
  • Proficient with Google Apps
  • Excellent oral and written communication skills, including report writing and technical documentation
101

Information Security Engineer Resume Examples & Samples

  • Advise users of the security features and procedures used in their ISs
  • Perform system vulnerability scanning using approved software tools
  • Thoroughly understand software installations, systems monitoring and troubleshooting, account management, and overall efforts to minimize system downtime
  • 3-5 years' experience as a Security Engineer supporting software architecture development environments
  • Experience on security directives, policies, publications and regulations
  • Experience in IT security certifications (CIPP. CompTIA Security, CPP, PSP and alarm/badge systems)
  • Posses clear understanding of security protocols and standards and have experience with software and security architectures
  • Experience with packet analyzers
  • Experience in networking concepts and services, such as, VPNs, IPSec, PKI and TCP/IP
102

Information Security Engineer Resume Examples & Samples

  • Active SECRET
  • Bachelor’s degree 10 to 12 years of experience in managing web portal and databases
  • Technical expertise to enhance the usability and functionality of a portal environment
  • Strong analytical and technical skills to understand and de-conflict complex matters
  • IT troubleshooting/help desk skills and experience
  • IT training experience
  • Excellent customer skills
  • Project Manager/Action Officer experience
103

Information Security Engineer Resume Examples & Samples

  • 5+ years progressive advanced experience as an IT information security professional working within an enterprise environment (Prefer Azure Experience)
  • 5+ years Hands-on experience implementing, administrating and operating information security technologies such as firewalls, IDS/IPS, SIEM, Antivirus
  • Advanced knowledge of regulatory compliance including, but not limited to OWASP, ISO, PCI-DSS, and NIST
  • Hands-on experience implementing, administrating and operating technologies such as network traffic analyzers and malware analysis
  • Advanced knowledge of the TCP & UDP IP protocol suite and related security architectures
  • CISSP, GSEC, CEH, Security+ or similar information security certification
  • Experience implementing and supporting systems within enterprise-class data center environments
104

Information Security Engineer Resume Examples & Samples

  • Performs the daily operation and execution of security-related tools, processes and controls related to cyber defense initiatives
  • Helps coordinate and drive remediation of identified risks and control deficiencies
  • Looks for ways to optimize security processes and recommend opportunities and solutions for improvement and automation
  • Serves as technical and function subject matter expert across multiple security domain areas, raising awareness and communicating security risks within the company
  • Supports and participates in incident response and technical investigations as needed
  • Ensures adherence to compliance regulations and policies
105

Information Security Engineer Resume Examples & Samples

  • 1) Work with threat detection and response tools and capabilities such as IDSes, malware sandboxes, log correlation engines, flow collectors, or memory forensics to understand typical security workflow and detection practices
  • 2) Programing in Linux, Windows and Macintosh operating systems to create interoperable applications and functionality
  • 3) Understand network and Internet architecture to design and build appropriate capabilities utilizing these architectures
  • 4) Developing and debugging with object oriented programming languages, such as C/C++ and Java, to design and develop security applications
  • 5) Client-side web programming, including HTML5, CSS, JavaScript, Ajax, and jQuery
  • 6) Python and Django, a server-side MVC framework for web application development
  • 7) Utilize RDBS, NoSQL or Hive/Hadoop to build structured and unstructured databases supporting applications and data analysis
  • 8) Mobile security, including security control implementation to advance secure development practices
  • 9) Understand and utilize data science, data mining principles and machine learning concepts to design and develop new methods for discovering threat activity
106

Information Security Engineer Resume Examples & Samples

  • Lead and execute Information Security projects in order to better protect our customers, shareholders and colleagues information. Develop, execute and communicate project tasks, time lines, and status information
  • Provide technical leadership and expert level consultative services focused on information security controls. Ensure that all layers of the network, operating system, application, and data infrastructure integrates in a secure fashion
  • Responsible for the development and continual enhancement of our Information Security program, used to maintain security of our Information Systems. Develop and maintain the documentation for Information Security Policies, Standards, and Procedures
  • Stay current with information security trends and regulations in order to provide intelligence in the areas of intrusion techniques, social engineering, technology, and security specific solutions. Advise management on applicable trends and recommended solutions. Serve as subject matter expert (SME) for designated information security controls
  • Conduct security risk assessments on all computing systems and components, both new and current, utilizing the appropriate security diagnostic tools. Identify security deficiencies and instigate appropriate corrective action, and report on findings
  • Develop, plan and perform configuration changes for our major security platforms, including but not limited to AS/400, UNIX, Windows, Web Application Firewalls, Log Management, IPS/IDS, DLP, and vulnerability assessment tools
  • Assess, analyze, consult and document security requirements for all information systems, which may include applications, 3rd party providers, mainframes, servers, wireless, telecom, LAN/WAN, databases and personal computers
  • Perform collaborative problem determination activities on overall security of network and application infrastructure: consisting of software, code, firewalls and other devices (such as IPS/IDS sensors, load balancers, routers and switches)
  • Provide expertise on integration of security technologies (such as IPS/IDS, HIDS, Firewalls, AV, security logs) within a common security reporting system
  • Monitor the compliance of the corporate Information Security policy, including protection levels and security related events. Perform security auditing and work with management to address detected
107

Information Security Engineer Resume Examples & Samples

  • Experience with Technology Protection Plan
  • Knowledge of DoD 8500, AR 25-2, AR 70-1, and DA PAM 70-3 Army Acquisition Implementation
  • BA or BS degree or 6+ years of experience with information security or assurance in the government industry
  • Compliant with DoD 8570 requirements
  • Experience with supporting the development of Program Protection Plan (PPP) and scheduling of RTP activities in support of DoD Milestone Decisions
  • Experience with Army Information Assurance processes and procedures
  • Experience with the configuration management of military software, including source code, documentation, and field-able products
  • Experience with software development and testing
  • Experience with the design and operation of airborne military communications systems
  • Possession of excellent customer service and organizational skills
  • Microsoft IT Professional (MCITP), Microsoft Certified Systems Engineer (MCSE), Microsoft Certified Professional (MCP) on Windows 2003 or 2008 server, Windows 7 MCSE, or equivalent Operating Systems Certification, or Cisco Certified
108

Information Security Engineer Resume Examples & Samples

  • At least 2 years experience in security auditing (tools including AppScan, Nessus, Burp Suite)
  • At least 2 years experience auditing web application code
  • Experience with SSAE-16, ISO27001, PCI-DSS, HIPAA, FedRAMP and similar compliance standards
  • Certified in CISSP, CISA, CISM, and/or Ethical Hacking Certification
109

Information Security Engineer Resume Examples & Samples

  • Identifies and oversees the installation, modification or replacement of hardware or software components and any configuration change(s) that affects security
  • Assesses the impact on the business unit/customer caused by theft, destruction, alteration or denial of access to information and reports to senior management
  • Nine or more years of experience in network, host, data and/or application security in multiple operating system environments
110

Information Security Engineer Resume Examples & Samples

  • Designs audits of computer systems to ensure they are operating securely and that data is protected from both internal and external attack. Makes and implements recommendations for preventive measures as necessary
  • Assesses assigned system to determine system security status. Designs and implements security policies and procedures to ensures compliance to policies and procedures
  • Designs and conducts training for computer security education and awareness programs. Researches and evaluation emerging security trends and issue to ensure that education remains current and is continuously updated
  • Defines security requirements and subsequently reviews complex systems to determine if they have been designed and established to comply with established standards. Develops and implements new standards as necessary
  • Leads investigations of security violations and breaches and recommends solutions; provides analysis summary to management and recommends alternative courses of action as necessary
  • Provides expert technical consultation on highly complex tasks; assists and/or provides limited direction to lower level technical personnel
  • Provides product recommendations of security packages to customers; Reviews vendor products and makes recommendations as appropriate. Conducts cost analyses to determine feasibility of new products for clients
  • Nine or more years of experience in computer science, management information systems or data security experience
  • Four or more years of experience with certification and accreditation of data center systems
  • Strong analytical and problem solving skills for resolving security issues
  • Strong organization skills to balance work and lead projects
  • Strong interpersonal skills to interact with customers and team members
  • TS/SCI with favorable polygraph required
111

Information Security Engineer Resume Examples & Samples

  • Deploys, operates and monitors technical security devices such as web application firewalls, host based IDS/IPS, network based IDS/IPS, Web proxies, vulnerability scanners, anit-virus, file integrity monitoring and security event and incident management systems (SEIM)
  • Monitors network security events and take appropriate action based on Valero’s policy
  • Develops, delivers and monitors custom SEIM reports to support operational and security requirements
  • Researches, evaluates, and recommends information-security-related hardware and software
  • Provides second and third-level support and analysis during and after a security incident
  • Plans, estimates and manages small I/S Security projects using Valero’s project methodology
  • Provides support of computing equipment and software, to include complex needs analysis, configuration, installation, moves, and changes for all supported locations during and after hours
  • Researches and assesses new threats and security alerts, and recommends remedial actions
  • Develops training materials and documentation as needed
  • Continuously monitors the status and effectiveness of security controls
  • Bachelor's degree (or higher) or foreign equivalent degree in Management Information Systems, Information Technology, Computer Science, Mathematics, or related field required
  • Minimum of three (3) years of relevant information security and IT experience including a high degree of technical security technology expertise required
  • Certifications such as Certified Information Systems Security Professional (CISSP) or Global Information Assurance Certification (GIAC) are preferred
  • Strong analytical and problem solving skills, systematic thinking, and a good understanding of technologies deployed in the infrastructure environment required
  • Knowledge of a wide range of security technologies, such as network security appliances, identity and access management systems, anti-malware solutions, automated policy compliance tools, and desktop security tools is required
  • Excellent understanding of information security concepts, principles, and best practices are required
  • Excellent communication skills are required to interact with internal and external contacts required
  • Interpersonal and collaborative skills and the ability to communicate security risks concepts to technical and non-technical audiences required
  • High level of personal integrity and the ability to professionally handle confidential matters with proper judgement is required
112

Information Security Engineer Resume Examples & Samples

  • Evaluation of new product lines and features for currently supported products
  • Level-of-effort assessments for various projects and deliverables for both internal and external clients
  • Comprehension and understanding of vendor roadmaps and release schedules
  • Maintaining centrally managed consoles and critical infrastructure that enable our SOCs to centrally manage third party security technologies
  • Participate in an on-call rotation for outside business hours escalations, and top tier escalation support for Operations based teams
  • Responsible for production and lab infrastructure specific to platforms under ownership
  • Participate in a 24/7 on-call rotation
  • Strong communication skills - written and verbal, team player for both technical and non-technical audiences
  • Must be familiar with security software products and audit tools used in distributed computing environment. Knowledge of Microsoft Windows Active Directory, Internet security, network security technologies, and third party security or audit tools is required. In addition; understanding how to implement application level security controls and mechanisms
  • Familiarity with UNIX/Linux operating systems, tools, and applications
  • Working understanding of Agile software development
  • TCP/IP protocol suite; advanced subnetting and network address translation
  • Extensive experience with routing protocols and concepts
  • Experience with troubleshooting certificate issues with tools such as Portecle
  • Strong technical background in proxy technologies such as Bluecoat, McAfee or similar products
  • CISSP, CISM, CISA, GIAC or other security certifications highly desired
113

Information Security Engineer Resume Examples & Samples

  • Implements and maintains security solutions across all Choice systems and networks
  • Identifies operational and security control points
  • Develop/maintain standards and selection criteria to identify appropriate security solutions to support strategic operational needs and security requirements
  • Assesses networks and systems to identify, report on, and provide guidance in the remediation of security gaps to include
  • Responding to Information Security threats, ensuring that Choice information assets remain secure
  • Performing incident response activities as necessary
  • Evaluates proposed changes that effect the technology environment to identify potential security gaps and recommends mitigating controls or options to include partnering with Test Engineering team to perform security testing on all applicable releases
  • Assess the production environment on an ongoing basis to ensure that it remains compliant with external regulations and Choice Hotels Information Security Policies and Standards
  • Master's degree (M.A.) or equivalent; or four years related experience and/or training; or equivalent combination of education and experience
  • Minimum of 5 years professional Information Technology experience
  • Previous experience in configuring and implementing heterogeneous technologies and standards across complex business and operational environments
  • Experience responding to and managing security incidents
  • Up-to-date understanding of exploits and current vulnerabilities
  • Knowledge of the Payment Card Industry Data Security Standard (PCI DSS)
  • OSPF, (E)IGRP, TCP/IP, NetBIOS/SMB, SNA, IP-RIP, Frame Relay, ATM, ISDN and other routing protocols
  • Vulnerability scanners and exploit frameworks
  • Encryption protocols for protecting data in transit and at rest
  • Superb customer service skills
  • Exemplarily interpersonal skills necessary to interact effectively with team members, project managers , developers, engineers, vendors, users and business analysts as well as executive and senior management
  • Strong presentation skills
  • Able to work both independently as well as collaboratively achieving results within established timeframes with minimal supervision
  • Ability to present to large groups
  • Ability to identify and provide hands-on remediation for security vulnerabilities
  • Ability and willingness to work long or late hours, based on system release and/or network update schedules
  • Ability to travel up to 10% to scheduled and unscheduled events throughout the United States and to potentially international locations
  • Must be able to uphold Choice¿s Values & Performance Principles of accountability, collaboration, performance excellence, sense of urgency, innovation, inclusion & diversity, integrity & trust, customer focus, and respect
114

Information Security Engineer Resume Examples & Samples

  • Review and develop security policies and corresponding standards
  • Provide security expertise to Maritz
  • Raise awareness and assist in the enforcement of security policies and regulatory requirements
  • Define and review security requirements for enterprise projects including application development
  • Analyze business needs, researches and recommends security solutions
  • Provide support to the Security Operations and Incident Response Teams
  • Participate in vendor product evaluation and recommendations
  • Perform other duties incidental to the work described herein
  • Maintain areas of an ISO 27001 and PCI DSS-based information security program and lead projects to enhance/implement program areas and processes
  • Assists Information Security Compliance activities in support audit and assessment activities, including customer, PCI, and internal audit reviews
  • Provide guidance for selection of third party service providers/vendors
  • Identify and evaluates risks, vulnerabilities and threats to systems and applications
  • Consults and interfaces with network and server administrators, desktop support staff, IT staff, developers, and non-IT departments on security issues and requirements
  • Improves efficiency of security functions, automates work processes and works collaboratively with IT operational personnel to accomplish a balance of business and security objectives
  • Gather information and collaborate with IT and non-IT staff to assess and solve security issues for networks, servers and applications
115

Information Security Engineer Resume Examples & Samples

  • Perform and coordinate communications regarding tier 1 remedy triage; generate periodic infringement status reports
  • Perform firewall scan and generate related reports
  • Review daily reports, identify compromised systems and follow up appropriately with systems administrator
  • Serve as backup to more senior staff in performing vulnerability scans, perform quarterly modem scans, review results and resolve issues identified
  • Automate triage process for efficiency and serve as backup maintenance for IS websites
  • Update online security tutorial for campus-wide use
  • Collaborate with others as appropriate to promote customer satisfaction with campus IT services
  • Work Experience:One or more years of job related experience
  • Skills:This job requires basic knowledge of computer systems and network security monitoring and reporting techniques, processes and practices. Skills in analysis and problem solving are required as is working knowledge of systems and components specific to area of assignment
116

Information Security Engineer Resume Examples & Samples

  • For the Project, provide technical expertise in information security and compliance topics
  • For the Project, demonstrate continuous improvement in the topics of information security and compliance using a measurable matrix tied to the State of California’s SAM-5300 security guidelines and NIST moderate level security controls
  • For information security and compliance topics, educate and coordinate projects and actions with all groups within the SGS Testcom Rancho Cordova office
  • Assist the IT Operations Manager and Senior Technical Project Manager with information security and compliance topics as needed
  • Oversees and participates in the creation of Documentation related to information security and compliance management
  • Perform technical tasks to setup and upgrade security devices, software, and complete subsystems
  • Lead the effort to run an ongoing security program in a world-class fashion
  • CISSP, CCNA and/or GIAC certifications
  • Strong leadership, project management skills, time management, and problem solving skills
  • Proficient level ability using general office tools including but not limited to Microsoft Windows based workstations, Microsoft Office suite of applications including Microsoft Project, and general Web based software tools
  • Ability to excel in idea generation, evaluation, and prioritization, customer and partner engagement
  • Experience solving complex and large-scare hardware/software problems
  • Ability to adapt to a changing environment and make timely decisions
  • An entrepreneurial spirit
  • Ability to work with technical and non-technical business owners to get things done
117

Information Security Engineer Resume Examples & Samples

  • Bachelor's Degree or Advanced Degree with experience in Information Security or Cyber Security
  • Information Assurance (IA) trained and certified
  • Possess and maintain a Security +, CISSP, or CEH certification
  • 3 years relevant work experience in the Information Assurance field
  • Knowledge and experience with implementing DoD & IA requirements and the RMF certification process
  • Experience with IA vulnerability scanning software tools, implementing Security Technical Implementation Guides (STIGS), and applying IAVA patches
  • Ability to work 5 days per week, on site, at APG, MD in a classified lab
  • Equivalent experience/education combinations are NOT permitted based on the Typical Minimums for this job. This requisition requires a minimum of 3 years of related experience and a bachelors degree in a related discipline. Only candidates possessing both qualifications can be considered
118

Information Security Engineer Resume Examples & Samples

  • Establish IT Security strategy and policy for GLOBALFOUNDRIES
  • Develop and define global security design initiatives
  • Responsible for Security Policy update & enforcement
  • Responsible for assessing and review security controls placed on systems, networks, databases, and applications
  • Assess and review the use of TCP/IP services within GLOBALFOUNDRIES
  • Assess security risks to the corporation's information and communications systems
  • Develop minimum standards and baselines to define required security controls and settings on all servers, commercial applications, and networks
  • Experience in forensic analysis and remediation
  • Awareness of Internet/Network Security technologies - firewalls, VPN, IDS, IPS, proxies, etc
  • Ability to develop, describe and communicate Security Baselines and Policies
  • Three or more years of hands-on experience working as a security analyst
119

Information Security Engineer Resume Examples & Samples

  • Coordinates the design, implementation and evaluation of all phases of highly complex
  • Information security solutions and programs. Assists in the overall development, implementation, and oversight of the information assurance [IA] program
  • Participates in the security engineering, validation testing of system configuration/hardening, and assessment of classified information systems [IS]
  • Understands current computer technologies and technical security requirements as applied to the design, development, evaluation, and integration of
  • Computer systems and networks to sustain compliance with national and corporate policy as well as best practices. Supports the Certification and
  • Accreditation [C&A] or the NIST Assess & Authorize [A&A] RMF process and develops system security plans [SSPs] under guidance of NIST SP
  • 800s,NISPOM, DIACAP, ICD 503, or replacement guidance as released. Conducts certification test analysis and technical evaluations for vulnerabilities
  • They also need at least two certifications: One of the following: GSEC Sec+ CE SSCP CCNA- Security
  • One of the following: CAP GSLC CISM CASP CISSP or Associate
120

Information Security Engineer Resume Examples & Samples

  • Bachelor’s Degree in Computer Science (or related field)
  • Minimum 3 years’ total experience in Information Technology, with at least 2 years specifically in Information Security
  • One or more security certification such as SANS/GIAC, CISSP, CISA, CISM, CEH, required
  • Scripting/programming skills (PowerShell, Bash, Perl, Python) and familiarity with ethical hacking
  • Experience with Windows Server 2008/2012, RHEL, and CentOS
  • Knowledge of UNIX and Windows environments as may pertain to Network and Security tasks including syslog, DNS, load balancers, Windows Event Log
  • Review technical security posture (network, application, database) for existing and newly acquired businesses or services
  • Perform security review and monitoring of the production environment setup permissions of users, open ports/services and overall network setup
  • Examine network, server, and application logs to determine trends and identify security incidents
  • Use security tools to audit infrastructure, detect issues and coordinate remediation of any issues
  • Manage Payment Card Industry (PCI) requirements such as internal/external network scanning and cryptography methodologies
  • Perform monthly scans of the internal and external networks for critical or high vulnerabilities for adherence to PCI and SOX
  • Set up dashboards and review production logs and look for patterns of possible security incidents SIEM solutions such as Splunk, QRadar, LogRhythm, ArcSight, and ELK
  • Follow, develop and improve network and security configuration procedures
  • Review requests for increased network access and provide risk-analysis
  • Deliver, maintain and improve security awareness training
  • Manage endpoint security tools like antivirus, antimalware and incident response tools
  • Experience with various security tools such as Retina, Nessus, FireEye, Snort, Nexpose, McAfee, Symantec, Carbon Black, BlueCoat, NMap, Metasploit, etc
  • Work with other teams to remediate discovered deficiencies
  • Requires excellent oral and written communication skills to work effectively with others regardless of departmental or geographic boundaries
  • Requires the ability to produce detailed technical documentation
  • Requires experience developing and presenting recommendations to peers and management
  • Requires good organization skills to produce quality work, within required specifications, and within scheduled timelines
  • The position requires individual initiative and ability to influence events, rather than passively accepting them, in order to achieve goals. This means being proactive and a self-starter and going beyond specific job responsibilities to ensure goals are achieved or exceeded
121

Information Security Engineer Resume Examples & Samples

  • Has experience with IA vulnerability scanning software tools, implementing Security Implementation Guides (STIGS), and applying IAVA patches
  • Has experience creating and maintaining various security documents such as the SCP/VSR, System Backup and Recovery Plans (SBRPs) and Plan of Action and Milestone (POA&M) tables
  • Able to interact with the SMEs to determine if a finding is applicable and the appropriate remediation can be applied and properly document exceptions
  • Bachelors Degree in related field and a minimum of 5 years experience
  • IAT Level II IAW AR 25-2 and DoD 8570-01M. Examples include: S+, CCNP, CEH, CISSP
  • Risk Management Framework (RMF) experience
  • HBSS (Host Based Security System) experience
122

Information Security Engineer Resume Examples & Samples

  • Minimum 5 years of experience working in an Information Security role of increasing responsibility
  • Minimum 3 years of experience securing Web applications based on privacy and/or transactional risk is required
  • Minimum 2 years of experience working with large, complex networks and systems
123

Information Security Engineer Resume Examples & Samples

  • Evaluate security risks for various change requests coming out of ever changing business needs; considering the risks which could be introduced, the existing network security controls (Firewall etc.) while adhering to Cisco's security policies & standards
  • Evaluate, assess, and verify the compliance of ports and protocols utilized by IT infrastructures, systems, platforms, applications, and network security devices (e.g. router Access Control Lists, Firewall configuration, ports /protocol etc.)
  • Automate tasks including ACL checks, network policy adherence, Analyzing Firewall rules etc
  • Develop knowled gebase, refine processes for case handling, auditing based on best practices
  • Typically requires an Engineering Degree in Computer Science or equivalent plus 6 - 10 years of experience in areas similar to that laid out under roles/responsibilities
  • Good conceptual knowledge in Networking & Security preferably evidenced through certifications and hands on experience in assessing security risks for large enterprise networks
  • Hands on scripting knowledge in PERL, Python AND/OR any programming language such as Java J2EE
  • Good understanding of Data Center, Virtualization, Cloud, UCS, Multi-tier deployment environments and their Security operations
  • Systems administration skills (Good understanding of Unix and windows environment)
  • 1 Ability to work independently with minimal supervision on routine work and general instructions on new assignments aligning with the larger goals of the team
  • 2 Influencing and communication skills (verbal & written)
  • 3 Ability to develop and nurture relationships with stakeholders, peers and customers
124

Information Security Engineer Resume Examples & Samples

  • Knowledge of DoD 8500, AR 25-2, AR 70-1, and DA Pam 70-3 Army Acquisition Implementation
  • BA or BS degree and 6+ years of experience in a professional work environment
  • Certification compliant with DoD8570 requirements
  • Experience with the configuration management of military software, including source code, documentation, and fieldable products
  • Ability to support the development of Program Protection Plan (PPP) and scheduling of RTP activities in support of DoD Milestone Decisions
  • Microsoft IT Professional (MCITP), Microsoft Certified Systems Engineer (MCSE), Microsoft Certified Professional (MCP) on Windows 2003 or 2008 server, or Windows 7 MCSE, or equivalent Operating Systems Certification, or Cisco Certification
125

Information Security Engineer Resume Examples & Samples

  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information
  • Bachelor's Degree and 5 years experience in IA. 12 years experience with 7 years concentrated in IA may be substituted for degree
  • At a minimum must be DoD 8570 IAT Level 2 certified...ie...Security+ CE or SSCP and technical computer environment certification or training to start. IAT Level 3 preferred
  • At least 5 years applicable experience in Information Assurance
  • At least 2 years of experience installing, configuring, administering, and operating ACAS in a DoD environment
  • Must be knowledgeable with STIGs and Assessment and Authorization (A&A) policies
  • Solid understanding of Microsoft, Linux, and Unix Operating Systems
  • Knowledge and experience working with Firewalls
  • Knowledge and experience working with IDPS
  • DoD IASAE Level 2 (CISSP, CASP, CLSSP)
  • Demonstrated skills with: SQL/XSQL Server Administrator, IP Data Networking and Vulnerability Assessment product engineering and design, ACAS Security Center 4.X, Nessus 5.x or greater
126

Information Security Engineer Resume Examples & Samples

  • Lead the research, analysis, design, testing, implementation, administration, and lifecycle management of enterprise security engineering solutions to meet business requirements
  • Participate in the evaluation, development, implementation, and communication of security standards, procedures, and guidelines for multiple platforms and diverse systems environments
  • Build relationships with corporate technology experts and business leaders
  • Act as a security expert resource (SME) to clients, management and staff in all phases of the development and implementation of projects
  • 8+ years of technical experience in the security aspects of multiple platforms, operating systems, software, communications and network protocols or an equivalent combination of education and work experience
  • Current SANS, ISC2, and/or other security certifications preferred
  • Working experience of Unix/Linux and Windows operating systems, databases and its security capabilities
  • Ability to rapidly learn and apply advanced and emerging technical security principles, theories, and concepts
  • Exceptional analytical ability, communication and project management skills, documentation and the ability to work effectively with clients, IT management and staff, vendors and consultants
  • 5+ years' experience in six or more of the following
  • SIEM (Ex: Splunk, ArcSight)
  • Encryption technologies (ex: SSL/TLS, IPSec, TDE, PKI)
  • TCP/IP stack
  • Web Application Firewall , Firewalls, IPS/IDS
  • Enterprise anti-malware solutions
  • Vulnerability management / Penetration testing
  • Database Security/ Wireless Security
127

Information Security Engineer Resume Examples & Samples

  • Works directly with 3rd party vendor and system administration teams to configure, deploy, fine tune, and monitor firewalls, proxies, security information and event management systems, intrusion detection systems, vulnerability scanners, multi-factor/strong authentication technologies, RADIUS servers, and logging servers
  • Conducts periodic security administration tasks including security scan and remediation, security monitoring and auditing, network setup and administration
  • Engages with internal and external partners to help design, test, and implement state-of-the-art secure operating systems, applications, networks, and database products/solutions
  • Assists with providing guidance, direction, and authority for all information security activities including enterprise wide user provisioning, de-provisioning, user access, and restrictions to all systems
  • Assists in the planning, design and implementation of security measures created to safeguard access to resources, enterprise networks, computer systems, and data elements
  • Helps to identify, analyze, and resolve any security concerns on various systems and platforms related to installation, configuration, management, and use
  • Conducts studies and periodic risk assessments to ensure the integrity, confidentiality and availability of information to end-users is not compromised
  • Assists in the enforcement of information security policies and standards, and provides assistance with the implementation of such policies and procedures throughout the enterprise
  • Serves as the information security subject matter expert by providing guidance and consulting services to IT teams and business units on matters related to security
  • Assist with information security education and awareness for all employees and contractors
  • Five (5+) years of information security and/or network security experience
  • Must have one of the following certifications: CISSP, SANS GIAC, CCNA Security, CCSP, CCIE Security or applicable technical certifications
  • Solid understanding and demonstrated experience with network, operating systems, database, and application security concepts, methodologies and technologies
  • Solid understanding and demonstrated experience with identity and access management concepts, methodologies and technologies
  • Solid understanding and demonstrated experience with security monitoring and vulnerability management concepts, methodologies and technologies
  • Solid understanding and demonstrated experience with incident management and response concepts and methodologies
  • Frontline and applied experience with VPN and SSL VPN technologies and architecture
  • Firm understanding and experience with IP address space management, subnetting, name resolution, and directory service protocols and ability to participate and guide future network LAN/WAN planning and implementations
  • Strong working knowledge of a wide range of Information Security concepts, methodologies and technologies including, but not limited to, virtual private networks, routers/switches/firewalls, ISA’s, intrusion detection/prevention systems (IDS/IPS), content filtering, anti-spam and anti-virus appliances and software, encryption/authentication, and vulnerability scanning
128

Information Security Engineer Resume Examples & Samples

  • Compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies. Validate and verify system security requirements definitions and analysis and establish system security designs. Design, develop, implement, or integrate IA and security systems and system components, including those for networking, computing, and enclave environments, such as those with multiple enclaves and differing data protection or classification requirements. Contribute to security planning, assessment, risk analysis, risk management, and certification and awareness activities for system and networking operations. Review certification and accreditation (C&A) documentation and provide feedback on completeness and compliance of its content. Apply system security engineering expertise in one or more of the following system security design process: the engineering life cycle, information domain, cross
  • Repudiation, availability, and access control, and security testing. Support security authorization activities in compliance with the CSS Information System Certification and Accreditation Process and DoD Information Assurance Certification and Accreditation Process (DIACAP) process, the NIST Risk Management Framework (RMF) process, and prescribed CSS business processes for security engineering
  • M Compliance Certification, including IASAE Level 2
129

Information Security Engineer Resume Examples & Samples

  • Knowledge of CDS policy and process and IA and Cybersecurity policies, including DIACAP, RMF, AR 25
  • 2, AR 380
  • 5, DoDD 8510.01, and DoDI 8500.1
  • DoD
  • Approved 8570 Security Certification
130

Information Security Engineer Resume Examples & Samples

  • Related risks. Develop or recommend integrated security system and physical control solutions that will ensure proprietary and confidential data and systems are protected. This position is located in Aberdeen Proving Ground, MD
  • Knowledge of DoD 8500, AR 25
  • 2, AR 70
  • 1, and DA Pam 70
  • 3 Army Acquisition Implementation
131

Information Security Engineer Resume Examples & Samples

  • Solid experience as server system administrator in an enterprise production environment with Windows servers, Active Directory, and SQL servers, including design, implementation, hardening servers, troubleshooting, forensics and security utilities
  • Strong knowledge of IT automation with implementation using PowerShell
  • Experience with security tools such as Cb Protection (Bit9), BigFix, DUO, Splunk, OSSEC, Qualys, AirWatch, and EMET
  • Experience as Windows server system administrator in enterprise production environment with Windows, Active Directory, and SQL servers, including design, implementation, hardening servers, troubleshooting, forensics and security utilities
  • Experience in intrusion detection systems, data loss prevention systems, analysis tools, various log aggregation tools. vulnerability analyses and risk assessments
132

Information Security Engineer Resume Examples & Samples

  • Maintaining centrally managed consoles and critical infrastructure that enable Internet and Email services from third party security technologies
  • Collaborate with internal teams like Customer Implementation Services, Support Engineering, Software Engineering, IT Operations, Finance and Procurement to ensure efficient service delivery
  • Responsible for production and lab infrastructure specific to platforms under ownership, including planning for cost effectiveness and growth
  • Hands-on experience with security tools such as McAfee web technologies, BlueCoat web technologies, Cisco Ironport, email gateway technologies, etc
  • 3 years working within Information Technology and 1 year specifically in Information Security
  • Must be familiar with security software products used in distributed computing environments. Knowledge of Microsoft Windows Active Directory, Internet security, network security technologies, network troubleshooting tools and third party security tools is required
  • Must be familiar with Linux and have a minimum of 1 year managing Linux based security products
  • Working knowledge of networking and security technologies
  • Working knowledge of network security management, networking technologies, Wireshark, Fiddler, IBM Qradar, application layer security and architecture
  • TCP/IP protocol suite; advanced subnetting and network address translation, DNS
  • Routing protocols and concepts
133

Information Security Engineer Resume Examples & Samples

  • Establishing and implementing an information security framework and technical architecture
  • Designing, developing and implementing information security products
  • Providing information security expertise and consulting
  • 2+ years designing and implementing enterprise security architectures
  • Experience with network infrastructure, modern operating systems, database applications, web applications and other computing technologies
  • Hands-on experience designing, architecting and implementing various information security tools/products such as PKI, Next-Generation Firewalls, HSM’s, SIEM, Multi-Factor Authentication, IPS, NetFlow Monitoring, Full Packet Capture, Database Encryption, Privileged Identity Management, etc
  • Ability to lead a project from concept through implementation and anticipate potential problems
  • Comprehensive knowledge and understanding of information security concepts and best practices (NIST, COBIT, ISO, PCI, OWASP, etc)
  • Ability to perform detailed information security risk assessments and recommend mitigating controls
  • Proven ability develop operational runbooks, engineering packages and architectural diagrams
  • Experience promoting security as a business enablement function through the use of documentation, metrics, and strong verbal communication
  • Industry certification preferred (CISSP, CCSP, CISA, GIAC, etc)
  • Assist in the ongoing development of Southern Company’s security architecture – identify areas of opportunity, research alternatives and recommend solutions
  • Develop creative solutions to meet business needs while ensuring appropriate security controls and best practices are implemented
  • Partner with others to identify and resolve information security issues
  • Plan, coordinate and lead information security projects
  • Help customers understand and apply information security concepts, processes and technologies
  • Maintain current knowledge of information security concepts, technologies and practices
134

Information Security Engineer Resume Examples & Samples

  • BSCS degree with 3-5 years of experience or an MS degree with 2+ years of experience
  • Up to 5 years of related hands-on security experience with web applications is desirable
  • Strong Working knowledge of mobile application security. Web security is a plus
  • Working experience with product development teams in a security engineering role is highly desirable
  • A background in software development and security in mobile applications (iOS and Android)
  • Programming experience in Java and familiarity with databases is highly desirable. Knowledge of other technologies like PHP, Node.js, Content management systems is a plus
  • Ability to conduct mobile and web security assessments and handle vulnerability remediation of applications and web services
  • Ability to build automation tools for security processes for both mobile and web applications
  • Ability to deep dive into data and analyze for security and fraud anomalies
  • Ability to conduct security awareness trainings
  • Ability to adjust quickly to the security needs of a highly agile organization
135

Information Security Engineer Resume Examples & Samples

  • Assist in the assessment of potential risks with new applications and products and provide security requirements and recommendations for risk mitigation to help the business succeed with their projects
  • Assist in assessing new security technologies and recommend possible implementation strategies
  • Participate in supporting a comprehensive application security program in all areas of development incorporating, at a minimum, risk analysis, threat modeling, code reviews, and static code analysis that is evidenced using KPI to attest to reduction of risk
  • Assess Agile development activities and integrate security controls that will ensure software security. Ensure reports and findings are delivered in a timely and appropriate manner to management
  • Recommend new security policy, standards, best practices, and system configuration standards. Consult with internal clients on security topics and policy interpretation
  • Undergraduate degree in Computer Science, Engineering, or related field, or equivalent experience
  • Experience identifying and protecting against web, mobile, or cloud application security vulnerabilities including but not limited to those found in the OWASP Top 10 and CWE Top 25
  • Knowledge of technologies, tools and process controls to minimize risk and data exposure
  • Candidate must be willing to pursue applicable professional/technical certifications, such as CISSP, CCSP, CEH, GWAPT, GISEC, CISM or CISA
  • Broad technical knowledge of current and emerging technologies
  • Analytical and problem solving skills related to software development, , operating systems, networking, and code review
  • Knowledge of information security industry and regulatory obligations (ISO 27001/27002, SOX, PCI, NIST Framework, FISMA, HIPAA, NACHA, and SSAE-16)
  • Application development and/or source code review experience in C/C++, C#, VB.NET, ASP, PHP, or Java
  • Knowledgeable of industry security standards and organizations such as SANS, and OWASP
  • Web technologies such as Apache, Internet Information Server, Weblogic, or JBOSS
  • Familiarity with security tools such as static analysis (Fortify, Sonar Qube), runtime analysis, black-box testing
  • Security administration of Linux, UNIX, or Windows operating systems
  • Knowledge of project management practices
  • Experience in large Enterprise data centers and/or networks
136

Information Security Engineer Resume Examples & Samples

  • Identify unsuccessful and successful intrusion attempts by reviewing and analyzing security events logs and event summary information
  • Ensure the integrity and protection of networks; audit network security system to identify and protect areas of vulnerability
  • Monitor Intrusion Detection Systems for potential, successful and unsuccessful intrusion attempts
  • Analyze alerts as well as develop new triggers and reporting on an ongoing basis
  • Perform security incident analysis, recommend remediation steps and orchestrate available resources to respond in accordance with appropriate incident response plans
  • Analyze compromised /potentially compromised systems and participate in incident response as required
  • Communicate intrusions and compromises to IT Security team
  • 3+ years' experience working in an information security or risk management related field
  • Previous experience working in a Security Operations Center (SOC) or Incident Response Team
  • Bachelor's degree in Cyber Security, IT or equivalent work experience
  • Experience with Anti-Virus, Intrusion Detection Systems, Firewalls, Active Directory, Vulnerability Assessment tools and other security tools found in large network environments; along with experience working with Security Information and Event Management (SIEM) solutions
  • Familiarity with various network and host-based security applications and tools, such as network and host assessment/scanning tools, network and host based intrusion detection systems, and other security software packages
  • Demonstrated ability to manage and prioritize multiple problems and issues, excellent organizational skills, a teamwork approach to work and collaborate with peers to solve security events when necessary
  • Excellent oral and written communication skills, strong interpersonal skills are essential
137

Information Security Engineer Resume Examples & Samples

  • SIEM (Security Information and Event Management): Must have experience extracting pertinent security data, setting up SIEM solutions and troubleshooting connectivity issues. Experience in Qradar, ArchSite, NitroSecurity, McAfee, etc
  • Ensure appropriate security access and protection against unauthorized access, modification, or destruction
  • Minimum 2 years of experience as an Information Security Administrator or Engineer
  • Experience with firewall, router, and switch security
  • Knowledge of security auditing techniques
  • Strong knowledge of technology and security topics including network security, wireless security, application security, infrastructure hardening and security baselines, web server and database security
  • Understanding of FEDRAMP and system cloud migration requirements
  • Experience reviewing audit logs utilizing SIEM tools
138

Information Security Engineer Resume Examples & Samples

  • Develop and implement security standards, procedures, and guidelines for multiple platforms and diverse systems environments
  • Manage compliance and internal audits
  • Support internal Arch team in design and implementation of secure architecture
  • Collaborate with Experian GSO/GRC as needed and appropriate
  • Perform vulnerability analysis and configuration reviews in support of compliance testing activities
  • Act as the primary technical interface for penetration test teams
  • Manage delivery of staff assignments, as needed
  • Engage in system- and enterprise-level network reviews and testing
  • Review the development, testing, and implementation of security plans, products, and control techniques
  • Apply realistic risk scores by taking into account business risk, prioritizing findings, and developing actionable recommendations
  • Ensure that appropriate data security procedures and products are implemented to address risk
  • Work with law enforcement as required for domestic and international investigations of real or suspected intrusions
  • Demonstrated experience with industry standard testing tools such as AppScan, Web Inspect, Burp Suite, Qualys, Nessus, Nmap, Metasploit, etc
  • Bachelor’s degree in Computer Science, a technical discipline or equivalent experience
  • Require 5-7 years related experience
  • Working experience in the credit industry, its products, and services
  • Extensive experience with IT policies, standards, guidelines, and procedures
  • Extensive experience in Information Security
  • Working experience in system audit
  • Subject expertise in application systems
  • Extensive experience in emerging technologies
  • Working experience in penetration testing best practices
  • Working experience in programming
  • May provide input on hiring decisions in other areas
  • Initiates projects, develops project proposals and plans work execution
  • Resolves conflicts within or across teams
  • May provide input on hiring decisions of technical team members
  • Develops and prioritizes own and others’ goals and workloads to meet project objectives and deadlines
  • Influences team decisions and results
  • Mentors team members and may prepare and present seminars to them
  • Provides effective leadership and clear direction to technical staff members on assignments/tasks
  • Facilitates team/department meetings
  • Drives team’s open communication environment and ensures timely flow of information, ideas and solutions
  • Initiates efforts to overcome team barriers
  • Coordinates activities/efforts of internal organizations, external vendors and/or customers
  • Challenges assumptions, thinks “out-of-the-box.”
  • Sets schedules and ensures adherence to them
  • Sets costs goals and responsible for achieving them
  • Influences direction, decision, and outcome through presenting information to various levels
  • Provides input into company’s technology strategy
139

Information Security Engineer Resume Examples & Samples

  • Assists with the development, implementation and evaluation of information system security program policy
  • Serves as security advisor for technical issues related to Cybersecurity auditing tools, vulnerability management solutions, and continuous monitoring capabilities
  • Coordinates and assists in all phases of systems accreditation activities including initial capabilities development, cybersecurity inspections, tests and reviews, system sustainment and disposal
  • Assesses architecture and current hardware limitations, defines and designs system specifications, input/output processes and working parameters for hardware/software compatibility
  • Participates in information system risk assessment and analysis which examines mitigating factors and resulting residual risk, document risks and make recommendations for residual risk determination to the ISSM & Security Controls Assessor (SCA)
  • Conducts continuous audit reviews and analysis of the system to identify threats, vulnerabilities, and potential malicious activities
  • Researches and identifies security vulnerabilities and provide guidance to mitigate risks
  • Executes vulnerability management programs, including tracking and addressing IAVAs and security patches, and accessing applicability to existing systems
140

Information Security Engineer Resume Examples & Samples

  • Manage Cyber Team with responsibility for personnel actions, performance evaluations, tasking assignments, quality assurance and quality control of deliverables, mentoring as needed
  • Update the DoD Information Technology Portfolio Repository DON (DITPR-DoN) database as required and ensure that information is acceptable in preparation for the annual review
  • Update the DON application and Database Management System (DADMS) as required, and ensure that software being used in the GWS is approved and recorded
  • Update the Vulnerability Remediation Asset Manager (VRAM) database as required, and identify non-compliances that are the responsibility of GWS surface warfare centers
  • Create, maintain, and validate information security certification and accreditation (C&A) packages for applications, systems, and networks in accordance with appropriate DoD policies and processes
  • Typically requires a bachelor's degree or equivalent and 12 to 15 years related experience. Master's degree or doctorate in field mathematics, telecommunications, electrical engineering, computer engineering, or computer science is preferred
  • Must meet DOD INST 8570.01-M (Information Assurance Workforce Improvement Program) or successor / DoD 8140.01 baseline certification requirements. IAM Level III or IASAE Level III Certification required
  • Must be knowledgeable of with IA Accreditation Process
  • Must be knowledgeable with DADMS and VRAM
  • Must possess a working knowledge and experience with DoD Information Assurance -- Certification and Accreditation Process (DIACAP) and Risk Management Framework (RMF)
  • Must have experience with direct client support and interface to facilitate internal management and technical issues and actions as well as external liaison and support between program office codes and personnel and the NAVSEA CIO, the DON CIO, and related external organizations as required and in accordance with DoD Inst 8570.01 and 8570.01-M
  • Must hold active Secret Clearance
  • Previous experience with Navy Gun Systems
141

Information Security Engineer Resume Examples & Samples

  • Develop and maintains corporate IT policies and standards by leveraging deep knowledge and understanding of SAS deployed controls and technology compared to industry standards
  • Review and assess adherence to IT policies, standards and benchmark compliance to governing laws and regulations
  • Researches new regulations and compliance guidelines helps disseminate this information to appropriate groups within the organization
  • Lead security compliance benchmark assessments of security policies against best practices and standards, which may include ISO 27001, FISMA, IRS 1075, NIST 800-53, and other NIST special publications utilizing knowledge of common regulatory standards and how the technical controls align to SAS deployed solutions
  • Review security contract terms and ensure compliance to current policies and processes
  • Perform security compliance threat analysis with the ability to understand how different threats or deviations from corporate standards may impact production systems and able to formally document the risks based on the impact
  • Perform Security Incident and Response Team (SIRT) activities to include, SIRT plan updates and leading SIRT tabletop exercises in partnership with Global Information Security
  • Perform security compliance risk assessments that identify vulnerabilities and risks using a standard framework
  • Recommend solutions to reduce, or mitigate risk, and effectively communicate to designated stakeholders
  • Develop, manage and coordinate security compliance Plan of Action and Milestones (POAM) and effectively complete project remediation efforts
  • Knowledge of technical controls required to satisfy compliance requirements documented in customer contracts or regulatory standard
  • Possess a knowledge of industry security best practice and ability to assure compliance requirements are being met based off of documented controls
  • Evaluates new products as they are being considered and provides security recommendations for usage
  • Coordinating and executing security compliance projects throughout the organization
  • Provides management reports regarding security compliance status and risk impacting the business
142

Information Security Engineer Resume Examples & Samples

  • Strong communication skills in English
  • Ability to design and develop information security architectures that support control implementation within existing architectures
  • Capable of independent management of projects from design through implementation and ongoing monitoring
  • Apply an enterprise-wide set of disciplines for the planning, analysis, design, and construction of Information Assurance solutions based on relevant (and various) information security regulations and standards, including ISO27001 requirements, EU Data Privacy Directives, and Security of Network and Information Security Directives
  • Develop analytical and computational techniques and methodologies for problem solutions
  • Perform enterprise wide strategic systems planning, business information planning, business impact analysis on a scheduled or ad-hoc basis to ensure ongoing Information Security activities within the enterprise. This includes performing process and data modeling in support of the planning and analysis efforts using both manual and automated tools
  • Provide technical guidance in software engineering techniques and automated support tools
  • Establish functional and technical specifications and standards, solve hardware/software problems, define input/output parameters, and ensures interoperability of proposed solution
  • Perform analysis at all system levels to include: concept, design, test, installation, operation, and validation
  • Analyze and identify all or part of a customer’s existing or new peripheral, network, and systems architectures
  • Coordinate, facilitate, and maintain ongoing Information Security programs including the remediation of identified vulnerabilities, security alerts, and applicable reporting metrics
  • Experience in large scale compliance or auditing environments
  • Experience with SOCII and/or audit criteria definition
  • Experience performing vulnerability assessments, Implementations & Validations
143

Information Security Engineer Resume Examples & Samples

  • Knowledge of Internet Protocols, Information Security concepts, and application and database operations
  • Understanding of ITIL, CoBit5, and other frameworks
  • Knowledge of SDLC concepts, applications, and practices
  • Knowledge of banking technologies, applications, and security
  • Knowledge of banking industry regulations
  • Proficiency with various scripting languages, operating systems, network and technology operations
144

Information Security Engineer Resume Examples & Samples

  • Design, implementation, and administration of security systems
  • Participation in and leadership of security projects and initiatives
  • Design and implementation of security solutions throughout the SDLC
  • Contribution to organizational security awareness efforts
  • Participation in security incident and event response
  • Participation required for external (client) security audits and assessments
  • Creation and maintenance of policies and procedures required for compliance with internal and external security audits and assessments
  • Conducting regular vulnerability scans of technology assets and web applications
  • Reporting on the vulnerabilities found within JM Family’s information assets and web properties and tracking their remediation
  • Researching and implementing new technologies and techniques to help secure JM Family against new and emerging threats
  • Support after hours and weekend change schedules as necessary
145

Information Security Engineer Resume Examples & Samples

  • Perform blackbox and whitebox penetration tests on new and existing applications
  • Review scan results for false positives
  • Open tickets, track tickets, verify remediation
  • Create vulnerability metrics
  • Monitoring vulnerability disclosure mailing lists and feeds
  • Firewall and content filter rule review and analysis
  • Provide support and assistance during internal and external audits
  • Interface with technical teams to provide technical details on reported vulnerabilities
  • Write custom exploits for undisclosed vulnerabilities
  • Coordinate with Product teams internal and external to the organization on remediation efforts
  • Write detailed reports for executive leadership
  • 80777BR
146

Information Security Engineer Resume Examples & Samples

  • Design, implement and manage security tools and systems (IDS, IPS, VPN, WAF, DLP, Anti-Virus, Anti-Malware, honeypots, SEIM, Vulnerability Scanners, Web Proxies, Forensic toolkits, MFA, key management) in a heterogeneous computing environment that spans multiple physical and virtual data centers
  • Enhance the security posture of internal infrastructure and client-facing systems
  • Perform security reviews of server / network / web application design within a virtualized environment and ensure compliance with Rally Health security policies and best security practices
  • Perform risk assessments, vulnerability management, penetration testing and patch management for Unix/Linux, Mac, Windows systems and web applications. Work closely with DevOps and Software Engineering to proactively identify and fix security flaws and vulnerabilities
  • Identity and access management across Rally Health’s rapidly growing number of systems and applications
  • Detect, investigate and recover from security incidents as well as assisting with incident response plans
  • Responsible for raising company-wide security awareness and monitoring information security related web sites and newsletters to stay up to date on current attacks and trends
  • Three or more years of technical experience in the information security field, preferably in an environment certified and compliant with a globally recognized Security Framework / Information Security Management System (NIST SP 800-53, ISO27001, HIPAA, HiTrust, SOX, PCI)
  • Three or more years of technical experience in the systems engineering, network engineering or software engineering field
  • Working knowledge of security and operations within AWS (EC2, S3, IAM, VPC, Route53)
  • Advanced knowledge of information systems security concepts and technologies; network architecture; general database concepts; document management; hardware and software troubleshooting and security tools such as FireEye, Encase and open source alternatives
  • Strong knowledge of cryptography for data at-rest and data in-transit
  • Demonstrated experience with systems auditing and monitoring to ensure compliance with security policies and standards
  • Advanced knowledge and experience with Unix/Linux, Mac and Windows operating systems and OS hardening
  • Experience automating the administration of systems through scripting and APIs a plus
  • Demonstrated programming skills in one or more language a plus (Python, Ruby, Bash, PHP, Perl, Java)
  • Experience with Chef and or Ansible
  • Strong analytical writing skills to articulate complex ideas clearly and effectively; experience creating and presenting documentation and management reports
  • Team player with proven ability to work effectively with other business units, IT management and staff, vendors, and consultants
  • Strong communication skills such as planning and leading effective meetings, conducting structured interviews to collect information, interpersonal and negotiation skills, and presenting to a variety of audiences
  • Advanced skills to present information to stakeholders and/or decision makers in an effective and professional deliverable
147

Information Security Engineer Resume Examples & Samples

  • Assembles medical products on an assembly operation, performing a variety of tasks on a rotating basis
  • Ability to rotate through the assembly line
  • Performs on-line and in-process visual inspection of products to ensure specifications per work order and procedure are followed
  • Assists Team Leader and Technicians with product and/or machine change-overs
  • Ensures product assembled meets quality standards
  • Rejects product outside of specifications
  • Adheres to safety standards
  • May operate a variety of testing equipment required for periodic product and process testing
  • Performs other related tasks, as required
  • Education and/or experience equivalent to a high school diploma or certificate of leaving
  • Demonstrates competencies and ability to rotate in a specific assembly line or work cell
  • Ability to perform a variety of assembly tasks requiring dexterity and fine motor skills
  • Ability to visually check work performed and identify whether a product has been assembled correctly
  • Ability to follow instructions in performing repetitive tasks
  • Attentiveness in performing tasks
  • Ability to work as a team member in assembling sterile medical products
  • Ability to meet line rate expectations
  • Six months of experience
148

Information Security Engineer Resume Examples & Samples

  • Actively detect, respond to, and remediate security events across our global infrastructure
  • Perform enterprise-wide operations to hunt for sophisticated and previously unknown malware
  • Develop new and novel capabilities for uncovering, detecting, and disabling malware
  • Dissect network, host, memory, and other artifacts originating from multiple operating systems and applications
  • Work closely with other members of the Information Security team to lead changes in the company's network defense posture
149

Information Security Engineer Resume Examples & Samples

  • Administer network and computing devices/systems that enforce security policies and audit controls in mixed Windows and Linux environment
  • Must be able to perform hands-on support for a wide range of security technologies including, but not limited to: SEIM, IDS/IPS, HIDS, AV, content filtering, logical access controls, IAM, and DLP, WAF, vulnerability scanners, LDAP, forensics software and security incident response
  • Bachelor's Degree from an accredited university or equivalent work experience
  • Five (5) years in a system administration (e.g., Network, Windows) role
  • Three (3) or more years experience working with in IT security tools (e.g. Nessus, Nmap, Metasploit)
150

Information Security Engineer Resume Examples & Samples

  • Interact with business managers to communicate security recommendations and solutions
  • As a part of the security team, encourage responsible security practices
  • Work with the IT security team to develop and maintain the security program
  • Assist teams with the development, maintenance and documentation of security procedures
  • Audit systems for compliance with company security policies and standards
  • Assist network and systems teams with security projects
  • Work directly with Network and System engineers to understand and document network control systems/equipment, network diagrams and firewall configurations
  • Work with legal department to understand and communicate objectives and responsibilities
  • Security application management
  • Understanding of the necessity of information security policies, practices and procedures
  • Ability to maintain understand PCI DSS compliance, and other industry regulations, and best practices
  • Analyze issues, facts and available information to develop logical solutions; researching inconsistencies found in data; drawing correct inferences from information and making recommendations that support business decisions
  • Communicate effectively, and train others
  • Participate in Vulnerability management program, monitoring environments and working with network and system engineers to participate in vulnerability identification and patching
  • Participate in the Business Continuity plan maintenance
  • Understanding of IDS/IPS and various methods to detect and prevent network attacks
151

Information Security Engineer Resume Examples & Samples

  • Planning and execution of dynamic and manual assessments and penetration testing across Equifax applications globally (55%)
  • Develop and deliver reports in line with security standards to development teams with clear indications of remediation needs (20%)
  • Identify gaps and areas of improvement for process and recommedations to fill those gaps or implement change(10%)
  • Work within the constructs of the team and organizational process following appropriate processes including Change Management (10%)
  • Provide customer/client questionnaire feedback on the program and active threats (5%)
  • 3-5 years application manual testing or penetration testing experience including use of commercial and open source tool sets. Development background with proven security experience can be leveraged in lieu of direct manual testing or penetration testing
  • Scripting experience including Python, Perl, etc
  • Understanding of secure architecture/design principles
  • Working knowledge of multiple operating systems (Windows, Linux, AIX, UNIX, etc.) and server hardening processes
  • Strong knowledge of Java and .NET development is preferred
152

Information Security Engineer Resume Examples & Samples

  • Minimum of 5-8 years of Information Technology Experience
  • Bachelor’s degree in Information Technology, Computer Science or Information Security
  • Certifications a plus CEH, CompTIA Security +, SANS GIAC
  • Proven ability to apply information security best practices across multiple sites
  • Significant understanding of IT Infrastructure technologies including network, server (Windows & Mac), end-point, mobile, and antivirus technologies
  • Ability to support technical, security related projects
  • Acts locally with a strategic perspective
  • Strong Verbal and Written Communication Skills
  • Possess current information security credentials
153

Information Security Engineer Resume Examples & Samples

  • Work with rock star engineering talent to build secure and reliable systems
  • Serve in an advisory and consultative capacity with system owners on practical security control design and secure implementation techniques
  • Define, build and manage test plans to test, validate and audit security systems/controls
  • Communicate complex concepts with senior management, technical personnel, and external stakeholders in a concise manner
  • Design and create in-depth system level documentation in support of the ISO-27001 and NIST 800-53 control implementation
  • Bachelor’s degree in computer science, information security, information technology, or other engineering discipline
  • Experience with scripting languages including Python, Bash and PowerShell
  • Master’s degree in computer science, information assurance/security/technology
  • 5 years working experience in high-technology fields with a focus on Security efforts
  • Demonstrated ability to lead a technical project from concept through design and implementation
  • Ability to clearly and concisely articulate complex topics to stakeholders in both written and oral communications
  • Familiarity with recognized Information Assurance frameworks such as ISO-27001/2, NIST SP-800 53, CNSS 1200/1253, DFARS, and DoD 5200/8500 series
  • Hands on experience implementing or managing the following: Linux (Debian/Ubuntu), Windows (7/10/2008/2012/2016), Elastisearch, Kibana, Logstash, Puppet, Hiera, Jenkins, JIRA, SCCM, and SCOM
  • Hands on understanding of secure Software Development Life Cycle (SDLC) development and implementation leveraging industry methodologies (CERT, BSIMM, STRIDE)
154

Information Security Engineer Resume Examples & Samples

  • Routinely conducts security risk assessments on networks and systems and makes recommendations to management to improve security and avoid negative impact on the business caused by theft, destruction, alteration, or denial of access to information and systems
  • Maintains network security devices such as IDS/IPS, proxy servers, NGFWs, etc
  • Develops and maintains existing security operations tools
  • Evaluates new products as they are being considered and provides recommendations for usage
  • Develops and administers corporate security policies
  • Responds to security incidents as part of the Incident Response Team
155

Information Security Engineer Resume Examples & Samples

  • Collaborate with internal customers to develop requirements, support decisions around build vs. buy, and prioritize work projects based on outcomes that drive risk reduction and operational effectiveness
  • Manage and administer the networking infrastructure and hardware (with basic OS) for a test lab that supports proof of concept and experimentation with security services and tools
  • Partner with security engineers, threat management staff and infrastructure engineers to build security products that help secure the brand, trust and customer experience
  • Work with security operation team to transfer knowledge and operational process to publish services for run-the-business consumption of developed solutions
  • Perform work on security data analytics involving data mining, ETL and data visualization
  • Resolve bugs/defects during development, QA testing, pre-production, production and post-release cycles
  • Architect, design and implement a scalable and highly available solution for security logging program (Splunk, Rsyslog, Syslog-ng, etc.)
  • Develop automation and integration programs on top of Splunk and other SIEM APIs
  • Assist with security incidents, investigations, root-cause analysis and support real-time tools development to enable prevention, or to drive down detection and containment times in partnership with the Security Operations, Attack-and-Defend and Engineering teams
  • Adopt and evangelize our prevention oriented network security architecture, and embody the role of first customer of Palo Alto Networks’ product suite
  • CNSE (Palo Alto Networks), CCNP, CCIE, CISSP/CISM, SANS GIAC, or other Networking and Security certifications a plus
  • Knowledge of network devices, firewalls, IDS/IPS, TCP/IP protocols, and general network architecture
  • Security engineering experience across the stack (Network, Application, Physical layers) a plus
  • Experience with multiple vendor technologies including Cisco, Palo Alto Networks, ServiceNow, Cloudera and other Data Collection and Aggregation Solutions, Case Management and Big Data Solutions
  • Demonstrated interest in security research
  • Thirst for exploring leading edge security technologies and the experience to analyze and resolve security issues
  • Team player, able to dealing with conflicts and a quick learner
  • Proficient in MS Office applications including Visio and PowerPoint
  • Experience with Cloud computing a plus
156

Information Security Engineer Resume Examples & Samples

  • Manage and expand information security infrastructure technologies as required by projects and business as usual operations
  • Manage ongoing information security vulnerability testing and technical compliance reviews
  • Keep information security infrastructure up to date with emerging threats and vulnerabilities
  • Monitor industry security updates, technologies and best practices to improve security management
  • Ensure that information security controls deployed within Micro Focus International infrastructure are effective at mitigating the identified security risks
  • Work collaboratively with the wider information security team and other groups to ensure that all infrastructure and information security controls meet internal and external compliance requirements
  • Coordinate technical risk management activities and update risk registers that underpin the Information Security Management System (ISMS)
  • Develop and maintain appropriate information security architecture documents and records
  • Prepare and present information on progress and resolution of information security gaps to leadership
  • University degree or equivalent qualification in Information Technology, Information Security or a related field. Alternatively you will possess the relevant industry knowledge and experience
  • Extensive experience of working in the Information Technology industry, with exposure to all aspects of business planning, system analysis and service management
  • Strong experience in being devoted to Information Security within a global business
  • Appropriate industry certifications (e.g. CISSP, CompTIA Security+, CEH, 27001 Lead Auditor)
  • Knowledge of risk assessment procedures, policy formation, authentication technologies and security attack pathologies
  • Technically proficient in security-related hardware and software, forensics and other security systems – ideally experienced with the NetIQ portfolio of security products
  • Technical proficiency in broader areas of IT, including networking, servers, desktops and mobile devices
  • LI-GC1
157

Information Security Engineer Resume Examples & Samples

  • Bachelor's Degree in Business, Management, Computer Sciences, or equivalent prior work experience in a related field
  • CISSP, GIAC, or other security specific certification desirable
  • 2-5 years’ experience in a computer related field
  • 1+ years Information security operations experience
  • Analytic thought processes and ability to think critically highly desireable
  • LI-AL1
158

Information Security Engineer Resume Examples & Samples

  • Ability to identify the threat surface, identify attack vectors, vulnerabilities and establish appropriate controls. Can build a threat model for the systems in focus
  • Evaluation & assessment of compliance to a regulation, law or policy using industry standard methodologies (NIST, PCI, CPNI, SOX, etc.) in an enterprise environment
  • Able to evaluate, recommend, and implement commercial hardware and software security products to augment and enhance the company’s enterprise security program
  • Ability to learn a new technology and support delivery from concept through to operational deployment
  • Ability to automate basic scripting and reporting tasks via secure coding standards
  • Ability to work on multiple tasks simultaneously, communicate delivery expectations, and meet deadlines
  • Innovate and solve problems, find the best solution and present that to your team
  • 3+ years of IT infrastructure proficiency and experience that could include one or more years of experience in: Encryption, Tokenization, Forensics/eDiscovery, Penetration Testing, Firewalls (static, WAF), Proxies, Gateways, Routers, VPN, Application Security SAST/DAST, cloud (XaaS), database, big data, telecom, mobile network, system or network administration, etc
  • Awareness of several enterprise environment technologies, security domains, or telecommunications
  • CISSP, CEH, CISM, CISA, CCNA Security, and a computer science background preferred
  • Available for work in Bellevue, WA (Factoria area)
  • CISSP, CISM or CISA Certification or related experience
  • 3+ years of IT experience
  • Bachelor’s degree in Computer Science or two additional years of work experience
159

Information Security Engineer Resume Examples & Samples

  • Develop and prepare technical reports and related documentation for Certification and Accreditation (C&A) packages and provide detailed system test and scan reports as well as the Plan of Action and Methods (POA&M) document for all tested systems/networks
  • Research and analyze DoD and Department of the Army (DA) policies to mitigate implementation problems that may impact the ACAS implementation
  • Coordinate with the IT Infrastructure team to implement Security Technical Implementation Guide (STIG) changes that apply to the infrastructure baselines
  • FedVTE ACAS certified
160

Information Security Engineer Resume Examples & Samples

  • Administer computing devices/systems that enforce security policies and audit controls in Windows environment
  • Support the implementation of technical solutions to contractual requirements in addition to ISO 27001 and 27002
  • Participate in the application of fixes, patches and disaster recovery procedures in the event of a security breach
  • Utilize best practice processes
  • Participate in continuous process improvement efforts
  • Participate in risk assessments and penetration tests
  • Participate on select security project teams
  • Familiarity with application and network security
  • Must be able to perform hands-on routine support for a wide range of security technologies including, but not limited to: SEIM, IDS/IPS, network firewalls, HIDS, malware analysis and protection, content filtering, logical access controls, identity and access management, data loss prevention, content filtering technologies, application firewalls, vulnerability scanners, LDAP, forensics software and security incident response
  • 3+ years in a system administration (e.g., Network, Windows) role or 6 months directly supporting network security technologies (firewalls, etc.)
  • Experience analyzing event logs
  • Experience with Cisco and/or Palo Alto Firewalls a plus
  • Proven organizational skills, specifically managing multiple tasks
  • License/Certificate (any of the following a plus) CISSP, CISA, CEH, CSSLP, CHFI, CCSP, GCIH, GCIA, PMP, ITIL v3, MCP, CompTIA A+, CompTIA Network+; CompTIA Security +
161

Information Security Engineer Resume Examples & Samples

  • Manage, administer, and configure Information Security related systems and applications including (but not limited to): Enterprise Anti-Virus, IDS/IPS, Web Filtering, Vulnerability Scanning and Remediation, Security Incident/Event Management, etc
  • Perform Technology Risk Assessments for vendors, products, services or processes
  • Participate in or lead Information Security projects or department initiatives as required
  • Work with Information Security, Engineering and Operations teams to define and document technical security standards and develop the security architecture of the organization
  • Engage with Infrastructure and/or Architect Teams to assess the security risk of proposed projects and system/application modifications
  • Collaborate with management, the legal department, facilities staff, and applicable law enforcement agencies to manage and remediate security vulnerabilities and incidents
  • Conduct research to keep abreast of current security issues and best practices
162

Information Security Engineer Resume Examples & Samples

  • Information Systems Security Engineer will work to ensure the completion and correctness of all Risk Management Framework assessments and documentation required for the effort, assist in the completion of DoD 8500.2, NIST 800-53a, and other checklists as required, to ensure compliance with DHA Accreditation requirements
  • The position requires an understanding of network security tools commonly used by the US Government and Department of Defense such as Nessus, SCAP, and HBSS
  • Evaluate and assess compliance with established security policies and regulations. Performs research, comments on, and edits A&A documentation based on RMF requirements
  • Collaborate with both the System Administrators and Systems Engineers on a daily basis
  • 2-4 years related experience with Bachelor’s Degree in Computer Science, Information Technology, Information Assurance, or Information Security, or 5 years related experience without degree
163

Information Security Engineer Resume Examples & Samples

  • Ability to apply excellent technically-oriented concepts to problem solving
  • Ability to obtain a Security+ Certification within 60 days of hire
  • Possession of excellent security-focused skills
164

Information Security Engineer Resume Examples & Samples

  • 0-2 years of technical experience and a BS degree in technical area such as Computer Science or Engineering
  • Must have “hands-on” knowledge and experience with the Linux Operating System (O/S)
  • Must be willing to travel occasionally in order to perform live assessments at locations throughtout the metropolitan area
  • Ability to obtain and maintain a TS/SCI with Polygraph clearance
  • Hands on experience with running of IT Security Tools
165

Information Security Engineer Resume Examples & Samples

  • 5+ years of Application Security Experience
  • Experience in vulnerability testing and auditing
  • Prior code audit / application penetration testing
  • Knowledge of secure development practices and techniques including OWASP Top Ten
  • Active experience in the Information/ Cyber-Security profession
  • Experience working with development team(s) that delivered commercial software or software-based services (development, QA testing, or security role)
  • Knowledge of and experience working with common Application Security Tools e.g. (Fortify, AppScan, WebInspect, etc.)
  • Experience and knowledge of industry IDS/IPS, logging, vulnerability, monitoring, firewall technology, wireless security, Anti-virus protection, OS patching, data loss prevention and SIEM technology and solutions
  • 5-7 years of Application Security Experience
166

Information Security Engineer Resume Examples & Samples

  • Responsible for Firm's deployed suite of security tools, including, but not limited, to URL filtering, SIEM, IDS/IPS, APT's, AV, VA scanner
  • Perform vulnerability scans and/or analyze results from vulnerable scans and assist with the remediation as necessary
  • Report to management concerns of residual risk, vulnerabilities and other security exposures, including misuse of information assets and noncompliance
  • Perform product evaluations and recommend and implement products/services for information security related hardware and software
  • Ensure access to all information systems is controlled, both internally and externally, commensurate with the level of potential risk. Recommend appropriate corrections
  • Participate in the computer security incident response team efforts and other security investigation activities as assigned
  • Define and implement appropriate security requirements for IT projects
  • Work with Information Technology team to produce monthly operational metrics
  • Drive continuous improvement through trend analysis reporting and metrics management
  • Provide technical assistance to IT staff in the detection and resolution of security problems
  • Works with information security leadership to develop strategies and plans to enforce security requirements and address identified risks
  • Communicate and report issues, status, and results to senior management
  • 5+ years of experience in information security related responsibilities
  • Experience with vulnerability management scanning platforms
  • Knowledgeable in DLP, SIEM, AV, APT and Vulnerability Analysis principles
  • This is not a Firewall Network Security Position
  • Ability to effectively prioritize and execute tasks
  • Ability to effectively present information verbally and in writing
  • Must be able to work collaboratively in a team environment and independently
  • Ability to handle sensitive and/or confidential material and information with suitable discretion
  • Excellent interpersonal skills and a professional demeanor; ability to work effectively with all levels of Firm personnel and vendors
167

Information Security Engineer Resume Examples & Samples

  • Drive vulnerability remediation efforts for identified issues on systems, devices, and network devices with system owners
  • Providing solutions to recommendations for security issues and vulnerabilities identified during assessments
  • Validate the remediation of identified issues using tools, manual techniques, and where necessary, relevant SME’s
  • Develop a continuous monitoring approach to regularly measure and report the status of the following control areas: patching, hardening, audit and log config, authentication mechanisms
  • Assess the risk of technical security vulnerabilities and configuration issues, utilizing known threats, vulnerability information, system exposure, and mitigating controls
  • Develop relationships with IT stakeholders to facilitate remediation of security issues
  • Deliver regular reporting to security leadership on remediation efforts
168

Information Security Engineer Resume Examples & Samples

  • Knowledge of DoD 8500, AR 25–2, AR 70–1, and DA PAM 70–3 Army Acquisition Implementation
  • Compliant with DoD–8570 requirements Certification
  • Experience with the configuration management of military software, including source code, documentation, and field–able products
  • Possession of excellent interpersonal, customer service, and organizational skills
  • Microsoft IT Professional (MCITP), Microsoft Certified Systems Engineer (MCSE), Microsoft Certified Professional (MCP) on Windows 2003 or 2008 server, Windows 7 MCSE, equivalent Operating Systems, or Cisco Certification
169

Information Security Engineer Resume Examples & Samples

  • Experience with Windows Server 2008 R2, Windows 7 domains or Windows Server 2012 R2, and Windows 10 domains, including GPOs and AD
  • Experience with DoD IA security tools, including ACAS or HBSS
  • Experience with scanning and remediating systems to maintain DoD compliance
  • Knowledge of the DoD incident handling life cycle
  • HS diploma or GED and 3 years of experience with working as an information security engineer
  • Experience in a VMware virtual environment
  • Experience with Shavlik and Splunk
  • DoD 8570.1M IAT level II or III Certification, including Security+ or CISSP
170

Information Security Engineer Resume Examples & Samples

  • Troubleshooting system problems on Linux servers
  • Developing strategies to improve operational workflow
  • Provide recommendations to overall system deployment and design
  • Working directly with a broad range of security tools to implement changes and features
  • Providing expertise to members of the team and the customer
  • Gather detailed requirements necessary to develop a compliant solution to meet the client needs
171

Information Security Engineer Resume Examples & Samples

  • Serves as a technical resource for enterprise security
  • Expert use of SEIM/correlation tool to provide risk assessments for enterprise
  • Review, build, rank and escalation point for IDS and IPS systems
  • Review escalated IDS/IPS alerts and logs
  • Correlate logs and alerts into attack patterns
  • Assess and rank the risk to the enterprise
  • Create and lead action plan to reduce risk
  • Remediation of vulnerabilities
  • Risk ranking and scoring
  • Oversight of remediation
  • Create solutions and lead efforts to reduce risk
  • Review of firewall and perimeter rule sets
  • Database security and review
  • SSL certification management and review
  • Will provide vulnerability assessment and potentially assist in penetration testing
  • Maintains and reviews web hosting environment
  • Security certification of new and existing production systems
  • Provide assistance in research of next generation security issues, 0-day attacks, and provide input on strategy for future security infrastructure and tools
  • 5 years of experience with McAfee Suite Products (ePO, Virus Scan, Host IPS, Data Loss Prevention (DLP), Site Advisor, Application Control, Policy Auditor, Group Shield/MSME, Drive Encryption, Threat Intelligence Exchange (TIE), Endpoint Security)
  • Expert with all versions of Microsoft Windows
  • Strong experience with Active Directory and LDAP
  • Strong experience with the linux operating system
  • Expert in TCP/IP, reading network packets, network technologies, and perimeter protection technology
  • Configuration experience with Cisco hardware and IOS a plus
  • Expert in firewall technology, IDS/IPS technology
  • Strong skills in web technologies (scripting, SSL, HTTP/S) and their security requirements
  • SQL query and manipulation
  • Experience with incident response, forensics and evidence preservation
  • Can program in multiple languages / scripting languages
  • Experience in leading a diverse project team that implements network and system security solutions
  • Vulnerability and penetration testing experience and skills
  • Ability to communicate technical security requirements to business units, create strategy, and implement security plans
172

Information Security Engineer Resume Examples & Samples

  • A bachelor's degree in Computer Science or other Engineering or Technical Discipline A Technical Bachelor's degree and 10 years of professional work experience is required
  • CCNA or other networking certification
  • Demonstrated knowledge of LAN topology, routers, hubs, switches, and network protocols (TCP/IP, IPX)
  • Working knowledge of storage systems and automation
  • Experience in scripting (VBScript, batch files, InstallScript, Wise Script, etc.)
  • Experience in SharePoint server administration
  • Familiarity of project management principles
173

Information Security Engineer Resume Examples & Samples

  • Design, implement, document, and operate Identity Management solutions
  • Experience with Linux, Windows, Python, Java, Shell scripting, PowerShell
  • Familiarity with SSO systems such as Ping and OKTA, including the concepts around SAML and OAUTH
  • Partner with internal stakeholders to promote the IAM Platform and raise awareness
  • Provide functional and technical expertise on projects that require or could benefit from IAM services
  • Familiarity with directory technologies including OpenLDAP and Active Directory
  • Ensure sufficient system monitoring and lifecycle management of IAM platform (patching, enhancements, etc.)
  • Gathers information to develop security-related processes and procedures to continuously improve the security posture and efficiency of the organization
  • Ensure adherence to all regulatory and compliance requirements and participate in audit processes
  • Strong communication skills; ability and willingness to thoroughly document code and systems
  • Drive projects and ensure successful execution of initiatives while involving stakeholders and meeting deadlines
  • Willingness to support end users and troubleshoot issues
  • Effectively manage problems and respond with the appropriate level of urgency, steering support tasks to the appropriate team
  • Willingness to participate in a 24×7 on-call rotation and the perform after hours support as needed
  • Engage and be able to effectively manage third party vendors for support and project-related work
174

Information Security Engineer Resume Examples & Samples

  • Experience in endpoint security (Windows, Mac, and Linux)
  • Experience in Cloud security
  • Experience in Identity and Access Management
  • Experience in incident handling/incident response and computer forensics (SIEM solutions, IDS/IPS appliances, and advanced threat analysis)
  • Experience in vulnerability management solutions
  • Familiarity with performing information security risk assessments of organizations, systems, applications, and/or enterprise projects
175

Information Security Engineer Resume Examples & Samples

  • Knowledge of security technologies and trends, network topology security principles and applications, Linux, Windows, network security, host–based security, and TCP/IP
  • Ability to apply excellent technically–oriented concepts to problem solving
  • Security+ Certification or ability to obtain within 60 days of hire
  • Ability to self–motivate
  • Possession of excellent client service skills, including working one–on–one with clients
  • Possession of excellent security–focused skills
176

Information Security Engineer Resume Examples & Samples

  • Conducts certification test analysis and technical evaluations for vulnerabilities and must possess the ability to recommend and apply security countermeasures to mitigate identified risks
  • Coordinates with program management and customer counterparts to ensure compliance with national IA/IS a security requirement. Provides IA/IS security awareness and training to users of classified systems. Provides Information System Security Officer (ISSO) support for classified and unclassified sensitive systems as Applicable
  • Assists the Director of Information Assurance (IA) in developing and maintaining the enterprise classified Information Systems (IS) Security Program for the protection of classified information, systems, and networks. Drafts applicable security documentation and provides assistance in the DIACAP Certification and Accreditation (C&A) or the NIST Assess & Authorized (A&A) RMF process for new and expiring classified and unclassified sensitive systems and Architectures
  • Oversees classified security policy implementation and enforcement across the corporation
  • Assists in the development of classified information systems security policies, plans, and procedures and serves as a key reviewer of unclassified systems information security policies and plans. Performs IS related incident investigations to include policy violation, insider threat activity, and/or inappropriate employee behavior on clients classified and unclassified IT infrastructure
  • Coordinates the design, implementation and evaluation of all phases of highly complex information security solutions and programs
  • Participates in the security engineering, validation testing of system configuration/hardening, and assessment of classified information systems (IS)
  • Understands current computer technologies and technical security requirements as applied to the design, development, evaluation, and integration of computer systems and networks to sustain compliance with national and corporate policy as well as best practices
  • Supports the Certification and Accreditation (C&A) or the NIST Assess & Authorize (A&A) RMF process and develops system security plans (SSPs) under guidance of NIST SP 800s,NISPOM, DIACAP, ICD 503, or replacement guidance as released
  • Candidate needs at least two certifications: GSEC Sec+ CE SSCP CCNA- Security
  • Prior experience with DIACAP and RMF desired
  • Seven or more years of experience in network, host, data and/or application security in multiple
177

Information Security Engineer Resume Examples & Samples

  • Operational support of security solutions (firewalls, IDS/IPS, advanced malware detection, netflow analysis, proxy, SIEM, and DDOS protection), security monitoring, security event analysis and response, malware detection and prevention, and collaboration among departments and management teams
  • Coordinate activities with vendors and third party providers
  • Identify security control gaps and provide solutions
  • Participate in Incident Response events
  • Bachelor's degree from an accredited university and 6 years of technical experience OR High School Diploma (or the Equivalent) and 10 years of technical experience
  • 5 years of security design experience
  • 5 years of experience with technical security assessment of hosts and networks
  • Advanced experience with two of the following information security tools: firewalls, IDS/IPS, proxy, SIEM, DDOS protection, and advanced malware detection
  • Incident Response, Forensics, and Malware Analysis experience
  • CISSP or GIAC certifications are a plus
178

Information Security Engineer Resume Examples & Samples

  • Two (2) years of Information Security experience may be substituted for a bachelor’s degree
  • Two (2) plus years of experience is required
  • Generate all documentation required by the ICD 503 Risk Management Framework
  • Experience in Configuration Management and SharePoint administration
179

Information Security Engineer Resume Examples & Samples

  • Bachelor's degree in Engineering or Science, or equivalent work experience
  • Two or more years of experience in information security, IT infrastructure management and IT operations
  • Working knowledge of IT environment including service-oriented and IT architecture, industry trends and direction, system and technology integration, and IT standards, procedures and policies
  • Basic knowledge of IT audit and control, asset management, software licensing, and product and vendor evaluation
  • Working knowledge of IT systems management including change control, technical troubleshooting, software process improvement, and technical writing/documentation
  • Basic knowledge of information security architecture, security audits, network and internet security, information assurance, and computer crime
  • Working knowledge of information security technologies and administration
  • Working proficiency of various technology tools
  • Ability to work cooperatively and professionally with co-workers, customers and management
180

Information Security Engineer Resume Examples & Samples

  • Performs automated and manual vulnerability assessments to gauge the organization against regulatory and internal policy compliance. Recommends solutions to support teams and advises Director of Information Security (DIS) of roadblocks and recommended solutions
  • Architects solutions and monitors compliance with the organization's information security policies and procedures among employees, contractors, and other third parties. Refers problems to DIS or appropriate department leadership
  • Recommends additions and modifications to information security policies and procedures and promotes improved data security through awareness and education
  • Bachelor’s Degree in Information Systems (IS) or related field; or an equivalent combination of training and progressively responsible experience that will result in the required specialized knowledge and abilities to perform the assigned work in lieu of degree
  • ​Ability to analyze and understand risk and compliance frameworks and standards
  • Multitasks, prioritizes and meets deadlines in timely manner
  • ​Strong organizational and follow-up skills, as well as attention to detail.     
181

Information Security Engineer Resume Examples & Samples

  • System policies and architecture
  • Provides guidance to implementation groups for compliance with corporate information security protocols
  • Monitors adherence to the architecture and system-wide policies
  • Application security
  • Responsible for managing application vulnerabilities by introducing security elements in the software development lifecycle (SDLC)
  • Schedules scans and reviews of findings with clear precise remediation are an integral responsibility of this role
  • Security implementation
  • Ensures that security tools and technologies are deployed in the current environment in line with Enterprise Architectural requirements
  • Ensures that custom applications and IT operations management tools being deployed, such as network management and log management, have the appropriate security built into them
  • Security Integration
  • Ensures that new tools and technologies are appropriately integrated with the existing tools and technologies
  • Applies a thorough understanding of the existing architecture and policies in order to provide guidance to application development teams in coordination with Enterprise Architecture
  • Strategy and Planning
  • Participates in the planning and design of enterprise security architecture, under the direction of the Director, IT Security where appropriate
  • Participates in the creation of enterprise security documents (policies, standards, baselines, guidelines and procedures) under the direction of the Director, IT Security, where appropriate
  • Participates in the planning and design of an enterprise Business Continuity Plan and Disaster Recovery Plan, under the direction of the Director, IT Security, where appropriate
  • Acquisition and Deployment
  • Maintains up-to-date detailed knowledge of the IT security industry including awareness of new or revised security solutions, improved security processes and the development of new attacks and threat vectors
  • Recommends additional security solutions or enhancements to existing security solutions to improve overall enterprise security
  • Performs the deployment, integration and initial configuration of all new security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically
  • The above statements are intended to describe the general nature and level of work being performed by people assigned to this job. They are not intended to be an exhaustive list of all responsibilities, duties and skills required
  • Knowledge of specialized principles or techniques equivalent to that which would normally be obtained through a formal four-year college/university academic program or an in-depth specialized training program directly related to the type of work being performed
  • Requires knowledge of their professional discipline and a working knowledge of related fields. Understands information in several unrelated professional disciplines
  • Technical knowledge
  • Working knowledge and experience with Ethical Hacking
  • Experience with FTK Imager, Qualys Guard PCI, Radius, RSA SecurID, SecureACS, SolidCore FIM, Splunk, Tenable Security’s Nessus SIEM, Rapid7 Nexpose scan, AirWatch MDM(VMWare), McAfee, Symantec, SNORT
  • Knowledge of computing and network operating systems, mobile device operating system
  • Strong understanding of UDP, TCP/IP, and other protocols
  • Strong understanding of LINUX, Windows, UNIX, Android, Apple iOS, Cisco IOS
  • Familiarity with Oracle/PeopleSoft, SAP, JAVA, Microsoft, Google apps, JIRA
  • Knowledge of the limitations and capabilities of computer systems and of the techniques used in the design of non-automated systems
  • Knowledge of data processing equipment, or applicable programming languages, or computer hardware and software; of computer operating systems, or writing program code, and of automated mapping
  • Ability to analyze, recommend, develop enterprise-wide security policies, standards, guidelines and delivery information security awareness programs
  • Ability to establish and maintain effective working relationships with various levels of professionals including legislators, executive management, mid-level supervisors and line employees
  • Ability to communicate both written and oral; and interpret technical information relating to information resources technology in a non-technical manner
  • Ability to work a flexible schedule when required
  • Superior communication and customer services skill
  • Ability to conduct research into IT security issues and products as required
  • Ability to work occasional overtime and/or a flexible schedule as needed to meet required deadlines
182

Information Security Engineer Resume Examples & Samples

  • Manage the design, implementation, and support of a diverse security infrastructure including firewalls, IDS/IPS, secure web gateways, endpoint security, vulnerability scanners, SIEM and DLP
  • Serve as the Subject Matter Expert and conduct security reviews and testing of new projects and initiatives
  • Research and recommend emerging security technologies and tools to address current and future threats
  • Provide guidance for security remediation to business and IT partners
  • Collaborate with key stakeholders to assess near- and long-term security needs
  • Provides analysis and trending of security log data from a large number of security devices
  • Provides threat and vulnerability analysis as well as security advisory services
183

Information Security Engineer Resume Examples & Samples

  • Work to ensure that security baseline configurations for all devices/servers are met
  • Review alerts on SIEM and determine appropriate actions
  • Manage vulnerabilities to an acceptable level
  • Actively participate in the selection of new security applications and tools
  • Manage and configure security appliances and servers
  • Complete tasks designed to ensure security of the organization's systems and information assets
  • Collect incident response information in the event of malware or other suspicious activity
  • Protect against unauthorized access, modification, or destruction of Towne’s assets and infrastructure
  • Review and monitor perimeter device logs to ensure configuration is within limits of compliance
  • Perform other duties as assigned by manager
  • Provide reporting to upper management as needed
  • Stay up to date on latest technologies as they relate to the organization’s security posture
  • Obeys all applicable federal laws, rules, and regulations relating to Anti-Money Laundering (AML) including the Bank Secrecy Act (BSA)
  • BS, Computer Science or similar discipline
  • 5 or more years of experience with network architectures
  • Strong background managing Windows server environment
  • 5 or more years in progressive security environment
  • Understanding of Security terms and concepts
  • Familiarity with auditing methodologies
  • Minimum CISSP certification required
  • Scripting/programming experience desired
  • Experience troubleshooting PC and LAN/WAN technologies
  • In depth understanding of OSI model, TCP/IP, network topologies and protocols
  • Understanding of ACLs and firewall rules
  • Must be flexible with work hours as business needs arise
  • Strong verbal and written communications and organizational skills
  • Team player who can also work independently
  • Ability to interact effectively and professionally with all employees, staff and service providers
184

Information Security Engineer Resume Examples & Samples

  • Provide connected asset security expertise and leadership in defining and prioritizing Connected Asset Security Programs initiatives
  • Integrate the Connected Asset Security Program into the relevant stages of the product development lifecycle
  • Perform design and architecture reviews, validating that information security artifacts are created and align with industry standards and regulations
  • Assist with product development remediation and mitigation activities
  • Report on metrics to the connected asset security steering committee and other business unit stakeholders
  • Maintain current knowledge on existing security procedures, directives and technology controls including application testing, threat modeling, attack and penetration testing, data classification and data handling
  • Participate in industry working groups and provide insights to product development teams on leading architecture, design, and security practices
  • Bachelor’s degree in Electrical Engineering, Computer Science or a related field
  • Ten or more years in information security or engineering
  • Professional information security certification (CISSP, CCSP, CSSLP, GISCP, GWAPT, GWEB etc)
  • Excellent written and verbal communications skills; demonstrated ability to communicate highly technical security concepts to non-security audiences
  • Strong understanding and experience with information security technologies
  • Ability to adjust to multiple demands, changing priorities, ambiguity, and rapid change, while multitasking effectively
  • Demonstrated ability in project management and change management
  • Demonstrated ability to develop metrics, perform critical analysis and develop executive decision support content
185

Information Security Engineer Resume Examples & Samples

  • 5 to 7 years of combined IT and security work experience, with a broad exposure to infrastructure/network and multiplatform environments
  • Strong networking background in TCP/IP, routing/switching and firewalls
  • Knowledge of security issues, techniques and implications
  • Demonstrated knowledge with security testing methodologies
  • Demonstrated experience developing detailed system designs, diagrams, processes & documentation
  • Demonstrated regulatory experience in IT regulations, PCI-DSS, NERC/CIP, HIPAA
  • Demonstrated experience with Disaster Recovery and Business Continuity best practices
  • Demonstrated Knowledge of SANS 20 controls framework and other security frameworks (for example, NIST-800 series, NIST IR 7628)Search Jobs US
186

Information Security Engineer Resume Examples & Samples

  • Bachelor’s degree in Computer Science, MIS or related field or equivalent combination of education and experience
  • 7+ years of networking experience including design and administration
  • Experience with next generation firewall security solutions
  • This position requires on-site attendance
187

Information Security Engineer Resume Examples & Samples

  • Defines, plans, designs, and evaluates information security systems
  • Manages large-scale programs of national or scope
  • IDS/IPS installation/configuration/management
  • Incident Response/Computer Forensics
  • REHL
  • ACAS Installation/Configuration/Management
  • HBSS Installation/Configuration/Management
  • SPLUNK installation/Configuration/Management
  • Cyber intel analysis
  • Boundary Protection
  • Audit Review and Analysis
188

Information Security Engineer Resume Examples & Samples

  • Perform security design review for IT applications
  • Enhance Security Operations Center efficiency and effectiveness
  • MS or above in Computer Science/Engineering or related fields
  • At least 3 year working experience in general IT or Information Security
  • Knowledge of security engineering, or computer and network security, or applied cryptography
  • Relevant work experience in application security, or Security Operations Center, or solid software development experience in Java, C/C++, or .NET
  • Certificate in CISSP, CSSLP is a plus
189

Information Security Engineer Resume Examples & Samples

  • A Bachelor’s Degree in Computer Science, or other Engineering, or Technical discipline with an Information Security or Cyber Security Concentration
  • Must be Information Assurance (IA) Trained and Certified per the Defense Federal Acquisition Regulation Supplement IAW DoD 8570.1-M, Change 2, and the Army Information Assurance (IA) Training and Certification Best Business Practice, corrected 6 Aug 2010
  • Must have a working knowledge of the functions spelled out in Table Table C10.T7. IASAE Level III Functions in DoD 8570.01-M
  • 10 Years minimum experience
  • IAT Level 2 IAW AR 25-2 and DoD 8570-01M
  • Twelve years of professional experience, appropriate computing environment certification, and IA WORKFORCE SYSTEM ARCHITECT AND ENGINEER (IASAE) SPECIALTY qualified in accordance with standards spelled out in DoD 8570.01-M and the Army Information Assurance(IA) Training and Certification Best Business Practice, corrected 6 Aug 2010
190

Information Security Engineer Resume Examples & Samples

  • Working knowledge of security auditing tools like AppScan, Nessus, Burp Suite, etc
  • Assist with security audits performed by third parties
  • Experience with working on and leading compliance certification efforts a plus
  • Experience with SSAE-16, ISO27001, PCI-DSS, HIPAA, FedRAMP and similar compliance standards is a plus
  • Work with MaaS360 development and operations team to implement security strategies
  • Help design security architecture of DevOps life cycle to MaaS360 operations and management team
  • Work with MaaS360 development and operations teams on tactical security solutions as needed
  • Provide guidance to MaaS360 operations and development teams on new technology implementations
  • Architect security strategy for cloud-based web platform
  • Must stay current with the latest developments on both the security and hacking end of the spectrum
191

Information Security Engineer Resume Examples & Samples

  • Supports Identity and Access Management programs; recommending improvements
  • Monitor normal activity, transactions and user access levels to ensure compliance and access justification
  • Plan methodology and technology used to design, run and build Identity Governance and Administration and Identity and Access Management (IAM) systems
  • Administer information security technology and solutions
  • Interact with various departments, vendors, and extranet partners
  • Works with other business units, partners and customers to maintain secure methods of data management
  • Review existing system accounts to ensure that they are provisioned / de-provisioned on a timely basis with only authorized access levels and conduct process improvements as needed
  • Minimum of 3 years in an identity and access management role
  • Security certifications a plus. (CISSP, HCISPP, GIAC, ECSA)
192

Information Security Engineer Resume Examples & Samples

  • Develop and execute infosec strategy, policies, and procedures
  • Provide training and raise infosec awareness
  • Help with risk assessment, and reporting
  • Perform asset and service discovery
  • Provide infosec expertise to other teams
  • Deploy and monitor security measures
  • Respond to incidents
  • Perform vulnerability assessments
  • Work with red teams
  • Reasonable professional experience in infosec
  • Experience in network security, end-point protection platforms, intrusion detection, and firewalls
  • Familiarity with Linux servers environment, and Windows/Macs office workstations
  • Familiarity with web application security
  • Ability to communicate security issues to product teams and management, and to work in team
193

Information Security Engineer Resume Examples & Samples

  • Responsible for improving, monitoring and coordinating Third Party Risk Management (TRPM) activities. The candidate will engage and participate in risk assessment, project management, procedural development, system testing and implementation, and training activities
  • Directly or indirectly works with business lines, subject matter experts and other constituents to ensure compliance with applicable regulations and internal policies and procedures. The assigned portfolios consist of business line(s) third party and/or program assessments and reporting. Audit and credible challenge of discrepancies and data conflicts will be performed along with approvals of internal and external assessments for completeness, consistency and accuracy prior to third party engagement
  • Communication and Relationship Building: Builds and maintains positive relationships with management, team members, and stakeholders across FRBA using effective written and oral communication practices. This position will foster collaboration internally across the FRBA and throughout the Federal Reserve System while drawing in diverse groups to share ideas, information, and resources to strengthen the TPRM program. This position will also be responsible for building cooperation and trust between departments and other groups. In this position, one will be expected to influence others using program knowledge, negotiation methods, and overcome objections which lead to consensus among constituents
  • The selected qualified candidate will be expected to lead aspects of the framework development and improvement. Specific responsibilities include
  • Info Security Frameworks
  • Network Design & Architecture
  • Technical Writing
  • Microsoft Command Line Tools
  • Microsoft Scripting Platforms Group
  • Policy
  • SIEM Tool Experience
  • Third party (vendor) risk management experience
  • Strong project management and strategic planning skills
  • Demonstrate the ability to recognize the relevance of risk trends, issues and potential risk exposure
  • Demonstrate business knowledge of banking-related products, services and relate how their associated risks may impact FRBA from a third party perspective
194

Information Security Engineer Resume Examples & Samples

  • Typically requires a bachelor's degree or equivalent and seven years of related experience
  • Active Top Secret security clearance with SCI eligibility
  • Ability to Obtain DoD 8570.01/DOD 8140 IAT Level II certifications (Security+, GICSP, GSEC, SSCP, CCNA-Security)
  • Bachelor's Degree in Cyber Security, Computer Science or related field
  • Advance Certifications: CISM, CISSP, CAP, CASP
195

Information Security Engineer Resume Examples & Samples

  • Work closely with the Information Security Officer (ISO) to develop and execute on security initiatives and risk management
  • Understand and advocate within working communities for compliance with CMHC and Cerner Information Security and Confidentiality & Privacy policies & best practice
  • Ensure that policies, procedures & training materials are technical accurate and practicable
  • Identify and provide guidance on technical or business obstacles these policies face
  • Act as technical advisor to the ISO during efforts to set the standards for access controls, ensure audit trails and sufficient event reporting (SIEM), and mandate encryption and integrity controls
  • Work with ISO and the Tech Services department to evaluate and recommend new information security technologies and counter-measures against threats to information or privacy
  • Participate in business continuity and disaster recovery planning to ensure emergency procedures exist for access and authorization controls over data
  • Participate in internal and external audits to ensure HIPAA and CMS technology compliance by compiling and analyzing data
  • Assist the ISO as needed in responding to and managing information security incidents, including malware threats
  • Assist the ISO/ leverage analysis tools to assess information assets, such as
  • Experience with HIPAA, CMS and/ or other compliance frameworks
  • Advanced computer skills, including Visio
  • Ability to perform prolonged use of a computer, computer monitors or other monitoring devices
  • Ability to work within a structured environment in keeping with regulatory requirements
  • Professional written and verbal communication skills
  • Demonstrated ability to work with diverse groups and difficult clients
  • Ability to work on a flexible schedule and overtime and/or irregular hours when needed
  • Must be able to travel up to one week a year for training or other development opportunities
  • Must reside in or be willing to relocate to southern or central Maine
  • 1+ year of experience or certifications in healthcare or sciences, with emphasis in information systems
  • 1+ year of experience or certifications focused on information security
  • Proven, professional systems engineering experience
196

Information Security Engineer Resume Examples & Samples

  • Conducting DoD security lockdowns utilizing a variety of system scan tools (e.g. ACAS, SCC), Security Technical Implementation Guides (STIGs), NIST RMF workflows and processes
  • Identifies security risks, threats and vulnerabilities of networks, systems, and applications
  • Performs automated and manual security lockdowns and checks
  • Develop and maintain security engineering documentation
  • Supports configuration and integration project team
  • Prepare security packages for DAA review and approval
  • Participate in certifications events to work with the appropriate agencies to obtain Approval To Operate (ATO) and Authority To Connect (ATC) approvals
  • Develops technical and programmatic assessments, evaluates engineering and integration initiatives and provides technical support to assess security policies, standards and guidelines
  • Assists with other IA compliance activities as directed by supervisor
  • Bachelor’s degree & 6 years related experience; MS degree & 3 years related experience
  • Computer proficient in MS Office products
  • Extensive knowledge and experience securing networking, Windows, and Unix/ Linux Based Information Systems
  • Possess security certifications (CISSP, Security+ CE, etc)
  • Demonstrated expertise and understanding of infrastructure COTS components and related scans and STIGS (web servers, web-enabled applications and databases including IT and systems, computing infrastructure and networking)
  • Demonstrated competence in security engineering and assurance principles in the design, coding, testing, and integration
  • Demonstrated familiarity with the National and DoD standards guiding the development of IA policy, requirements, integration, engineering and certification and accreditation
  • Demonstrated understanding of web-enabled IA standards and security features of firewall technology, ports and protocols, UNIX, DB’s and MS Windows 200x systems
  • Demonstrated experience with DoD accreditations
  • Must be able to multi-task, prioritize and adapt to a dynamic and demanding environment. Candidate must possess good communication skills
  • Demonstrated ability to manage a security engineering effort
  • Demonstrated ability to diagnose complex system problems and develop innovative solutions
  • Demonstrated interpersonal skills to work equally effectively as a team member with contractor and Government staffs from different locations and organizations
  • Demonstrated ability to participate in cross-functional planning, coordination, and task execution situations involving the full spectrum of system integration activities
  • Demonstrated ability to author technical documents
  • Demonstrated ability to communicate and conduct formal reviews
  • Demonstrated ability to generate and manage program deliverables
  • Percent of Travel Required Approximately 25%
  • Must have Secret security clearance
  • High degree of experience with Department of Defense information systems
  • Proven ability to work with SOA based architectures
197

Information Security Engineer Resume Examples & Samples

  • Configure, design, evaluate, and integrate information security solutions
  • Review information security requirements, assess security risks, and define security requirements
  • Monitor, identify, report, and mitigate security weaknesses
  • Perform security architectural risk reviews and provide customers with recommendations as needed
  • Communicate and manage client needs and expectations in all phases of their information security solutions
  • Work with internal resources to ensure proper security controls are identified, implemented and tested
  • Work independently with internal and external areas regarding security requirements for existing and future business
  • Develop detailed technical recommendations to solve security issues
  • This is an intermediate level position suited for an individual who has a technical and Information Security background
  • B.S. degree in Computer Science, Computer Engineering and 3 years experience OR 5 – 7 years of relevant Information Security experience
  • Experience in some or all of the following areas: OS Security (Windows, Linux, Sun), next gen firewalls, IP, IAM, PKI, Pen testing, SIEM
  • Working knowledge of Security Architecture for both infrastructure components (networks and servers) as well as applications and data
  • Works well in a team environment and independently
  • Relevant Information Security Certifications (CISSP, CISA, CNE, GISA, etc.) are preferred
198

Information Security Engineer Resume Examples & Samples

  • Perform Risk assessments for applications and underlying systems and recommend security requirements based on upstream Business requirements
  • Provide security consulting to product teams from ideation to deployment, identifying security flaws and suggest remediation
  • Consult with business units on new product and feature offerings, suggesting preferred implementation patterns and identifying areas of security risk for scrutiny
  • Be a champion for security to the business units; train and instil core security values in engineers including exercising risk-based judgments and prioritizing remediation work
  • Enable teams to take ownership of the security of their applications and services in production
  • Focused on working with application project and development teams to see security controls and industry best practices integrated into project life-cycles in alignment with the security strategy
  • Work with engineering teams to implement strong security controls for servers, clients, and network devices
  • Review and contribute to system architecture throughout the development lifecycle, identify and mitigate security risks
  • Conduct security assessments and scans to identify vulnerabilities, recommend and prioritize remediation actions
  • Architecture Reviews
  • Application vulnerability management
  • Cloud Security Controls
199

Information Security Engineer Resume Examples & Samples

  • Assist in the design and implementation of the security infrastructure
  • Configure, upgrade and troubleshoot various information security technologies such as anti-virus and email security solutions
  • Perform monitoring for security alerts for various systems and databases, alerting management to security issues and making recommendations on proposed resolutions
  • Assist in managing third party SSL certificates for company websites
  • Assist in maintaining all technical security controls
  • Make recommendations on improvements to reduce the frequency and duration of incidents impacting confidentiality, integrity and availability of the organization’s data
  • Represent Information Security at change control meetings
  • Participate in disaster recovery activities as needed
  • Support end-user community with security related issues
  • Must be able to work outside normal hours in order to perform diagnosis and/or implementation of product releases or changes, so that normal workflow is not interrupted
  • On-call duties will be required in a team environment
  • Perform additional duties, as assigned
  • Perform data analysis of data derived from system logs, and reports
  • Assist in the selection, testing, implementation, documentation, operation and maintenance of various information security technologies such as authentication devices, access controls, firewalls, IDS/IPS/SIEM systems, malware detection systems, forensic and vulnerability management tools
  • Configure, upgrade and troubleshoot various information security technologies such as firewalls, VPN solutions, anti-virus, SIMS, DLP, vulnerability scanners, web filtering and email security solutions
  • Interface with external vendors on hosted security services provided to the organization
  • Work with IT and business units on new and existing projects to identify security requirements that will ensure the confidential, integrity and availability of the organization’s assets
  • Assist with providing reports, presentations, and recommendations covering the operational aspects of information security to IT senior management
  • Assist with internal and external audit requests
  • Working experience with security technologies such as firewalls, DLP solutions, vulnerability scanners, anti-virus solutions, SIMS, email gateway solutions and content proxies is required
  • Experience with Checkpoint, Cisco, Vontu, CITRIX Netscaler, Imperva and McAfee technologies preferred
  • Familiarity with bank security policies and government regulations pertaining to information security preferred
  • Strong system administration, network, security and troubleshooting skills
  • Working knowledge of network infrastructure, including routers, switches and associated network protocols and concepts required
  • Detail oriented with strong organizational and prioritization skills
  • Strong communication and written skills
  • Ability to perform multiple projects simultaneously
  • Working knowledge of Microsoft Word, Excel, PowerPoint, and Visio
200

Information Security Engineer Resume Examples & Samples

  • For the Project, demonstrate continuous improvement in the topics of information security and compliance using a measurable matrix tied to the State of Californias SAM-5300 security guidelines and NIST moderate level security controls
  • For information security and compliance topics, educate and coordinate projects and actions with all groups within the Rancho Cordova office
  • Bachelor's Degree (B.A. or B.S.) or higher in Computer Science, Engineering, a related field or equivalent experience
  • Multiple years of experience with Intrusion Detection and/or prevention systems
  • Experience with wireless security mechanisms and technologies
  • At least five or more years of experience as a member of a security or compliance team or as a security consultant
  • Experience working with Executive Management Teams
  • Demonstrated background assisting companies using continuous improvement techniques
  • Experience interacting with Information Security Officers (ISOs)
  • Experience with compliance audits and resulting remediation planning and implementation
  • Familiar with a large variety of the information security field's concepts, practices, and procedures
  • Demonstrates strong commitment to Policies, Procedures, and Work Instructions by participating in safety meetings, completing required training, intervening in unsafe situations, refusing unsafe work, and complying fully with all applicable laws and regulations related to HSE
  • Reports all incidents (actual incidents and near misses) in accordance with the Incident Reporting requirements
  • Actively participates in incident investigations and risk assessments as deemed necessary by management
201

Information Security Engineer Resume Examples & Samples

  • Determine security requirements by evaluating business strategies and requirements, researching information security standards, conducting system security and vulnerability analyses, threat modeling and risk assessments, studying architecture/platform; identifying integration issues
  • Serve as the front line engagement with the business and provide support for various requests or work with Security Architects to drive more complex solutions
  • Contribute to security policy, standards, and guidelines related to Information Security
  • Drive engineers, developers and others to adopt security controls and best practices
  • Guide cross-functional initiatives towards solutions to coordinate activities, mitigate risks and enhance system and security
  • Collaborate effectively with various Architects and Engineers to solve complex problems spanning their respective areas and resolve technological disagreement with informed, rational debate
  • Support various security projects
  • Updates job knowledge by tracking and understanding emerging security practices and standards, participating in educational opportunities, reading professional publications, maintaining personal networks, participating in professional organizations
  • Innovative, self-motivated, and able to interact with all levels of the organization
  • Ability to manage numerous high-priority projects simultaneously
  • Basic understanding of information security
  • Fluency with Microsoft Office Suite
  • 3+ years of experience as an Information Security Engineer, Technology Consultant, System Engineer or similar role, compliance experience
  • Experience with information security risk management
202

Information Security Engineer Resume Examples & Samples

  • Design, oversee and/or perform comprehensive risk/vulnerability systems assessments to identify vulnerabilities, including providing reporting on assessment results as well as risk mitigation and remediation recommendations and plans
  • Communicate known security risks and solutions to mitigate risks to business and technology partners as needed
  • Manage audits of vendor security processes, procedures and compliance controls
  • Demonstrated understanding of security related technologies and practices, including: authentication and authorization systems, endpoint protection, encryption, segmentation strategies, vulnerability management, and secure remote access
  • Strong analytical and customer service abilities required
  • Leadership abilities and a highly innovative problem solver
  • Cross-functional Experience in End Point Security including experience in one or more of the following: Database Monitoring, Security Incident & Event Management, Advanced Persistent Threat, PKI, Endpoint Threat Management, and other duties
  • Strong understanding of operating systems, network, and infrastructure design considerations and the advanced troubleshooting skills those areas
203

Information Security Engineer Resume Examples & Samples

  • Must have 5 years of experience in information security in a highly regulated industry (i.e. Financial, Insurance, Medical, Government)
  • Must have 5 years of experience working with Power 7 iSeries/AS 400 security and systems administration
  • Must have 3 years of experience working with 3rd party security products such as Enforcive, NetIQ, PowerTech, etc
  • Knowledge of IBM security best practices, Power 7 iSeries OS, IT audit, policies, vulnerability risk remediation, and regulatory requirements, (i.e., GLBA, FFIEC, PCI, etc.)
  • Candidate must have ability support and monitor automated security products, and recommend/perform actions required to audit and maintain/improve security
  • Additional xSeries, MS-OS, or AIX OS knowledge is a plus
  • Ability to perform analysis and assessment of application security is also a strong plus
  • Complex problem-solving skills, ability to think independently as well as work in dynamic team groups, ability to work within deadlines, strong organizational skills, excellent verbal and written communication skills
  • Develops policies, procedures, standards and guidelines to ensure security
  • Investigates, recommends and monitors implementation of security products and services
  • Monitors and evaluates internal and external security threats. Researches security and recommends appropriate changes
  • Acts as an escalation point for complex internal security and support functions
  • Manages high level projects that drive current security initiatives and support security solutions
  • Monitors security of systems for compliance
  • Follows up on security findings from security related reviews and other third-party reviews
204

Information Security Engineer Resume Examples & Samples

  • Conduct a variety of technical penetration testing engagements (external, internal, web application, cloud, social engineering, wireless, etc.)
  • Act as subject matter specialist communicating and delivering information security practices and techniques and strong understanding of the OWSAP top 10 vulnerabilities
  • Hands-on experience in threat detection, exploitation, and industry toolsets
  • Provide security remediation validation to ensure remediation steps are effective
  • Work with 3rd party vendors to coordinate penetration tests for all cloud-based solutions
  • Understanding of coding and scripts, and provide best coding practices
  • Knowedge of emerging technologies such as DevSecOps, Agile Development, Cloud Compute Technologies and Platform, etc (Amazon AWS)
  • 2-3 years of application/network penetration testing and vulnerability management experience
  • Penetration tools such as Kali, Burp Suite, Qualys Guard, Cenzic, Metasploit, OWASP ZED, sqlmap, nosqlmap, WPScan, Nessus, NMAP, etc
  • Must be technical – technical capability to understand technologies, cloud services, enterprise systems, agile development concepts/tools/practices, and digital frontier
  • Versed in one or more programming and scripting languages such as HTML5, Java, Python, Ruby, Perl, Bash, PowerShell
205

Information Security Engineer Resume Examples & Samples

  • 2+ years of experience as a developer
  • Strong discipline regarding adherence to SDLC processes
  • Complete comfort working with source code control systems such as git and subversion
  • Fluent in Java including ORM related libraries
  • Strong attention to detail, confident enough to raise questions and escalate when necessary
206

Information Security Engineer Resume Examples & Samples

  • Leading a team of Information Systems Security personnel while they develop and maintain a formal Information Systems Security program
  • Willing/able to work OCONUS for minimum of one year
  • Experience in developing, implementing, and enforcing organization’s unique IA policy
  • Excellent communication skills; shows tact, versatility, teamwork, effective listening skills and follow through
207

Information Security Engineer Resume Examples & Samples

  • Provide an interface between the business and IT for technical security projects
  • Create strategies, controls and architecture specifically for desktop, workstation/endpoint and mobile device security
  • Maintain the organization's data loss prevention (DLP) solutions
  • Optimize technologies and processes for Information Security Analysts
208

Information Security Engineer Resume Examples & Samples

  • 2 years of professional experience, appropriate certification, and qualified in accordance with standards spelled out in DoD 8570.01-M and the Army Information Assurance (IA) Training and Certification Best Business Practice, corrected 6 Aug 2010
  • Expertise with MS Exchange
  • Expertise in supporting platform integration issues with Oracle, SQL databases on a windows server.Experienced System Administrator Skills (certification is a plus) in some or all of the following: Windows Server 2008, 2012, Window 7 or Windows 10
  • Experience in the design, development, implementation, and/or integration of a DoD IA architecture, system, or system component for use within Computing Environment (CE), Network Environments (NE), and enclave environments
  • Experience with IA vulnerability scanning software tools, implementing Security Implementation Guides (STIGS), and applying IAVA patches
209

Information Security Engineer Resume Examples & Samples

  • A Bachelor’s Degree in Computer Science, or other Engineering, or Technical discipline with an Information Security or Cyber Security Concentration. Advanced Degree with concentration in Information Security or Cyber Security preferred
  • 5 Years minimum experience as an Information Security Engineer or performing Information Security Engineer related activities within the last 10 years
  • Seven years of professional experience, appropriate computing environment certification, and IA WORKFORCE SYSTEM ARCHITECT AND ENGINEER (IASAE) SPECIALTY qualified in accordance with standards spelled out in DoD 8570.01-M and the Army Information Assurance(IA) Training and Certification Best Business Practice, corrected 6 Aug 2010. Experience can substitute for the degree provided the person has BOTH the relevant experience AND is fully Information Assurance (IA) certified in accordance with AR 25-2, Information Assurance, and the associated best business practice for IA Training and certification (IA Training BBP)
  • Expertise in supporting platform integration issues with Oracle, SQL databases on a windows server
  • Experienced System Administrator Skills (certification is a plus) in some or all of the following: Windows Server 2008, 2012, Window 7 or Windows 10
210

Information Security Engineer Resume Examples & Samples

  • Perform security risk assessments and recommend security requirements for new and existing information technologies, systems, applications, and services. Perform vulnerability assessments against networks, systems, and applications, and work with IT Services staff to eliminate vulnerabilities found or otherwise mitigate the associated risks
  • Aid in the development and execution of the Information Security Framework
  • Provide technical recommendations and support for the adoption, configuration, and deployment of network and host based information security solutions and capabilities such as malware defenses, firewalls, intrusion detection and prevention, security configuration management, user and device authentication, and incident detection and response
  • Perform application administration for information security systems to include systems configuration, integration, monitoring, operations, and troubleshooting
  • Recommend and develop security standards and configuration baselines for network-connected devices, endpoint systems, servers, applications, network equipment, and security systems. Work with technical staff responsible for the development, implementation, and administration of these systems to ensure appropriate use of secure methods and compliance with standards and baselines
  • Lead the development and delivery of security awareness training for students, faculty, staff, and other users of College information resources
  • Develop and maintain deep technical knowledge of security issues and protections related to network-connected devices, endpoint systems, servers, network equipment, and cloud solutions
  • Develop and maintain deep technical knowledge of identity and access management technologies, including directory services, two-factor authentication, and federation services
  • Apply knowledge of information security along with a deep understanding of the academic and business needs of the University to provide security-related recommendations and support to students, faculty, and staff
  • Develop, analyze, and present scheduled and ad hoc reports, and make recommendations based on the data from various sources
  • Develop and maintain security systems documentation
  • Perform other duties and responsibilities as required, assigned, or requested
  • Minimum of 5 years’ experience in information security or the equivalent combination of education, training, security certification, and directly related technical experience
  • Experience configuring and operating network and host-based firewalls, intrusion detection/prevention systems, vulnerability scanning and penetration testing tools, anti-malware and spam protection, secure data transmission technologies (e.g., SSL VPN, IPSEC, SSH), and network monitoring/protection solutions
  • Prior experience using contemporary tools and technologies for vulnerability scanning, remote system administration, network monitoring and protection, security notification, and risk assessment
  • Extensive knowledge and experience with network, server, and desktop administration
  • Strong oral and written communication skills, especially the ability to effectively impart complex or technical subjects to diverse audiences
  • Strong organizational, analytical and problem solving skills with a heightened concern for confidentiality and attention to detail
  • Most of the work is carried out within a generally accessible, safe, indoor environment. The employee will be required to operate a personal computer and associated equipment as well as other office equipment used in the day-to-day office operations. The employee will be required to attend meetings, workshops and conferences on and off campus during and outside of normal business hours. The employee will be required to respond to technical emergencies both during and outside of normal business hours
  • Three or more years of experience configuring and operating network and host-based firewalls, intrusion detection/prevention systems, vulnerability scanning and penetration testing tools, anti-malware and spam protection, secure data transmission technologies (e.g., SSL VPN, IPSEC, SSH), and network monitoring/protection solutions
  • Membership in selective and restricted professional security communities, such as REN-ISAC, InfraGard, or ISACA
211

Information Security Engineer Resume Examples & Samples

  • Maintain entire lifecycle of information security applications, equipment and components
  • Update and verify information security systems
  • Ensure inline security tools, including firewalls, intrusion prevention, distributed denial or service protection and advanced persistent threat protection, maintain maximum uptime and security
  • Maintain Cybersecurity systems and work closely with other team members and business partners to ensure the environment meets or exceeds security policies and regulatory compliance requirements
  • Utilize continuous improvement and innovation to generate new processes and improvements in the Cybersecurity environment
  • Collaborate with the team on design, development and implementation of Cybersecurity solutions
  • Create and maintain technical and process documentation of the Cybersecurity environment
  • Understand and apply Thrivent’s Information Technology standards and processes for Cybersecurity systems to ensure the systems support business needs and availability requirements
  • Provide on-call support (rotating scheduling) for assigned Information Technology system(s)
  • Understand and apply legal and industry requirements/regulations to the Cybersecurity systems including the definition of potential gaps and the proposal of strategic controls, policies or project to resolve
  • Networking and management of information security network technologies
212

Information Security Engineer Resume Examples & Samples

  • Respond to DDoS issues related to production network services with a sense of urgency in a 24/7 operation environment (25%)
  • Actively participate in planning for DDoS detection and mitigation efforts, including industry research (25%)
  • 2 - 5+ years of experience with Network Engineering
  • Knowledge of DNS
213

Information Security Engineer Resume Examples & Samples

  • Develop and manage security requirements traceability matrices
  • Prepare evaluation reports and provide recommendations
  • Coordinate, develop, and evaluate security programs
  • Identify, report, and resolve security vulnerabilities and issues
  • Establish and satisfy information assurance and security requirements based on analysis of user, policy, regulatory and resource demands
  • Analyze, design, and develop security features for system architectures
  • Analyze and define security requirements for computer systems which include mainframes, workstations, personal computers, and virtual environments
  • Ensure all information systems are functional and secure
214

Information Security Engineer Resume Examples & Samples

  • Administer, monitor, and perform security operations tasks around Tivity Health’s technical security solutions [e.g., firewalls, anti-malware, logging/monitoring systems (SIEM), data loss prevention (DLP) solutions, etc.]
  • Assist with vendor and product/solution security assessments; Maintain tracking of information security corrective actions and exceptions
  • Write and contribute to the creation and maintenance of information security-related documentation (e.g., policies, procedures, standards, work instructions, etc.) as required, and maintain Tivity Health’s Security Wiki and SharePoint sites
  • Lead and/or assist in implementation of Tivity Health Information Security projects as directed
  • Have the ability to learn technologies and platforms quickly; 
215

Information Security Engineer Resume Examples & Samples

  • Typically requires bachelor's degree or equivalent and two to four years of related experience
  • Must have a current DoD Top Secret security Clearance
  • Experience with Assured Compliance Assessment Solution (ACAS) used for scanning workstations and servers for vulnerabilities and the Nessus Vulnerability Scanner
  • Experience with McAfee Web Gateway
  • Experience working with Host Based Security System (HBSS)
216

Information Security Engineer Resume Examples & Samples

  • Candidates duties can expand into incident response forensics in support of the CenturyLink CIRT Team in the investigation of cyber attacks/events, internal bad actors, possible data breaches, etc
  • Assist in managing the process to electronically preserve hard drives for legal hold
  • Maintain a knowledge of forensic and anti-forensic techniques, modern hacker tools, methodology, and attack trends, when necessary conducting research to find, learn and deploy new forensic tools and techniques
  • Set up and maintain computers including application installs and troubleshooting over a variety of OS'es, most commonly Windows, Windows Server, Linux & Mac OS
  • Maintain forensic lab systems, knowledgebase, indexes and databases
  • Log and Track assets and data to maintain chain-of-custody for investigations and litigation
  • Undergraduate degree in computer science, engineering, or related field, or (preferred) 2+ years of relevant work experience
  • Basic knowledge of computer forensic investigations, litigation discovery (eDiscovery) & incident response
  • Willingness to pursue, applicable professional/technical certifications, such as CISSP, EnCE, GIAC (SANS)
  • 5+ years of work experience in computer security, computer and mobile device forensics, incident response, network analysis, log analysis, malware analysis or eDiscovery
  • Thorough understanding of eDiscovery standards, concepts and procedures with an added plus if familiar with EDRM (Electronic Discovery Reference Model), FRCP (Federal Rules of Civil Procedure), legal hold preservation, and data spoliation
  • Experience using forensic tools not limited to but including EnCase, Access Data FTK and other, open source forensic tools such as (but not limited to) The Coroner’s Toolkit (TCT), SANS SIFT Workstation, Remnux, Mandiant’s Redline/Memoryze, Volatility, Regripper, etc
  • Experience working with various operating systems including Windows, Mac, Linux, IOS and Android, with system administration experience a plus
  • Experience with Encryption Technologies including Credant, Bitlocker, Pointsec, FileVault 2 and LUKS
  • Experience with memory acquisition and analysis
  • Certifications: CISSP, EnCE,, SANS GIAC or related
  • Application development and/or source code review experience in C/C++, C#, VB.NET, ASP, PHP, PERL, Python, or Java
  • Knowledge of HIPAA, SOX, PCI and other privacy and data handling regulations
  • Experience in or knowledge of Legacy and VoIP Telecommunications technologies
  • Experience in large enterprise or carrier data centers and/or networks
217

Information Security Engineer Resume Examples & Samples

  • Responsibility for information cyber security analysis & response with the mission of protecting Change Healthcare from data loss risks and common threat actors
  • Technical lead for DLP solutions
  • Lead initiatives and the implementation of capabilities in order to advance the Cyber Threat program
  • Designs, develops and implements solutions to IT security requirements focusing on Data Loss Prevention and associated data loss risks
  • Enhance and distribute security incident response and escalation procedures to ensure timely and effective handling of security events and alerts related to data loss
  • Enhance Change Healthcare’s Cyber Security program and strategy to expand threat management services across all business units
  • Review, interpret and adapt customer, regulatory and corporate security and compliance requirements into technical design options
  • Apply knowledge of technical, analytical skills to ensure the confidentiality, integrity, and availability of all information systems assets and ensure compliance with company policies, procedures, contractual, and regulatory requirements
  • Participates with Enterprise Risk Management team to ensure proper identification of policy issues/violations
  • Experience building cyber security toolsets and solutions across non-integrated business units
  • Experience with architecture, design, and management of DLP technologies and best practices
  • Experience with SEIM technologies and best practices, and experience implementing a more robust advanced security data analytics capability
  • Malware detection, analysis, exploitation, containment, and eradication techniques experience (Not just commercial tools)
  • A solid understanding of Threat Vector Analysis, Intrusion Detection and Prevention, Incident Management and Response, Risk Assessment and Mitigation methodologies, and Counter Threat Operations
  • Knowledge of monitoring and managing network and host-based intrusion prevention systems actively in-line, Full Packet Capture (with analytics), Sandboxing, Data Loss prevention, malware prevention systems, vulnerability scanning solutions, DDOS protection, Security Event/Information Management, host-based integrity checking, end-point security and AV
  • Proficiency in OS platforms, including Linux, Unix, Windows and AIX. Capable of building and maintaining an organization with expert knowledge of information technology functions, practices and business units. Has strong expertise in multiple systems and in the functions and business units supported
  • Knowledge of scripting languages, including python, perl, php, Ruby, and JS
  • Knowledge of information security concepts and theory, and the application of such through technical and non-technical methods
  • Solid understanding of cyber security threats, risks, vulnerabilities and attacks, to include threat actor motives, capabilities, and techniques, with the ability to analyze intelligence data and provide indicators and warnings to healthcare and financial services business functions
  • Demonstrating an ability to work under stress/pressure to meet deliverables, timetables and deadlines
  • Demonstrating personal integrity and high ethical behavior at all times to inspire confidence in clients, peers, partners and employees
  • 5+ years' industry experience in a mission-critical environment
  • Knowledgeable of current and emerging security and information technology standards and practices
  • Understanding of key InfoSec regulation & frameworks (PCI, GLBA, HIPAA, ISO 27001, HiTrust, EHNAC) is a plus
  • Bachelor’s degree required – preferably Computer Science or MIS
  • Must possess an active industry InfoSec related certification (i.e.- CISSP, CEH, CISM)
218

Information Security Engineer Resume Examples & Samples

  • A strong background in Network and Linux Systems security. 2+ years of experience
  • Hands-on familiarity with common Cloud IaaS and PaaS platforms
  • A firm understanding of networking protocols
  • Programming Skills: hands-on experience writing your own tools and modifying others, in order to automate and integrate systems
  • A good grasp of current threat intelligence and modern attacker exploit and persistence techniques
  • An entrepreneurial spirit; you enjoy challenges across broad range of disciplines
  • Experience interfacing with technical and non-technical persons on Information Security Topics
  • Act as the lead to drive Infrastructure Security needs across the organization
  • Perform security assessments to identify Security Improvements and Capability needs for corporate and production networks and systems
  • Harden our systems to increase attacker cost
  • Be the subject matter expert on Infrastructure and Architectural Security Concerns
  • Instrument our systems and networks for effective management and detection
  • Responsible for creating or adjusting existing relevant policies to ensure MongoDB’s stance is modern and effective
  • Interface with and educate other MongoDB engineers on network and systems security topics
  • Continually evaluate current Infrastructure Security posture; work with engineering leadership for rolling out additional capabilities
  • People: Collaborate and design new and improved infrastructure security systems with fellow engineers in various departments
  • Organization: Ability to manage multiple parallel efforts and prioritize resources based upon understanding and interpreting business needs
  • Communication: Successfully communicate your recommendations and rationale to both technical and non-technical management
  • Research: Research modern approaches to identified risks and capability gaps Gather and analyze feedback from internal stakeholders and develop recommendations and/or implement yourself
  • Customer Service: Ensure MongoDB’s Infrastructure Security program and controls are pragmatic for our internal stakeholders. Provide great customer service when interfacing with other MongoDB Teams
219

Information Security Engineer Resume Examples & Samples

  • Manage the design, implementation, and support of a diverse security infrastructure including firewalls, IDS/IPS, secure web gateways, endpoint security, vulnerability scanners, SIEM, and DLP
  • Provide guidance for security remediation to business and IT partners, and participate in security incident response process
  • Collaborate with key stakeholders to assess near- and long-term security needs in addition to developing and maintaining partnerships with key vendors to ensure that service levels are understood and met
  • Mentor junior members of the Information Security team working in a rotational 24x7 SOC environment
  • Provide analysis and trending of security log data from a large number of security devices as well as provide threat and vulnerability analysis as well as security advisory services
  • A minimum of 7 years of Information Security Experience working with a broad range of technologies including firewalls, IDS/IPS, secure web gateways, endpoint security, vulnerability scanners, SIEM and DLP
  • Demonstrated experience and success creating technical security designs and implementation plans for at least 2 new security technologies
  • Proven experience with information security best practices
  • Experience working in a global, enterprise environment
  • Experience working with threat analytics platforms (TAP)
220

Information Security Engineer Resume Examples & Samples

  • 5+ years of experience with programming, including Java
  • Experience with a formal software development life cycle (SDLC) process and configuration management tools
  • Experience with developing in an Oracle Solaris 10/11 or Red Hat Enterprise Linux (RHEL) v6.x environment
  • Experience with UNIX system administration and shell scripting
  • Experience with developing software to format, generate, transform, and process eXtensible Markup Language (XML)-based data
  • BA or BS degree and 4+ years of experience with security engineering or 7+ years of experience with security engineering in lieu of a degree
  • Security+ or equivalent security certification
  • Experience with RHEL preferred
  • Experience with OpenOffice or Libre Office integration or development
  • Experience with system and software design, development, integration, testing, system administration, operations, and maintenance
  • Experience with implementing and executing software and security engineering practices in the system or software SDLC process
  • Knowledge of hidden data threats associated with complex and proprietary file types, including Microsoft Office, Word, PowerPoint, and Excel and Adobe Portable Document Format (.pdf)
  • Knowledge of DoD, IC, and national-level system security initiatives and secure information, local area network (LAN), wide area network (WAN), and cross-domain solutions (CDS) technologies
  • Knowledge of DIACAP or DoD RMF, DCID 6/3, ICD 503, or NIST RMF
  • Certified Information Systems Security Professional (CISSP) or Certified Ethical Hacker (CEH) Certification
221

Information Security Engineer Resume Examples & Samples

  • Perform security audits, risk analysis, vulnerability testing (including penetration testing and the development of exploits), and security reviews periodically to ensure the security of corporate technology systems and data
  • Assist in the resolution of security incidents related to corporate assets, including root cause analysis
  • Research and implement necessary recommendations for the protection of all information processed, stored, or transmitted by systems
  • Participate in educating users regarding IT security
  • Have an understanding of intrusion prevention & detection, network traffic analysis, cryptography and data encryption
  • Exercise discretion and maintain confidentiality related to privileged information (e.g., security, personnel, legal, or financial)
  • Actively participate in security compliance efforts (e.g., HIPAA, HITRUST)
  • Stay abreast of industry trends and latest advancements in network and data security
  • Bachelor’s Degree in Computer Science or equivalent related work experience
  • 3+ years of experience in network, server or application security
  • 1+ years of experience with one or more of the following technologies/solutions
222

Information Security Engineer Resume Examples & Samples

  • Bachelor’s degree or equivalent in experience (as evidenced by employment history, professional certification, and/or academic track record) required; Master’s degree preferred
  • At least 3-5 years of system/software design, administration, and/or engineering experience required
  • Ability to diagnose and respond to computer and network security incidents
  • Experience in obtaining forensic data in support of University Counsel and on-going incidents
  • Experience in providing guidance and ensure compliance with incident response procedures; evaluate security threats and applicability to a given environment
  • Experience with security control services such as certificate authority, vulnerability scanning, data loss protection and endpoint security
  • Excellent interpersonal communication skills (both verbal and written) and excellent technical and problem solving skills throughout all duties
  • CISSP, GSEC, GCFE, or other information security practitioner certificates preferred
223

Information Security Engineer Resume Examples & Samples

  • Act as the subject matter expert (SME) in regards to the Akamai Security platform and as the SME in the application security space in general
  • Responsible for the governance of the Akamai Kona Side Defender platform (Akamai KSD WAF) across Citi Global Consumer banking applications
  • Build a process for development, testing and implementation of the WAF rules across the new and existing applications
  • Integrate WAF policy lifecycle into Secure Software Development Lifecycle (SSDLC)
  • 5 to 7 years of proven working experience of designing and engineering information security solutions
  • Knowledge of Web Application Firewalls(WAF) – Imperva, F5 ASM, ModSecurity or Akamai Kona Site Defender
  • Understanding of Web protocols and technologies such as HTTP/S, JSON, AJAX
  • Knowledge of common web application vulnerabilities, penetration testing technics and malicious actor’s tactics and technics
  • Understanding of the vulnerability management/remediation processes
  • Thorough working understanding of Information Security concepts and architecture elements in the area of identity and access management, cryptography, logging and monitoring
  • Candidate should be fully aware of the current and emerging security solutions available in the industry
  • Strong communication and analytical skills
224

Information Security Engineer Resume Examples & Samples

  • Plan, coordinate, and perform penetration testing technical assessments
  • Maintain communication between system owners and the assessment team, including before, during, and after testing engagements
  • Monitor, evaluate, and maintain systems and procedures to safeguard internal information systems and databases
  • Ability to work with APIs and develop automated processes
  • Research, recommend, and implement changes to enhance system security
  • Educate and communicate security requirements and procedures to all users, including new employees
  • Ability to work with intelligence gathering techniques and control environment and articulate risk of threats and vulnerabilities to senior management
  • 3-5 years of combined IT or security work experience with a broad exposure to systems analysis, applications development, database design and administration or other directly related experience. A combination of education and experience may meet requirements
  • Experience with NMap, Metasploit, Nexpose, Burp Suite, AppScan and other security-related tools
  • Knowledge of network security, application security, database administration, programming, systems analysis procedures, database software and operating systems
  • Ability to evaluate threat intel and information security controls and identify potential risk
  • Ability to program in Ruby or Python a plus
225

Information Security Engineer Resume Examples & Samples

  • Provide oversight on the Department of Defense Host based Security System (HBSS) from original concept through final implementation interfacing with all Information Assurance Managers and System Administrators
  • Provide expert level guidance in all aspects of HBSS administration and support, to include
  • Ability to create user accounts and assign correct permission sets
  • Ability to open correct firewall rules to allow secure network communication between the server and all of its clients
  • Ability to remotely load McAfee agent on clients to manage groups, systems and policy assignments
  • Ability to view and configure a Policy Catalog to deploy policy settings for deployable products. Able to create policy assignment rules
  • Ability to deploy platform specific HBSS products to the correct HBSS clients
  • Ability to create and access dashboards, create queries and utilize the Servers to monitor all of the HBSS clients assigned
  • Coordinates with program management and customer counterparts to ensure compliance with national IA/IS security requirements. Provides IA/IS security awareness and training to users of classified systems
  • Provides Information System Security Officer (ISSO) support for classified and unclassified sensitive systems as Applicable
  • Acts as a mentor for junior members on the IA team
  • Assists in the overall development, implementation, and oversight of the information assurance (IA) program
226

Information Security Engineer Resume Examples & Samples

  • Provides security and risk management services by performing risk identification, assessment, and remediation as well as regulatory and internal compliance monitoring using standards and processes as required to adequately protect personnel, facilities, infrastructure, information, and business operations
  • Plan, create, implement, and maintain security program documentation
  • Perform system risk assessments, evaluation of products, and review SaaS based services to assess / address risk
  • Provide security expertise to the company
  • Define security requirements and review systems to determine if they have been designed to comply with established security standards. Develop new standards as necessary
  • Leads, facilitates security projects and tasks
  • Assist the Network Engineer in the development of technical policies and procedures regarding LAN/WAN activities
  • Establish and maintain effective working relationships with end users, vendors, and managers
  • Identify and resolve hardware and software related security problems
  • Define user needs and recommend alternatives
  • Bachelor’s degree and at least 7 years of professional experience
  • Excellent writing, documentation, and communication skills
  • Knowledge of risk assessment methodologies and processes
  • Familiarity with creating and implementing security program policies, standards, controls, and procedures
  • Familiarity with assessing risks and developing mitigating controls and alternatives
  • Experience in computer security combined with risk analysis, audit, and compliance
  • Ability to independently identify, assess and document system security deficiencies and recommend solutions
  • Experience in supporting network firewalls and proxy servers
  • Familiar with administration of Routers, Firewalls and Switching technology
  • Knowledge of TCP/IP and related data network protocols: knowledge of standard network protocols like TCP, ARP, ICMP, DHCP, HTTP, SNMP etc., and advanced features like IPSEC and IPv6 related protocols and accompanying protocol analysis tools
  • Experience with the design and configuration of a network DMZ
  • Experience with converged network technologies
  • Knowledge of security and risk frameworks including NIST, SANS, HITRUST, ISO, CoBIT
  • Working knowledge of Windows/Unix systems administration and security vulnerabilities
  • Working knowledge of modern communications networks and protocols (MPLS, VPNs, etc.)
  • Understanding of and the ability to perform penetration testing
  • Knowledge of network technologies to include wireless and mobile platforms
  • Knowledge of compliance requirements including ITAR, DFARS, PCI, SOX, and CPI
  • Must be highly motivated and able to work effectively under minimal supervision in a fast-paced environment
  • Extensive understanding of Endpoint Security for PCs and Servers
  • Process oriented and attention to detail
  • Experience with ITIL concepts
  • Ability to perform risk assessments and testing of data processing systems
  • Training staff on network and security processes and procedures
  • Information Systems Security: At least 7 years
  • Network Security: At least 7 years
  • Firewalls: At least 7 years
  • IPS/IDS: At least 7 years
227

Information Security Engineer Resume Examples & Samples

  • Creating architectures & designs for new solutions around existing and new concepts
  • Knowledge on best practices and Architecture for Hadoop
  • Experience with Cloudera and Hortonworks
  • Hands on experience in Hadoop, Hive, Spark, HBase, Kafka and Camus
  • Masters / Bachelors Degree in Computer Science or related field
  • 5 + years of experience in RDBMS systems
  • 2+ years of Data warehouse experience
  • 14+ years of experience in software development in Java / J2EE technologies with at least 3 to 4 years of experience as an Architect
  • Must have strong experience working on Big Data / Hadoop and related technologies
  • Experience taking a leading role in building complex software systems
228

Information Security Engineer Resume Examples & Samples

  • Must have a minimum of 18 months school exposure and or work experience in technical support, research, or analysis
  • Associate or Bachelor’s degree is preferred
  • 2 years’ experience troubleshooting with (Routing, TCP/IP, VPN, Firewalls) is preferred
  • Security +, CCNA, or other industry recognized certifications is preferred
  • Experience with any of the following firewall platforms: Cisco ASA, Fortigate, or Sonicwall is preferred
  • Experience with banking and credit union environments is preferred
  • Develops the security of electronic information and establishes security systems, policies and procedures to prevent system compromise or infiltration
  • Develops and implements standards for appropriate security checkpoints and encryption methods
  • Performs research and analysis on suspicious activity to determine if the activity is an actual security concern or a false positive
  • Assesses the impact on the business caused by theft, destruction, alteration, or denial of access to information
  • Monitors and evaluates internal and external security threats. Researches security threats and implements appropriate changes to programs to prevent company and customer data assets from being compromised
  • Follows up with financial institution on suspicious activity, answers client questions about the activity, and provides recommendations on how to mitigate the threat
229

Information Security Engineer Resume Examples & Samples

  • Provide expert information security-related input and design for projects
  • Create and enforce company security policies, standards and best practices
  • Research, evaluate, design, test, recommend and implement new or improved security systems
  • Monitor for and respond to security incidents and violations of security policy
  • Ensure the security of the computing environment by enforcing appropriate controls and countermeasures
  • Provide information security guidance and consulting
  • Identify and assist in remediation of security vulnerabilities
  • Participate in audit-related activities
  • Provide after-hours/on-call support as needed or assigned
  • Experience working with firewalls, intrusion detection systems, authentication, authorization and accounting systems (AAA); application security concepts and tools
  • Ability to relate complex business requirements and associated risks to technology design/implementation for security-related and other areas of technology
  • Ability to effectively adapt to rapidly changing security technology and threat vectors to be able to apply findings to business needs and requirements
  • Strong team-oriented interpersonal skills; ability to effectively interface with a wide variety of people
  • Aptitude for troubleshooting technical problems with emphasis on network
  • Served in a customer service capacity with experience in deploying new technology utilizing accepted ¿Best Practice¿ methodologies
  • SIEM Expertise (Splunk preferred)
  • Strong with regular expressions
  • OS Administration
  • Firewall Expertise (Checkpoint preferred)
  • VPN (IPSEC, SSL)
  • 11 Wireless Security
  • Network/Protocol troubleshooting ( Wireshark, tcpdump, etc)
  • HTTP/SOCKS Proxy (Bluecoat preferred)
  • File Integrity Monitoring (Tripwire preferred)
  • Strong analytical and people skills
230

Information Security Engineer Resume Examples & Samples

  • Provide technical design and architecture advice to internal teams on how to securely develop and build applications and supporting systems
  • Work closely with developers and evaluate business requests and proposed designs to determine feasibility; work with software development teams to define alternatives and recommend optimal solutions to meet security and regulatory requirements in the design of new/enhanced systems
  • Leverage security experience and knowledge within the mobile and digital commerce arena to cultivate and maintain effective working relationships with a variety of internal MasterCard stakeholders, including business owners, end-users, customers, project managers, engineers, and senior management
  • Define security requirements and guidelines to ensure repeatable processes are followed by worldwide teams
  • Assist in the strategy, standards, and architecture for the security aspects of the SDLC including application, mobile, web service, DevOps, cloud, and CI/CD efforts
231

Information Security Engineer Resume Examples & Samples

  • Provide technical leadership and partner with architecture, data, application and infrastructure areas to interpret security standards and derive appropriate solutions to manage risk and maintain compliance
  • Identify and support the remediation of security vulnerabilities in applications, databases, middleware, operating systems, and networks
  • Execute a variety of methods to identify vulnerabilities, including but not limited to scanning tools, automation tools, and data analysis
  • Partner with delivery teams across IT to ensure ideal security configurations for operating systems, networks, databases, middleware, etc., including participation in the development of hardening standards for cloud adoption and the application of secure coding standards to ensure confidentiality of client information and compliance with applicable standards and controls
  • Define the appropriate security controls that should be implemented into Business as Usual activities and provide security consulting services to IT teams to ensure controls are appropriately implemented
  • Drive continuous improvement in the vulnerability management process by preventing vulnerabilities from being deployed to production; examples include reviewing tools and processes such as configuration management, change management, and patch management; providing input into standards and policies; and performing retrospectives
  • Keep current with industry trends and enterprise initiatives, to ensure that our Information Security program capabilities evolve with emerging threats, new technology capabilities, and business needs
232

Information Security Engineer Resume Examples & Samples

  • Provide tactical guidance and governance for new solutions to meet business-aligned, security and compliance goals
  • Leveraging in-depth knowledge of advance application security penetration technics and defenses to work with HLI development community to standardize on security best practices
  • Prepare and updates information security policies, architectures, standards, and/or other technical requirement documents
  • Produce gap analysis documentation to identify any gaps between specific technical security requirements for systems and applications then providing detailed technical recommendations
  • Develop target state security technical controls and baselines includes the creation of metric driven security risk mitigation program
  • Monitor and analyze immerging threat trends to ensure HLI’s security posture and protection mechanisms address potential vulnerabilities
  • Provide technical leadership in the analysis, design, and support phases of application security controls in conjunction with the application development, data informatics and DevOps teams
  • Professional security management certification in one or more of the following areas preferred: CISSP, CISA, CISM, GISO, GCIH, CIPP
  • Extensive experience in Enterprise Security Architecture Design
  • Experience in working with key security technologies including SIEM, DLP, AV, BYOD, cloud and network monitoring tools
  • Penetration testing and vulnerability management experience at both the application and network layers
  • Strong understanding of IP, TCP/IP, and other network administration protocols
  • A successful track-record and at least five years’ experience being responsible for administering, operating, maintaining, and developing information security policy
  • Thorough knowledge of network management protocols and related standard tools
  • Thorough knowledge of computer network telecommunications, Windows, Linux and Unix-based Server operating systems
  • In-depth understanding of how to conduct risk assessments and the associated methodologies involved in risk mitigation and the presentation of this work Broad knowledge of the workings of firewalls, intrusion detection systems, anti-virus software, hubs, switches, routers, data encryption, and other industry-standard techniques and practices
233

Information Security Engineer Resume Examples & Samples

  • Key part of the 24/7 (follow-the-sun) security operational support team
  • Collaborate with other IT disciplines inside the larger organization, including network engineering, storage engineering, systems management engineering, and platform engineering to provide resolution of service issues
  • Working with our partners to define and apply security configurations for the services offered by ISRM
  • Minimum 1-2 years operational IT experience within an enterprise environment. Preferably some experience with security tools
  • Experience supporting as least 2 of the above tools e.g. anti-malware and Active Directory
  • Systems administration experience in Windows Server 2008 (or later) or Linux
  • Basic understanding of basic TCP/IP principles and current LAN technology,
  • Experience with Active Directory or anti-malware tools, in a large corporate environment, is an advantage
  • Experience with Storage technologies, Monitoring tools, and Microsoft SQL
  • Knowledge of virtualization platforms a plus ( VMware, Hyper V)
234

Information Security Engineer Resume Examples & Samples

  • Administering Next General firewall, firewall VPN and IDS/IPS policies
  • Recommending firewall and VPN policy standards, specific policies, and IPS blocking policies
  • Generating firewall policy/ruleset reports, identifying outdated policies/rules and making risk recommendations
  • Participate in Change Control Board reviews of proposed firewall policy changes to determine potential risks and make risk and risk mitigation recommendations to meet business requirements
  • Reviewing firewall/IDS logs and firewall/IDS log monitoring reports from the Security Operations Center (SOC) for malicious activity or incidents
  • Review network vulnerability scan reports for risks, making remediation recommendations and taking actions to configure network security systems to address threats and risks
  • Working with the IT Group network engineers to evaluate network architecture risks, firewall, VPN and Network IDS/IPS architecture practices, and network vulnerabilities; determine and validate ACL requirements, and collaboratively improve network security configuration
  • Support security incident identification, response and resolution including after hours, weekend and holidays response such as urgent firewall rule changes, IPS signature blocking and zero-day IDS signature updates
  • Provides network security design recommendations
  • Assists with risk assessment, vulnerability assessments, and continuous monitoring
  • Experience installing and administering firewall and IDS/IPS systems in enterprise networks including in Cloud environments
  • Demonstrated knowledge of network and web related protocols (i.e.: (TCP/IP, HTTP, BGP, TLS, IPSec, SSL, SSH, etc.)
  • Understanding of network authentication and authorization protocols (TCACS, Radius)
  • Experience with other protocols and security implementations
  • Experience with interpretation and application of information security policy and standards
  • Relevant security certifications such as CISSP, CompTIA Security+, CEH, GIAC certs, etc
  • Experience with Palo Alto, Cisco ASA, and SOC Firewalls/IPS/IDS and Sourcefire IDS/IPS
  • Experience with web content filtering
  • Experience working in one or more of the public cloud providers (AWS, Azure, Google) with security features such as VPC, DLPs
  • Working knowledge of mixed environment (Windows and Mac) systems
  • Systems administration, monitoring, and patching experience
  • Ability to write technical documentation and communicate effectively
  • Prior Federal contracting experience or government experience
  • Knowledge of NASA and/or DoD Information Technology, Network, and IT Security Processes
  • Knowledge/Experience with NIST Risk Management Framework
  • Knowledge/ Experience with ISO27001:2013, NIST SP 800-53 and NIST SP 800-171
  • Experience with network vulnerability scanners (e.g. Nessus)
235

Information Security Engineer Resume Examples & Samples

  • Implement appropriate technology to address risk/monitoring requirements
  • Work with IT owners to design and implement new technologies to mitigate risks
  • Work with Architects to ensure secure design of all IT initiatives
  • Maintain awareness of new technologies and trends in the security space
  • QUALIFICATIONS
  • Broad understanding of Information Security concepts
  • Familiarity with security frameworks and various compliance requirements
  • Communicate effectively through written and verbal means to co-workers and senior leadership and effectively manage multiple tasks simultaneously, coordinating and ensuring that scheduled goals are met
  • Experience with the conduct of an information security investigation and remediation
  • Experience with security technology and processes used to defend an international enterprise network
  • Experience analyzing business or technical problems and proposing and implementing solutions
  • Excellent communication skills, verbal and written and be a self-managed / self-driven individual
  • B.S. Engineering / C.S. / MIS degree highly desirable
  • CISSP/CISM/GIAC Certification highly desirable
236

Information Security Engineer Resume Examples & Samples

  • Competent in most areas of information systems security, including network application, database and physical
  • Basic business communication skills. May be required to provide clear and effective direction and guidance to less experienced staff
  • Must be able to successfully monitor systems, detect security problems and create IT solutions, including those of moderate complexity or sophistication. Ability to make recommendations to security flaws in question
  • Detail oriented and organized; able to understand information systems and ensure accuracy of work. May review the work of others and be able to detect errors or needed modifications
  • SECRET clearance required- Top Secret preferred
237

Information Security Engineer Resume Examples & Samples

  • Information Systems Security Engineer will work to ensure the completion and correctness of all Risk Management Framework assessments and documentation required for the effort, assist in the completion of DoD 8500.2, 800-53a, and other checklists as required, to ensure compliance with DHA Accreditation requirements
  • Evaluate and assess compliance with established security policies and regulations. Performs research, comments on, and edits C&A/A&A documentation based on DIACAP/RMF requirements
  • 4-7 years related experience with Bachelor’s Degree in Computer Science, Information Technology, Information Assurance, or Information Security, or 10 years related experience without degree
238

Information Security Engineer Resume Examples & Samples

  • Triage, manage, and complete service requests for the Vulnerability Assessment team including assisting in resource allocation exercise with Management. Lead daily team call to ensure all work is aligned with program goals and priorities. (50%)
  • Develop and manage vulnerability remediation processes activities across all programs of responsibility (40%)
  • Participate in regulatory audits and client audits regarding Vulnerability Assessment programs (10%)
239

Information Security Engineer Resume Examples & Samples

  • Responsible for the development of end to end security monitoring and reporting; ensuring expected controls are in place and performing as designed
  • Evaluate new and emerging threats against existing security controls; ensuring controls remain effective to changing business and threat landscapes
  • Develop process and capabilities to identify systems and data not protected by standard security controls and apply mitigations and protections
  • Build threat and data models to define trust boundaries to drive risk management and security control decisions
  • Enhance and manage CAA’s vendor risk assessment program for responding to and inquiring on 3rd party security compliance and capabilities
  • Play an active role in CAA’s security incident response efforts, working to identify and mitigate information security threats
  • A minimum of 5 years’ experience delivering information security solutions, ideally with a mixed focus on infrastructure and development projects and services
  • A Bachelor’s or Master’s Degree in a relevant field of work
  • Experience scripting in at least one of the following languages: PowerShell, Python, JavaScript
  • A strong understanding of the fundamental operations of servers, operating systems, networks and cloud applications and infrastructure and an expert understanding of the key controls required for secure operation of these systems
  • Demonstrated an organized and methodical approach to making improvements on past organizations security programs
  • Has designed and maintained controls to support the secure delivery of applications through continuous development and continuous integration processes
  • Has built and managed frameworks to test and validate the effective operation of security controls; measuring the ability to stop threats and attacks at the earliest point in the kill chain
  • A deep familiarity with the secure software development lifecycle
240

Information Security Engineer Resume Examples & Samples

  • Scope and execute projects for improving and/or increasing adoption of directory services, such as Active Directory and Ping Directory, across the enterprise
  • Contributes to establishing practices, standards and governance for effective IAM Services. Gather and analyze solution requirements that are complete and incorporates concerns such as operational quality, availability, maintainability, solution appropriateness, and adoption
  • Takes an active role in IAM portfolio by assessing and rationalizing implementation requirements for proposed enterprise capabilities. Supports the overall IAM capability road-map(s) based on a situational awareness of overall IT strategy, operational goals, critical challenges, and opportunities. Leads the implementation of selected solutions and develops recommendations based on business requirements
  • Functions as an expert resource to the business and other IT towers to answer or facilitate responses to business and technical related questions
  • Works with the business leaders, IT peers, and project team members to assess current capabilities and identify high-level requirements, and low level architecture
  • Monitors IAM processes/methodology to achieve team goals or objectives; determines and monitors process inefficiencies with resources and/or workflows and leads the process change to improve efficiency of workflows
  • Consults to support other IT teams on critical improvement initiatives and other business or technical challenges. Delivers measurable IAM/IT process improvements through these engagements
  • Standardize and coordinate IAM service efforts in the Operations organization. Re-engineers key processes and capabilities and ensures alignment with future-state vision
  • Leads and mentors other cross functional team members in the development of technical engineer and analyst deliverables, understanding industry best practices/standards
  • Engineering or other technical degree along with direct and current experience with multiple IAM technologies: SailPoint IIQ, CyberArk, SSO, Ping Federate, Ping Access, Active Directory, RACF, Digital Certificates, Certificate Authority. Java EE and JavaScript development a strong plus. An equivalent mix of education or experience will be considered
  • 10+ years' experience with 5+ years gained within financial services/insurance industry, or consulting firms; in depth knowledge of stated industry, of technology, and of process, such as cross-functional processes for major operational areas, project management, vendor management and solution delivery life cycle
  • Business minded and strategic thinking in order to define practical solutions that align with technical strategy
  • A broad view of business issues and strong degree of appreciation for strategy, tactical, processes, and capabilities
  • Strong process analysis and modeling skills along with direct experience converting business requirement into action oriented technical objectives and measurable results
  • Ability to apply engineering principles to high level technical solutions
  • Strong communication skills and the ability to communicate appropriately at all levels of the organization; this includes written and verbal communication as well as visualizations
  • Ability to act as liaison conveying information needs and constraints to the technical team; applies equal conveyance regarding IT strategy, processes and work flow automation, program initiatives, IT initiatives, benefit realization, and service delivery
  • Team player able to work effectively at all levels of an organization with the ability to influence others and move toward consensus
  • Strong situational analysis and decision-making abilities
  • Ability to think creatively and to drive innovation
241

Information Security Engineer Resume Examples & Samples

  • Adept in security automation for repeatable tasks
  • 3 to 5 years of proven working experience of designing and engineering information security solutions
  • Knowledge of Information Security concepts and architecture elements in the area of identity and access management, cryptography, logging and monitoring
  • Basic level of understanding of security design, threat modeling and risk assessments
  • Knowledge of current development technologies (web Services, Service Oriented Architectures, emerging development architecture, such as Microservices, API, Containers etc
  • BS degree in computer science or equivalent work experience
242

Information Security Engineer Resume Examples & Samples

  • A Bachelor’s Degree in Computer Science, or other Engineering, or Technical discipline with an Information Security or Cyber Security Concentration. Advanced Degree with concentration in Information Security or Cyber Security preferred. (Technical experience in Tactical Communications may be considered in lieu of formal education.)
  • 8 years minimum experience as an Information Security Engineer or performing Information Security Engineer related activities within the last 10 years
  • 10 years of professional experience, appropriate computing environment certification, and IA WORKFORCE SYSTEM ARCHITECT AND ENGINEER (IASAE) SPECIALTY qualified in accordance with standards spelled out in DoD 8570.01-M and the Army Information Assurance(IA) Training and Certification Best Business Practice, corrected 6 Aug 2010
  • Experience with IA vulnerability scanning software tools (ACAS, Nessus and SCAP), implementing Security Implementation Guides (STIGS), familiarity with STIGViewer, and applying IAVA patches
  • Has experience creating and maintaining various security documents such as the Vulnerability Status Report (VSR), System Backup and Recovery Plans (SBRPs) and Plan of Action and Milestone (POA&M) tables
243

Information Security Engineer Resume Examples & Samples

  • 2+ years of experience with Information Assurance and Certification and Accreditation (C&A)
  • Knowledge of the DoD or the NIST IA instruction series
  • Knowledge of networking
244

Information Security Engineer Resume Examples & Samples

  • Provides security analysis and consultations services for product, system, and network designs
  • Assist in e valuation and assessment of compliance with established security policies and regulations
  • Performs research, comments on, and edits A&A documentation based on RMF requirements
245

Information Security Engineer Resume Examples & Samples

  • Ensure compliance with existing corporate security policies
  • Organize and maintain regular infrastructure monitoring and audit activities
  • Provide regular penetration tests of internal infrastructure
  • Provide regular vulnerability assessments of internal infrastructure
  • Plan and conduct regular BCP/DRP tests
  • React in a timely manner on new threats, vulnerabilities, organizational and IT changes
  • Supervise, maintain and improve incident management and forensics processes
  • Maintain Information Risk Management program network-wise
  • Keep Information Security training materials up to date and take active part in security awareness initiatives
  • Consult particular accounts on security practices
  • Communicate with customers on security incidents and security-related inquiries
  • Provide support on RFI/RFP and due diligence responses
  • 10+ years of experience in the field of IT Security
  • 5+ experience in information security risk management and governance
  • 5+ years of management experience
  • Extensive experience with Security Management Systems (ISO 27001 or similar)
  • Master's Degree in computer science/engineering or related technical or business discipline (equivalent experience required)
  • Solid understanding of telecommunication networks (Microsoft-based corporate solutions, secure software development, threat modeling, risk analysis, ethical hacking)
  • Good leadership and communication skills
246

Information Security Engineer Resume Examples & Samples

  • Demonstrated experience working with and standing up a Security Operations Center (SOC)
  • Experience operating on a Computer Incident Response Team (CIRT)
  • Proven ability to work with difficult customers and achieve ambitious goals under difficult constraints
  • Demonstrated ability to build strong and effective interpersonal working relationships
247

Information Security Engineer Resume Examples & Samples

  • Three or more years in information security architecture, assessment, networking, or control engineering
  • Technical experience in security control design and engineering including technologies such as network design, network engineering, firewalls, web proxies, user directories, IDS/IPS, operating systems, middleware, endpoint security, VPNs
  • Experience with Nmap, Netstat, Wireshark and other network related tools
248

Information Security Engineer Resume Examples & Samples

  • Participate in new product and technology evaluations to represent the interests of the WaTech Information Security Program policies and controls
  • Utilize SIEM technology to analyze disparate data sources to detect, analyze, and respond to security events and investigations, lead efforts to define requirements for configuration of alerts, dashboards, and reporting
  • Map networks to discover connected assets and maintain visibility and awareness of targets in scope for protection and remediation, lead efforts to ensure all relevant networks are being mapped
  • Conduct vulnerability scans and report results to relevant stakeholders, retest and report to provide remediation quality assurance, assist stakeholders in understanding options and exploring compensating controls where necessary
  • Advocate security and secure practices through promotion of education and awareness, lead workshops to engage stakeholders for a "deep dive" on hot topics
  • Work closely with the Office of Cyber Security (OCS) SOC and CERT partners in prevention, detection, and response activities
  • Identify logging requirements and implement feeds to ensure scope of data reporting to the SIEM is appropriate for needed visibility
  • Provide requirements for design, configuration, and implementation of security focused tools and solutions
  • Conduct and participate in design review processes to provide requirements and champion changes to maintain or enhance security
  • Understanding of advanced protocols and standards, including a demonstrated ability to perform complex analysis and metrics
  • Knowledge of information security frameworks and industry regulations (NIST, PCI, HIPAA, CSC)
  • Information security certifications like CISSP, GIAC's GCED, GPEN, GWAPT, GCIH
249

Information Security Engineer Resume Examples & Samples

  • Senior Information Security Systems Engineer (ISSE) will lead and execute tasking in support of the Veterans Affairs (VA) Assessment & Authorization (A&A) process for the VBMS system
  • Ensure completion and correctness of all VA A&A Risk Management Framework assessments and documentation required for the effort. Ensure proper entry of this data into the VA GRC tool, RiskVision
  • The position requires an understanding of network security tools commonly used by the US Government and VA such as Tenable Security Center/Nessus, SCAP, and HBSS
  • The position requires a basic understanding of Service-Oriented Architectures to include web services, web applications, data models and information flow
  • The position requires a detailed understanding of the following security concepts: Quantitative Risk Assessment; Software Vulnerabilities and Weaknesses; Web Application security; configuration compliance for Windows & Linux is required, other COTS products desired (Apache Web Server, Weblogic Application Server, Oracle Database, Java Runtime Environments); Threat Modeling to include awareness and analysis of emergent threats; and Network Security
  • Significant written and verbal communication is required for this role, including risk assessments, compliance analysis reports, executive summaries of cyber threats, formal and informational briefings to CACI and VA Enterprise Program Management Office (EPMO) professional staff
  • Collaborate with VBMS System Administrators, Architects and Developers on a regular basis
  • 5-8 years related experience with Bachelor’s Degree in Computer Science, Information Technology, Information Assurance, or Information Security, or 10+ years related experience without degree. Some experience in a Team Leadership or Management Role is desired
250

Information Security Engineer Resume Examples & Samples

  • Lead corporate initiative towards GRC certification
  • Assist business units with implementation of controls
  • Engage with auditors during audits
  • Lead initiatives to raise security posture tied to audit findings
  • Research alternatives and solutions and provide recommendations to audit findings
  • Track and report to management on initiative status
  • Develop / maintain / promote security policies