Information Security Lead Resume Samples

4.5 (102 votes) for Information Security Lead Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the information security lead job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
LF
L Feeney
Linnea
Feeney
52515 Ondricka Lane
San Francisco
CA
+1 (555) 627 0147
52515 Ondricka Lane
San Francisco
CA
Phone
p +1 (555) 627 0147
Experience Experience
Houston, TX
Information Security Lead
Houston, TX
Prosacco Group
Houston, TX
Information Security Lead
  • Maintain SIEM/log analysis solution, including data collection, aggregations, and regular exception reporting
  • Monitor and distribute security notifications in adherence with the established notification/security information sharing protocols
  • Track and monitor upcoming feature releases, product changes and enhancements
  • Utilizing reports and other tools and processes, perform security and device trend analysis
  • Provide training and education to internal teams on IS security risks and measures
  • Monitor, detect, identify, triage, track and resolve information security incidents received through various sensor sources and reporting channels
  • Driving the development, deployment and implementation of global security roadmaps and standardization
Phoenix, AZ
Information Security Lead-soc
Phoenix, AZ
Cartwright, Crona and Welch
Phoenix, AZ
Information Security Lead-soc
  • Provide team and thought leadership, including to help set policy/procedures and to act as a mentor to more junior members of the team
  • Ensure the SOC analyst team is providing excellent customer service and support
  • Influence and improve upon existing processes through innovation and operational change
  • Investigate network traffic for potential security incidents using
  • Evaluate existing technical capabilities and systems and identify opportunities for improvement
  • Perform incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts
  • Compile detailed investigation and analysis reports for internal SOC consumption and delivery to management
present
Dallas, TX
Business Information Security Lead
Dallas, TX
Swaniawski-Rolfson
present
Dallas, TX
Business Information Security Lead
present
  • Leads IT process owners in the creation and maintenance of IT policies and procedures to support information assurance and regulatory compliance activities, by providing input on control objectives and activities
  • Reports to IT-GRC head, with additional reporting line (to include formal objectives, mid-year review, and year-end review) to RJ Bank/RJ Trust management
  • Provides reporting to RJ Bank/RJ Trust senior management on IS metrics and performance
  • Primary point of escalation for RJ Bank/RJ Trust into the IT functions including SLA/RACI activities
  • Advises process owners on design and implementation of IT controls (manual and automated) into processes and systems using knowledge of risks and RJ Bank/RJ Trust objectives
  • Monitor initial and on-going IT remediation activities. Evaluate results with the business unit risk manager and information owners to determine action steps to address gaps or acceptance of risk
  • Maintains a security awareness program for RJ Bank/RJ Trust
Education Education
Bachelor’s Degree in Business
Bachelor’s Degree in Business
Michigan State University
Bachelor’s Degree in Business
Skills Skills
  • Ability to navigate the big picture yet keen attention to details, accuracy and timeliness
  • Excellent verbal and written communication and interpersonal skills
  • Strong multi-tasking skills in a fast paced environment
  • Strong analytical and problem solving skills
  • Strong team player
  • Ability to work effectively with people at various levels throughout the organization
  • Excellent communication skills, both oral and written
  • Ability to tailor communication style and content effectively dependent upon audience
  • Excellent verbal and written communications and clarity. Practiced in preparing and delivering presentations
  • Proven strategic thinking aptitude and problem-solving skills. Ability to collaborate with senior management
Create a Resume in Minutes

15 Information Security Lead resume templates

1

IT Enterprise Information Security Lead Architect Resume Examples & Samples

  • Lead the planning, creation and management of security architecture, components, policies and standards for all applicable platforms and environments to influence CIS and IT Services decision making
  • Lead development of system security context and preliminary system security concept of operations and define baseline system security requirements in accordance with applicable regulations and standards
  • Demonstrate comprehensive experience and skill in Information Security (InfoSec) technology and practices necessary to negotiate and persuade technology direction on security principals and tenets such as confidentiality, integrity, availability, authentication and non-repudiation
  • Document reference architectures, patterns, templates, and roadmaps
  • Create/maintains domain specific strategies aligned with business drivers and higher level strategies
  • Exhibit a thorough understanding of existing and future CIS technology direction
  • Participate in the IT planning process and take ownership to ensure CIS architectural designs and principles are incorporated in enterprise implementations across peer and LOB groups
  • Maintain awareness of business issues and needed capabilities, aligning with existing and new Information Security industry technologies
  • Establish strong relationships with key technology stakeholders and create convergence by demonstrating credibility, empathy and expertise on business and technical issues. Facilitate, communicate, collaborate, and persuade others in the definition, adoption and implementation of a coherent architecture
  • Bachelor’s degree in Business, Management, MIS-related field, or equivalent education and related training
  • Twelve years of progressively responsible leadership experience in Information Security
  • Comprehensive experience in network security architecture, including design tools, methods, and techniques and the application of Defense-in-Depth principles; knowledge of network design processes, including understanding of security objectives, operational objectives and tradeoffs
  • Thorough knowledge of The Open Group Architecture Framework (TOGAF), including infrastructure, data, information security, applications, architectural concepts, and associated disciplines
  • Mainframe security, including access control, monitoring, integration with non-mainframe technologies, and virtualization
  • Authentication and authorization technologies including remote access
  • Application security and the security development lifecycle and ability to apply to client-server and web-based application development environments
  • Enterprise databases and database security, including database activity monitoring and database access control technologies
  • Encryption methods and technologies for data-in-transit and data-at-rest scenarios
  • Incident response processes
  • Denial of Service prevention mechanisms
  • Firewall technologies and intrusion prevention methods
  • Cloud technologies and hosting
  • Operating system hardening
  • Virtualization technologies
  • Mobile technologies
  • Encryption and key management technologies
  • Malware protection
  • Data Loss Protection technologies
  • Experience with peripheral component interconnect and other security audit processes, evidence gathering and development/management of remediation plans used in resolution of findings
  • Ability to translate technical concepts into business and capability terminology
  • Demonstriated effective verbal and written communication and presentation skills
  • Demonstrated proficiency in basic computer applications, such as Microsoft Office software products
  • Ability to travel, occasionally overnight
  • Information security and control certifications (e.g. CISSP, ISSAP, CSSLP)
2

Cyber Information Security Lead Risk Analyst Resume Examples & Samples

  • Work with peers in GIS, Architecture & Product Management, Execution & Engineering, Infrastructure & Operations, and IT Compliance & Controls to identify and adjudicate InfoSec risks
  • Conduct tabletop, lightweight, and detailed risk assessments using CME Group’s established InfoSec risk management method and instrumentation
  • Collaboratively author and edit various risk-related documents including Risk Profiles, Risk Advisory Memos, Risk Acceptance Memos, exceptions and exemptions from GIS technical policies and standards, and other related output resulting from risk adjudication activities
  • Participate in and contribute to various working groups across the Technology Division including but not limited to the Enterprise Architecture Board, various change advisory boards, Identity & Access Management working group, Data Protection working group, etc
  • Assist the E.D. of GIS Risk Management and Manager, Risk Analyst with
  • Minimum of 2-4 years of experience in publicly traded companies or finance/technology industry operations; OR minimum 2-4 years as a consultant to such companies at a commensurate level
  • Experience in at least two of the following: InfoSec (Operations, Program Management, Governance, Risk Management, etc.), Enterprise Architecture, Identity & Access Management, Application Development, Infrastructure & Operations, IT Compliance, or Internal Audit
  • Demonstrable knowledge of a broad range InfoSec technologies and practices
  • Experience with recommending, implementing, or operating GRC solutions
3

Business Information Security Lead Resume Examples & Samples

  • Provides guidance and subject matter expertise to RJ Bank/RJ Trust and business technology manager for regulations related to information security, RJ Bank/RJ Trust technology requirements and industry best practices
  • Leads IT process owners in the creation and maintenance of IT policies and procedures to support information assurance and regulatory compliance activities, by providing input on control objectives and activities
  • Reports to IT-GRC head, with additional reporting line (to include formal objectives, mid-year review, and year-end review) to RJ Bank/RJ Trust management
  • Provides reporting to RJ Bank/RJ Trust senior management on IS metrics and performance
  • Primary point of escalation for RJ Bank/RJ Trust into the IT functions including SLA/RACI activities
  • Advises process owners on design and implementation of IT controls (manual and automated) into processes and systems using knowledge of risks and RJ Bank/RJ Trust objectives
  • Monitor initial and on-going IT remediation activities. Evaluate results with the business unit risk manager and information owners to determine action steps to address gaps or acceptance of risk
  • Maintains a security awareness program for RJ Bank/RJ Trust
  • Identifies, implements, and maintains processes and tools to support assurance, compliance, and remediation tracking activities (e.g., testing, maintenance of controls documentation)
  • Collaborate with cyber risk threat team to assess ongoing potential threats and vulnerabilities that may impact significant third party hosted applications or solutions that house sensitive RJ Bank/RJ Trust customer information
  • Maintains IT controls-related documentation (e.g., narratives, process flows, RCM) for simple to complex information systems in support of information assurance and compliance activities
  • Seeks understanding of risks and procedures sufficient to understand the reasons for tasks being performed
  • Serves as an information risk and control advisor, participating in IT processes and activities (e.g., planning, systems development and product selection, etc.)
  • Consults on RJ Bank/RJ Trust projects to ensure secure design
  • Maintains the IT risk lifecycle
  • Develops and uses basic interview techniques and participates in facilitated risk identification sessions
  • Analyzes controls for adequacy of design and performs and/or supports control assurance testing activities
  • Works closely with internal and external auditors, regulators, and examiners, including coordination and compilation of technology documentation requests, reports, and assurance letters to ensure IT compliance
  • Minimum of a B.S. in Computer Science, MIS or related degree and seven (7) years of related experience in banking information security, information technology, risk management, auditing or combination of education, training and experience
  • Experience within a highly regulated banking environment
  • Certified Information Systems Security Professional (CISSP) or Certified Information Systems Auditor (CISA), or ability to obtain within eighteen (18) months after hire is required
  • Knowledge of the following highly preferred
  • IT controls and risks sufficient to identify and evaluate control effectiveness and identify gaps between risks and controls
  • Recognized IT control frameworks and standards (e.g., COBIT, ITIL, and ISO 17799)
  • Accepted industry audit and control standards (e.g., AICPA, ISACA)
  • State and federal information protection and control-related legislation (e.g., GLBA, SOXA 404, FFIEC, PCI, Privacy, HIPAA, etc.)
  • Technical skills and proficiency in a wide array of platforms and systems (e.g., Windows, UNIX, SQL, Tandem)
4

Information Security Lead Resume Examples & Samples

  • Lead off-shore and or third party security resources
  • Conduct vulnerability scans with various tools including RAPID7 NEXPOSE, Nessus Vulnerability Scanner, MetaSploit, AppScan, etc
  • Review and analyze alerts and logs from Firewalls (FW), Intrusion Prevention Systems (IPS), Antivirus (AV), and other security threat data sources
  • Maintain SIEM/log analysis solution, including data collection, aggregations, and regular exception reporting
  • Analyze and or escalate security threats found internally or via Managed Security Service Providers
  • Monitor and distribute security notifications in adherence with the established notification/security information sharing protocols
  • Assists with review of Network, System, and Application vulnerability scan alerts and reports
  • Work closely with IT and Business teams to identify security vulnerabilities, follow-up on outstanding findings, document new or updated technology infrastructure elements, etc
  • Assist with formulation and distribution of Information Security Metrics and Event Reports
  • 5+ years of experience in Information Security
  • CISSP, CISA, or CISM certifications preferred
  • Experience with industry standard frameworks, best practices, and compliance regulations (ISO, NIST, PCI, SOX, etc.)
  • Experience with vulnerability scanners and web application testing tools such as Nessus, Nmap, NEXPOSE, Metasploit, Wireshark, IBM AppScan, etc
  • Knowledge of network security, current information security threats and incident management concepts and practices
  • Hands-on experiencing with implementing secure guidelines on various Network Technologies, Database systems, and Operating Systems including Microsoft Windows Server, Red Hat Linux, and IBM AIX
  • Familiarity with eDiscovery and digital forensics
  • Strong multi-tasking skills in a fast paced environment
  • Thorough understanding of the TCP/IP suite
  • Strong team player
  • Excellent verbal and written communication and interpersonal skills
5

Information Security Lead Resume Examples & Samples

  • Recognized cyber security expert with 2+ years of relevant experience
  • Experience with cybersecurity at SOC (strongly preferred)
  • Strong quantitative analysis skills
  • Ability to work independently and deliver as a part of the team towards business goals
6

Information Security Lead Resume Examples & Samples

  • The purpose of this role is to design and implement Atkins Information Security Programs and policies across all Technical Services in all regions; providing Information security guidance, expertise and functional execution for Technical Services, aligned with our Atkins 2020 agenda
  • The job holder will ensure the delivery of IT security as a coherent and proactive practice across all Atkins services, guaranteeing it is not considered a ‘check box exercise&#8217
  • The Information Security Lead is responsible for the following activities
  • Driving the development, deployment and implementation of global security roadmaps and standardization
  • Partner with, and support, business functions, projects, and initiatives through continuous direct engagement and collaboration with stakeholders in the regions
  • Interface with outsourced providers, and 3rd parties, to resolve security incidents and ensure policy compliance in externally managed environments
  • Evaluate, select, recommend, and drive the implementation of required information security controls, technologies, processes, and policies to mitigate information security risks
  • Enhance and maintain cyber security position of the company, and support long-term secure business objectives across the enterprise
  • Monitor, detect, identify, triage, track and resolve information security incidents received through various sensor sources and reporting channels
  • Provide active Incident Response and investigative support
  • Lead investigation activities in partnership with Legal, HR, Business units, and other parties as required
  • Monitor the trends and changing business risk and security needs of our customers
  • Track and monitor upcoming feature releases, product changes and enhancements
  • Utilizing reports and other tools and processes, perform security and device trend analysis
  • Identify and recommend improvements in service gaps, policy and processes
  • Provide training and education to internal teams on IS security risks and measures
  • Perform Trending analysis of health, availability, threshold settings, change activity and incident activity of devices under management and work with appropriate teams to define recommendations
  • Minimum of ten years leadership experience in Information Security, IT infrastructure design and operations
  • Minimum of ten years’ experience designing and implementing information security management systems (ISMS)
  • Ten years of active internal investigations or incident response experience desirable
  • Ability to learn and adapt to changing environments while maintaining operational capability
  • Experience developing and implementing and managing information security policies, standards, and procedures
  • Previous experience in an operations, engineering within the networking, security, IT and/or telecommunications field
  • Four year university degree or college diploma in the field of computer science and/or 10 years equivalent work experience
  • Current professional certifications in Information Security. CISSP and GIAC highly desired
  • Strong foundation in information security and IT management frameworks and standards, such as ISO27000 series, COBiT, ITIL, SANS20, PCI-DSS, etc
  • Excellent communication skills, both oral and written
  • Ability to tailor communication style and content effectively dependent upon audience
  • Track record of communicating security risks and measures
  • Strong negotiation skills and Project Management skills
  • Driving security roadmap and standardisation through
  • Experience and understanding of risk management and risk mitigation activities
7

IT Information Security Lead Resume Examples & Samples

  • Build trust with internal and external clients, influencing via strategic relationships
  • Operate as a strategic thinker and ally to the business
  • Offer leadership about security execution and direction
  • Provide Information Security expertise and execution
  • Communicate with executive management to ensure support for the information security strategy and program
  • Set security strategy, utilize internal and external expertise to support the development of a suitable strategy
  • Oversee and conduct risk management activities (risk assessment, gap analysis, business impact analysis, etc.) to help the business reach an acceptable level of risk and also maintain regulatory objectives
  • Support the company to understand and define and follow an appropriate security risk appetite
  • Oversee the establishment, implementation and adherence to policies and standards that guide and support the terms of the information security strategy
  • Advise and make recommendations / implement appropriate personnel, physical and technical security controls
  • Participate in resolving problems caused by major security incidents and breaches
  • Report appropriate security metrics to executive management across the group
  • Responsible for the management of ISMS and assisting the company to maintain ISO27001 accreditation
  • Certified Information Security Systems Professional (CISSP); or Certified Institute Information Security Manager (CISM)
  • Experience building and running highly effective, flexible, security service model that protect businesses against the changing security landscape and support compliance external regulations and internal controls, such as: ISO27001 - Global security standards, PCI DSS - Payment Card Industry Data Security Standard, J-SOX - Financial Instruments and Exchange Act, DPA - Data Protection Act, FCA - Financial Conduct Authority
  • Experience of all aspects of people management, including permanent staff and contingent resource to flex the capability of security services where required
  • Good experience of managing and influencing third party suppliers
  • Building relationships with key stakeholders through the delivery of trusted services that are worth paying for
  • Experience of managing a security strategy, security budget and client relationships
8

Information Security Lead-threat Intelligence Resume Examples & Samples

  • Perform threat assessments, profile threat actors, and identify attack vectors along with developing mitigation strategies
  • Have the ability to effectively identify, evaluate and communicate new and ongoing cyber security threats to leadership through regular, and ad hoc reporting
  • Researching current threat intelligence data and make the data ready for consumption, correlation and reporting
  • Reviewing threat intelligence correlations in our SIEM and IOC platforms and make recommendations for further investigations to the SOC and/or IRT
  • Providing support to the expansion of our detection and/or blocking mechanisms
  • Maintaining and expanding existing threat intelligence feeds with internal and external
  • Strong background in several of the following areas: Application, Endpoint, System, Network Security and/or Cloud Security
  • Broad understanding of current Internet security threats and networking essentials is mandatory
  • Experience with Security operations and incident response technologies and methodologies
  • Experience with any of the industry standard SIEM solutions is recommended
  • Programming, Scripting and/or data parsing experience is a plus
  • Ability to collaborate with other teams within and outside of the GSO organization
  • Highly developed research and analytical skills
  • Readiness and capacity to innovate
  • Teamwork spirit as well as being able to operate individually when needed
9

Information Security Lead Resume Examples & Samples

  • Successful completion of a full 4-year course of study in an accredited college or university leading to a bachelor's or higher degree in a major such as computer science, information technology, or related; OR appropriate combination of education and experience
  • 6 years+ systems security or other relevant experience required
  • Demonstrated prowess in project management and change management
  • Please see specific IT capability highlighted below
  • Proven strategic thinking aptitude and problem-solving skills. Ability to collaborate with senior management
  • Demonstrated leadership vision and initiative
  • Excellent verbal and written communications and clarity. Practiced in preparing and delivering presentations
  • Ability to gather cooperation and resources from disparate parts of the organization to move an initiative forward. Sensitive to customer perspective and requirements. Diplomatic and politically savvy
  • Ability to navigate the big picture yet keen attention to details, accuracy and timeliness
  • Graduate education
  • Experience in higher education
10

Data & Information Security Lead Resume Examples & Samples

  • 2FA & PKI Infrastructure Support understanding
  • DLP Solution Implementation and maintenance Experience
  • Antivirus Management
  • Management and maintenance of D&I and EP Security Operation
  • Ensuring Infrastructure uptime
  • Incident and Change Management
  • Strong communication skills in order to drive the various operationally required communication processes with the Security Operation
  • Expertise at handling Security Operation
  • Ability to coach and mentor the team
  • Ability to handle and motivate the team
  • Experience in handling large environment
  • Good knowledge on PGP, Encryption technology
  • Good Understanding of Risk, Threat and Vulnerabilities
  • People Management Skills
  • Project Management and Delivery Experience
  • Handling customer escalation
  • 12+ years relevant experience in Security Operation which includes Data & Information Security and End Point Security
  • Proactive monitoring and contribution to service improvement area
  • Previous relevant experience of leading a team for D&I Security Operation and Endpoint Security Operation
  • B.E./B.Tech. and B.Sc. in Computer Science, MBA etc
  • Exposure to manage large environment/ Infrastructure
  • Good knowledge in D&I / EP Security products
  • Basic knowledge in Networking concept
  • Experience of global customer handling
  • A reputation for self-motivation, integrity, cultural sensitivity and strong interpersonal skills
11

Global Information Security Lead Engineer Resume Examples & Samples

  • Determine security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates
  • Plan security systems by evaluating network and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; adhering to industry standards
  • Verify security systems effectiveness by developing and implementing test scripts or utilizing enterprise security solutions
  • Maintain ongoing awareness of and continually review the continuous monitoring and protection of enterprise infrastructure and applications, solving identified problems/challenges identified as the result
  • Assist in implementation and maintaining of enterprise vulnerability management program
  • Assist in design, implementation and maintaining enterprise security event monitoring program and process
  • Facilitate the review and verification of new third-party vendors with respect to their information security policies and procedures, including administration of all global third party contracts which require security controls
  • Expectation of off-hours support, responsiveness and availability in response to security related incidents, material developments which could create risk to the Company, known threats etc
  • Minimum of eight years of information technology and/or information security experience in a corporate environment
  • Any one or more of the following preferred – CISA, CISSP
  • Prior experience with information security frameworks in relation to risk and third party reviews
12

Information Security Lead-digital Cyber Operations Resume Examples & Samples

  • Institutionalizing and enhancing new information security tools and capabilities
  • Recognizing cyber security threats and recommending course of action by monitoring Chase web and mobile channels
  • Understanding the security implications of a certain pattern, socializing, and troubleshooting it with a sense of urgency
  • Ensuring the secure availability and 100% uptime (reliability) of all Chase Digital properties
  • Documenting threats and recommended solutions in a concise manner to build a strong knowledge base
  • Liaise with other organizations within JPMC to handle IT compliance/audits/security with National and International laws and regulations, as well as contractually carry out industry standards
  • 10+ years of experience in information technology with an emphasis on information / cyber security
  • 4+ years of experience in developing, deploying and supporting commercial and custom software solutions with an emphasis on identity and access management framework, security, integration and support
  • Knowledge and practical experience with
13

TTS & SSO Western Europe Information Security Lead Resume Examples & Samples

  • Information Security Governance in Western Europe
  • Extensive years experience in Information Security and at least two 2 IS programs including, but not limited to, Audit Reviews, Risk Assessment, Awareness & Training, Identity Access & Management, Data Protection, Incident Management, Vulnerability Assessment. Knowledge of key government regulations and local laws
  • Other Risk Management activities should be as Sector or business IS SME or some risk management role
  • Minimum years experience managing people
  • Minimum one required (CISSP, CISM, or CISA)
  • Exceptional candidates who do not meet these criteria may be considered for the role provided they have the necessary skills and experience
  • The candidate will be expected to obtain an IS industry certification if not already held
  • Excellent conflict resolution skills
  • Some project management and program management skills
  • Verbal and written communication skills
  • Strong risk analysis and problem solving skills
  • Understanding of the IS risks that are inherent to a business
  • Working knowledge of the technology aspects of security
  • Program management skills
  • Strong customer service and problem solving skills
  • Excellent consulting and problem solving skills
  • Able to convey ideas to senior management and staff
  • Advanced technical knowledge
  • In depth knowledge of IS programs
  • Advanced presentation skills, program management, and relationship management skills
  • Able to work with senior business management to implement IS strategy
14

Information Security Lead Resume Examples & Samples

  • Act as a liaison to business, technology and project management in support of IAM technology initiatives
  • Optimize IAM processes and recommend solutions for improvement, automation and streamlined integration
  • Manage activities relative to the day-to-day operations of access control and authentication; determine business and technical requirements for account requests and provisioning efforts
  • Make recommendations and assist in the implementation of changes to work methods and procedures to make them more effective or to strengthen security measures
  • Research, design, and advocate new technologies, architectures and security products that will support security requirements for the enterprise and its customers, business partners, and vendors
  • Assist in the development and implementation of a company-wide Information Security training program to assure the organization’s workforce is knowledgeable of Information Security policies, practices and relevant guidance appropriate to their role in the organization
  • Strong technical knowledge required, including security operations, engineering and cyber security, endpoint protection, governance, risk and compliance, and identity management
  • Strong understanding of systems including but not limited to Windows, Unix, Linux and Virtualization technologies. Knowledge of iSeries and Cloud service technologies a plus
  • Excellent communication skills with a capacity to present, discuss and explain issues coherently and logically both in writing and verbally
  • Must be detail oriented, outgoing, can balance conflicting and changing demands through prioritization and a pragmatic approach working with all levels of corporate personnel
  • Ability to manage multiple priorities as well as flexibility to adapt to change with new systems and methods while working in a team environment
  • CISSP, CISA, and/or related certifications are preferred
  • Flexibility to travel when required
15

Information Security Lead-soc Resume Examples & Samples

  • Provide team and thought leadership, including to help set policy/procedures and to act as a mentor to more junior members of the team
  • Investigate events, alerts and tips to determine if an incident has occurred
  • Perform incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts
  • Assist and mentor less experienced analyst staff regarding analysis, investigations, and incident response
  • Evaluate existing technical capabilities and systems and identify opportunities for improvement
  • Research and test new security tools/products and make recommendations of tools to be implemented in the SOC environment
  • Maintain strong standards, and promote productivity, accountability and high morale
  • 10+ years of SOC or MSSP experience with at least 3 year in an in-depth technical role
  • 4+ years of SIEM experience – with knowledge of content creation (rules, alerts, etc.)
  • Experience with packet capture and analysis (tcpdump/windump, Wireshark, etc.)
  • Experience with host and network forensics
  • Strong understanding of root causes of malware infections and proactive mitigation
  • Ability to mentor and coach less experienced security analysts. Providing techniques and strategies to dig deeper into investigations
16

Cyber & Information Security Lead Resume Examples & Samples

  • 5+ years of Information Security analysis experience
  • Bachelor's degree in a technical discipline or equivalent experience
  • Previous supervisory experience of Information Technology/Security professionals is preferred
  • Knowledge of Risk Management Framework and of Security Best Practices such as NIST
  • Strong Windows and Linux background
  • In depth knowledge of Security Industry Best Practices
  • Scripting experience, including any of Shell, PowerShell, Python or Perl
  • Written and verbal English communication skills
  • Experience with Layer 7 Web application Firewall (WAF)
  • Experience with database information security controls
  • Knowledge of web application security
  • Knowledge of security architectural concepts and frameworks
  • Any Information Security certification is a plus!
  • Will abide by departmental policies and procedures, including authority levels, to comply with C&F's risk management controls
17

Information Security Lead Resume Examples & Samples

  • Masters or Bachelor's degree in computer science, computer engineering or related field and 5-7+ years of experience as an IT professional
  • 5-7+ years of information technology, IT project/program management, or IT security related background
  • CISSP, CISM, GIAC, OSCP or working toward security certifications is preferred
18

Risk & Information Security Lead Resume Examples & Samples

  • Execute risk identification, quantification, and management efforts related to the technology organization
  • Provide risk evaluation and assessment of likelihood and impact of findings, vulnerabilities and exceptions
  • Build a network of relationships throughout the organization that can be leveraged to accomplish the broad requirements of this position
  • Track and ensure timely remediation of issues / findings
  • Understanding of basic business, finance and management concepts with the willingness to expand in this area as a core aspect of the role
  • Advanced degree in actuarial sciences mathematics, statistics or business
  • Proven risk management and control experience
  • Current professional certification (i.e., CISSP, CRISC or CISA)
19

Enterprise Information Security Lead Architect Resume Examples & Samples

  • Provide thought leadership in new technology innovation, incubation, introduction and implementation critical to the CIS roadmap and BB&T’s success. Build roadmap for acquiring, integrating, and implementing high-value technology and processes. Oversee efforts (e.g. proof of concepts) to measure and prove new technology value
  • Ensure that all acquired or developed security systems and security architectures integrate with enterprise security architecture
  • Ensure security product lifecycles are managed proactively
  • Create/maintain domain specific strategies aligned with business drivers and higher level strategies
  • Document design specifications, installation instructions and other system security-related information
  • Evaluate existing or emerging technologies to consider factors such as cost, security, compatibility and usability
  • Participate in the IT planning process and take ownership to ensure CIS architectural designs and principles are incorporated in enterprise implementations across peer and line of business (LOB) groups
  • Establish strong relationships with key technology stakeholders and create convergence by demonstrating credibility, empathy and expertise on business and technical issues. Facilitate, communicate, collaborate and persuade others in the definition, adoption and implementation of a coherent architecture
  • Bachelor’s degree in Business, Management, Management Information Systems-related field, or equivalent education and related training
  • Comprehensive experience in network security architecture, including design tools, methods and techniques, and the application of Defense-in-Depth principles; knowledge of network design processes, including understanding of security objectives, operational objectives and tradeoffs
  • Knowledge of risk management processes, including steps and methods for assessing risk
  • Demonstrated comprehensive experience and skill in Information Security technology and practices necessary to negotiate and persuade technology direction on security principals and tenets such as confidentiality, integrity, availability, authentication and non-repudiation
  • Exceptional collaboration ability; substantial experience as a senior-level negotiator
  • Demonstrated effective verbal and written communication and presentation skills
  • Master’s degree
  • Information security and control certifications (e.g. Certified Information Systems Security Professional (CISSP), Information Systems Security Architecture Professional (ISSAP), Certified Secure Software Lifecycle Professional (CSSLP))
20

Information Security Lead-pm Resume Examples & Samples

  • Manage IT Audit engagements for internal and external audit reviews including coordination of the capture, review, and storage of evidence/deliverables and generating high quality audit reports
  • Plan and perform reviews of IT general and application controls
  • Validate accuracy of control narratives (PCI, SOX, NIST, GLBA) and to the degree they are followed with strategic recommendations
  • Analyze findings, formulate opinions, develop recommendations, and participate in the audit report preparation and management presentations?
  • Maintain a high level of knowledge of current cyber security frameworks, leading practices, technologies, techniques, and tools for risk assessments
  • Strong analytical, time management, problem solving, and decision making ability; Acquire and maintain security appliances & application software
  • Manage technical performances and technology aspects of projects (setting standards, directing and monitoring activities for on and off-shore teams)
  • Produce key PMO deliverables that synthesize detailed analytical work into meaningful senior-level business reports and presentations
  • Responsible for budgeting, scheduling, staffing, and service orientation
  • Provide continuous closed loop communication on the status of all implementation milestones, bottlenecks, contingencies and risk analysis
  • Strengthen digital information security and safeguard communications systems; fortify the security eco-system to answer how, when, what & how
  • Implement Security Analytics capabilities to block cyber-attacks at multiple points in the attack chain and protect against comprised credentials
  • Secure organizations to streamline compliance and operations, build trust with customers and boost reputations; improve incident response / forensics
  • Strong project planning skills: establishing project scope and objectives while ensuring successful delivery within constraints of budget, quality, timeliness, and accuracy; Manage third-party services
  • High-level technical professional analysis of software life cycle: requirements definition, design, implementation, integration, testing, staging, production, and operations; Identify automated solutions
  • Emphasize communication, collaboration and integration between software developers, data and IT operations; improve quality of SW deployments