Information Security Principal Resume Samples

4.5 (116 votes) for Information Security Principal Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the information security principal job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
NH
N Hickle
Nora
Hickle
7218 Purdy Pines
San Francisco
CA
+1 (555) 921 2710
7218 Purdy Pines
San Francisco
CA
Phone
p +1 (555) 921 2710
Experience Experience
Dallas, TX
Principal Information Security Engineer
Dallas, TX
Heller-Conroy
Dallas, TX
Principal Information Security Engineer
  • Define, plan, design, and evaluate information security systems and architecture
  • Conduct certification testing and reporting in accordance with the Risk Management Framework (RMF) and NIST 800-53; identifies deficiencies (POA&M) and provides recommendations for solutions
  • Participate in the change management process, and assesses security impact of proposed changes
  • Create and maintains existing information system security documentation, including SSP, SCTM, Security Configuration Guide
  • Write implementation and design documents describing how security features are implemented
  • CISSP, Security+ CE, or DoD 8570.1 certification (IAT Level II, IAM level II, IASAE Level II)
  • Define, plan, design, and evaluate information security systems and architecture with the following projects
Los Angeles, CA
Principal Information Security Solutions Engineer
Los Angeles, CA
Satterfield LLC
Los Angeles, CA
Principal Information Security Solutions Engineer
  • Perform essential sizing, tuning and configuration, and recommend solution best practices
  • Helping to identify new opportunities, collaborating with sales peers to qualify opportunities, and driving the technical close process on all relevant Security solutions
  • Collaboratively develop and articulate an end­to­end solution design, inclusive of consulting, support and education
  • Provide focused leadership across technology area to drive initiatives with virtual teams in Area
  • Function as the technical lead in the development of responses to RFIs and RFPs
  • Identify and execute assessment­led selling opportunities
  • Provide customer with complete solution designs which may include 3rd­party products
present
Dallas, TX
Senior Principal Information Security Engineer
Dallas, TX
Jast-Becker
present
Dallas, TX
Senior Principal Information Security Engineer
present
  • Working knowledge security framework models such as ISO 27002, SANS Top 20 CSCs, NIST, etc
  • Proficient oral and written communication to effectively communicate technical issues to IT and Business management
  • Participates in all aspects of IT Security to include such areas as standard security technologies (firewall, antivirus, antimalware, authentication methods, IPS/IDS, encryption), incident response, policy creation and enforcement, assessing security vulnerabilities and proposing solutions, and ensuring business critical applications are deployed and maintained in a secure manner
  • Participate in re-architecture plans of existing network infrastructure, network design reviews, and provide security recommendations for network security solutions, products, controls, and sensors
  • Solid knowledge of security and network policies and procedures
  • Ensures security technologies are implemented and managed including hands-on technical expertise (IDS/IPS, Endpoint Protection, Encryption)
  • Expert knowledge of network security principles, cloud infrastructure and applications, TCP/IP, security protocols such at TLS, IPSec, SSH, and network services such as DNS, SMTP, HTTPS
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of Oregon
Bachelor’s Degree in Computer Science
Skills Skills
  • Possess excellent interpersonal, verbal and written skills: ability to clearly and concisely articulate issues, alternatives, and recommendations
  • Flexible, adaptable, and able to manage multiple tasks in a dynamic, high-pressure, fast-paced environment
  • Proven troubleshooting skills and ability to understand complex relationships between components of multi-tiered and distributed systems related to directory services
  • Experience implementing the Health Insurance Portability and Accountability Act of 1996 Privacy Rule
  • Self-driven and be able to work independently with minimal supervision
  • CISSP (Certified Information Systems Security Professional)
  • ITIL Foundations knowledge
  • PMP (Project Management Professional),
  • Available for off-hours escalations as 2nd and 3rd tier of on-call support
  • Knowledge of standard audit procedures; and
Create a Resume in Minutes

15 Information Security Principal resume templates

1

Information Security IT Audit Principal Resume Examples & Samples

  • Assess the enterprise information system by reviewing the strategy, standards, guidelines, practices, and control environment that manage and reduce risks while providing great customer experiences
  • Work collaboratively and independently with Information Security to identify challenges, problems, and provide lessons learned to build stronger and improved governance, practices, and controls
  • Build collaborative working relationships with Privacy, Information Security, Regulators, External Auditors, and other key business and technology stakeholders
  • Determine ways to recommend or advise security improvements by assessing current situation; evaluating threat trends; anticipating new information security requirements; and providing cost benefit solutions
  • Assess enterprise wide information security using appropriate frameworks such as NIST, ISO 27001, Visa PIN Security Requirements, FFIEC IT Examination, and PCI DSS as a strategy to identify, perform, and report to leadership and appropriate stake holders current risks and control effectiveness
  • Perform and document Internal Audit assurance work and advisory projects using IIA Standards and the TeamMate Repository
  • Keep users informed by preparing timely status reports; communicating preliminary findings, and recommending cost effective Management Action Plans. Request user feedback using quality survey and other means to obtain performance feedback to learn and improve our audit process
  • Maintain quality service by following IIA Standards, and the Department Operating Manual
  • Maintain technical knowledge by attending appropriate educational workshops; reviewing publications; and developing a network of reliable specialists to share appropriate information and lessons learned
  • Contribute to team knowledge by training and sharing best information security intelligence and practices with other Internal Audit Team members
2

Information Security Principal Resume Examples & Samples

  • Direct responsibility for engineering activities such as
  • Proven troubleshooting skills and ability to understand a very complex environment
  • Possess excellent interpersonal, verbal and written skills: ability to clearly and concisely articulate issues, alternatives, and recommendations
  • Flexible, adaptable, and able to manage multiple tasks in a dynamic, high-pressure, fast-paced environment
  • Must possess good time management skills and ability to prioritize tasks effectively
  • Self-driven and be able to work independently with minimal supervision or as a team member on multiple projects
  • Must be able to excel in a multi-tasked environment
  • Experience in a user-focused technical-support environment
  • Bachelor's degree (B.S./B.A.) in Computer Science, Business Information Systems, or related field is desired
  • Available for off-hours escalations on-call support and patching activities
  • Little to no travel required (< 10%)
3

Information Security Principal Resume Examples & Samples

  • Work with internal staff to enforce corporate information security policy and procedures by providing assistance in applying security standards to projects
  • Develop new processes, streamline existing processes, and implement and administer security software solutions
  • Act as a Subject Matter Expert (SME) in support of business units undergoing an audit
  • Work with Audit and Compliance Team (ACT) for various audit related activities to address requests from internal and external auditors on Xerox security controls
  • Produce metric and status reports as requested
  • Display constant curiosity on new tools or methods to improve security posture
  • Stay abreast of emerging industry security trends and threats to help proactively improve the security position of Xerox and increase the efficiency of security operations
  • Respond and/or participate as necessary to security events and incident response
  • Participate in continuous information security skills development/training
  • Perform other duties as identified Requirements for Hire
  • Critical thinking skills: a depth of network architecture and system experience to confidently and creatively challenge the status quo
  • Absolute attention to detail
  • Strong English language skills both written and verbal
  • Knowledge of remote access technologies and secure implementation thereof
  • Knowledge of identity management strategy, techniques, and technologies
  • 5 year’s full-time experience in information technology security, including experience or training in secure infrastructure architecture and server and network appliance O/S configuration
  • Prior experience with relevant security standards and best practices such as NIST, PCI DSS, ISO/IEC 27000-series, and SSAE 16
4

Information Security Engineer Principal Resume Examples & Samples

  • Responsible for the daily management, coaching, and leadership of the Cyber Security Engineering Team to include hiring, performance evaluation, corrective disciplinary action, and project oversight
  • As a member of the Incident Response Team, lead the response, and report on cyber security incidents, providing initial assessment of impact, severity and type of incidents being addressed according to documented procedures and guidelines. Assesses the impact on the business unit/customer caused by theft, destruction, alteration or denial of access to information and reports to senior management
  • Responsible for identifying security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives
  • Provides technical support in the development, testing and operation of firewalls, intrusion detection systems, enterprise anti-virus and software deployment tools
  • Conducts complex security architecture analysis to evaluate and mitigate issues
  • Develops complex technical and programmatic assessments, evaluates engineering and integration initiatives and provides complex technical support to assess security policies, standards and guidelines
  • Manage and establish clearly defined programs for: Risk assessments including system, network and applications including penetration testing; System and network hardening; Intrusion detection systems; File integrity checks; Endpoint Security; Secure Application Development; Database security; PKI and encryption; Malware, Anti-virus implementation; Security in a virtual environment; Log and event monitoring; Incident response processes and Firewalls
  • Research new Cyber Security technologies and serve as the liaison between Cyber Security, vendors and the network architect to develop a security roadmap for the Institute. Perform highly complex product evaluations, recommend and implement products/services for security. Validate and test complex security architecture and design solutions to produce detailed engineering specifications with recommended vendor technologies
  • Education:A Bachelors Degree in Computer Science or related field or equivalent combination of experience and education
  • Work Experience:Three or more years job related experience
  • Certifications:CISSP and one or more additional cyber security certifications
  • Skills:This job requires demonstrated initiative and success in providing Cyber Security services, preferably in a university setting; excellent knowledge of Cyber Security principles and practices, Cyber Security methodologies and concepts, such as identification and authentication, access control; experience with Firewall, Anti-Spam, Anti-Virus, Intrusion Detection and Vulnerability Management systems; knowledge of Windows, Macintosh, Linux, and Unix operating systems; a sound understanding of LDAP, Network architectures, Active Directory, and Group Policy Objects; detailed knowledge of TCP/IP and infrastructure related protocols; experience with data encryption technologies; must be able to obtain a security clearance
  • Preferred Work Experience:Two years incident response and digital forensics experience. Experience supporting and/or using
5

IT Corporate Information Security Cyber Threat Principal Analyst Resume Examples & Samples

  • Lead cyber investigations for escalated, complex computer security incidents using computer forensics, network forensics, root cause analysis and malware analysis
  • Develop tactical and strategic cyber intelligence by acquiring threat intelligence and technical indicators from external and internal sources
  • Engage in threat hunting activities to proactively search for threats in the enterprise environment
  • Create and maintain use cases for recurring investigation/incident triggers in support of the 24/7 Cyber Threat Operations and Cyber Threat Management program
  • Create and maintain playbooks used in response for investigation/incident triggers in support of 24/7 Cyber Threat Operations and Cyber Threat Management program
  • Guide security strategy through interaction with and direction to, when necessary, other teams in Information Security (e.g. network operations, Cyber Threat Operations Center (CTOC), vulnerability management) along with information and liability risk officers and technology management
  • Aid team members for enhancement and enrichment of security monitoring tools with contextual information
  • Deliver expert cyber intelligence services and material to information technology and business leaders
  • Prepare appropriate threat intelligence content for customer and executive presentations
  • Provide mentoring for junior level analysts and specialists
  • Adhere to all policies and standards, as well as regulatory requirements regarding reporting and escalations
  • Bachelor’s degree in Computer Science or related field, or equivalent education and related training
  • Broad knowledge of general IT with mastery of two or more of the following areas: operating systems, networking, computer programing, web development or database administration
  • Demonstrated advanced knowledge of cyber security operations with master of two or more of the following: attack surface management, Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider), vulnerabilities, and exploits; incident response, investigations and remediation
  • Demonstrated experience with systems for automated threat intelligence sharing using industry standard protocols such as Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indication Information (TAXII)
  • Advanced knowledge of processes, procedures and methods to research, analyze, and disseminate threat intelligence information
  • Ongoing passion for learning about information security through self-education
  • Ability to formulate, lead and persuade individuals, large teams and communities on ideas, concepts, and opportunities
  • Critical thinking and problem solving skills
  • Industry certifications in general technology (e.g. Microsoft Certified Professional (MCP), Microsoft Certified Solutions Expert (MCSE), Network+)
  • Industry certifications in cyber security and forensics, such as Certified Information Systems Security Professional (CISSP), Certified Forensic Computer Examiner (CFCE), GIAC Certified Forensic Examiner (GCFE), GIAC Certified Forensic Analyst (GCFA), GIAC Certified Incident Handler (GCIH) and other related credentials
  • Experience in the Intelligence Community (IC)
6

Senior Principal Information Security Resume Examples & Samples

  • Lead the continual development and implementation of an innovative and progressive PCI Compliance program
  • Oversee completion of PCI compliance activities and drive the ongoing evaluation of compliance readiness to proactively address potential issues
  • Plan and execute an efficient and effective roll-out of the PCI Compliance program. The program will span all enterprise processes and regions
  • Ensure proper communication of identified risks as input into annual risk assessment program
  • Participate in the development of the initial ERM analysis
  • Analyze results to appropriately assess risks and provide appropriate recommendations for corrective action
  • Use a consultative approach to identify opportunities for improvement
  • Proven track record of being a change agent, even in the face of resistance
  • Experience as a lead who identifies and resolves issues and directs and influences others
  • Experience with global outsourcer (general IT or security services)
  • 3+ years in risk management/PCI assessments
  • Mature understanding of PCI DSS Certificates, Licenses, and/or Registrations
  • Familiarity with Archer
  • Knowledge of Sabre and Sabre systems
7

Principal Information System Security Specialist Resume Examples & Samples

  • Implementing appropriate NIST Risk Management Framework technical security for new and existing information systems
  • Ensuring new information system solutions and existing information systems receive Authority to Operate according to RMF
  • Ensuring systems are operated, maintained, and disposed of in accordance with internal security policies and practices outlined in the System Security Plan (SSP)
  • Ensuring that all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the information system
  • Reporting all security-related incidents via appropriate channels
  • Initiating protective or corrective measures when a security incident or vulnerability is discovered
  • Developing and maintaining an SSP for each information system
  • Conducting periodic reviews to ensure compliance with the SSP
  • Ensuring configuration management (CM) for security-relevant software, hardware, and firmware is maintained and documented
  • Formally notifying the Authorizing Official when changes occur that might affect accreditation
  • Following procedures developed by the ISSM and authorizing software, hardware, and firmware use before implementation on the system
8

Principal Information Security Engineer Resume Examples & Samples

  • Define, plan, design, and evaluate information security systems and architecture
  • Perform requirements analysis, design, and integration for complex software applications and collaboration infrastructures
  • Perform system administration and maintains audit collection and reporting system, vulnerability management program, and continuous monitoring capabilities
  • Participate in the change management process, and assesses security impact of proposed changes
  • Create and maintains existing information system security documentation, including SSP, SCTM, Security Configuration Guide
9

Principal Information Security Engineer Resume Examples & Samples

  • Define, plan, design, and evaluate information security systems and architecture with the following projects
  • Design and implement two factor authentication for general users and privileged users
  • Design and implement data at rest encryption for SANs and servers
  • Design and implement privileged user tiered
10

Principal Information Security Engineer Resume Examples & Samples

  • Mentor more junior engineers by leading and influencing technical decisions, processes, and best practices with an expert ability to explain technical concepts in written and verbal forms
  • Advise in, and participate in, the design of secure products and architectures
  • Perform architecture security reviews, security focused code reviews, and security testing
  • Create or approve documentation that codifies the application security program: this will include the development of secure coding policies, procedures and standards, modification of the SDLC to include the necessary security checkpoints, product deployment, and code review methodologies
  • Evaluate potential security related issues and make recommendations on third party tools and components
  • Work closely with engineering and product teams to design and implement security-related systems and functionality, including writing secure code as necessary, and verification of threat models, risk and security posture
  • Monitor software usage and perform forensics to verify that the software and infrastructure is performing to the required security standards
  • Perform constant monitoring and awareness of key developments in the area of systems, web application, and client application security in order to provide direction of security trends, and anticipate emerging standards and best practices
  • Provide leadership, guidance and direction to security resources and be an influencer of development, systems, support, and quality assurance teams
  • Participate in public security projects and or volunteer time and knowledge to improve the broader security community, representing the company’s mission and goals, as well as promoting cooperation and knowledge sharing
  • Communicate to senior management by demonstrating an expert skill in presenting technical concepts
  • Attend all meetings necessary for the seamless delivery of the product as part of the Software Development Life Cycle
  • Actively engage using unique wide-range of professional skills with an expert understanding of industry practices and company policies and procedures
  • Excellent planning/ organizational skills and techniques
  • Excellent analysis and problem solving skills
  • Excellent writing, presentation and communication skills
  • Excellent independent decision making skills
  • Excellent Interpersonal skills
  • Professional maturity in delivering difficult messages in a professional and empathetic manner
  • Excellent negotiating skills
  • Act as a resource and/or mentor for colleagues with less experience; may direct the work of other staff members
  • Ability to manage a budget
  • Project management/ consultative skills
  • Expert in multiple technical and business skills
  • Ability to cultivate and develop lasting customer relations (either internal or external)
  • Excellent knowledge of secure application programming, coding life cycles and designs
  • Excellent understanding of security principles, best practices architectures, tools and processes
  • Advanced knowledge of multiple current operating systems and hosting environments
  • Advanced understanding of networking protocols
  • Excellent knowledge of software and network architecture and standards
  • Excellent knowledge of authentication protocol building blocks and methods
  • Advanced ability to understand business drivers and priorities, and integrate these requirements into overall security design
  • Excellent ability to conduct threat assessments and assess risk
  • Excellent ability to create and maintain risk-based measures and build security processes that work within various development methodologies
  • Excellent ability to communicate security objectives orally and in writing to a variety of audiences
  • Advanced knowledge of the technological security issues and challenges faced by corporations and governments around the world
  • Advanced ability to project and predict outcomes based on security trends and industry requirements
  • Excellent knowledge of reverse engineering techniques and tools
  • Excellent ability to implement code derived from technical specifications
  • Excellent ability to problem solve/diagnose in a technical space
  • Advanced knowledge of all programming languages leverage in the products being secured
  • Advanced knowledge of data storage formats, tools and languages
  • Ability to keep skills current with changing industry demands as identified by the department training site
11

Principal Information Security Solutions Engineer Resume Examples & Samples

  • Helping to identify new opportunities, collaborating with sales peers to qualify opportunities, and driving the technical close process on all relevant Security solutions
  • Solution SEs must also coordinate with Marketing and Sales to ensure that Symantec initiatives are timely and appropriate for current end user and/or market demand
  • Additionally, the Solution SE is responsible for ensuring partner satisfaction regarding technical aspects of end­user, partner­led initiatives. IS Solution SEs also act as project lead to ensure that the customer/partner’s specific product requirements are addressed in both current and future product development, and assists both partner and direct sales with building business cases for new opportunities. IS Solution SEs are required to deliver security­focused training to both Symantec and partner SEs. Additionally, IS Solution SEs must have a deep understanding of, and have an ability to apply, technical roadmaps to our customer’s mission critical applications
  • Collaboratively develop and articulate an end­to­end solution design, inclusive of consulting, support and education
  • Translate customer business requirements into integrated technical solutions
  • Explain to the customer the complete solution deployment lifecycle
  • Identify and execute assessment­led selling opportunities
  • Solution selling of all offerings within the Symantec Security Portfolio
  • Provide customer with complete solution designs which may include 3rd­party products
  • Assist in technically closing complex and competitive opportunities through advanced competitive knowledge, technical skills, and credibility
  • Become recognized as a thought leader and source of advice for other functions
  • Deliver product and technology briefings
  • Train, mentor and collaborate with Technical Sales Organization (TSO) peers both locally and across NA
  • Function as the technical lead in the development of responses to RFIs and RFPs
  • Employ industry ­leading best practice and TSO methodology and tools
  • Identify revenue ­impacting support escalations and pro­actively engage with required parties (both internal and external) to ensure timely and satisfactory resolution
  • 8+ years of successful technical systems and sales engineering experience in the security, security consulting and/or data protection industry
  • Specific experience in assessing customers' technical maturity against their defined goals and matching those assessments to solutions which meet or exceed client expectations
  • Knowledge of IPSec, SSL, and VPN­based technologies
  • Detailed knowledge of the Security Industry
  • Presentation­ ready knowledge of several Symantec or competitor solutions and expertise in products making up one or more solutions
  • Ability to relate to a wide range of technical staff and managers in customer environments
  • Broad product and solution knowledge of market trends in the Security industry and business
  • Symantec is an equal opportunity employer. All candidates for employment will be considered without regard to race, color, religion, sex, gender identity, sexual orientation, national origin, physical or mental disability, veteran status, or any other basis protected by applicable federal, state or local law
12

Principal Information Security Engineer Resume Examples & Samples

  • Assess our existing tools, understand the company’s needs and work with the team to assess our technical gaps and be ready to build solutions that address them
  • Build independent systems that augment our existing systems and improve the security of the company
  • Understand the pros and cons of existing vendor and open source tools and be able to utilize their full capabilities, or write your own
  • Deploy secure configurations of monitoring and detection toolsets
  • Assist in the automation scripting of information security monitoring tools
  • Work with pen testers and be familiar with Red/Blue team exercises
  • Experience with C and/or C++ would be awesome
13

Information Security Engineer, Principal Resume Examples & Samples

  • Experience on Federal systems within the last five (5) years
  • Six (6) years of experience developing accreditation packages for DoD or DoN systems, providing experience on DoD with example system accreditations
  • Must have demonstrated experience performing DIACAP and/or RMF for certification of networks
  • 04-05 years w/High School Diploma
14

Information Security Principal Resume Examples & Samples

  • Work with development teams to integrate the security architecture with applications including user sign-on and role based access control
  • Identifies potential information security vulnerabilities
  • Development and Implementation solutions to mitigate risks and enhance system security
  • Investigates and recommends security technologies including managed security services
  • Analyzes and resolves data, application, computer and security problems and issues
  • Administers security policies to control access to systems
  • Work on complex issues where analysis of situations or data requires an in-depth evaluation of variable factors. Exercises judgment in selecting methods, techniques and evaluation criteria for obtaining results
  • Secondary party responsible of operational activities related to monitoring, reporting, and audits, along with change, incident, & problem management
  • Support for Mainframe Security software and applications supporting RACF, ACF2, TopSecret functions
  • Project Management skill levels sufficient for the understanding and implementation of within-team and cross-functional projects
  • Proven troubleshooting skills and ability to understand complex relationships between components of multi-tiered and distributed systems related to directory services
  • Self-driven and be able to work independently with minimal supervision
  • ITIL Foundations knowledge
  • 5+ years scripting experience (e.g. RACF, CA-ACF2, CA-TopSecret, etc.) a plus
  • Minimum of 5 year’s experience in an Mainframe Information Security work
  • Relevant Information Security certification (CISSP/CCNA) is a plus
  • Available for off-hours escalations as 2nd and 3rd tier of on-call support
15

Information Security Engineer, Principal Resume Examples & Samples

  • Knowledge and experience in security disciplines including, but not limited to, information systems security, operations security, administrative security, personnel security, physical security and communications security
  • Knowledge of DCID 6/3, ICD 503, CNSSI 1253, NIST SP 800-55, NIST SP 800-53, NIST SP 800-53A, NIST SP 800-37, and security controls assessment criteria/procedures
  • Knowledge and experience of information systems security policies and practices, computer science, state-of-the-art security tools and applications, and a thorough knowledge of IT
  • Knowledge of DoD/IC system security control requirements
  • Knowledge of the capabilities and functionality associated with various technologies for organizing and managing information (e.g., databases, bookmarking engines)
  • Knowledge of the capabilities and functionality of various collaborative technologies (e.g., groupware, SharePoint)
  • Knowledge of the principal methods, procedures, and techniques of gathering information and producing, reporting, metrics development, and sharing intelligence
  • Knowledge of the organization's core business/mission processes
  • Knowledge of Personally Identifiable Information (PII) data security standards and security controls
  • Skill in conducting information searches and analytical research and analysis
  • Skill in conducting knowledge mapping (i.e., map of knowledge repositories)
  • Skill in using knowledge management technologies
  • Ability to match the appropriate knowledge repository technology for a given application or environment
  • Minimum of 10 years’ experience in systems engineering or requirements analysis as applied to the cybersecurity, information assurance or related field; candidate must have experience with application of security controls to information systems
16

Information Security Engineer, Principal Resume Examples & Samples

  • Must obtain appropriate (IAM or IAT level III - CISSP, CISM, CASP, CISA or GSLC certification (CISSP preferred)) 8570 Certification within 90 days of hire and maintain certification throughout employment
  • Developed technical documentation and white papers
  • Knowledge of virtualization technologies and virtual machine development and maintenance
  • Experience within the Intelligence Community
  • Certified 8570 IAM or IAT level 3, (CISSP, CISM, CASP, CISA or GSLC certification (CISSP preferred))
  • 12 years experience with Bachelor's degree
  • 14 years without degree
  • 8570 Level III certification within 90 days of hire
17

Information Security Principal Malware Reverse Engineer Resume Examples & Samples

  • Knowledge of Advanced Persistent Threat (APT) tactics, techniques, and procedures (TTP) and common attack vectors
  • Have experiences with cyber threat analysis, malware identification, or evidence handling
  • Perform triage and in-depth analysis of malwares, phishing emails, and other client-side exploits to support the resolution of security incidents
  • Perform network forensic analysis and network protocol reverse engineering. Use various techniques to analyze encrypted network traffic to prevent stealth data exfiltration
  • Perform kernel-mode debugging on rootkit malware
  • Providing technical indicators and mitigation suggestions in the context of a security incident, as it relates to the technical analysis of malware or other attack artifacts
  • 3+ year experience with these programming languages: assembly language (x86), C/C++ or .NET, Python/Perl
  • 3+ year experiences with Linux/Unix OS architecture and configuration
  • 5+ year experience with kernel-mode debugging (WinDbg)
  • 5+ year experiences with host and network forensics analysis. Familiar with Encase Forensic tool
18

Information Security Principal Resume Examples & Samples

  • Operate in multiple classified environments on a daily basis
  • Act as CS advocate to collect succinct accurate artifacts to support Directives, Policies, and SOPs established to make decisions for Risk Management (i.e. develops Security Assessment Reports)
  • Respond to daily inquiries via email, phone, or in-person from organization members
  • Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems
  • Administer, operate, and maintain multiple vulnerability management servers/applications and RMF web database tool
  • DOD TS/SCI clearance
  • B.S. or M.S. in Computer Science, Information Security, Mathematics, or IT related field
  • Vulnerability tool administration and execution
  • Proficient with MS Office products
  • Must have customer service and team player skills
19

Senior Principal Information Security Engineer Resume Examples & Samples

  • Research and evaluate cyber security technologies to combat and manage the risk of the latest security threats
  • Participate in re-architecture plans of existing network infrastructure, network design reviews, and provide security recommendations for network security solutions, products, controls, and sensors
  • Provide expert design and enterprise-level implementation of selected network security solutions, products, controls, and sensors
  • Serve as an active member of the incident response team by acting as a technical consultant on information security incident investigations
  • Ensure compliance with security policies and other regulatory and industry standards (i.e. PCI, SOX)
  • 12+ years of experience working with network, web, cloud, wireless, and mobile security solutions, products, controls, and sensors
  • Bachelor's degree in a Cyber Security or Information Technology related field of study or equivalent work experience
  • Relevant and recognized security certifications such as GIAC, CISSP, and/or vendor specific professional and expert level security certifications
  • Expert knowledge of network security principles, cloud infrastructure and applications, TCP/IP, security protocols such at TLS, IPSec, SSH, and network services such as DNS, SMTP, HTTPS
  • Experience with design and implementation of on premise and cloud-based network security technologies such as NGFW, IDS/IPS, UTM, WAF, NAC, TLS/SSL/IPSec intercept/decryption solutions, highly-scalable network aggregation solutions, WiFi security, network-based DLP, highly scalable full-packet capture solutions
  • Knowledge of and experience with implementing highly-scalable, on premise and cloud-based DDoS solutions
  • Ability to self-manage, including delivering network security solutions on time and within budget
  • Ability to adapt to a hyper-growth pace and changing priorities
  • Excellent problem solving, analytical skills, and communication skills
20

Information Security Principal Analyst Resume Examples & Samples

  • Participate in the development or modification of DCGS-A security program plans and requirements
  • Collection and maintain information needed to meet system IA reporting requirements
  • Recommend resource allocations required to securely operate and maintain system IA requirements
  • Assist government personnel in identifying security programs implications of new technologies or technology upgrades
  • Assist government personnel in creating and analyzing IA policies
  • Assist government personnel in developing system security configuration guidelines for DCGS-A
  • Ensure testing of 1/3 of “local” IA controls annually and ensure compliance/non-compliance results are documented in SSAA/SSP and POA&M
  • Review the selected security safeguards to determine if security concerns identified in the DCGS-A system POA&M and SSP have been fully addressed
  • Report security violations and incidents through your site and region government IAM/IASO to the servicing RCERT in accordance with Section VIII, Incident and Intrusion Reporting
  • Assists the government in the preparation of DIACAP paperwork for SIPRnet and Collation accreditations
  • Assists the government in the preparation of Short Form SSAAs for JWICS accreditations
  • Assists the government in Information Assurance awareness training and education
  • Educate task order personnel on required Information Assurance process to maintain system accreditation
  • Maintain knowledge of current and emerging Federal, Department of Defense (DoD), and Army requirements, policies, regulations, and trends
  • Maintain knowledge of information vulnerabilities and trends
  • Collaborate effectively with the customer, CECOM SEC and other project team members
  • Understand and apply sound Information Assurance principles and methodology to all work
  • May Lead a team and/or less senior staff
  • Knowledge of DoD IT organizations and responsibilities
  • Ability to analyze an organizations internal and external IA processes and identify areas for improvement
  • Ability to author official IA correspondence, IA guides, and plan of action and milestone (POA&M)
  • Ability lead or work on informal teams
  • Knowledge of the Department of Defense Information Technology operating environment
  • Ability to brief organizational leadership on technical issues in a non-technical format
  • Ability to analyze an organizations business processes and develop material and non-material solution to implement applicable DoDI 8500.2 IA controls
  • Ability to perform independent or collaborative research on solutions for IA requirements
  • Ability to assess current IA capabilities against future requirements and provide a strategy to close any capability gap
  • Research IA regulatory compliance requirements and tools for IA requirements. Provide recommendations and strategies for material and/or non-material solutions to improve the system and/or organizational IA posture
  • Maintain an IA Specialist continuity book for their location
  • DCGS-A baselines versions 3.1.x and 3.2.x
  • Experience building formal accreditation/certification packages for DoD Intelligence support systems
  • Experience performing IA functions in a DoD operational environment or other national level agency environment
  • 8+ years minimum experience, 10+ year preferred
21

Principal Architect, Information Security Resume Examples & Samples

  • Plans and designs security architecture and solutions by evaluating network and security technologies; developing requirements for applications, OS, data in motion and data at rest; designs maintainable security solutions, including access administration, public key infrastructures (PKIs), data leakage and information protection as well as COTS hardware and software; adhering to industry standards and frameworks
  • Determine security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; when needed preparing cost estimates
  • Wide breadth of knowledge across security products, tools, and industry trends; ability to create solutions using a pragmatic, risk-based approach
  • Assesses security threats and vulnerabilities using structured methodologies such as NIST Cybersecurity Framework or ISO 27001
  • Prepares system security reports by collecting, analyzing, and summarizing data and trends; presents reporting for management review
  • Create process improvement by identifying inefficiencies and solutions for process improvements
  • Works with IT Security team on placement and configuration of key monitoring and prevention tools
  • Writes clear implementation guidelines for the implementation engineers
  • Guides and confirms that the design has been implemented as per the requirements
  • Enhances department and organization reputation by accepting ownership for accomplishing new and different requests; exploring opportunities to add value to business strategies and objectives
  • CISSP (CISSP:ISSAP is a plus), GIAC, or equivalent certification
  • Knowledge of ITIL or other ITSM methodology or certification a plus
  • Solid understanding of TCP/IP and networking concepts
  • Strong knowledge of networking concepts and architecture, including security considerations associated with networking hardware like Routers, Switches, Firewalls, Gateways etc
  • Prior experience in emerging networking areas, including Software Defined Networking (SDN) strongly desired
  • Strong knowledge of VPN & Routing technologies & concepts including but not limited to IPsec, MPLS, GRE, GET VPN
  • Solid understanding of Operating system security concepts
  • Understanding of malware, emerging threats, attacks, and vulnerability management
  • Experience assisting the development and maintenance of tools, procedure, and documentation
  • Track record of effective project management and project delivery
  • Ability to work in a fast-paced team environment
  • Ability to develop detailed process and procedure documentation
22

Principal Information Security Engineer Resume Examples & Samples

  • Partner closely with the Cloud security product manager, engineering, Ops and security team to develop and implement project requirements
  • Architect/develop feature code based on product requirements
  • Individualize tasks for engineering implementation on an as needed basis
  • Track critical CVE (security vulnerabilities) and notify security subject matter experts. Oversee the response to critical industry-wide vulnerabilities which impact CenturyLink systems by analyzing the vulnerability, engaging the system owners in the business, identifying systems impacted, prioritizing remediation, ensuring remediation plans are established
  • Provide security design reviews and recommendations to teams developing new features
  • Deploy and maintain security infrastructure (Devops)
  • Maintain software releases and automated unit testing (continuous integration) (Devops)
  • Mentor security team members on industry best practices, development, debugging code, network forensics, and Unix systems
  • Provide routine penetration testing on CenturyLink systems as required for corporate compliance adherence, Federal Information Security Management Act (FISMA), and other industry compliance standards as necessary
  • Perform vulnerability assessment and penetration testing engagements for CenturyLink corporate infrastructures and new products/services encompassing network elements, operating systems, databases, and applications
  • Candidate must possess one or more foundational professional security certifications such as CISSP, GSEC, GCED, or Security+
  • Broad technical knowledge regarding current and emerging threats, vulnerabilities, technologies, intrusion techniques, and exploit methodologies
  • Experience leveraging OWASP Top 10, SANS Top 20 Critical Security Controls, and NIST Vulnerability Database within penetration testing engagements
  • Experience utilizing multiple vulnerability assessment and penetration testing tools such as Core Impact, Nessus, Burp Suite, AppScan, Kali Linux, and Metasploit
  • Ability to perform mixed work hours and days to accommodate penetration testing on production systems during scheduled maintenance windows
23

Information Security Engineer, Principal Resume Examples & Samples

  • Respond to known and possible network attacks i.a.w. applicable DoD/DON policies, directives and instructions, or as directed by the CND Service provider
  • Ensure all items are configured to store and archive all system, device, application, and security event logs i.a.w. DOD, DON, NAVSEA and (if applicable) NATO security policies
  • Audit and review all system, device, application, and security event logs i.a.w. DOD security policy
  • Reporting, mitigating and/or resolving all classified security incidents (e.g. data spills) that impact networks within time constraints identified by the applicable directive or as directed by the Computer Network Defense (CND) Service Provider
  • Network and system security functions for authorized users, workstations, and servers as required under
  • Download, install, and modify IT assets in accordance with Information Assurance Vulnerabilities Assessments (IAVA) and Bulletins (IAVB)
  • Configure and harden IT systems per DISA Security Technical Implementation Guides (STIGs) as required
  • Provide technical input and develop documents to provide information, help prevent, and increase understanding of issues involved in computer security incidents
  • Assist system owners and other representatives to create, maintain and update accreditation artifacts system
  • MSCE & CISSP or Security+
24

Information Security Engineer, Principal Resume Examples & Samples

  • Typically a bachelor's degree or equivalent and 10 to 12 years related experience. Master's degree or doctorate in field mathematics, telecommunications, electrical engineering, computer engineering, computer science is preferred
  • Experience as subject matter expert with demonstrated competency in engineering related functional or cross-functional security areas (e.g., security engineering, IT operations security design, cyber security)
  • Experience in identifying technical gaps and providing solution recommendations
  • E xperience in providing and analyzing comprehensive security architecture artifacts
  • Working knowledge and experience in security disciplines including but not limited to, information systems security, operations security, administrative security, personnel security, physical security and communications security
  • Working knowledge of IA principles and organizational requirements that are relevant to confidentiality, integrity, availability, authentication, and non-repudiation
  • Working knowledge of DCID 6/3. ICD 503, CNSSI 1253, NIST SP 800-53, NIST SP 800-53A, NIST SP 800-37, and security controls assessment criteria/procedures
  • Working knowledge of DoD/IC system security control requirements, roles, missions, and operational enterprise architecture
  • Working knowledge of IA architecture frameworks, including the IC IA Architecture Reference Model
  • Working knowledge of network security architecture concepts, including topology, protocols, components, and principles
  • Working knowledge of the System Development Lifecycle
  • Working knowledge of information security systems engineering principles and virtual machine technology
  • Working knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption)
  • Working knowledge of network access, identity, and access management (e.g., PKI)
  • Working knowledge, skills, and experience in Systems Engineering principles, requirements analysis, system development (software and hardware)
  • Skill in designing countermeasures to identified security risks
  • Skill in discerning the protection needs (i.e., security controls) of information systems and networks
  • Ability to develop and apply security system access controls
  • Ability to conduct audits or reviews of technical systems
  • Certified 8570 IAM or IAT level 3, CISSP, CISM, CASP, CISA or GSLC certification (CISSP preferred)
  • Working knowledge of IT supply chain security/risk management policies, requirements, and procedures
  • Working knowledge of system design tools, methods, and techniques, including automated system analysis and design tools
  • Working knowledge of system software and organizational design standards, policies, and authorized approaches (e.g., International Organization for Standardization guidelines) relating to system design
  • Working knowledge of Privacy Impact Assessments (PIA) and Personally Identifiable Information (PII)
  • Working knowledge and experience with XACTA, including understanding workflow
  • Skill in translating security requirements into functional requirements and options for developers
  • Skill in security control inheritance from enterprise security services and communicating these to developers
  • Skill in creating policies that reflect system security objectives
  • Skill in designing security controls based on IA principles and tenets
  • Skill in designing the integration of hardware and software solutions
  • Ability to use design modeling (e.g., unified modeling language)
  • Ability to conduct vulnerability scans and recognizing vulnerabilities in security systems
  • Ability to establish working relationships internally and externally to the Agency
25

Principal Information Security Resume Examples & Samples

  • Provide highly technical examination, analysis and reporting of cyber based events to include collecting and analyzing intrusion information and use discovered data to enable mitigation potential cyber security incidents within the enterprise
  • Manage the use and reporting of a large-scale SIEM and Data Analytics implementation in a dynamic cloud service provider environment
  • Monitor and enforce guidelines for best practices in security and compliance
  • Respond to inquiries, guide and advise customers on security best practices
  • Take the lead on internal investigative and triage efforts by reviewing forensic analysis, reports, and data and collaborate with multiple other groups
  • Track and document incidents from initial detection through final resolution including documenting requests and activities in case management system
  • Coordinate with and provide expert technical support to resolve cyber security incidents working with other technicians to correlate threat assessment data as needed
26

Senior Principal Information Security Engineer Resume Examples & Samples

  • Participates in all aspects of IT Security to include such areas as standard security technologies (firewall, antivirus, antimalware, authentication methods, IPS/IDS, encryption), incident response, policy creation and enforcement, assessing security vulnerabilities and proposing solutions, and ensuring business critical applications are deployed and maintained in a secure manner
  • Identifies and assesses IT security risks, evaluate and propose remediation plans to mitigate such risks
  • Investigates and resolves incidents and breaches regarding the network. Perform incident triage and remediation activities as needed
  • Participates in security architecture design reviews, identify gaps and recommend security enhancements
  • Develops and implements security strategies for the overall protection of the enterprise network
  • Maintains security roadmap for the organization
  • Stays current and maintains a knowledge of industry threats, trends, and security technologies
  • Ensures security technologies are implemented and managed including hands-on technical expertise (IDS/IPS, Endpoint Protection, Encryption)
  • Secures the MKS network and data by understanding threat technologies and using tools to protect against known, emerging and zero-day threats
  • Supports and expands the MKS security awareness training program to ensure security best practices are communicated and the employees are formally trained
  • Participates in preparation of necessary information security policies, standards and procedures
  • Participates in IT security risk assessments and control design activities
  • Represents information security in project meetings to ensure security and risk is being considered in delivering IT solutions
  • Works closely with MKS infrastructure and operations teams
  • Maintains relationships with strategic vendors with guidance from IT Management
  • Reviews technical information, requirements statements, feasibility analyses, conceptual designs and other security documents created during the systems development process
  • Tests, selects and implements commercially-available best-of-breed Security products and services
  • Completes special ad hoc projects as assigned
  • Receives supervision from the IT Security and Compliance Manager
27

Information Security Principal Resume Examples & Samples

  • Four (4) years’ experience in program organization and administration
  • Excellent verbal, written and presentation communications skills
  • Experience implementing the Health Insurance Portability and Accountability Act of 1996 Privacy Rule
  • Experience managing patient privacy disputes and requests for changes to their medical record
  • Knowledge of standard audit procedures; and
  • PMP (Project Management Professional),
  • GIAC (Global Information Assurance Certificate)
  • SSCP (Systems Security Certified Practitioner)
  • CISSP (Certified Information Systems Security Professional)
  • Responsibilities:Principal officer with responsibility for ensuring the Contractor’s adherence to the FI Contract’s Privacy Office provisions
  • Develop policies, procedures, and guidelines for the use, disclosure, transmission, and storage of information that is protected and confidential information under all applicable state and federal laws
  • Develop policies and procedures for reporting incidents involving the intentional, unintentional, or unauthorized disclosure or use of protected, confidential information
  • Develop, implement, and maintain a Security and Confidentially Plan in coordination with the Information Security Office to prevent unauthorized disclosure of protected, confidential data. The Plan shall meet the requirements for a Security and Confidentiality Plan set out in the contract
  • Establish a security and confidentiality training program in coordination with the information Security Office as part of the Security and Confidentiality Plan that is specifically designed for all levels of the Contractor’s staff
  • Evaluate requests and coordinate with the Information Security Office for the release of Personally Identifiable Information (PII), Personal Confidential Information (PCI), and Protected Health Information (PHI) based on existing laws, regulations and policies, and make recommendations to the Department
  • Develop policies, procedures, and safeguards in coordination with the Information Security Office to ensure that only authorized persons may access
  • Sensitive or confidential data (included but not limited to PHI, PII, and PCI, whether hard copy (paper/microfiche) or electronic
  • Software programs and system documentation, including procedure manuals; and
  • Computer rooms, disk and tape libraries, and vaults
  • Develop standards, procedures, and safeguards to ensure that sensitive data (including PCI/PII/PHI) is handled and stored in such a manner as to preclude unauthorized disclosure. The standards, procedures, and safeguards shall protect the integrity of sensitive data from unauthorized disclosure at all times, including while in transit
  • Conduct special reviews as requested by the Department; and i. Provide written and oral presentations of review issues and alleged security/privacy violation incidents to Department staff
28

Principal Information Security Engineer Resume Examples & Samples

  • Develops and contributes security standards, architecture/design criteria and solutions to support division programs and initiatives, customer requirements and the implementation of ISO 27001 and CSC information security controls
  • Understands customer and business requirements to provide information security design/solution options for division architects, engineers, operations and professional services
  • Leads and improves the division’s capabilities to detect and alert on security events and incidents through constant incremental improvement to the business rules, queries, filters, correlation and alert criteria among relevant security tools/systems. Work with asset and data owners, process owners (NOC/SOC) and managers for relevant and useful security event alerting/reporting
  • Identifies appropriate platform and application logging and triggers at design phase to support advanced fraud and cyber detection use cases. Integrates appropriate systems and logs into the security information and event management system to properly protect critical assets. Designs, tests and develops specific content and alerting to identify threats against critical assets
  • Drives improvements to the division’s processes and procedures for Event Management and Incident Handling for security events and incidents. Updates incident response procedures for new threat content and alerts
  • Serves as Security Incident Manager, coordinating investigations, forensics, remediation among 3rd and 4th level support and oversees communications with internal and external parties. Escalates and invokes Nuance’s Cyber Incident Response Team (CIRT) as appropriate
  • Liaises with Corporate Security on security operations and security tool/system requirements, design and deployment and with Legal, Human Resources, Privacy and other internal and external departments as security incidents merit
  • Develops and reports on key activity- and performance indicators concerning Security Events and Security Incidents for the Division
  • Minimum five (8) years of experience in network, infrastructure, OS, or software engineering
  • Minimum of five (5) years of experience in information security
  • In-depth technical capabilities and professional knowledge of IT and Information Security
  • Strong understanding of network security, systems security, and application security
  • CISSP, CISM or similar information security credentials
  • Understanding of the information security vendor landscape
  • In-depth knowledge of at least three: networking, infrastructure, operating system, database, application, and web services employed in platform- and software- as a service
  • Solid understanding of systems and tools required to provide configuration and patch management; asset management, and monitoring in a large scale hosting environment
  • Experience with security related technical tools (Palo Alto, Tripwire, Splunk, ELK) and processes
  • Ability to work both independently with sole responsibility, and as part of a team to deliver quality work product in a timely fashion in a fast-paced environment
  • Ability to communicate effectively with peers across divisions
  • CCNA, MSCE and other such credentials
  • Linux and Windows Operating System Administration
  • Access Control technologies; LDAP, Active Directory and Identity & Access Management
  • MS Azure and Amazon Web Services
  • PKI and Key Management
29

Information Security Principal Engineer Resume Examples & Samples

  • Comprehend and enforce applicable laws, regulation, and compliance relating to IT Security and Privacy, liaising closely with Legal
  • Evaluate security needs and recommend cost effective mitigating controls
  • Work directly with IT staff to implement processes and procedures to cost-effectively protect information systems assets from intentional or inadvertent modification, disclosure
  • Ensure data privacy for our clients’ customer data and our own intellectual property and other confidential data
  • Liaise with IT and compliance staff to ensure audit preparedness
  • Oversee and assist in the configuration and administration functions for specific security tools
  • Assist Risk Management with fraud detection, documentation, and prevention
  • Oversee a training program for personnel with significant responsibilities to keep them current with the emerging threat landscape that is present within the corporate environment
  • Develop, maintain and oversee information security policies, procedures and control techniques to address all applicable security and compliance requirements
  • Collaborate with and advise a security operations program that through automated and continuous monitoring that can detect, contain, and mitigate incidents that could compromise sensitive data, or impair information systems
  • Engage in the mentoring of security operations engineers and operational staff on security concepts and techniques
  • A minimum of five plus years professional experience designing, implementing and managing enterprise IT security (HEAVY UNIX/LINUX BACKGROUND DESIRED!)
  • Thorough understanding of IT security regulations and compliance, including PCI, SOX General Computing Controls, and SSAE 16 SOC I and SOC II, HIPAA and AICPA Trust Services Principles
  • Experience with the following tools- QRadar, Vericept, Symantec DLP, network scanning tools like Nexpose, Nessus and Qualys, IronPort, Forefront, Encase and patch management systems
  • Experience in conducting forensic investigations and eDiscovery highly desirable
  • Perform or work with others to execute security assessments of technical environments
  • Ability to communicate effectively, both in writing and speech, as well as being able to prepare and present IT related material to a wide variety of audiences, including non-technical executives and management and on occasion, to large groups
  • Successful project management experience
  • Ability to coordinate incident response with many internal and external organizations including IT, legal, internal audit, operations, executive management and local and federal authorities as needed
  • Experience developing, reviewing, administering, and implementing security policies
  • B.A. or B.S degree a plus
  • Experience within the outsourced (BPO) Contact Center Experience would be ideal
30

Principal, Corporate Information Security Resume Examples & Samples

  • Develop and implement information security strategic plans and objectives for the business segment in an alignment with the corporate strategy
  • Develop and implement programs to ensure data confidentiality to warrant the information created, acquired or maintained is used in accordance with its intended purpose to protect it from external and internal threats, and to ensure the organization complies with statutory and regulatory requirements regarding access, security and privacy
  • Provide vision and direction to the operational components of security programs including incident management and secure software development; act as a subject matter expert to the operational teams
  • Implement controls around identity and access management, privileged access usage and monitoring; develop escalation processes
  • Partner with our SCVM team to provide oversight of third party strategic vendors including governance, service level agreements and strategic partnerships
  • Partner with key stakeholders to identify information asset owners to classify data and systems as part of a control framework implementation. Ensure security is factored into the evaluation, selection, installation and configuration of hardware, applications and software
  • Liaise with legal to establish mutually acceptable contracts and service-level agreements
  • Regularly interact with Business Leaders and customers to report on information security program progress, risks and compliance trends in the industry as it relates to the business segment information security initiatives
  • Provide visionary thinking and direction around the latest security and privacy legislation, regulations, advisories, alerts and vulnerabilities pertaining to the data organization
  • Conduct continual research to maintain knowledge of technology and customer needs; stay current with advancements in security, related services; make recommendations to evolve the security controls to accommodate such opportunities
  • Develop domain knowledge of CoreLogic businesses to include an understanding of short-term objectives & long-term strategies for the organization
  • Ensure compliance with CoreLogic policies, processes and practices. Role model CoreLogic ethical standards, professionalism and code of conduct
  • Bachelor’s degree in a related field (or equivalent combination of education and experience) with 10+ years’ experience in security or risk field, including an audit function. MA/MS preferred
  • Experience leading information security projects for a dynamic organization with a demonstrated strong project management and execution skills
  • Experience with the principles and techniques of security risk analysis; must demonstrate an understanding of the management issues involved in implementing security processes and a security-aware culture
  • Experience with and ability to understand data and system lifecycles
  • Prior successful experience leading by influence in a matrix environment; ability to drive results through complex teams to include direct and indirect resources. Prior experience working within a client-solution focused environment
  • Strategic management capabilities; critical thinking skills and strong financial acumen
  • Strong leadership capabilities and management skills with proven ability to foster an environment of positive engagement and trust
  • Strong influencing and negotiation skills; strong consultative abilities; proven ability to develop and maintain positive working relationships with key stakeholders to effectively partner across the enterprise to drive required results
  • Strong analytical and decision making skills with the ability to analyze complex situations involving competing priorities and act decisively in both a strategic and results-driven manner
  • Ability to champion and lead others through change in a dynamic high volume environment; resiliency; adaptability; self-motivated
  • Excellent written/ verbal communication skills and strong presentation abilities with demonstrated experience communicating at all levels within an organization
  • Strong results orientation with proven ability to multi-task in a high volume environment; high agility; ability to prioritize conflicting demands, allocate limited resources and organize time and focus to deliver solid and consistent business results in alignment with the organization’s preferences and priorities
  • Solid technical aptitude; proficiency in Microsoft Office, including Word, Excel and PowerPoint
  • Ability and willingness to travel up to 10% of the time
31

Information Security Principal Architect Resume Examples & Samples

  • Planning and implementing application security measures to protect computer systems, networks and data
  • Working collaboratively with multidisciplinary teams and Business Units to implement and support existing and future solutions
  • 5 or more years in system security administration, controls or information management experience and/or Security Engineer/Architect/Consultant
  • 10 or more years of systems architecture experience
  • End to end understanding of the software development lifecycle