Information Security Senior Resume Samples

4.5 (123 votes) for Information Security Senior Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the information security senior job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
AV
A Volkman
Aryanna
Volkman
958 Miles Roads
New York
NY
+1 (555) 592 3382
958 Miles Roads
New York
NY
Phone
p +1 (555) 592 3382
Experience Experience
Los Angeles, CA
Information Security Senior
Los Angeles, CA
Koss Group
Los Angeles, CA
Information Security Senior
  • Provide ongoing feedback for risk management, mitigation, and prevention
  • Develop, understand and execute all testing necessary for a successful DR execution for tools and systems managed by Information Security Operations
  • Develop and maintain process, framework and SOP documentation for all GRC related functions
  • Develop and maintain relationships with internal and external customers to manage IS risks
  • Perform security risk assessments (SRA) according to the Freddie Mac SRA framework and IS standards
  • Provide quality control reviews and guidance to junior staff members on performing risk assessments, assigning risk ratings and analyzing mitigating actions
  • Regularly report Disaster Recovery activities to upper management
Chicago, IL
Information Security Senior Analyst
Chicago, IL
Kautzer-Reinger
Chicago, IL
Information Security Senior Analyst
  • Monitor and test network performance and provide network performance statistics and reports
  • Work with project managers and application teams to develop resource and funding estimates to execute remediation action plans and associated risks
  • Practice network asset management, including maintenance of network component inventory and related documentation and technical specifications information
  • Ensure network connectivity of all servers, workstations, telephony equipment, fax machines, and other network appliances
  • Design and implement key inventory workflows sustain compliance with the Citi Key Management Standard and supporting processes
  • Assist in troubleshooting the remediation of key management-related compliance gaps
  • Provide detailed documentation and artifacts related to network and cloud implementations and issues encountered during deployments
present
New York, NY
Information Security, Senior Manager
New York, NY
Bashirian-Roob
present
New York, NY
Information Security, Senior Manager
present
  • Establish and maintain structured approach for maintaining effective IT General Controls (ITGC) and documenting change management
  • Provide leadership and work with business team for authoritative source of identity and process streamline
  • Manage Security integration projects for ERP, key application apps and other IT services for Identity and Access Management, GRC including internal controls
  • Identity and Access Management system architecture including RBAC
  • Privileged account management
  • Manage the technology from architecture, design to implementation for all Identity Lifecycle management and access management projects in complex networked environments
  • Security risk management
Education Education
Bachelor’s Degree in Information Systems
Bachelor’s Degree in Information Systems
Colorado State University
Bachelor’s Degree in Information Systems
Skills Skills
  • Network & Application Penetration Testing: Evaluates, tests, scans to determine weaknesses in client IT operations, processes, systems, and related controls. Presents solutions based on findings to engagement team
  • Security Incident Response & Disaster Recovery Planning: Implements response procedures to identify, assess, and properly address threats and/or recover from an incident. Investigates and assesses the nature and scope of breaches and recovers critical systems and data. Reviews procedures for disaster response, recovery, and restoration, and recommends enhancements. Participates in the implementation of enhancements. Structures tests and exercises to prepare recovery teams
  • Knowledge of ACH and wire procedures, bank agreements, IT security measures (including anti-virus and anti-malware programs, server and workstation patching, and transaction/network event logging), and insurance. Knowledge of PCI data security standards
  • Participates in the execution of the information technology audits, including definition of audit scope, control evaluation, test activities, audit reporting, issue resolution, and risk assessment for assigned audit objectives
  • Strong communication skills
  • Ability to understand and write the security rules/policies for the tools, troubleshoot and resolve the issues on a timely manner
  • Ability to deliver a high level of client service through positive interactions
  • Intermediate to advanced knowledge of concepts such as LDAP, Virtual Directory, Meta Directory, and LDIF
  • Intermediate to advanced technical proficiency with Windows and Linux Server support and Systems Administration
  • Advanced knowledge of security concepts such as data loss prevention (DLP), web application firewall, infrastructure and web application vulnerability assessments, baseline hardening standards (CIS, DISA, etc.), endpoint protection is desirable
Create a Resume in Minutes

15 Information Security Senior resume templates

1

Information Security Senior Engineer Resume Examples & Samples

  • Review projects and designs proposed by the business
  • Work with Protection, Detection and Response team, to help implement security directives or transpose business needs into security solutions
  • Performing security requirements analysis, design, and integration for complex software application environments and collaboration infrastructures
  • Support other Information Security teams based on needs
  • 5+ years’ experience with information networks and the security aspects
  • Experience working with recognized IT Security-related standards and technologies
  • Broad security and IT experience, such as
  • Infrastructure implementation, support or design experience (firewalls, routers switches, host OS, etc.)
  • Testing experience, penetration, scanning etc
  • Can work across teams
2

Information Security Senior Engineer Resume Examples & Samples

  • Continuous review and evaluation of best practices for implementing a comprehensive information security program
  • Implementation of vulnerability management program, including tracking and addressing, accessing applicability to existing systems, and ensuring closure
  • Responsibilities for evaluation and introduction of hardware and software into security facility
  • Support for creation of security policies and maintenance of existing information system security documentation
  • Writing implementation and design documents describing how security features are implemented
  • Providing IT Systems and Applications Engineering support for a large distributed IT infrastructure
  • Providing direction and guidance to less experienced security engineers
  • Ad hoc support and execution of information security investigations
  • Working on project teams responsible for engineering oversight of solutions to integrate within the production IT environment
  • We have multiple openings -- these positions can be located in: Englewood Cliffs, NJ; Orlando, FL; or Los Angeles, CA
  • Requires Bachelor's degree (in field mathematics, telecommunications, electrical engineering, computer engineering, computer science) or equivalent and five to seven years experience with information networks and the security aspects
  • Desire to solve problems that have no textbook solution
  • Strong proven ability in building high-performance, highly-available and scalable secure distributed systems
  • Requires deep knowledge of virtualization, Microsoft Windows systems, networking devices, audit collection systems, knowledge of accreditation practices
3

Information Security Senior Consultants Resume Examples & Samples

  • Information Security (policies, DLP, Identity & access management, etc.)
  • Information system audits and audits of IT General Controls (change management, logical access management, etc.), IT Application Controls, IT Dependent Controls, etc
  • Development of Information Security solutions and offerings
4

Information Security Senior Analyst Resume Examples & Samples

  • This critical role will be a catalyst for driving the global implementation of encryption key management processes and procedures. Specific responsibilities include
  • Leading assessments with application teams to identify keys to be registered in the key inventory
  • Mapping application team members to appropriate process roles
  • Determine remediation gaps and propose respective actions plans
  • Controlling the Key Inventory
  • Effective collaboration with multiple application teams will be needed as this multi-year program will be implemented in concurrent risk-based waves of applications
  • Assure that the application teams involved are trained on the assessment methodology and key management processes
  • Work with project managers and application teams to develop resource and funding estimates to execute remediation action plans and associated risks
  • Oversee revision of all existing operational documentation to align with target processes
  • Serve as a subject matter expert in the areas of encryption key management and the compliant use of keys including security controls
  • Facilitate between the Application, Information Security and Risk and Control teams to determine appropriate operational controls balancing risk mitigated vs the cost of the control considering the application risk profile, data protection requirements and any technical capabilities and limitations
  • As needed, will continuously improve the implementation methodology and the key management processes
  • Provide guidance to application teams in interpreting key management processes and appropriate use of keys to protect sensitive data
  • Recommends proper encryption of data at rest, in transit, and end-to-end and incorporation of effective process controls to ensure that critical data isn't compromised
  • Provides support for Association (Visa, MasterCard, etc.) encryption standards and Payment Card Industry Data Security Standards (PCI-DSS)
  • Facilitate completion of key management scoping questionnaires to gather the list of applications that use cryptographic keys, understand the metadata of the keys used, key management process/roles followed for respective applications and associated dependencies
  • Review existing documentation related to key management practices for identified applications and performs baseline gap analyses against the key management process control manual
  • Document the gaps in the existing key management practices for identified applications then determine the risk exposure from the identified gaps
  • Assist in troubleshooting the remediation of key management-related compliance gaps
  • Design and implement key inventory workflows sustain compliance with the Citi Key Management Standard and supporting processes
  • Bachelor’s Degree preferably in Computer Science, Engineering or a related quantitative discipline
  • Information Security certification
  • 7 to 10 years in Information Technology and/or Information Security
  • 5+ years of experience with complex global projects and programs, consulting or a related results-delivery function
  • 5+ years hands-on experience with data security, encryption, PKI including secure cryptographic key generation, storage, renewal, and archiving
  • Operational experience with operational cryptographic key management systems including Hardware Security Modules (HSMs)
  • Understanding of SP 800-130, SP 800-57 and other NIST Key Management related frameworks and standards
  • Demonstrated track record of designing/implementing security controls to protect information
  • Strong knowledge of software development/deployment methodologies (including agile or waterfall models)
  • Performed technology and business risk assessments covering areas such as data protection, application security and cryptographic controls
  • Able to demonstrate the principals of dual control and split knowledge
  • Ability to work independently under pressure and adjust to changing focus and priorities. Must be able to successfully execute with multiple, competing priorities without significant guidance
  • Outstanding analytical abilities and a disciplined methodical approach to problem-solving
  • Excellent influencing, facilitation, diplomacy and partnering skills with ability to motivate and inspire people
  • Understanding of effective design and use of encryption within/between applications especially where customer experience will not be impacted
  • Excellent skills in preparing and presenting strategies, recommendations, and value propositions to senior leadership teams
5

Information Security Senior Specialist Resume Examples & Samples

  • Designs, develops, implements and troubleshoots various information systems security software ensuring resolution
  • Develops, tests, and validates solutions to remediate exploitable conditions on enterprise devices and software such as custom applications, Web servers, mail servers, routers, firewalls and intrusion detection systems
  • Evaluates, codes (and/or assists developers) and implements software fixes (patches) to address complex system vulnerabilities such as malicious code (e.g. viruses), system exploitation using SQL injection, cross-site scripting, buffer overflows, parameter tampering, hidden field manipulation, cookie poisoning, and Web services manipulation
  • Conducts security assessments of complex systems, networks and applications using penetration tests and ethical hacking tools and risk assessment/mediation methodologies to evaluate vulnerabilities. Prepares status reports on security matters to develop security risk analysis scenarios and response procedures
  • Develops and implements security policies, procedures, and measures in a networking environment
  • Develops security solutions for complex assignments
  • Displays technical knowledge and expertise, in addition to a thorough understanding of the industry, when examining security issues, techniques and implications across multiple computing platforms and of varying complexity
  • Plays the role of a subject matter expert for Information Security when handling customer RFP’s, calls and concerns regarding Information Security elements of NASDAQ OMX products and services
  • Provides input and internal consulting to assist with assessment of risks, architecture and design of new solutions and projects to address Information Security concerns inherent in new initiatives
6

Information Security Senior Analyst Resume Examples & Samples

  • Tenable Security Center
  • WebInspect
  • Vulnerability Assessment tools
  • Ability to execute compliance reviews
  • Vulnerability Management
  • Technical Documentation
  • Communication (Written and Verbal)
  • Self-supervision experience
7

Information Security Senior Consultants Resume Examples & Samples

  • You hold a Master Degree / Engineer Degree in IT, Security, Mathematics, Economics or equivalent
  • You have 3 to 6 years of work experience in the field of IT and/or information security
  • You are willing to combine business understanding with technical skills and vice versa
  • You have experience or you are familiar with some corporate IT solutions (e.g. ERP, CRM, GRC, network infrastructures, etc.)
  • You are familiar with Risk Management, ITIL, ISO 27k, ethical hacking concepts
  • You are fluent in French and English
  • You are CISSP, CISA, CEH, OSCP, ISO 27001/22301 Lead Auditor/Implementer
8

Information Security Senior Spec Resume Examples & Samples

  • Perform log management and threat analysis set up and fine tuning. Design and architect tool for optimization
  • Perform daily operational real-time monitoring, analysis and resolution of security events from multiple sources including but not limited to events from Security Information Monitoring tools, network and host based intrusion detection systems, content filtering solutions, firewall logs, & system logs matching existing SLA
  • 5-8 years of Information Technology experience with network technologies, specifically TCP/IP, and related network tools and concepts
  • Subject matter expert (SME) in one or multiple areas such as Windows, Unix, Firewalls, Intrusion Detection, Threat Detection Analysis, or Information Risk Management
  • Knowledge of implementing and working with an open source log management solution good to have
  • CISSP, CAN, S+, or SANS GIAC GCIA certification desired
  • Experience managing SIEM solution or log management solution in a large and highly complex environment
9

Information Security Senior Analyst Resume Examples & Samples

  • Knowledge in Information Security standards and policies
  • 2+ years work experience with regulatory guidelines and controls around Identity Management
  • Knowledge and ability in applying Information Security Standards and Identity Audit policies in complex corporate environment
  • 2+ years work experience in data analysis and large data set queries in SQL or Access
  • Proven ability to drive and execute processes and standard procedures, operational tracking and readiness to improve the end product, operational efficiency and customer satisfaction
  • Strong analytical and problem solving skills. Must have good follow-up with strong attention to detail
  • Strong written and verbal English communication skills
  • General knowledge software development and solutions architecture
  • MBA, CISA, CISM, PMP certification preferred
10

Public Sector Information Security Senior Associate Resume Examples & Samples

  • Various phases of designing security solutions--conducting analyses, developing specifications, designing, constructing, testing and implementing information into prototypes and deliverables
  • Leading various aspects of full lifecycle delivery of information security related initiatives, including vision and strategy development, vendor selection, business use-cases, requirements gathering, solution analysis and development--designing, building, testing, deploying and activating
  • Identifying and addressing client needs by developing and sustaining deep client relationships using networking, negotiation and persuasion skills; preparing and presenting complex written and verbal materials; and defining resource requirements, project workflow and budgets
  • Leading teams to generate a vision, establish direction, motivate team members, create an atmosphere of trust, leverage diverse views, coach staff, and encourage improvement and innovation
  • Abstracting the solution architecture into different views and domains, apply critical thinking skills, technical ingenuity, creativity, and resourcefulness to establish viable security levels and standards
  • Utilizing oral and written communication skills when interfacing and collaborating with clients, peers, and management to develop solutions, emphasizing a client-based focus to understand and respond appropriately to business requirements
  • Integrating work across relevant areas, emphasizing the development of business and services to enhance customer satisfaction and productivity, manage risks and safety appropriately, development and execution business plans, manage information, and providing of exceptional service to internal and external customers
  • Exhibiting effective resource and project planning, decision making, results delivery, team building, and staying current with relevant technology and innovation.This role supports client work contractually requiring US Citizenship and a Secret Level Security Clearance
11

Information Security Senior Manager Resume Examples & Samples

  • Leading, coaching and developing a multi-location team of 7-10 staff (both employees and non-employees)
  • Managing expectations and performance for both project managers and technologists
  • Overseeing the creation and maintenance of 10-20 robust project plans, primarily related to EERS governance, compliance and efficiency
  • Coordinating timely deliverables against the project plans
  • Leading IAM-wide meetings to support projects
  • Ensuring the Identity and Access Management monthly metrics and operating reports are generated timely and accurately
  • Building strong cross-sector and cross-regional partnerships to improve the Identity and Access Management (IAM) posture at Citi
  • Guiding technology efforts, such as complex metrics design, data analytics and robust database management
  • Excellent communication and presentation skills to interact with Senior Management within GIS and across other areas
  • Bachelor's Degree or relevant business experience required
  • 1-3 years’ staff management experience
  • Demonstrate influencing, facilitation, and partnering skills in a decentralized environment
  • Technical proficiencies in MS Word, Excel, PowerPoint, and MS Access, and Business Objects
12

Information Security Senior Manager Resume Examples & Samples

  • Coordinates and manages integration of SoD plans into project activities. Partner with the CATE/CTO, Operational Risk Management, sectors, regions and GIDA to implement the strategic plans
  • Accountable for managing actual project schedules against the project estimates across broad business and technology areas. Report significant variances and develop corrective action plans, as required
  • Interact with and influence senior Sector/Regional Business partners and O&T (CATE / CTI) to support strategic initiatives in alignment with GIS and interdisciplinary goals
  • Considers alternatives and conflicting needs to arrive at risk appropriate solutions
  • Communicate project plans and routine updates on project status and issues/risks to the project team, stakeholders and management
  • Participates in the high visibility Program Andes, with regular working meetings and presentations to multiple Managing Directors
  • Responsible for the strategy and implementation of controls and processes to reduce risk in our highest dollar transaction areas (wire/funds transfers). This includes extensive senior change management skills to influence core process changes within large operational business areas
  • Requires strategic thinking skills to navigate the technical and operational components of the solutions and achieve the vision for success
  • Regularly interacts with global auditors and is responsible for key controls under KPMG entity review
  • Sets strategy and is responsible for the drive, prioritization and implementation of projects to support the strategy. Role includes regular and frequent interaction with seniors in GIS, business sector representatives, ORM, and Finance
  • Minimum Bachelor's Degree, Masters / MBA preferred
  • Minimum 5 years managing global, diverse staff across several work streams
  • Minimum 3-5 years’ experience with Segregation of Duties tools, procedures and policies
  • Leadership and adaptability when facing unique challenges encountered on projects, including ability to influence and negotiate to lead necessary change within and beyond team
  • Minimum 5-10 years’ experience in project management, ideally with Project Management Professional (PMP) certification
  • Experience with Operational Risk Management is preferred; prior consulting experience is a plus
  • Minimum 5-10 years’ experience with analyzing and documenting business requirements and interfacing with application developers
13

Information Security Senior Specialist Resume Examples & Samples

  • Meet service level agreements(SLA’s) regarding response time and customer notifications
  • Provides central contact point for user support and problem management for managed security applications (Firewall, IDS, Encryption, SIEM, EIQ, Web filtering)
  • Service and Change management knowledge and understanding a must
  • Provide oversight and guidance to junior team members as it relates to the Security realm
  • Document and create process improvements as needed when gaps are/have been identified
  • Knowledge of Microsoft Office Suite products
  • Excellent and demonstrated knowledge of IT processes and procedures, specifically Incident, Problem, Change and Service Level Management
  • ITIL v3 Foundations preferred
14

Information Security Senior Resume Examples & Samples

  • Network & Application Penetration Testing: Evaluates, tests, scans to determine weaknesses in client IT operations, processes, systems, and related controls. Presents solutions based on findings to engagement team
  • Security Awareness Training: Ensures training sufficiently educates employees to recognize threats, use security controls, and highlights the role of everyone to improve the organization’s security posture. Recommends training needed and timing of delivery
  • Participates in the execution of the information technology audits, including definition of audit scope, control evaluation, test activities, audit reporting, issue resolution, and risk assessment for assigned audit objectives
  • Executes on security and operational audits in various computing environments
  • Identifies information technology internal control structures and strategies through appropriate forms of investigation and consultation
  • Experience in an IT security role, analyzing multiple aspects of information security for organizations. Previous experience in a support or development role, related to applications development, desktop, server, or network infrastructure preferred
15

Information Security Senior Resume Examples & Samples

  • Lead the development, update and compliance of IS standards, IS Charter/s, Baseline Security Configurations in accordance with industry standards, best practices and IS GRC Standard Operating Procedures (SOP)
  • Work with technical teams to ensure baseline configurations are kept current and configurations for new technologies are designed and built prior to integration into the Freddie Mac environment
  • Develop the comprehensive Information Security Awareness program and run year round campaigns. Create communications on behalf of IS for awareness activities, initiatives or other required IS announcements. Assist in developing IS awareness materials including presentations, brochures, posters and other medium as necessary
  • Arrange IS speakers, brown bags and all-employee IS awareness presentations and develop marketing materials for the presentations
  • Assist in audit response activities
  • Provide security consulting and advisory services to business units and project teams regarding IS policies, standards, and configurations
  • Develop and maintain relationships with internal and external customers to formulate information security governance solutions for Freddie Mac
  • Research and maintain knowledge base regarding information security issues, solutions and potential implications for Freddie Mac
  • At least 5 to 6 years of hands-on information technology Governance, Risk and Security experience
  • Bachelor degree in Information Systems or related field or an equivalent combination of education and experience
  • Experience managing and developing information security policies and standards, to include a solid understanding of industry frameworks (ISO, COBIT, NIST, etc.)
  • Experience in developing and running Information Security awareness program and campaigns
  • CISSP, CISA, CISM or equivalent designation
  • Experience using Risk Management (GRC) tools is a plus (i.e., Risk Vision, Archer)
  • Demonstrated organizational skills with respect to time management and work production
16

Information Security Senior Associate Resume Examples & Samples

  • Lead dynamic teams in information security engagements, with a focus in the implementation of Governance Risk and Compliance (GRC) solutions to provide technology enablement of risk-related processes
  • Lead discussions and workshops with clients to create a risk-aware culture through proper technology enablement of risk-related processes using GRC solutions
  • Design and architect solutions to automated client processes into GRC solutions to meet their unique requirements
  • Effectively manage and motivate client engagement teams with diverse skills and backgrounds
  • Monitor progress, manage risk and ensure key stakeholders are kept informed about progress and expected outcomes
  • Demonstrate deep technical capabilities and professional knowledge
  • Evaluate and assess the security posture of client environment such as network infrastructure and IT assets
  • Strong understanding of compliance and risk management processes. Facilitation of information gathering workshops
  • In-depth knowledge on information security internationally accepted standards (e.g. ISO27001). Knowledge in local regulatory guidelines (e.g. MAS Technology Risk Management Guidelines) would be an advantage
  • Experience in engaging and managing a variety of stakeholders with an ability to consult, provide recommendations, and develop solutions using GRC solutions
  • Practical experience and understanding of technology and business processes in providing related information security advisory considerations
17

Information Security Senior Resume Examples & Samples

  • Communicate IS Standards and requirements for Freddie Mac owned or operated custom developed and third-party applications
  • Perform security risk assessments (SRA) according to the Freddie Mac SRA framework and IS standards
  • Document identified IS risks to incorporate relevance and impact to Freddie Mac systems, infrastructure and business process
  • Understand and communicate how vulnerabilities can be exploited within technology and the Freddie Mac environment in a manner that resonates with the business areas
  • Provide remediation recommendations and/or recommend alternate solutions to resolve exceptions to IS Standards
  • Provide security consulting and advisory services to business units and project teams
  • Develop and maintain relationships with internal and external customers to manage IS risks
  • Provide quality control reviews and guidance to junior staff members on performing risk assessments, assigning risk ratings and analyzing mitigating actions
  • Minimum 6 - 10 years of hands-on technology risk, security and/or governance experience
  • Minimum Bachelor degree in Information Systems or related field or an equivalent combination of education and experience
  • Solid understanding of information security policies, standards, industry best practices, and frameworks. (ISO 27K, NIST 800 series, COBIT, etc.)
  • Solid understanding of network security, OSI model, and information security architecture
  • Secondary mortgage market or equivalent financial services experience
  • Experience using Risk Management tools is a plus
18

Information Security Senior Resume Examples & Samples

  • Work with Business Continuity management to ensure that tools and systems managed by Information Security Operations team adhere to disaster recovery and business continuity plan, disaster recovery (DR) strategy and procedures
  • Establish and maintain the DR procedures for tools and systems managed by Information Security Operations such as CA Control Minder / (eTrust ) Access Control, Vormetric Data Encryption, RSA Authentication Manager(SecureID), SailPoint, Oracle Identity Manager etc
  • Work with the other technical teams to ensure that disaster recovery solutions are adequate, in place, maintained, and tested as part of the regular operational life cycle
  • Develop, understand and execute all testing necessary for a successful DR execution for tools and systems managed by Information Security Operations
  • Represent Information Security Operations team in all DR exercises
  • Support the DR Site in case of a real Disaster Recovery or DR testing
  • Provide ongoing feedback for risk management, mitigation, and prevention
  • Regularly report Disaster Recovery activities to upper management
  • Act as liaison for auditing and examination of disaster recovery processes
  • Coordinate with other support teams to ensure issues impacting tools and systems are resolved quickly and effectively
  • Augment production support team to ensure 24/7 coverage and operations; Responsibilities sometimes require working evenings and weekends, sometimes with little advanced notice
  • Bachelor’s degree, with a technical major, such as engineering or computer science
  • 5-7 years of professional IT experience, with at least 3 years of information security experience
  • Experience with Security products in a senior role including experience with policy configuration, application integration and firmware deployment
  • Knowledge and understanding of Unix commands, and other scripting languages
  • Strong understanding of server/file encryption technology, encryption key management and information security policy
  • Advanced technical proficiency with Windows and Linux Server support and Systems Administration
  • Knowledge of PKI certificates and their use in secure environments
  • Experience with UNIX administration/CA Access Control
  • Experience with Identity and Access management tools such as SailPoint, Oracle Identity Manager
  • Experience with Password Management solutions such as Cloakware & Cyber-Ark
  • Experience with Web Logic, Tomcat, Apache administration
  • Advanced knowledge of concepts such as LDAP, Virtual Directory, Meta Directory, and LDIF is desirable
  • Exceptional organizational skills with an ability to manage multiple priorities in a fast-paced dynamic environment
  • Ability to work effectively under aggressive timelines
  • Proven written and verbal communication skills with both Business/Management and Technical/Engineering resources
19

Information Security Senior Resume Examples & Samples

  • Bachelors (4-year) degree, with a technical major, such as engineering or computer science
  • Good understanding of database technologies such as Oracle, Sybase, MS SQL etc
  • Understanding of data masking, server/file encryption technologies, encryption key management and information security policy
  • Exposure to UNIX scripting or any other scripting technologies
  • Ability to prioritize work without management direction, and provide clear and documented status updates to the management and the team
  • Must have the ability to learn and adapt to new capabilities based on the needs
  • Advanced problem solving skills and ability to work effectively under aggressive timelines
  • Experience in supporting Encryption and/or Security Appliance Devices
  • Experience in deploying and managing Informatica DDM Product
  • Technical proficiency and experience in deploying and managing the Vormetric Encryption Product
  • CISSP or Security+ certification will be a plus
20

Information Security Senior Associate Resume Examples & Samples

  • Assist all Business Units with client questions and audit activities related to information resources security
  • Assist with technology administrative tasks related to security including but not limited to log monitoring and vulnerability management
  • Work with all areas of IT to implement and maintain information resources security
  • Remain current with changes in information resources security legislation and regulations
  • Assist with firm Disaster Recovery database and all documents within it
  • Technology certifications desirable but not required (CISSP or CISA)
  • Experience with development of security procedures, technical configuration standards, and guidelines
  • Exposure to security awareness/education and training of end users and IS staff
  • Experience with and knowledge of technical support and troubleshooting methods
21

NIS Information Security Senior Associate Resume Examples & Samples

  • Understanding and leveraging information security policy and procedure development and maintenance (including security awareness and role-based security training)
  • Performing and maintaining formalized risk assessments
  • Maintaining Insider Threat Awareness training process
  • Implementing and overseeing a compliant Risk Management Strategy
  • Providing insight to overall security strategies and evaluating organizational progress towards agreed upon goals, and finding solutions to complex issues in order to maintain timelines and achieve project success
  • Writing, communicating, facilitating and presenting cogently; to and/or for all levels of audiences, and internal staff and management
  • Developing team building skills that foster an inclusive and collaborative environment for stakeholders and team members; and,
  • Identifying and addressing leadership and stakeholder needs
  • Collaborating effectively with all levels of stakeholders and project resources to gather information for various project management activities, adapting strategy as needed
  • Leveraging creative thinking, problem solving, and technology (i.e., MS Office Suite, Lotus Notes, Google at Work and other firm-sponsored technologies) to develop deliverables and analyses
  • Working independently on projects, influencing line manager by providing project and operational planning and implementation; and,
  • Keeping team and leadership informed on progress and or issues affecting deliverables and/or the department
22

Information Security Senior Resume Examples & Samples

  • Experience with administrating, implementing and supporting SailPoint (Identity IQ) based Identity and access management solutions
  • Experience with implementing the Oracle Identity Management (OIM) 11g solution and Oracle Entitlement Server (OES) will be a huge plus
  • Experience with developing and deploying connectors
  • Understanding of SailPoint, OIM 11g specific database administration
  • Must have a good working knowledge of Java and SQL with an ability to fix issues identified in logs and other error messages
  • Must have ability to troubleshoot any system failures, identify root cause and fix issues, ensuring the availability and integrity of the system
  • Experience with Password Management solutions such as Xceedium Cloakware & Cyber-Ark
  • Understanding of server/file encryption technology, encryption key management and information security policy
23

Information Security Senior Consultant Resume Examples & Samples

  • Conduct Information Security risk assessment and create and maintain the system security plan
  • Manage remediation of identified control deficiencies
  • Evaluate proposed changes to the system to identify potential adverse effects to the security posture of the system
  • Support audit and client engagements, coordinate the collection, review and submission of Information Security deliverables and coordinate the remediation of audit concerns
  • Review audit logs, user accounts, physical security and such for anomalies and accuracy
  • Promotion of information security awareness through various communications channels within the organization
  • Coordinate business continuity and disaster recovery test activities
  • Produce weekly reports to management on security status of project
  • Perform other duties as may be assigned by management
  • Bachelor's degree from an accredited college or university required
  • 5-7 years with information security standards and risk management framework experience required
  • Certification in CISSP or CISA preferred
  • In-depth knowledge of OS, layered products, storage and network architectures and hosting solutions
  • In-depth knowledge of business operations, strategies, and objectives
  • Knowledge in software engineering languages, methodologies and tolls; proficient in new and emerging technologies
  • Extensive experience in supporting a mission critical 24x7 production environment in an engineering role and experience in troubleshooting and diagnosing event to address real-time production issues
  • Expertise in Anti-Malware technologies
  • Understanding of security incident response methodology and use case development
  • Excellent verbal communication skills, strong analytical, and organizational skills
  • Results driven individual who can manage multiple complex assignments, management assignments based on criticality, in a timely and professional manner
  • Ability to perform quantitative and qualitative analyses of existing business processes based on in-depth industry knowledge of organizational and/or client objectives
  • Ability to influence senior level leaders regarding matters of significants
  • Ability to negotiate with internal and external customers to gain desired outcome
  • Ability to work under standards-based performance measures
  • Ability to successfully manage many complex tasks simultaneously
  • Must be able to remain in a stationary position for an extended period of time
24

Information Security Senior Data Engineer Resume Examples & Samples

  • Confident with building active-active distributed infrastructure
  • Capable with messaging system such as RabbitMQ, Kafka, ZeroMQ
  • Comfortable with HBase, Cassandra, or similar distributed non-relational databases
  • Extremely proficient with relational databases such as PostgreSQL
  • Experience working with Time Series databases such as InfluxDB or Riak TS
  • Experience with HDFS or other distributed file systems
  • Experience with information retrieval technologies like Elasticsearch, Solr, Lucene
  • Experience with configuration management tools such as Ansible, Chef, and/or Puppet
  • Experience with one or more programming languages such as Java, Ruby, Python, Golang, or others
  • Experience developing REST-ful web service APIs
25

Information Security, Senior Manager Resume Examples & Samples

  • Manage global Identity and Access Management (IAM) systems, Single Sign-On(SSO) and related Governance Risk and Compliance(GRC) technologies and their life cycle management
  • Manage the technology from architecture, design to implementation for all Identity Lifecycle management and access management projects in complex networked environments
  • Develop IAM strategy, To-Be architecture, roadmap and implementation plan based on business requirements from applications, tools and cloud services requirements
  • Manage sustaining services of existing IAM and SSO services
  • Execute consolidation of legacy platform based on roadmap
  • Provide leadership and work with business team for authoritative source of identity and process streamline
  • Manage Security integration projects for ERP, key application apps and other IT services for Identity and Access Management, GRC including internal controls
  • Manage centralized account administration services
  • Present reports on performance and dashboard
  • Support reporting mechanisms to capture information on the status of the environment
  • Develop application integration playbook for security
  • Establish and maintain structured approach for maintaining effective IT General Controls (ITGC) and documenting change management
  • Evaluate all staff positions, responsibilities and individuals for appropriate performance, skills, potential for improvement and growth and organizational development. Develop detailed plan for staffing changes, training, enrichment and personal development
  • Reevaluate current technology platforms, consolation of toolsets and consulting and outsourcing arrangements
  • 15 + years of experience on IT or related
  • 10+ years of experience directly related to IAM, SSO, GRC
  • 10+ years of IT management
  • Technical knowledge and understanding on below area
  • Identity and Access Management system architecture including RBAC
  • Single Sign On using SAML standards
  • Active Directory systems
  • Application security and internal controls
  • Segregation of Duties
  • Cloud applications / application access controls
  • Privileged account management
  • SOX compliance
  • ERP & GRC
  • Web application access control
  • Strong project, team, people management skills
  • Ability to compile, analyze, and summarize data for communication
  • Strength in communicating effectively
  • Demonstrated ability to handle heavy multi-tasking
  • Clear ability to complete work with minimal oversight
26

Information Security Senior Manager Resume Examples & Samples

  • 5-8 years’ experience in Information Security
  • Leadership with the ability to see the big picture without losing attention to detail
  • Very strong problem solving and analytical skills
  • Very strong meeting organization and facilitation skills
  • Very strong oral and written communications skills and bilingual
  • Very strong Customer and Vendor relationship management skills with the ability to handle conflict and negotiations
  • Flexible and adaptive, collaborative team player
  • Ability to work well under pressure, to prioritize work, and to be well organized
27

Pci-information Security Senior Specialist Resume Examples & Samples

  • Identify, document and maintain in-scope applications, locations and IT controls
  • Identify IT process/control owners
  • Communicate success/fail criteria of IT controls
  • Provide guidance to IT control owners
  • Monitor on-going PCI compliance for IT controls
  • Coordinate development of remediation plans for IT controls
  • Facilitate work of QSA firms
  • Identify changes in IT environment impacting the card data environment
  • Identify impact of changes to PCI standards
  • Communicate PCI requirements to PCI Coordinators
  • Perform PCI readiness reviews for new systems
  • Provide PCI-DSS implementation guidance to Cigna companies
  • Effectively manage multiple competing priorities
  • Identify, document, and evaluate IT controls
  • Optimize processes for testing and reporting on effectiveness of IT controls
  • Engage matrix partners on the upfront implementation of key controls
  • Manage control remediation activities
  • Timely reporting on project status
  • Develop management reports
  • Develop insights and influence positive change in the control
  • Produce high-quality deliverables
  • Perform special projects as required by management
  • Several years of work experience with information security, IT controls, or IT audit
  • Bachelor’s Degree in Computer Science, Business Administration, or other related field preferred (or equivalent work experience); graduate degree or coursework a plus
  • At least 1 year of PCI compliance experience preferred
  • Has a ‘can do’ positive attitude
  • Working knowledge of industry information security standards such as ISO 27001 and NIST SP 800 series publications, and familiarity with internal controls frameworks such as COSO or COBIT
  • Advanced user of MS Office tools (Word, Excel, Powerpoint, Visio and Access)
  • Consistently demonstrate key competencies: courage, developing direct reports, hiring and staffing, managing through systems, managing vision and purpose, and professional savvy
  • CISA and/or CISSP certification strongly preferred; CISM, CBCP, CIA, CIPP, CRISC, CGEIT, or other professional certifications a plus
  • PCI QSA/ISA certification strongly preferred
28

Information Security Senior Analyst Resume Examples & Samples

  • Infrastructure management. Includes health monitoring, capacity planning, policies, administration and support of various security tools and products. Technical support for security, network and server operations. Reviews and support break/fix changes from vendors
  • Incident response.Provides support for security incident resolution whether identified through internal monitoring activities or external notification
  • Ticket handling includes being able to open, escalate, and resolve tickets, while properly documenting all troubleshooting steps
  • SIEM Content and Monitoring.Operational and security threat monitoring with limited content creation with ArcSight
  • Mentorship.Acts as a role model, trainer and mentor to less experienced team members
  • Contribute to documentation and process improvement.Continually evaluate process, procedures and documentation to ensure success
  • IT project resource.Participates in IT projects as requested
  • Security thought leadership and research
  • Change management responsibilities include the acceptance, review, planning and implementation of approved changes
  • On Call Duties.Must be able to support rotating on call
  • Other duties and responsibilities as required
  • Bachelor’s degree in computer science, information systems, or related field OR equivalent work experience required. Master’s degree a plus
  • 3 to 5 years of progressive IT and Information Security experience including at least 2 years of systems support and/or event/incident management experience and at least 1-2 of experience in a dedicated security device management position
  • Experience in a Windows and/or Linux environment with a primary focus on security vendors
  • Proficient in complex troubleshooting. Able to identify problems and drive to solve, which may include researching, scripting or other technical means
  • Should have a good understanding and extensive hands-on experience with various security technologies e.g. VPN's, IDS/IPS, end point security solutions (AV, HIPS, and Hard Disk Encryption), strong Authentication products, Security Event Monitoring/Management solution/Log Management Solution, Content Security Gateways (Web/Mail Security Gateways), Scripting solutions
  • Should have thorough understanding about interoperability of various networking components and security components
  • Experience working with HPE ArcSight is strongly preferred
  • Experience in scripting is preferred
  • Excellent analytical, time management, organizational and problem-solving skills with the ability to multi-task and work in a deadline-driven environment
  • Must be self-motivated team player with strong attention to detail, high level of accountability, and the ability to work somewhat independently and excel under pressure
  • Must have excellent verbal, written, and interpersonal communication skills and the ability to engage with business partners to understand their requirements
  • Must be able to respond to calls as needed (24/7)
29

Information Security Senior Resume Examples & Samples

  • At least 5 years’ experience in Identity and Access Management, provisioning or related experience with one or more of the following platforms
  • Experience in the Financial Industry
  • Ability to communication clearly, effectively, and persuasively with team members and leadership
  • Experience with the following: Unix shell scripting, Windows Powershell, SQL, ODBC, and Excel macros
  • Bachelor’s degree in Computer Science, Information Technology, or Business Management
  • Ability to influence and guide decision making
  • CISSP or security related certification
30

Information Security Senior Business Control Specialist Resume Examples & Samples

  • 1) Manage risk intake process within GIS from risk identification to action plan creation
  • 2) Liaison between GIS key leaders and external partners for issue creation
  • 3) Prepare for Internal routines
  • 4) Maintain air traffic control for internal reviews
  • 5) Lead / participate in risk / debate meetings
  • 8) Establish effective risk reporting to provide a clear understanding of our risk profile
  • Information Security & Technology professional
  • 5+ years of risk management experience with proven ability to effectively apply risk principles to challenging business situations; understanding of information security risk
  • Exhibit strong relationship management and interpersonal skills
  • Bachelor's and/or Master’s degree
  • Detailed, bank specific risk management and governance experience
31

Global Information Security Senior Engineer Resume Examples & Samples

  • Assist in designing and supporting the overall security architecture of the enterprise systems environment
  • Assist in designing and supporting the enterprise identity and access management program
  • Provide defensive security services, specializing in the development and continuous tuning of components of the company’s defensive and detection infrastructure
  • Interface with the GIS Operations team regularly to assist in operationalizing and integrating ongoing incident response and cyber intelligence outputs into necessary infrastructure/tools
  • Update job knowledge by tracking and understanding emerging security practices and standards; participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations
  • Minimum of three years of information security experience in a corporate or consulting environment
  • Certified Information Systems Security Professional (CISSP) from ISC2
  • (any) Global Information Assurance Certification (GIAC) from SANS
  • Offensive Security (OSCP, OSCE) certification, knowledge and/or penetration testing experience a plus
  • Knowledge of common information security management frameworks and practices such as ISO/IEC 17799:2005 and ISO/IEC 270xx, National Institute of Standards and Technology (NIST), and the United States Computer Emergency Readiness Team (US-CERT)
  • Effective technical skills to understand the ramifications of various system security recommendations and decisions
  • Excellent oral/written communication, problem solving and analytical skills
32

Information Security Senior Project Manager Resume Examples & Samples

  • BS/BA preferred or equivalent experience
  • PMP Certificate Required
  • CSM (Certified Scrum Master) Preferred
  • Typically have 8 – 12 years of directly related experience
  • Experience with both agile/iterative development and waterfall project methodologies
  • Experience working as a liaison between key business sponsors and the technical teams
  • Experience with coordinating and facilitating User Acceptance Testing
  • Experience managing with at least 2 large, long-term programs with multiple projects within each program simulateously
  • Experience with working with Project Server, SharePoint, Microsoft Office tools such as Project Professional, Word, Excel, Outlook, and PowerPoint
  • Experience documenting and explaining project financials (budget vs. spend per cost center)
  • Basic, high-level understanding of each major IT discipline (Information Security, Infrastructure, Application Development)
  • Competence in writing and communicating in both a detailed level and in an executive summary level
  • A go-getter attitude, ready to take on challenges, while maintaining cohesion and a collaborative enviroment and handling a heavy workload
  • Ability to follow required PM processes and audit requirements
  • Ability to work with the team to convert ambiguous requirements into more specific requirements upon which project scope can be built
  • Ability to be flexible with the unknowns of projects, while maintining a handle on the health of the program/project scope, schedule, and financials
33

Information Security Senior Resume Examples & Samples

  • Perform security risk assessments (SRA) for Freddie Mac applications and infrastructure platforms by gathering inputs from security architecture reviews, Pen test, SAST and DAST results, Information Security standard gaps, document identified Information Security risks to incorporate relevance and impact to Freddie Mac systems, infrastructure and business process
  • Provide remediation recommendations and/or recommend alternate solutions to resolve InfoSec risk issues
  • Support requirements gathering and design efforts of critical projects and process improvement efforts as needed
  • Define and report Security risk assessment metrics
  • At least 6 to 10 years of hands-on technology risk, security and/or governance experience
  • Demonstrated knowledge in penetration testing, vulnerability scanning, DAST and SAST tools and techniques
34

Information Security Senior Associate Resume Examples & Samples

  • Responsible for leading the Bank’s multi-year transformation activities of IAM
  • Work closely with business area IAM representatives to identify, analyze, and comprehensively understand IAM business processes and business area specific requirements
  • Apply change management methodology and support the development of the prioritization model for integrating applications with National IT IAM technology solutions
  • In conjunction with the Business Area IAM representatives, develop executable approaches to address business process changes required to comply with IAM standard operating procedures
  • Ensure recommended process and technical transformations adhere to applicable IAM policies and standards
  • Understanding of industry standard information security control frameworks, and particularly their interaction with IAM processes, procedures, and accepted best practices
  • Provide thought leadership and engage in close collaboration with the Federal Reserve System’s IAM community
  • 5+ years of experience in designing and deploying change management strategies, preferably for technology related initiatives, ideally with IAM initiatives
  • 5+ years of experience in developing training and awareness programs and strategic communication strategies. Strong awareness of IAM controls with ability to determine business requirements for change management plan
  • Experience in collaborating within cross-functional organizations, with demonstrated ability to conduct working sessions at various levels of the organization
  • Understanding of technology/system development lifecycle is preferred
  • Understanding of IAM products and services. Ability to communicate with technical and executive audiences, including experience in interfacing with business areas
  • Experience in gathering requirements, documenting and assessing information while developing enterprise strategies
  • Knowledge of technology trends and developments in the areas of IAM, and knowledge and experience with formal security and control frameworks such as ISO 17799, COSO, ITIL, and NIST SP 800-53 that have applicability to the discipline
  • Record of building and maintaining relationships with a consultative and engaging style
  • Highly collaborative working style, strong interpersonal capabilities and relationship building; proven ability to manage diverse client and stakeholder relationships, and to collaborate effectively with customers and colleagues; proven ability to successfully convey complex topics and otherwise communicate with diverse audiences
  • Excellent influence and negotiation skills; ability to facilitate discussions around complex issues and bring them to resolution
  • Demonstrated ownership and accountability for operational and project excellence
  • Mission-driven orientation, with a strong interest in public service
  • Strong commitment toward diversity and inclusion and one who values diversity of background, thought and perspectives
  • Unquestionable ethics and integrity
  • Ability to satisfy the Federal Reserve System’s Conflict of Interest requirements
35

Information Security Senior Engineer Resume Examples & Samples

  • Requires Bachelor's degree (in field telecommunications, electrical engineering, computer engineering, computer science) or equivalent and five to seven years of experience with information networks and the security aspects
  • Requires deep knowledge of virtualization, Microsoft Windows systems, Linux networking devices, audit collection systems, knowledge of accreditation practices
  • Experience working in or consulting to the Entertainment Industry, MPAA Data Security Standard, OWASP
  • Infrastructure implementation, support or design experience (ex. firewalls, routers switches, host OS, etc.)
  • Experience performing network and application security testing
36

Corporate Information Security Senior Specialist Resume Examples & Samples

  • Bachelors Degree in related fields; Masters Degree preferred
  • At least 5 years of experience with 3 years in the field of information & cyber security
  • Professional Certifications CISA, CISM, CRISC, SSCP, ISA preferred
37

Information Security Senior Analyst Resume Examples & Samples

  • Configure networks and servers during new deployments as well as site remediation’s to ensure their smooth and reliable operation for fulfilling business objectives and processes
  • Monitor network performance and troubleshoot problem areas as needed
  • Ensure network connectivity of all servers, workstations, telephony equipment, fax machines, and other network appliances
  • Practice network asset management, including maintenance of network component inventory and related documentation and technical specifications information
  • Monitor and test network performance and provide network performance statistics and reports
  • Participate in managing all network and cloud security solutions
  • Provide detailed documentation and artifacts related to network and cloud implementations and issues encountered during deployments
  • After hours support could be required on an as needed basis
  • 4-8 years of progressive experience,
  • Strong problem solving, analysis, design, communication, documentation, implementation, customer service skills
  • Strong experience in multiple network protocols and practical application in an enterprise networking environment
  • In-depth knowledge of routing, switching and WAN services
  • Strong experience with router and switch configuration
  • Understanding of firewall configuration
  • Broad knowledge of networking concepts, TCP/IP, subnetting, VLANs
  • Firm understanding of WAN protocols (BGP, EIGRP, MPLS and OSPF)
  • Install all new hardware, systems, and software for networks and cloud
  • Install, configure, and maintain network services, equipment and devices
  • Plans and supports network and computing infrastructure
  • Perform troubleshooting analysis of servers, workstations and associated systems
  • Documents network problems and resolution for future reference
  • Monitors system performance and implements performance tuning
  • Oversee network security
  • Strong analytical abilities and professional office experience needed
  • Understands the issues involved with administering and maintaining corporate infrastructure, including network connectivity, Internet access, email, etc
38

Information Security Senior Resume Examples & Samples

  • Work with Business Continuity management to ensure that tools and systems managed by Information Security Operations Monitoring & Encryption team adhere to disaster recovery and business continuity plan, disaster recovery (DR) strategy and procedures
  • Establish and maintain the DR procedures for tools and systems managed by Information Security Operations Monitoring & Encryption including, but not limited to, Database Security monitoring tools such as IBM Guardium, Imperva SecureSphere Database Security solutions, and Trustwave DbProtect, data loss prevention
  • Develop, understand and execute all testing necessary for a successful DR execution for tools and systems managed by Information Security Operations Monitoring & Encryption team
  • Support the DR site and administer monitoring and encryption toolsets in case of a real Disaster Recovery incident
  • Establish and maintain operational, configuration and other process/procedures to ensure effectiveness of new and existing detective and preventative configuration policies
  • Coordinate with other infrastructure, engineering and application project/support teams to ensure new policies/assets are deployed and issues impacting tools and systems are resolved quickly and effectively without adversely impacting the affected business systems
  • Draft and maintain technical installation, configuration and customization specification documents
  • Support planning, coordination and execution of system changes per established enterprise change process
  • Augment production support team to ensure 24/7 coverage and operations. Responsibilities sometimes require working evenings and weekends, sometimes with little advanced notice
  • Bachelors (4-year) degree, with a technical major, such as engineering or computer science or equivalent work experience
  • Experience with Security products in a seasoned professional or senior role including experience. with policy configuration, application integration and software deployment
  • Experience with administrating, implementing and supporting enterprise Database Security solutions
  • Must have a good working knowledge of Unix commands, shell scripting (Unix, PowerShell, Python, etc.) and SQL
  • Ability to think critically to troubleshoot ability to fix identified system issues/failures, identify root cause and fix issues on a timely basis while maintaining the availability and integrity of the system
  • Experience implementing and/or maintaining Database Activity Monitoring (DAM), Vulnerability Management (VM), Baseline Security Compliance Monitoring and Data Discovery policies and processes
  • Experience with additional web application, network, desktop endpoint and server monitoring, log management (aggregation/correlation), public key infrastructure (PKI) and encryption Security solutions
  • Advanced knowledge of security concepts such as data loss prevention (DLP), web application firewall, infrastructure and web application vulnerability assessments, baseline hardening standards (CIS, DISA, etc.), endpoint protection is desirable
  • Experience with Unix, Windows, Database administration a plus
  • Splunk administration experience a plus
  • CISSP or Security+ certification a plus
39

Information Security Senior Project Manager Resume Examples & Samples

  • Ensures requirements for internal technology projects align to operational standards. Develop alternate requirements or document exceptions as appropriate
  • Identifies needed resources for projects, defines and assigns major project roles
  • Assigns and monitors work of project team, providing technical and analytical support and direction. Interfaces with external clients or field-based employees on technical matters as needed
  • Manages project risks, issues/problems, and activity progress to ensure project goals (e.g., deadline, scope, and quality) are achieved. Assists with problem resolution or risk mitigation as needed
  • May manage the integration of vendor/subcontractor tasks, and track and review vendor/subcontractor deliverables, if appropriate for the project
  • Serves as liaison between technical and non-technical teams, in internal organizations as well as in client and vendor/subcontractor organizations, to ensure all project targets and requirements are met
  • May directly oversee employees assigned to manage specific project that have a distinct beginning and end. Selects, develops, and evaluates personnel to ensure the efficient operation of the function
  • Identifies project management coordination process gaps or areas for improvement, recommends and implements solutions
  • Extensive knowledge of project management standards, processes, procedures, and guidelines
  • Knowledge of the industry project management best practices (i.e., Project Management Body of Knowledge - PMBOK)
  • Knowledge of various types of IT project methodologies and life cycles (e.g., conversions, incremental, rapid delivery, classic or traditional waterfall phases of analysis, design, development, testing, implementation) and the correct project application
  • Knowledge of standards relevant to the software industry (e.g., ISO, CMM, Six Sigma)
  • Knowledge of company's products and services
  • Skill in the use of negotiation techniques to reach agreement when there are widely-differing viewpoints
40

Information Security Senior Resume Examples & Samples

  • Support monitoring & encryption systems and provide tool administration support
  • Perform daily system monitoring, verifying the integrity and availability of all hardware, server resources, systems and key processes, reviewing system and application logs, and verifying completion of scheduled jobs such as backups
  • Apply patches and upgrades on a regular basis, and upgrade administrative tools and utilities
  • Configure new and maintain existing services as necessary
  • Install, configure, troubleshoot and support Database Security monitoring tools such as IBM Guardium, Imperva SecureSphere Database Security solutions, and Trustwave DbProtect
  • Experience with Security products in a seasoned professional or senior role including experience with policy configuration, application integration and software deployment
41

Corporate Information Security Senior Data Analytics Team Lead Resume Examples & Samples

  • Gather, review, analyze, profile, validate and map system data into the data warehouse to meet information security reporting and analytical business needs
  • Perform complex data analysis and troubleshooting on security data ingestion issues reported by production support and other teams
  • Determine and analyze line of business requirements, use system data, and provide input needed by various departments and senior management to produce business reports
  • Work with developers to test and validate data attributes and with other business consultants to ensure data is integrated consistently, regardless of the source system
  • Translate high level business requirements into functional specifications for the IT organization and manage changes to such specifications
  • Partner with data owners to understand business applications and associated data flows
  • Work with source system business analysts to understand system log nuances and resolve data issues
  • Take ownership of issues through resolution, including close coordination between business representatives, IT staff and data warehouse administrators
  • Create and maintain clean, clear and accurate data
  • Creation and maintenance of data analyst competency and best practices
  • Understanding of data governance principles and how they apply
  • Creation of quality metrics and scorecards
  • Conceptualize, design and develop dynamic and static dashboards or views to enhance risk awareness and internal intelligence availability for incident identification, investigation and remediation
  • Champion the use of technology to drive efficient, effective data management processes
  • Bachelor’s degree in Information Technology, Information Systems, Computer Science or business-related field, or equivalent education and related training
  • Ten years in a role of data analysis, statistical analysis, data transformation, data reconciliation and/or sophisticated data presentation
  • Experience in extract, transform, load (ETL) development using standard tools
  • Strong issue and problem management, including root cause analysis and troubleshooting skills
  • Ability to perform analysis with little to no direction, proactively identifying potential issues in the data and conducting research to determine the best course of action to correct the data
  • Demonstrated knowledge and skill in data warehousing and transactional application data concepts and technology; understanding of Enterprise Data Warehouse
  • Familiarity in using data analysis tools
  • Strong technical documentation skills
  • Ability to work with multiple areas within the Bank to determine business objectives and data requirements
  • Strong presentation and communication skills, both written and verbal
  • Understanding of cyber security intelligence and security analytical packages
  • Experience with Alteryx, Tableau, MS SQL
  • Experience with Information Technology (IT) systems and Server Administration
  • Database administration
  • Working knowledge of Statistical Analysis System (SAS) and/or other analytic tools
  • Ability to recommend the growth, addition and retirement of data analytics toolsets
  • Possess understanding of information security disciplines, solutions and industry best practices
  • Understanding of the different components of an Information Security Program
42

Information Security Senior Resume Examples & Samples

  • Establish and maintain the DR procedures for tools and systems managed by Information Security Operations such as Sailpoint, Enterprise Directory (Radiant Logic), CyberArk, Oracle Identity Manager, Informatic DDM etc
  • Bachelors Degree (4 years) with a technical major such as Engineering or Computer Science or equivalent work experience
  • Intermediate to advanced technical proficiency with Windows and Linux Server support and Systems Administration
  • Intermediate to advanced knowledge of concepts such as LDAP, Virtual Directory, Meta Directory, and LDIF
  • CISSP or similar security certification will be a plus
43

Information Security Senior Consultant Resume Examples & Samples

  • A strong knowledge of the following areas of technical expertise: information policy formulation, information security management, business risk management, IT risk assessment and management, IT continuity management, IT governance formulation, and organizational change management, IT financial management and IT audit
  • Deep experience implementing and leading information security and risk management programs
  • Strong knowledge in organizing change management, awareness and training for end users, as well as act as an internal consultant to IT leaders, Architects and Operations for planning and implementation of select IT initiatives across the organization
  • Strong technical management skills in overseeing security assessments, providing security guidance, mock security breach exercise to clients business units
  • Master's degree in Computer or Information Science, engineering or related Technology with Business and leadership training preferred
  • 10 years-of demonstrated experience in information security management, security engineering, and service management
  • Participates in leading industry forums and consortia to represent business interests and set standards/practices
  • Experience with vendor and managed security services management, enterprise wide transition and transformation program
  • Proven communication skills both oral and written
  • Ability to balance different priorities and to raise and resolve conflicts with Business Units
  • Demonstrated ability for strategic thinking, with strong analytic and problem solving skills to translate business needs into executable projects
  • Experience managing a complex security budget
  • Leadership and influencer's skills to contribute to an innovative culture, taking calculated risks as appropriate
  • Manage multiple complex initiatives simultaneously
44

Information Security Senior Resume Examples & Samples

  • Tool Management – Manage/Operate the existing tools like CA Control Minder / (eTrust ) Access Control, etc. in order to manage the security policy in Freddie Mac
  • The role will lead efforts install, configure and manage the security related tools like CA Control Minder, RSA Authentication Manager and Tivoli Access Manager
  • The role will perform all procedures necessary to protect the necessary resources in Freddie Mac
  • 5-8 years of professional IT experience
  • At least 2 years of information security experience
  • Bachelor’s degree in Information Security, Information Technology, Management Information Systems, related field or equivalent work experience
  • Knowledge of one or more from CA Control Minder / (eTrust ) Access Control, including Installation, Configuration, Administration, Policy Development and Troubleshooting , etc
  • Previous experience managing UNIX administration
  • Ability to understand and write the security rules/policies for the tools, troubleshoot and resolve the issues on a timely manner
  • UNIX shell scripting experience
45

Information Security Senior Resume Examples & Samples

  • This role will be mainly to support the Disaster Recovery activities
  • Knowledge of one or more from CA Control Minder / (eTrust ) Access Control , RSA Authentication Manager Administration and Tivoli Access Manager , including Installation, Configuration, Administration, Policy Development and Troubleshooting , etc
  • UNIX shell scripting experience would be a plus
46

Information Security Senior Infrastructure Manager Resume Examples & Samples

  • Application Manager Responsibilities for ePO and Tanium
  • Must have strong written and verbal communication skills (English is required any other considered a plus)
  • Minimum of 5-10 years work experience in global projects, security operation, system support, conversions and implementation of an enterprise level application system
  • Have at least 5 years management experience
  • Strong technical background with Microsoft products, McAfee security software (Agent, ePolicy Orchestrator, McAfee Security for Microsoft Exchange, Threat Intelligence Exchange, Virus Scan Enterprise, Virus Scan Enterprise for Storage etc.) and Tanium is desired