IT Security Resume Samples

4.8 (63 votes) for IT Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the it security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
RP
R Parker
Rhianna
Parker
8097 Miller Course
New York
NY
+1 (555) 225 3022
8097 Miller Course
New York
NY
Phone
p +1 (555) 225 3022
Experience Experience
08/2014 present
Chicago, IL
IT Security Expert
Chicago, IL
IT Security Expert
08/2014 present
Chicago, IL
IT Security Expert
08/2014 present
  • Monitoring and managing ongoing health and capacity of firewall environments within multiple data centers
  • Responding to calls & requests from the monitoring teams and other internal customers to assist in troubleshooting level 1 and level 2 network/firewall issues
  • Knowledge of IP networking and network security including Intrusion
  • Contribute to the reporting of all incidents according to the Incident Management System
  • Troubleshooting problems when necessary
  • To minimize operational risks and risks of fraud by implementing regular and sufficient controls related to his / her position
  • You will optimize the system architecture in cooperation with System Engineering in regard to IT security
03/2009 04/2014
Detroit, MI
IT Security
Detroit, MI
IT Security
03/2009 04/2014
Detroit, MI
IT Security
03/2009 04/2014
  • Work closely with business, legal, and technology stakeholders to improve review and response processes
  • Assist in the periodic review of volume, analyzing rules with high volumes of false-positives/ non-incidents for further review with engineering and integration team
  • Develop implementation options in line with Incident Management best practices
  • Manages implementation of IT security and risk management framework/tools
  • Learn and apply the various templates that correspond with the OHS workflows or the BHS/FH workflows
  • Performs focused risks assessments of existing or new services and technologies to ensure the protection of the organization’s information assets and our customer information
  • Partnering with infrastructure, application development, and business intelligence areas to develop and maintain recovery procedures for key business applications
07/2006 02/2009
Los Angeles, CA
IT Security Intern
Los Angeles, CA
IT Security Intern
07/2006 02/2009
Los Angeles, CA
IT Security Intern
07/2006 02/2009
  • Assist with maintaining compliance with Payment Card Industry (PCI) data security standards
  • Work directly with Security team members
  • Other duties as assigned by supervisor
  • Support the development and sourcing of security awareness materials
  • Perform data analysis and metrics reporting in support of security awareness initiatives
  • Research and write content for communication of security awareness topics to end-users
  • Assist in maintaining the group’s standard work documentation
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of Kentucky
Bachelor’s Degree in Computer Science
Skills Skills
  • Solid knowledge of Microsoft Office Suite
  • Strong verbal and written communications skills with demonstrated ability to explain technical ideas to non-technical audience
  • Ability to handle sensitive matters with discretion and maintain confidentiality
  • Developing and maintaining tools to assist in vulnerability research and exploit development
  • Ability to self-organize, prioritize activities independently, create documentation, and reporting
  • Able to collaborate effectively with business and technology stakeholders, and manage expectations in the delivery of projects
  • Broad security domain knowledge
  • Leadership � Ability to lead projects from initiation to completion and to develop partnerships with key stakeholders
  • Three years previous experience working incidents
  • Experience with Incident Management tools, such as RSA Archer Incident Management, Symantec DLP
Create a Resume in Minutes

15 IT Security resume templates

1

IT Security Engineering & Operations Manager Resume Examples & Samples

  • Manage and participate in the review and approval of changes to Russell’s information security systems, architecture and management practices and procedures. This will include both Russell and outsourced/ managed service initiated changes
  • Manage the effective use of internal and multiple external team resources and participate in the consultation with the IT Security team in the implementation of practices, technical and administrative changes relative to the secure transmission and storage of data, access to computer networks, use of computer resources and the appropriateness of the security architecture. Manage the process for the production of appropriate metrics for this task
  • Assist in the forensic investigation process in response to information security incidents and events. Ensure appropriate management reporting and escalation of security incidents takes place and an incident process exists that incorporates chain of custody records, reporting procedures, and appropriate forensics methods and technologies
  • Manage the processes for reviewing and auditing Russell’s technical infrastructure (including vulnerability scanning, patch management and ethical hacks) and ensure the timeliness of reviews and appropriateness of system and network changes
  • Participate in information security audits performed by Internal Audit and external auditors, including the development of management responses and remediation of exceptions. Assist the audit work in the scope of Russell’s corporate finance audit and the SSAE review
  • Assist in the active promotion of the awareness of security policies and practices with external technical support services. Conduct information security training sessions for associates and external business partners
  • Manage and participate in the testing of security controls and the accomplishment of service level agreements associated with security administration tasks. Manage the process for the production of appropriate metrics for this task
  • Formal training in Firewall Management, SIEM Technologies, 2-Factor Authentication and SSO platforms is preferred
  • 10 – 15 years experience within IT Security, and typically 5 years experience managing security systems to best industry practices such as ISO 27001/27002 is essential and preferably in a global financial services environment
  • This position needs extensive knowledge of networking protocols; network and security best practices including computer network defense, computer network attack and technical intrusion analysis techniques; project management; and security architecture
  • This role requires experience in both direct and indirect management (via an outsourced or managed security-as-a-service provider) responsibilities
  • The ability to communicate (both written and oral) in a tactful, responsive and timely manner is essential
  • Advanced education in computing security, risk management, audit and controls is preferred. CISM and CISSP designations are mandatory
2

VP, IT Security Monitoring Resume Examples & Samples

  • Analysis and response to various industry and commercial cyber intelligence threat feeds
  • Information Security guidance and leadership to junior members of the Security Operations Center team as well as other parts of the business
  • Review, tuning and development of Data Loss Prevention (DLP) alerts
  • Analysis, response and tuning for Network Intrusion Detection systems
  • SIEM alert tuning, response and oversight
  • Proxy traffic analysis, blocking and reporting
  • 8+ years Information Security / Information Technology experience including incident response, event correlation and security management for the following technologies
  • Multifactor authentication (token, soft, sms, etc)
  • Web servers (IIS, Apache, etc)
  • Database (Sybase a plus)
  • Network devices
  • Prior team lead / management experience
  • Effective organization skills
3

IT Security Leader Resume Examples & Samples

  • Responsible for managing security compliance of application portfolio, monitors compliance to key performance metrics
  • Executes security reviews of applications and technology environment, drives remediation actions
  • Responsible for quarterly reviews of user access, data center, and third-party suppliers
  • Establishes IT security policies and procedures and measures compliance
  • Primary support contact for Treasury security and represents Treasury requirements in all security forums
  • Responsible for local incident response and leads forensic investigations
  • Provide constant communication to keep the executive management and operational teams informed of any and all issues
  • Define and manage overall IT security strategic plan
  • Manages a global team of information security professionals and contract workers
  • Fosters, through mentoring and leadership, critical and independent thinking skills and behaviors that drive strong information security practices
  • Working knowledge of current security industry technologies
  • Experience leading direct teams, matrixed teams and/or contractors
  • Possesses project management skills and presentations skills
  • Proven track record of setting goals and delivering results within a team structure
  • Proven ability to build strong partnerships and leverage both internal and external resources
  • Experience as CISO, CSO, or other senior security related function
  • Experience and comfort presenting in front of senior level management
4

IT Security Technology Solutions Architect Resume Examples & Samples

  • Multi-task in complex, global environment while focusing on architectural success of multiple projects
  • Minimum of 7 years of experience as a Technology Solutions Architect
  • Bachelor’s degree in related information technology field
  • Experience with architecting and developing solutions for highly scalable, highly available systems
  • Experience in architecting multi-tiered solutions based on architectural best practices
  • Experience with service oriented architecture (SOA), Enterprise Service Bus (ESB) technology and other middleware technologies
  • Experience with web solution architectures
  • Strong strategic thinker with an ability to communicate your vision
  • Creative thinking and approach, essential to collaboration with BOW customers, product groups and account management to determine solutions that further the business and align with business plans and technology strategies
  • Outstanding analytical skills; able to critically evaluate the information gathered from multiple sources
  • Strong facilitation and listening skills
  • Highly effective written, verbal and presentation skills
  • Interpersonal skills that lend themselves to effectively negotiating priorities and resolving conflicts among project stakeholders
  • Excellent architecture documentation and modeling skills
  • Strong software development, design and application architecture skills
  • Significant Retail Banking experience
5

Mgr IT Security Technology Resume Examples & Samples

  • Budgeting, resource allocation, project costing, contract management, goal development, strategy development, team building, and performance assessment
  • Responsible for management and oversight of day-to-day security operations
  • Consulting executive and senior management, business units, technical units, and vendors on security and technical considerations concerning system architecture, infrastructure, policies and standards
  • Planning, implementing, and maintaining security infrastructure, architecture and strategies, and related software tools used to support those strategies for all bank projects including back-office, distributed computing, and Internet
  • Developing enterprise standards for secure design of both Internet infrastructure and Internet application development
  • Performing information security risk assessments on all systems and vulnerability assessments and testing of all infrastructure (routers, firewalls, servers) and applications
  • Implementing and managing Internet Intrusion Detection and Response system. Responsible for 24x7x365 detection, response and escalation of Internet related security breaches. Responsible for providing recommendations to management for corrective actions
  • Coordinate and manage the processes related to advanced computer and network forensic investigation tasks involving various forms of electronic fraud, identity theft, e-commerce fraud, computer intrusion, theft of information, denial of service, multi-national organized electronic criminal groups, as well as financial fraud investigations
  • Managing contracts between Bank and multiple 3rd party organizations providing security services and consultation for all bank systems
  • Advising the organization with current information about information security technologies and related regulatory issues
  • Provides reports to superiors regarding the effectiveness of network and data security and making recommendations for the adoption of new procedures and technologies as required
  • Stay current with IT security and compliance industry requirements and regulatory changes that will affect security policies and procedures and recommend appropriate technical changes to maintain security protection levels
  • Coordinate and oversee security testing procedures to verify the security of systems, networks and applications, and manage the remediation of identified risks
  • Oversight of maintenance, upgrades and recommendations of security technologies for anti-malware, intrusion detection, scanning, event correlation and monitoring
  • Collaborate with internal and divisional business partners to identify, document and mitigate technology and fraud related risks associated with the development, implementation, upgrade and or changes of the bank’s information assets
  • Create and maintain the enterprise’s IT Security Business Continuity and Disaster Recovery Plans
  • Must possess advanced multi-platform knowledge. Experience with Windows, Linux and IP intranet/Internet security environments including: firewalls, intrusion detection, incident response, vulnerability testing, operating system hardening, regulatory compliance and data classification
  • Must possess understanding of Internet and cloud architectures, methodologies, and processes including set-up and configuration of public (untrusted) and trusted networks utilizing routers, firewalls, and proxies and how security is employed in these areas. This should include 2-3 years hands-on experience
  • Must possess hands on experience with intrusion detection/prevention systems, Content Filtering, Data Loss Prevention systems, forensics software and malware analysis
  • Experience architecting and implementing security solutions, policies, and technologies
  • Understanding of LAN/WAN architecture, design, and network topologies
  • Understanding of security issues relative to third party applications, relational databases, e‑mail, VPN/remote access, Cloud computing and PC / server Operating Systems
  • Must understand security and fraud issues related toall bank initiatives
  • Must possess excellent verbal, written and interpersonal communication skills including demonstrated ability to interface and communicate with all levels of company management, as well as external audit agencies
  • Knowledge about security frameworks and standards such as ISO2700x, FIPS, SAN, NIST, SSAE-16/SAS70
  • Ability to handle multiple projects and priorities simultaneously with a high degree of professionalism and client service orientation
  • Advanced knowledge about how DDoS attacks work and experience with mitigation platforms and techniques
  • Understanding of Application Security Vulnerabilities such as OWASP Top 10, CWE/SANS Top 25 and remediation approaches
  • Knowledge of digital forensics with open source and commercial forensics tools
  • Understanding of network traffic analysis
6

IT Security Solution Integration Specialist Resume Examples & Samples

  • Participating in the development of methods, tools, templates, training to support our GRC client programs
  • Participating in the planning and implementation of Security Solutions meeting customer requirements
  • Participating in the implementation of automated GRC programs
  • Performing requirements analysis and producing detailed solution implementation documentation
  • Contributing to continuous growth of the Security Solutions practice through identification of new opportunities and development of security solutions
  • Experience in implementing/configuring an automated IT program
  • Able to communicate IT Security GRC program points to others at the technical and user levels
  • Strong Project methodology and ability to work closely with project managers
  • Demonstrated experience in implementing IT Security Governance (GRC), Risk and Compliance programs
  • .Net, Java coding experience
  • Prior IT security solution integration experience
7

Show Director, IT Security Resume Examples & Samples

  • Serve as a cross-functional leader representing IT Security across Reed Exhibitions portfolio of security events
  • Set the long-term strategic direction and oversee the development of the go-to-market plans
  • Develop detailed project plans including program roadmap/themes/messaging and positioning/marketing and launch plans
  • Leverage your solid understanding of the multiple security stakeholders and sales channels to develop audience, speaker, and exhibitor acquisition plans
  • Develop strategic partnerships with associations, vendors, thought leaders to leverage participation and involvement in events
  • Provide leadership and oversight around key conference disciplines including: marketing, social media, venue selection, contract negotiation, track development, keynote production, celebrity selection/management, networking events, sponsorships/exhibit management, registration, and overall budget and financial management
  • Lead the sales organization to achieve event goals and meet sales targets
  • Evaluate and report on the effectiveness of go to market initiatives, regularly communicate with members of the senior management team to provide executive accountability
  • Develop the partner ecosystem necessary for driving successful planning and execution
  • Be the primary liaison to industry associations [SIA, ISACs, (ISC)², etc…]
  • Own the P&L for IT Security event
  • Demonstrate passion with a desire to transform the security industry by delivering the premier event to raise awareness, educate, and showcase emerging vendor technologies
  • Please note: This is a hybrid role that requires both event management expertise and a core competency in IT Security. Candidates with this expertise will be preferred
  • Minimum 5 to 10 years' experience in event management and/or event marketing
  • Ideal candidate also has 3 to 5 years of marketing experience in IT Security
  • Proficiency of general IT security concepts [BYOD, Insider Threats, Access Cloud, SaaS, SSO, Authentication, Identity Management] and familiarity with vendor ecosystem
  • Able to cultivate relationships including mobilization of a diverse security industry leaders
  • Proven track record of leadership, managing and driving results of cross-functional teams
  • Proven track record of Project Management experience
  • Excellent written/verbal communication skills
  • Experience in contract negotiations
  • Ability to make “data-driven” decisions, with demonstrated ability to gather and analyze information necessary to formulate business recommendations
  • Demonstrable executive experience with P&L and budgetary cycles
  • Familiarity with marketing automation systems
  • Effective time management, multi-tasking, and problem-solving skills required
  • Able to communicate and be comfortable interacting across organizational levels
  • Accountable and takes responsibility for delivering on organizational commitments
  • Strong customer service orientation with experience in effectively resolving issues in real-time
  • Bachelor’s degree and strong academic credentials required. MBA a plus
  • Certified Meeting Planner (CMP) a plus
  • Must be able to thrive in an environment with high demands and expectations
8

IT Security Operation Resume Examples & Samples

  • · Integrate technical knowledge and business understanding to create superior and secured solutions for HP and for customers. Mentor/consult with team members, other organizations, customers, and vendors on complex issues
  • · Assist with the development and execution of a rolling yearly work plans for the Compliance
  • · Plan, conduct and oversee audit/compliance/risk management activities
  • · Develop/implement audit/compliance/risk management programs
  • · Manage audit/compliance/risk relationships between HP and client
  • · To act as a consultant to HP internal and external clients on matters of internal control and risk management
  • · Manage and drive audit tracking and remediation tasks
  • · Facilitate externally run reviews conducted by clients, external auditors, regulatory bodies and other organizations as required
  • · Maintain currency on laws regulatory requirements, methodologies and standards appropriate for HP and our clients
  • · Develop/manage ongoing reporting
  • · Coach and mentor team members
  • · Establish and maintain effective relationships with people at all organizational levels, internally and externally
  • · Identify and analyze new or existing tools, processes, and procedures
  • · Prepare materials and execute presentations of solutions, proposals, process change etc. to appropriate audiences
  • · Identify and evaluate the significant exposures or risks across functions, locations, accounts, processes, or other variables associated with HP and the client account
  • · Represent HP control interests to clients and external parties by vetting all audit/compliance/risk management responses to clients and external parties to ensure appropriateness of responses
  • · Provide control/risk management expertise in global initiatives that affect the control/risk management environments
  • · Understanding of technology in areas of compliance issues
  • · Apply advanced subject matter knowledge to complex business issues, and regarded as a subject matter expert. Frequently contribute to the development of new ideas and methods
  • · Work on complex problems / projects where analysis of situations or data requires an in depth evaluation of multiple factors
  • · Exercise significant independent judgment within broadly defined policies and practices to determine best method for accomplishing work and achieving objectives. Lead and / or provide expertise to functional project teams and may participate in cross-functional initiatives. May provide mentoring and guidance to lower level employees
  • · Act as an expert providing direction and guidance to process improvements and establishing policies. Frequently represent the organization to external customers/clients
9

IT Security Auditor Secure Works Resume Examples & Samples

  • Develop and administer risk-focused exams for information technology systems
  • Execute and properly document the audit process on a wide variety of computing environments and
  • Apply internal control concepts in a wide variety of information technology processes and
10

IT Security Architect Secure Works Resume Examples & Samples

  • Review of security designs submitted by members of various teams
  • Research and develop/recommend solutions to address gaps in the internal security framework
  • Design and drive/increase the adoption of security-related tools and processes, including network
  • 7+ years’ experience in IT industry including at least 3 from the Information Security sector
  • Four year degree in a relevant field preferred or an equivalent amount of post-secondary education
  • Certifications Given Priority: CISSP, CSSLP, SSCP, SANS GIAC, GSEC
11

Intern Summer IT Security Resume Examples & Samples

  • Monitoring for security anomalies and investigating potential security incidents
  • Develop and test processes for malware detection and remediation. The candidate would assist with testing new malware removal programs and ensuring that our process is successful in cleaning malware from systems. They could help develop the process by which we research and track infections
  • Research on new malware and attack vectors. The candidate would assist in keeping current on malware trends and in researching the details around specific malware that makes it into the company
  • Mapping out the IT environment and creating the appropriate configuration of our Security Monitoring tool to ensure that systems are identified appropriately and that all locations are mapped correctly
  • Assist with documentation around Security processes
  • Freshman through graduate level course work at an accredited college/university with a major in IT, Computer Science, Information Science or similar discipline; An academic grade point average of 3.0 or better on a 4 point scale for the most recent academic session (quarter/semester)
  • Emphasis on networking and/or information security is a plus
12

IT Security Consulting Director Resume Examples & Samples

  • Minimum of 8 years of experience with a mid-market organization IT
  • CISA, CISM, CISSP certification or comparable IT security accreditation preferred
  • PCI QSA and/or PCI ASV certified desired but not mandatory
  • Working knowledge of PCI DSS compliance preferred
  • Outstanding client service skills
  • Attention to detail and accuracy
  • Team player and deadline oriented
  • Ability to communicate clearly, concisely, and in a professional manner
13

IT Security Operations Desk Analyst Resume Examples & Samples

  • At least 6 months experience in Network
  • At least 6 months experience in Security Management
  • At least 6 months experience in Firewall and IDS/IPS
  • English: Intermediate
14

IT Security, Junior Analyst Resume Examples & Samples

  • Review baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.)
  • Monitor operational configurations of all in-place security solutions as per the established baselines
  • Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and work with the functional team to devise plans for appropriate resolution
  • Participate in investigations relating to problematic activity
  • Participate in the execution of vulnerability assessments, penetration tests and security audits as directed
  • Provide on-call support for IT management for all in-place security solutions
  • Responsible for special projects as assigned by management
  • Under the supervision of the IT Security, Senior Analyst, consult and advise the IT infrastructure and operations team in the deployment, integration and initial configuration of security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically
  • College diploma or university degree in the field of computer science
  • 1 to less than 3 years of work related experience
  • Working technical knowledge in at least two of
  • Analytical and problem-solving abilities
15

IT Security Solutions Professional Resume Examples & Samples

  • Academic degree or equivalent qualification
  • 7 years’ experience in IT environment, preferably IT security solutions
  • CISSP or other similar certifications
  • ISO 27000 series
16

IT Security, Junior Analyst Resume Examples & Samples

  • Strong understanding of IP, TCP/IP, and other network protocols
  • General knowledge of scripting and programming
  • General knowledge of Microsoft Windows or Linux/BSD operating system
17

Head of IT Security Resume Examples & Samples

  • Budget. Directs the prioritization of spend, ensuring value for money, balancing cost vs benefit
  • Internal and external relationships. Global responsibility for a significant part of one of IT Security’ functions
  • People. Functional responsibility for people, expense, strategy and operation
  • Regulatory. Develops procedures and policy in the context of IT frameworks. Collaborate with Regional peers to ensure compliance and adherence to regulations and policy
  • Strategic Input. As strategies evolve for IT and IT Security and for the Sub-Function, ensure they remain congruent with each other and the Bank’s strategy. Ensure full advantage is taken as IT globalizes its functions. Manage challenges where 3rd parties’ (internal and external) goals and strategies are not entirely aligned, seizing the opportunities these differences present
  • Typically educated to degree level
  • Extensive experience in a managerial role within an IT/IT Security or related field, including experience of managing a global function with a geographically dispersed team
  • Ability to build strong relationships and communicate with a wide spectrum of stakeholers
  • Excellent knowledge of the project lifecycle and Group Strategy
  • Understanding of business finance and experience of effective managements of budgets and expenditure
  • Comprehensive understanding of positioning Bank approach and policy in context of wider industry trends and direction
18

Junior IT Security Analyst Resume Examples & Samples

  • Supporting analysis of applicable threats, vulnerabilities, controls and resulting risks (IT Risk Assessments)
  • Performing problem analysis and providing recommendations
  • Interviewing stakeholders and gathering data about the system
19

Senior Consultant IT Security Resume Examples & Samples

  • Manage small-scale and participate in large-scale in IT Risk and Security engagements and in internal projects as Auditor and Consultant
  • Prepare reports and schedules for review that will be delivered to internal and external clients
  • Maintain a professional and proactive communication with your Management which includes updating on progress, identification and communication of risks within engagements
  • Supervise and coach Junior team members, delegating tasks and take responsibility at the same time, monitor quality of team deliverables, provide technical support to team members, etc
  • Work effectively and efficiently as a team member
  • Identify potential business opportunities within existing engagements and work closely with management in pursuing these to support and respond to our client’s needs. 
20

IT Security Intern Resume Examples & Samples

  • Development of various IT Security policies, standards, programs and procedures
  • Assist in development and identification of high risk areas across various business segments
  • Assist in reviewing technology and feature designs and working with various IT and legal teams in order to provide advice regarding IT Security best practices with applicable global information security regulations, standards and corporate policies
  • Work with a wide variety MHE teams on regulatory issues, including contributing to company-wide policies, standards, training and business procedures designed to foster compliance with relevant laws
  • Participate in Network Security Monitoring, Application and Network Scanning
  • Various types of assessments
  • Assist in the implementation of appropriate procedures, products, and controls
  • Assist in the development of Information Security Key Risk Indicator metrics and automation techniques
  • Must be an undergraduate student in your junior or senior year in pursuit of a computer science or computer security related undergraduate degree
  • Basic security and networking knowledge (at least one core security class
  • Basic operating system knowledge: Windows, Linux, Solaris, OS X. Basic IT troubleshooting
  • The desire to learn about new security concepts and techniques
  • Highly organized, efficient and process focused. Ability to prioritize well, effectively manage multiple tasks and meet demanding deadlines in a fast-paced environment
  • Strong networking and interpersonal skills. Demonstrated ability to work collaboratively and across disparate groups, teams and reporting lines. Ability to work independently and effectively in a loosely structured team environment that demands a high degree of cooperation, flexibility, cross-group collaboration and real-time responsiveness
  • Excellent listening skills and proficient oral and written communications
  • Strong problem-solving and decision-making skills with a focus on achieving results that benefit our business as well as the businesses of our customers and partners
  • Proficiency with Word & Excel. Familiarity with Microsoft SharePoint collaboration software
21

IT Security Operations Resume Examples & Samples

  • Overseeing the companies 3rd Party and internal intelligence
  • Monitoring and Threat Analaysis
  • Implementation and management of a Cyber Intelligence partner/provider
  • Manage and ensure ongoing effectiveness of key IT security systems
  • Monitor network activity and potential hackers
  • Responsible for understanding and reporting companies IT risk profile
  • Responsible for companies IT vulnerability management programme
  • Responsible for the effective response and resolution to IT security incidents
  • Network security management
  • Security incident response management
  • Operations enterprise security controls
  • Network forensics, host forensics, malware analysis
  • Familiarity in Cyber Security is a plus
22

Lead IT Security Administration Resume Examples & Samples

  • Responsible for Day to day administration of all request types
  • Ensure team to Process Leave of Absence (LOA) and Return to Work (RTW) requests
  • Ensure execution of daily, weekly checks to ensure access is terminated for exited workers
  • Liaise with Help Desk team members and assist as and when required and develop an customer centric model for increased end user satisfaction
  • Assist and support periodic internal and external IT audit and SOX audits
  • First line of contact for any escalations/concerns from business
  • Responsible for notifying management of any concerns raised by requestor and/or anticipating escalation
  • Ensuring team adherence to all Security Administration Standard Operating Procedures. Notify management when discrepancies are found in SOPs and fix it to ensure they are updated accordingly
  • Responsible/Participate in projects and initiatives in support of regulatory, audit and IdM directives when called upon
  • Responsible for documenting process/technical difficulties being experienced and timely reporting them to management
  • Collate statistical data as requested in support of metrics/measurements and publish them on periodical basis and publish them
  • Responsible for Day-Day Operations/Staffing/Team Needs
  • Reporting /Adherence to Operational Metrics/SLA
  • Identity/Drive Automation Initiative/Efforts to enhance productivity
  • Work Closely with Training/Internal Audit team to drive efficiency
  • Minimum of 5-6 years of Information Technology experience
  • Minimum of
  • 5 year of Security Administration or equivalent experience
  • Ability to handle multiple priorities
  • Experience with working with remote teams
  • Internal Synchrony Candidates should have spent 18 months in Synchrony and 12 months in current role
  • Should have an Role Model or Excellent rating in last 2 EMS
  • Self Motivated
23

Associate Director, IT Security Resume Examples & Samples

  • Develops the business, information and technical artifacts that constitute the enterprise information security architecture and solutions
  • Contributes to the development and maintenance of the information security strategy
  • Analyzes business impact and exposure, based on emerging security threats, vulnerabilities and risks. Communicates security risks and solutions to business partners and IT staff
  • Delivers a leadership role in providing network and system security advice and risk analysis to business units who engage with the Information Security team
  • Expert knowledge of modern network security technologies such as network and host-based intrusion detection/prevention, vulnerability assessment (including app/web-layer interrogation), DDOS protection, Security Information Management, host-based integrity checking, end point security, AV, Data Loss Prevention, etc
  • Pragmatic understanding of security problems as a mix of technology and process issues with the ability to pursue solutions at both layers within the organization
  • Experience with working in a highly outsourced environment (both infrastructure outsourcing and security operations outsourcing)
  • Knowledge of SOX and other regulatory and statutory compliance
  • Proven ability in security organizational design in a leadership capacity
24

IT Security Incident Consultant Resume Examples & Samples

  • Create and maintain team standards and strategy for special projects involving SIEM and Log Data Warehouse solutions
  • Establish key business operations relationships, providing an avenue to assess and recommend operational changes and enhancements
  • Partner with the IT and business operations areas and with both internal and external parties to resolve technical issues with SIEM/Log Data Warehouse technologies
  • Communicate with both technical and non-technical users to determine individual requirements
  • Experience managing an enterprise Security Incident and Event Management (SIEM) or Log Consolidation Warehouse
  • Thorough understanding of security related technologies including hardware, software and operating systems
  • Thorough understanding of logging formats/functions used across various types of logging sources (Windows Event Logging, Microsoft SQL, Syslog, etc.)
  • Working knowledge of networking including routing, architecture, design and logging
  • One or more of the following certifications: CCNA, CCNP,CCIE, CWNA, CWNP, CWNE, CISSP, GCIH or GCIA
  • Certified Information Systems Auditor certifications
25

Manažer IT Security Resume Examples & Samples

  • Define the strategy of IT Security and Information security for GE Money group in Czech republic
  • Execute and manage agreed steps to implement defined strategy organizations
  • Assure smooth run of day-to-day security operations including incident resolution, security monitoring, advisory to other teams
  • Lead a team of IT security experts including coaching, goals and performance management, support skills and career development
  • Coordinate and supervise IT risk management process execution
  • Actively participate in company’s cross-business risk management & anti-fraud committee and contribute to overall operational risk management agenda
  • Engage with GE’s global IT Security function and ensure alignment of local approach and global priorities
  • Manage IT Controllership process – 2nd level controls, compliance assurance
  • Define and implement policies and standards across the company
  • Manage budgets and supplier contracts associated with the IT Security area
  • University degree (Bachelor’s degree or above)
  • Fluent knowledge of English language – both written and oral, good knowledge of Czech (both writtena nd spoken)
  • Minimum of 6 years’ experience in IT area and at least 3 years in area of IT/Information security
  • Proven experience with team management
  • Strong communication, facilitation and collaboration skills
26

Contract Websense IT Security Analyst Resume Examples & Samples

  • Bachelors of Science degree in Computer Science, MIS, Business Administration or equivalent work experience
  • Expert knowledge of IT security concepts (i.e. Defense in Depth, Separation of Duties, Control environments, malicious software, security awareness)
  • Expert knowledge of IT security technologies (i.e. firewalls, IDS/IPS, DMZ, access controls, penetration testing, risk and vulnerability assessment, investigative techniques, authentication systems)
  • Expert knowledge of IT technologies (i.e. operating systems, network protocols, IT security management systems)
  • Expert knowledge of network security products including firewalls, IPS and URL filtering solutions
27

IT Security Analyst Intern Internship Resume Examples & Samples

  • Review Applications logs for recurring anomalies, warnings and errors
  • Review Server logs for recurring anomalies, warnings and errors
  • Create and track item punch lists (tickets) for users, server administrators and application owners to resolve issue
  • Execute utilities and perform applications checks
  • Review data in access logs to identify anomalous behavior
  • Assist in training of colleagues as required
  • Special projects and other related duties as assigned
28

IT Security & Controls Champion Resume Examples & Samples

  • Provide guidance on appropriateness of compensating controls
  • Consulting on Security Control Process to IT Site Management and their business partners
  • Facilitating communications with Operations and General Audit Office (GAO) to confirm controls information
  • Provide metrics and status to management regarding compliance with information security requirements
29

IT Security Intern Resume Examples & Samples

  • Assist with maintaining compliance with Payment Card Industry (PCI) data security standards
  • Assist in balancing business needs with security requirements
  • Work directly with Security team members
  • Must be at work on a regular/scheduled basis
30

IT Security Operations Desk Analyst Resume Examples & Samples

  • Serves as a point of contact between client and IBM Security Services delivery team for operational governance of security services activities and deliverables
  • Maintain and oversee relationships for Managed Security Services (MSS) delivery organizations providing security support
  • Provide oversight and management for operational MSS security actives, processes and polices as required
  • Track, report and resolve quality issues impacting the client
  • Provide continuous improvement through use of service delivery reporting to identify areas of concern in order to develop nhancements where necessary
  • Produce a Standard Operating Procedures Compilations
31

VP, It-security Resume Examples & Samples

  • Establish a robust security and risk management functional capacity and framework across the organization
  • Ensure that clear and timely business advice is provided to executive management on key information security and assurance issues
  • Build sound business relationships across the enterprise to enable a strong understand and close alignment with business needs, direction, and risk appetite
  • Manage the creation and production of timely, accurate and informative business and IT metrics relating to information risk initiatives; utilize metrics to prioritize key initiatives and response to negative trends
  • Ensure that all IT and information security programs are in compliance with applicable laws, regulations, and policies
  • Collaborate with application owners to understand and address (as appropriate) the risk position around key business applications; promote secure development lifecycle principles throughout all development processes in partnership with development team leaders
  • Oversee the development and maintenance of an information security policy set, including standards and processes that fit the organization at all levels; seek and confirm management approval as required
  • Develop and maintain an effective information security architectural approach, ensuring that the approach is implemented in accordance with appropriate standards
  • Evangelize security awareness and best practices throughout all levels of the organization, considering the tactics, techniques, and procedures employed by malicious actors and how they evolve
  • Liaise with enterprise architectural functions to ensure that information security standards, policies, and procedures are enacted consistently across application development projects and programs; collaborate with process owners to define physical, virtual, and logical security architecture specifications and requirements
  • Monitor existing security control efficacy and operational impact leveraging metrics; establish new controls and optimize as necessary in support of business needs while minimizing risk
  • Direct incident response at the highest level in partnership with the appropriate internal and external entities ensuring the management is appraised as necessary during all phases and coordinates response across responsible functions
  • Oversee research into emerging threats, trends in the security industry, and advances technology or methodology and act as a conduit to share these evolutions with technical leadership within the organization to incorporate in design philosophy
  • Deep understanding of the enterprise security architecture disciplines, processes, concepts and best practices
  • Intimate with security program management in a highly focused development environment for a large scale enterprise organization
  • Thorough understanding of the various enterprise security components that comprise an effective program today and a keen eye toward what the future entails
  • Knowledge of technological trends and developments in the area of information security and risk management
  • Able to grasp how new technologies work and how they might be applied to achieve business goals
  • Strong facilitation skills and a clear ability to build relationships with business stakeholders at all levels, including executive managers and vendors
  • Proven problem-solving skills, and the ability to identify, analyze and resolve problems, driving solutions through to resolution
  • Exemplary mentorship capabilities; can coach and develop security professionals across all disciplines and levels to the maximum potential
  • Advanced degree in computer science, engineering, mathematics or a related field of study or equivalent
  • A minimum of 15 years’ of experience in leading comparable information risk, security and governance teams, transforming functions and changing culture
  • Experience with carefully managing budgets to deliver demonstrable value
  • Experience in leading the response to incidents, crises, and investigation with sensitivity, tenacity and focus on detail
  • Extensive experience in information security architecture, consultative stakeholder management and strategic planning
  • Experience with significant outsourced and hosted / cloud models and the appropriate contractual, vendor, and security requirements
32

Director of IT Security Resume Examples & Samples

  • IT Security Operation Centre (SOC)
  • IT Operational Security activities ; patching, antivirus, vulnerability management
  • IT Work-streams of the Cyber IT Security Programme
  • Defining and implementing IT Security strategy and plans
  • Line management and leadership of staff within the IT Security function. Ensure appropriate IT Security organization and infrastructure is implemented in the enterprise to ensure that the information risks of the enterprise are appropriately managed
  • Leadership and strategic direction for the function, ranging from planning and budgeting, developing and implementing Security policies and procedures, to motivational and promotional activities expounding the value of information security
  • Sponsor and drive improvements in IT Infrastructure (hardware, networks, applications) etc to improved our Security maturity and identifying goals, objectives and metrics to reduce the cyber risk to the organization
  • Base the design, implementation, operation and maintenance of the IT Security initiatives (including processes and controls) on the ISO/IEC 27000 series standards
  • Ensures current and future IT activities (e.g. projects and proposals) have considered the security implications from the outset and that any risks, together with mitigating controls / decisions to accept residual risk etc. are fully documented and that appropriate risk management processes have been followed
  • Review and develop processes covering Information Security related concerns such as (but not limited to) patch / vulnerability management, anti-virus protection and change management
  • Conduct security incident investigations, including root cause analysis. Ensure Incident Management processes are in place covering IT Security incidents. Recommend improvements to process to mitigate future incidents
  • Ensure Information Security requirements are included in all Third Party dealings and that these controls remain effective throughout the lifespan of the relationship
  • Liaise with stakeholders including Burberry senior management (e.g. COO, CIO, ISO) and other IT and business functions such as IT Solutions, Service, Operations (Networks and Infrastructure), Regional Teams, IT Compliance, and Business functions including Legal, Security, Risk, HR, lnternal Audit and External Audit to
  • Drive forward IT Security initiatives
  • Provide direction on IT Security matters such as routine security activities plus emerging security risks and control technologies
  • Provide recommendations to IT and the business to ensure that business operations are in line with appropriate IT Security controls including any legal and regulatory requirements
  • Provide a “specialist security expertise ”for IT security offering advice and practical assistance on information security risk and control matters throughout the organization and promoting the commercial advantages of managing information security risks more efficiently and effectively
  • Lease with IT Compliance monitoring and improvement activities to ensure compliance both with internal security policies etc. and applicable laws and regulations
  • Leads / supports information security risk assessments and controls selection activities
  • Supports activities relating to contingency planning, business continuity management and IT disaster recovery in conjunction with relevant functions and third parties
33

IT Security Strategist Resume Examples & Samples

  • Help define the vision and strategy for Identity and Access Management
  • Conduct self-directed research to understand industry trends and analysts perspectives
  • Research open standards, specification, frameworks and protocols that enable interoperability
  • Influence industry to provide solutions to solve our most challenging business problems
  • Review supplier strategies, product roadmaps and existing solutions in the market
  • Participate in benchmarking to share, learn and collaborate on priorities and lessons learned
  • Assess current capabilities across enterprise, consumer and the connected experience
  • Understand business strategies and conduct customer interviews
  • Evaluate and build innovative prototypes to demonstrate feasibility
  • Advocate and make recommendations on tools, methodologies and processes
  • Define and maintain high level strategic plans for Identity and Access Management
  • Establish the position of a service provider relative to other service providers
  • Provide vision and expertise to guide our strategic position and strategic initiatives
  • Assess the impact of industry changes against the existing strategic and tactical plans
  • Maintain strategies and ensure they keep pace with internal and external environments
  • Consult, collaborate, and facilitate internal and external security discussions
  • Communicate and create awareness of the Identity and Access Management Strategy
34

IT Security Access Management Resume Examples & Samples

  • Responsible for the management of the Shared Access Password Management system ( SAPM ) including the testing and development environments. The ideal candidate will understand Unix, Windows Server, Server Clustering, Networking and will have strong scripting skills along with database management, SQL query proficiency, project management skills and a solid understanding security processes
  • Reviews root cause analysis to identify, recommend and implement best practices
  • Manage multiple initiatives and related activities concurrently
  • Identify and solve performance issues
  • Help determine feasibility of product requests and time estimates
  • Work closely with project and product managers to drive technical requirements in products
  • Creating technical documentation to instruct technical resources
  • Make recommendations for implementing desired level of access controls
  • Analysis of the enterprise password vault infrastructure and policies to ensure a healthy state at all times
  • Assist with system upgrades
35

IT Security Resume Examples & Samples

  • Work with the Engineering and Integration teams to understand monitoring needs and priority for onboarding
  • Work with review & response teams to estimate capacity and ongoing resource needs
  • Work closely with business, legal, and technology stakeholders to improve review and response processes
  • Assist in the periodic review of volume, analyzing rules with high volumes of false-positives/ non-incidents for further review with engineering and integration team
  • Proactively assess tools across the Security Incident Response tool suite to identify opportunities for enhanced monitoring, automation, and reporting
  • Develop implementation options in line with Incident Management best practices
  • Demonstrated experience in designing and implementing technology and process solutions to reduce the potential risk of data compromise
  • Ability to understand drivers and priorities, with regard to Business, Security, and regulatory requirements
  • Ability to self-organize, prioritize activities independently, create documentation, and reporting
  • Strong verbal and written communications skills with demonstrated ability to explain technical ideas to non-technical audience
  • Ability to multi-task, with attention to detail, and prioritize as needed to accomplish goals
  • Solid knowledge of Microsoft Office Suite
  • Able to collaborate effectively with business and technology stakeholders, and manage expectations in the delivery of projects
  • Bachelor’s Degree or Equivalent
  • Experience with Incident Management tools, such as RSA Archer Incident Management, Symantec DLP
36

IT Security Solution Integration Specialist Resume Examples & Samples

  • Participating in the development of methods, tools, templates, training to support our client programs
  • Participating in the planning and implementation of solutions that meet customer requirements
  • Contributing to continuous growth of the Security Solutions practice through identification of new opportunities
  • Able to communicate IT Security Risk Management points to others at the technical and user levels
  • MS SQL or Oracle Database design experience
  • Experience in conducting Threat Risk Assessments (TRA)
  • Bilingual: English and French
37

IT Security Resume Examples & Samples

  • 2 to 5 years+ of relevant working experience - information security
  • Significant experience working on complex technical environments and have worked on large network and security projects
  • Familiarity with ISO27001 processes and security controls and experience working within an ISO27001 certified environment
  • In-depth knowledge of network, PC and platform operating systems
  • Persuasive interpersonal skills to support the requirement for security awareness and to work in conjunction with teams
38

IT Security Intern Resume Examples & Samples

  • Support database and core application environment for Oracle Retail and Oracle Business Intelligence platforms
  • Use inputs and direction from leads for implementation on Oracle database and Oracle Applications environments
  • Work on the business logic and back-office integration, using existing ETL processes to manipulate data, integrate with external services, and create jobs for processing data
  • Participate in all aspects of systems management, including software patching, testing, and deployment
  • Work effectively with technical leads and others to implement solutions and resolve issues
  • Must be at work on a regular and predictable basis or as scheduled
39

It-odt-it Security Analyst / Itsa Resume Examples & Samples

  • Must have user admin experience
  • Be able to add, change, and transfer to different groups
  • Must have active directory experience
  • User security administration and provisioning for RACF, Active Directory and application level accounts, permissioning, adds, changes, terms and deletions
  • Providing users and management with technical support on matters related to access control. Implementing security improvements by assessing current situation, evaluating trends anticipating requirements
  • Determining security violations and inefficiencies by conducting periodic audits
  • Acting as a technical information security reviewer of performance reports, system status, operating procedures manual and other documents produced
  • Maintaining technical knowledge about latest developments in the Information Security field
  • Knowledge in vulnerability assessments, intrusion prevention and detection, access control and authorization, policy enforcement, design of secure infrastructure. Incident response
40

IT Security Consulting Manager Resume Examples & Samples

  • Bachelor’s degree in information systems, business administration, accounting, or a related field required
  • Minimum of 5 years of experience in IT consulting or operations in a “hands on” capacity
  • CISA, CISM, CISSP certification or comparable IT security accreditation preferred but not required
  • MCSE, MCTIP, CCNA, GSEC/GIAC, ITIL or comparable accreditation preferred but not required
  • Network administrator level or working knowledge in network and infrastructure security preferred
  • Working knowledge of PCI DSS compliance preferred but not required
  • Working knowledge of network infrastructure and administration, vulnerability assessment scanning, and penetration testing
  • Must be willing to travel
  • Business development skills a plus
41

IT Security Technical Specialist Resume Examples & Samples

  • Demonstrable experience in technology security related roles, with demonstrable experience of identifying and managing information security risks in complex or critical scenarios
  • Understanding of Intrusion Theory and Practice
  • Demonstrable understanding of information security detection and protection methodologies Experience of assisting technical users with identification of information threats/vulnerabilities/risks Understanding of a wide range of information security related topics and industry standards, including ISO27001 and ITIL
  • Ability to convey and explain complex technical information to technical staff
  • Ability to manage multiple tasks and work streams effectively and prioritise accordingly
  • Web application and API development and architectural experience
  • Windows / active directory security understanding and experience
  • Cloud security concepts and solutions understanding such as AWS, and Azure
  • Previous experience of Public Sector and/or Media organisations
  • Technical understanding and experience of enterprise network management and monitoring systems
42

Orvis IT Security Intern Resume Examples & Samples

  • Tokenization and point to point encryption user experience and functionality testing
  • Project technical documentation including system architectural diagram, design guide, build guide, and run book
  • Secure encryption device key injection and management
  • Currently working towards a Bachelor's or Master's degree in Information Technology or Information Security
  • Understanding of the CISSP CBK domains and how they apply them to an Omni-channel retailer
  • Ability to discuss security issues in understandable business terms
  • Analytical, well organized, and able to document complex designs and principles
  • Demonstrated ability to collaborate with team members to deliver security controls to protect the confidentiality, integrity, and availability of the IT environment
  • Proficient in Microsoft applications, including Excel, Word, Powerpoint, and Outlook
  • Demonstrated ability to communicate with all levels of employees
43

Service Desk / IT Security Analyst Resume Examples & Samples

  • 1) User pre-provisioning (checking)
  • 2) User provisioning (access creation, modification & deletion)
  • 3) Password resets (1st line support)
  • 4) Providing audit evidence on request
  • Statistical/problem analysis experience (desirable)
  • ITIL &/or ISO 9001:2008, TickIT & ISO 20000 training/experience (desirable)
  • Lotus Notes, Active Directory admin (intermediate) & Microsoft Office Products (advanced) - (Desirable)
  • Experience of IT security administration, preferably in the financial sector - banking, securities, or similar environment (desirable)
  • CISMP (Certificate in Information Security Management Principles) (desirable)
44

Intermediate IT Security Analyst Data Breach Resume Examples & Samples

  • Support and maintain mechanisms for the management of ongoing digital investigations and/or legal proceedings through the use of an incident and case management solution
  • Ensure that all data gathering and processing methods are conducted following consistent and repeatable processes
  • Perform comprehensive data analysis and mining using specialized solutions such as e-mail archives, relational databases, and investigation platforms
  • Assess and troubleshoot in a variety of technical and information security related issues
  • Participate in the incident management process when needed
45

IT Security Resume Examples & Samples

  • Leadership � Ability to lead projects from initiation to completion and to develop partnerships with key stakeholders
  • Strategic Thinker � Ability to critically assess the environment and propose both tactical and strategic initiatives to further enhance Nomura�s security posture
  • Broad security domain knowledge
  • Understanding of US Financial Regulatory Cyber directives
  • Familiar with NIST SP 800 Series Cyber Security Guidelines as well as ISO 27001 and 27002
  • Experience performing third party and application security reviews/assessments
  • Experience with threat intelligence (OSINT) - basics of intelligence and effective analysis, analytic writing, Open Source collection methods, techniques and tools
  • Ability to evangelize security and develop an effective well balanced training and awareness program that will effectively communicate security messaging across the organization at all levels
  • BS / MS in a technical discipline and a professional certification, CISSP, CISM or related SANs certifications preferred
  • 10+ years of professional work experience which demonstrates growth in both technical and leadership areas
  • Effective communication (written and oral) and ability to collaborate with team members in a geographic and culturally diverse workforce and to convey concepts related to cybersecurity to both technical and non-technical audiences
  • Willingness to learn, a desire to collaborate with others, and the drive to lead significant programs
  • Self-motivated individual, comfortable working independently and with an ability to work to deadlines
46

IT Security & Audit Consultant Resume Examples & Samples

  • Bachelor's degree or a master's degree in information systems, accounting information systems, IT security, or other related fields
  • Professional experience in such areas as IT security management design and implementation, IT security assessment, BCM, and/or business process and control review; prior experience in project planning and management will be a plus
  • Mature, positive working attitude and willing to adapt self for team success
  • Capable to handle multiple tasks and assignments and pressure
  • Familiar with leading IT security and assurance frameworks such as ISO27001/2, ITIL, COBIT, ITGI guidelines and frameworks
  • Thorough understanding of current technical concepts and professional standards and their application
  • Highly proficient in both English and Thai with good written and oral communication and analytical skills
  • Strong interpersonal skills and able to work both independently within given guidelines or as part of a team
  • Good personality and presentation skills
47

Head IT Security EGI Resume Examples & Samples

  • IT security for EGI
  • Vulnerability and Risk assessment of the IT environment
  • Security Investigations related to information leakage (with support and direction from Head of Security EGI and RSD)
  • Address security requirements for all types of local operations, including hosted activities within the functional Units
48

IT Security Analyst Security & Control Resume Examples & Samples

  • Experience with audit practices and methodologies
  • Strong presentation and communication skills
  • The incumbent will conduct reviews of IT application and supporting IT pervasive controls
  • The incumbent will maintain documentation supporting SOX Business Processes and SOX IT Pervasive areas under direction of IS&C management and control owners
  • The incumbent receives general direction from the Manager/ Control Specialist. Day to day tasks are handled independently
  • The incumbent will analyze operational/security risks, threats and potential exposures, escalating immediately any potential security breach situations to supervising line management and effectively report on the condition under review
  • The incumbent is guided by the Bank’s Information Security Policy and Standards and the requirements of Bank regulators and auditors as well as departmental procedures
49

Senior Administrator, IT Security Resume Examples & Samples

  • Supports system development and maintenance lifecycle by providing guidance on implementation and verifying the secure configuration
  • Develop, implement, maintain, and oversee procedures and associated plans for system security administration and user system access based on industry-standard best practices
  • Validates the continued and proper placement, operation, and tuning of security instrumentation, including vulnerability scanners, intrusion detection sensors, DLP, security log monitoring/correlation tools, file integrity monitoring solutions, and other security relevant controls by monitoring the IT security operations
  • Expedites neutralization of threats that pose immediate danger to the confidentiality, integrity, and availability of information assets
  • Design and implement applicable security features throughout the configuration and change management process
  • Identify security requirements and impacts resulting from modifications to the systems, and work with the respective groups to help with remediation
  • Identify and explain false positives
  • Develop mitigations and articulate compensating controls for near-term and planned implementation
  • Assist in the development of alternative remediation or mitigation strategies to minimize vulnerabilities and risks while minimizing the impact to the system functionality and performance, as well as program cost and schedule
  • Supports PCI/PII and other regulatory related activities and remediation
  • Perform threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats, and are free from known vulnerabilities
  • Engineers, implements, deploys and maintains technologies including but not limited to; Network Intrusion Prevention systems, Web Application Firewalls, and Security Information Event Management (SIEM) systems, implements and verifies the secure builds of systems by leveraging the Center for Internet Security (CIS) Benchmarks as well as manages the organization’s managed security services
  • Conduct research on emerging products, services, protocols, and standards in support of security enhancement and development efforts
  • N/a
  • 2 years of project and/or supervisory/management experience
  • Must have current Certified Information Systems Security Professional (CISSP) certification; additional certifications such as GIAC, CEH, LPT, PCI-ISA, etc. are preferred
  • Experience with PCI, ISO 27001/27002, and SOX
  • 7 years’ related information security or engineering experience
  • Fundamental understanding of risk-based information security management, as well as knowledge of applicable regulations, standards, and guidelines pertaining to information assurance (FIPS, NIST, ISO Standards)
  • PCI DSS implementation experience
  • Ability to support the development of system level plan of action and milestones
  • Excellent interpersonal skills and the ability to work within all levels of the organization
  • Solid understanding of networking concepts and project management skills
  • Ability to collaborate effectively
  • Works with other team members, including cross-functional teams, business users, and vendors
  • Mentors new and/or less experienced team members
  • Required to wear a cell phone 24 x 7
  • Occasionally work nights and/or weekend hours for major implementations to minimize impact on organization
  • Experience working on Microsoft-based, complex systems in the security engineering role using the security features of Windows 2003/2008 Server products, Windows 7, IIS, Sharepoint, Exchange and SQL Server products
  • Experience with Tenable Security Center, Forcepoint/Websense DLP, Cisco ASA, Sourcefire, Symantec SEP, Nessus, NMAP, Snort, Burp Suite, or similar products
50

It-das-it Security Analyst / Itsa Resume Examples & Samples

  • Monitor network and information system activity
  • Respond to alerts (analyze, interpret, investigate, resolve) based on monitoring activity, for security (malware, malicious actor), and other purposes (malicious activity, misuse, etc.)Uses creativity and innovation to automate and streamline processes and procedures
  • Manage, update, modify alerts, adjust/fine tune event correlation rules, etc. (e.g. filter false positives, increase accuracy/relevance/effectiveness), create new rules based on threat changes/evolving risk, etc
  • Perform specialized security functions (e.g. forensics for incident response)
  • Q-Radar Ironport Web and Email Security Imperva Certifications in Microsoft Powershell 3.0 scripting background
  • Qualys McAfee Enterprise solutions IPS Splunk Other security related tools. ITIL Knowledge and ITSM Tools
51

IT Security Architecture Team Lead Resume Examples & Samples

  • Leading a small team of security professionals
  • Participate in various Operational and Technology Risk governance processes
  • Deliver security reviews as part of the security assurance process
  • Ensure effective communication between the architecture team and internal clients locally and globally
  • Work with vendors supplying technology and business services to the firm to identify security risks with those services
  • Provide specific security expertise to engineering teams
  • Identify areas of risk on projects where security requirements cannot be fully addressed in the required time frame of the project. Document and present those risks to senior management, IT and security team members
  • Create documentation and guidance on the secure implementation of new technologies in the Firm
  • Knowledge of the primary operating systems (Unix/Windows)
  • Configuration and management of the platform(s)
  • Security risks of the platform(s)
  • Mitigation of the risk of the platform(s)
  • Knowledge of application, network and platform security vulnerabilities and the ability to explain these vulnerabilities to developers
  • Knowledge of enterprise security concepts (Authentication, Entitlements and identity management, Cryptography encryption and hashing)
  • Knowledge of standard network model and risks on each layer, good understanding of network architecture
  • Excellent communication and presentation skills (ability to present outcomes of assessments and obtain buy in from technologists and management)
  • Excellent time management skills (ability to handle multiple concurrent assessments, plan based deliverable management, strong follow up and tracking)
  • Experience in conducting IT Security assessments
  • Experience reviewing technical designs and functional requirements to identify areas of Security weakness
  • Knowledge of MacOS / iOS
  • Knowledge of authentication terminology (SAML, SiteMinder, Kerberos, OpenId)
  • Knowledge of validation checking, software attack methodologies, security throughout full SDLC
  • Knowledge of data protection, data leakage prevention and secure data transfer and storage
  • Knowledge of programming in any OOP language or database design
  • Knowledge of mobile computing
  • Experience in conducting penetration tests, dynamic vulnerability assessments and static vulnerability assessments
  • Experience in testing tools (Veracode, Fortify, AppScan, WebInspect, Burp)
  • CISSP or other industry qualification
  • Technology background in the financial sector
52

Public Sector IT Security Resume Examples & Samples

  • Log Aggregation Technology
  • Communicating a broad range of Firm services
  • Providing candid, meaningful feedback in a timely manner to the Cybercrime team; and
  • Keeping leadership informed of progress and issues.Position contractually requires a TS/SCI federal government security clearance with an adjudicated FS Poly
53

IT Security Resume Examples & Samples

  • Designing and implementing IT security and risk management framework/tools for e-commerce, e-marketing, social, and digital areas
  • Designing and implementing IT security framework/tools for third party risk management
  • Domain competencies in a number of IT-risk-related disciplines, including IT risk management, Cybersecurity, IT audit, business continuity management, privacy and compliance
  • Performs focused risks assessments of existing or new services and technologies to ensure the protection of the organization’s information assets and our customer information
  • Communicates risk assessment findings to stakeholders
  • Ensures compliance with industry, regulatory and L’Oreal Group defined policies and standards
  • Maintains strong working relationships with individuals and groups involved in managing information risks across the organization
  • Performs IT General Control, Application control audits, PCI DSS and other IT related reviews
  • Identifies weaknesses in internal controls and opportunities to enhance operational efficiencies
  • Monitors and assesses Digital/Cyber risks utilizing security tools to proactively identify potential new threats and escalate as necessary
  • Tracks remediation of audit issues noted in internal and external audit reports
  • A commitment to the crucial concept of promoting security as an enabler and not an inhibitor of business
  • Building enterprise IT risk management and governance and compliance programs
  • Strong organization, prioritization, rationalization and analytics skills
  • An ability to cultivate and build collaborative working relationships with a broad range of enterprise stakeholders
  • A well-developed understanding of and appreciation for business needs and a commitment to leading the information risk management team in delivering high-quality, prompt, and efficient service to the business
  • A well-developed understanding of and appreciation for organizational mission, values, and goals and consistent application of this knowledge
  • An ability to communicate complex and technical issues to diverse audiences, orally and in writing, in an easily-understood, authoritative, structured and actionable manner
  • A working knowledge of the following areas of technical expertise: information policy formulation, cybersecurity management, IT risk assessment and management, business continuity management, IT governance formulation, IT vulnerability management, and organizational change management, IT financial management and IT audit
54

IT Security Project Manger Resume Examples & Samples

  • Manage the Project from initiation to completion on budget and time aligned to the projects sponsors' project brief
  • Address all findings and deliver the documented solutions
  • Manage communications to the stakeholders and management with monthly status updates
  • Manage Project and resources according to the Prince 2 framework and deliver requirements to agreed time and budget
  • Ensure that project activities are clearly defined, communicated, committed to and that progress of these activities are timely reported to the Project Board
  • Ensure that Project Board meetings are held and minuted and that progress reports are available
  • Ensure that issues blocking the success of the project are identified and brought to the attention of the Project Board
  • Manage Risks register and ensure it is appropriately documented and communicated to Project Board
  • Responsible for involving the required stakeholders within and outside ITI, IS&D and Security, in order to ensure proper hand-over from project to support phase and to ensure compliance with Regulatory requirements
55

IT Security Intern Resume Examples & Samples

  • Must be enrolled at a University/College or have graduated within the last six months
  • Skilled in Microsoft Office applications (Visio, Word, Excel, Access, Powerpoint)
  • Focus study within the area of IT
56

Das-it Security PM / PM Resume Examples & Samples

  • End Point Protect (End Point, White Listing and Policy Auditor)
  • Database Encryption
  • Enterprise Password Vaulting
  • Intrusion Protection
  • Security Information & Event Management
  • Database Activity Monitoring
  • Must have experience in managing at least one large program (collection of related projects) that was more than 1 year long, more than a year in duration and a budget great than $1 million
  • 5-8 years of experience managing medium to large sized projects
  • Managing teams of 10-15 people from differing vertical lines of technology and/or business
  • Experience managing several significant projects simultaneously
  • Experience following project management best practices and methodologies
  • Experience with project management applications (WorkFront preferred) and Microsoft Office suite of products
57

AVP, IT Security & Infrastructure Resume Examples & Samples

  • Serves as the information technology infrastructure and security expert and thought leader working closely with other members of the IT leadership, infrastructure component and application owners to deliver secure solutions that align with strategic direction
  • Determines security requirements by evaluating business strategies and requirements, implementing information security standards, conducting system security and vulnerability analysis and risk assessments, recommending secure architecture, and identifying/driving remediation of integration issues
  • Plans infrastructure and security systems by evaluating network, server, data center and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; designs public and private facing network/Internet protocol usage methodologies including; configuration and use of certification authorities (CAs) DNS, digital signature, encryption technologies as well as hardware and software; adhering to industry standards and driving future methodologies and implementations for a more secure computing environment
  • Implements security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures; creating, transmitting, and maintain keys; providing technical support
  • Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analysis; developing and conducting training programs
  • Creates, maintains and drives information security technology strategies and road maps
  • Researches/analyzes emerging technologies, designs and advocates new technologies, architectures, and security products
  • Provides expert knowledge of solution/application architecture and tier 3-4 support
  • Enforces security standards, procedures, and methodologies for the software development life cycle
  • Interacts with stakeholders and possesses the ability to influence direction, articulate risks and sell secure solutions/road maps
  • Establishes alternative security mitigations/compensating controls to allow for business to continue while protecting the company’s assets
  • Partners with various cross functional teams to ensure compliance to industry and company standards
  • Updates job knowledge by tracking and understanding emerging security practices and standards; participating in educational opportunities; reading professional publications; maintain personal networks; participating in professional organizations
  • Provides subject matter expertise for overall enterprise architect and other technologists
  • Regular attendance
  • Sitting, talking, hearing, and walking
  • Concentrated mental and visual attention with normal hand-eye coordination
  • Clarity of vision at 20 inches B corrected or uncorrected
  • Generally negligible physical effort, but occasional moving of 1 to 10 lb. items
  • CISSP and other expert level industry security certifications preferred. GSE highly preferred
  • Strong understanding of infrastructure and security architecture concepts
  • Demonstrated ability to stay current with best practices, existing and emerging technology platforms, architectural and systems engineering industry trends with an emphasis on security systems
  • Implementation and architecture experience with purchased, open source and customized solutions/projects
  • Demonstrated experience of cloud technologies
  • Good oral communications and written communication skills
58

Director, Regional IT Security Resume Examples & Samples

  • The development, implementation and oversight of policies, processes, controls and toolkits supporting a Regional IT Security Framework for PCA's Life & Funds Businesses. This IT Security Framework will be used to guide long-term IT Security strategies and contribute to the management of security issues across all business lines on a daily operations perspective
  • Ensure alignment with the corporate governance frameworks, monitor changes in global and regional guidelines to support the tactical adoption of Group Security strategies
  • Evaluate IT Security technologies by proactively ensuring the regular maintenance, update, publication and communication of new technologies introduced to the organization
  • Evaluate vendors, propose standard technologies and maintain key IT Security vendor relationships
  • Support business and IT alignment and implementation through close partnerships with IT teams in the other APAC offices
  • Develop an IT Security regulatory control matrix for all of the regulatory authorities within the operating area in the organization
  • Ensure IT Security Regulatory compliance at the IT Hubs
  • Support business units in achieving IT Security compliance
  • Work with internal/external auditors and regulatory agencies as appropriate for IT Security Audits
  • Candidate must have more than 8 years of experience in IT Security and more than 4 years of experience in project management
  • Required to have a University Degree or above
  • Experience gathered in insurance or other financial institutions
59

IT Security Deployment Engineering Manager Resume Examples & Samples

  • Strong staff management skills; must have served as a recent manager in a previous role, including staff lifecycle management
  • Strong infrastructure familiarity to pinpoint dependencies in large scale DMZ build outs
  • Strong vendor management skills (including directing site-to-site shipments, billing inquiries, order procurement, etc)
  • Strong proactive inventory lifecycle management (especially around tracking End-of-Sale/End-of-Life hardware)
  • Strong budgeting skills; candidate must have managed multi-million dollar inventories in prior jobs
  • Strong datacenter knowledge in terms of power & rackspace allocations for equipment as well as experience with equipment airflow and cooling characteristics & specifications
  • Moderate physical networking abilities (Knows how to cable RJ45 jacks, familiar with creating out-of-band dongles, modems, etc)
  • Moderate networking (knows how to subnet, knows how IP addressing works, etc)
  • Moderate hands-on router/switch configuration capabilities
  • Basic Hands-on configuration of non-router/switch security devices (Knows how to direct others which cables to plug into which ports)
  • Basic security hardware knowledge (knows what proxies, firewalls, servers, Network Intrusion Devices, etc are. Candidate does not have to know them intimately, just know how they function on a high level)
  • Basic systems administration skills (knows how to navigate a unix command prompt)
  • Microsoft Office (Sharepoint , Excel, Powerpoint, etc)
  • Lab management
  • Staff fiscal management
  • Telecom/Datacenter experience
  • Financial firms experience
  • Strong Networking/Systems knowledge
  • Scripting capabilities (Shell, python, perl)
60

Senior Associate, IT Security Resume Examples & Samples

  • Five (5) or more years of professional experience required
  • Ability to work in a fast-paced, high-growth environment with multiple high-priorities
  • Approximately 20% out-of-town travel to client locations is typical for IT security consultants
  • Consultants work from their local office when not visiting client locations, or remotely when testing is required out of office hours
61

IT Security Consulting Manager Resume Examples & Samples

  • Supervises the day-to-day workload of staff on assigned engagements and reviews work product
  • Ensures staff is trained on all relevant software
  • Evaluates the performance of staff and assists in the development of goals and objectives to enhance professional development
  • Delivers periodic performance feedback and completes performance evaluations for staff in accordance with Firm guidance
  • Acts as mentor to staff, as appropriate
  • Eight (8) or more years of professional experience required
  • Experience performing IT Security Assessments, including static, dynamic, and manual assessments preferred
  • Experience leading and managing teams of security consultants preferred
  • A strong understanding of web, mobile, and thick client Application Security, static and dynamic testing, and Secure SDLCs
  • A working understanding of application layer vulnerabilities, and the business impact associated with those vulnerabilities
  • Have an understanding of how to create unique exploit code, bypass AV and mimic adversarial threats
  • A strong desire to be a part of and grow a nationwide, elite IT Security team
  • Strong written and oral communication skills
  • Ability to travel 25% to perhaps as much as 50% of the time, as needed
  • Consultants work from their local office when not visiting client locations
62

IT Security Specialists Resume Examples & Samples

  • Conduct research on emerging security threats
  • Develops focused reporting and briefings for cyber threats and activity
  • Supports Security Operation Center analysis, handling and response activity
  • Maintains situational awareness reports for advanced threats such as advance persistent threats
  • Author Global Standard Operating Procedures and training documentation when needed
  • Participate on team to assist to provide analysis, communication abilities and mentorship of other analysts
  • Must have experience on a shared services environment
  • Strong analytical skill, problem solving, attention to detail, and can handle multiple task
  • Ability to identify and assess reasonably foreseeable internal and external risks to the security, confidentiality and availability of information and systems using a documented approved process
  • Strong problem solving, analytical, technical and troubleshooting skills
63

IT Security User Provisioning Specialist Resume Examples & Samples

  • High school diploma is required
  • 3+ years of security provisioning or Level 2 (or higher) help desk experience is required
  • Active Directory, Exchange, and SAP provisioning experience is required
  • Strong verbal, written, and interpersonal communication skills are required
64

IT Security Analyst, /I Resume Examples & Samples

  • Creates, modifies, and deletes user access to files/data on numerous platforms using various tools and operating system command line interfaces
  • Performs advanced and complex tasks for security projects including training, documentation, testing, scanning, and reviewing IT security
  • Leads and manages small IT security projects
  • Operates security scanners and security products, reviews security logs, configures complex security products, assists with testing, and participates in building security solutions
  • Investigates, reviews, tests, and pilots security products
  • Reviews and correlates security data; presents findings to management and third parties
  • Provides support and direction during a crisis situation. Provide direct contribution to the IT Security objectives with efforts in the many areas of administering, reviewing and testing IT security
  • 1-5 years’ experience in IT administration or IT support
  • Lead and organize small projects
  • Excellent technical and communication skills
65

IT Security User Access Administration Analyst G Resume Examples & Samples

  • Analyze complex business requirements and develop effective technology solutions. High level technical contributor with expertise in particular business processes responsible for formulating systems scope and objectives relative to the organization's business plan and industry requirements
  • Information security best practices
  • Principles of a service oriented architecture
  • Design tools and techniques
  • 5+ years in compliance, operational risk, IT systems security, business process management, of which at least 2 years must include direct experience in compliance or operational risk management (includes audit, legal, or the management of a process or business with accountability for compliance or operational risk)
  • 5+ years security user access administration experience on multiple platforms (Windows / Active Directory, RSA Secure ID, UNIX, OS390 Mainframe)
  • 5+ years direct experience with management and implementations of RSA SecureID Multi-Factor solutions
  • Ability to work independently or as a member of a team
66

IT Security Intrusion Analyst Resume Examples & Samples

  • Understanding of the issues related to the decision-making process; ability to analyze situations fully and accurately, and reach productive decisions
  • Knowledge of practices and policies governing disclosure of information about the organization, its business activities, and employees; ability to apply this knowledge appropriately to diverse situations
  • Knowledge of and the ability to utilize tools and techniques for assessing the effectiveness of information security measures, identifying potential risk exposures, and protecting the availability, confidentiality and audit trails of information from destruction or manipulation
67

IT Security Forensic Digital Resume Examples & Samples

  • Knowledge of and the ability to detect and prevent data security vulnerabilities of coding throughout the software development life cycle within software development organizations
  • Knowledge of and ability to design, implement and evaluate standard operating procedures affecting daily and strategic business operations in order to increase operational efficiency
  • Knowledge of and the ability to utilize a variety of administrative skill sets and technical knowledge to manage organizational IT policies, standards, and procedures
  • Knowledge of and the ability to detect and prevent business crimes that involve computers/networks as instruments
  • Knowledge of technical troubleshooting approaches, tools and techniques, and the ability to anticipate, recognize, and resolve technical (hardware, software, application or operational) problems
68

IT Security Architect Lead Resume Examples & Samples

  • Perform threat modeling activities to articulate risks affecting the PNC enterprise
  • Participate in threat analysis activities and facilitate the development of security architecture-based risk mitigation strategies
  • Deliver technical and internal strategy development presentations, internal webcasts, whitepapers, RFI and RFP questions, and research pertaining to PNC information security, and knowledge transfer with respect to developing and CERT operations, scenario planning, and red team assessments
69

Director IT Security Resume Examples & Samples

  • Live and exemplify the Five Principles of Mars, Inc. within self and team
  • Provide executive level influence (internal/external) to ensure security interests are represented, championed, and prioritized in alignment with business needs and risk management
  • Lead the design and operation of related compliance monitoring and improvement activities to ensure agreement both with internal security policies and applicable laws and regulations
  • Evaluate and recommend risk management, protocols and strategies around industry best practices, ensuring the protection of the practice
  • Direct the preparation and authorization of implementation of necessary information security policies, standards, procedures and guidelines, in conjunction with the business
  • Work closely in a confidential manner with Legal on security related litigation and legal hold cases
  • Proactively collaborate with IT and business units regarding major systems and application changes, helping to ensure that information security standards and issues are addressed early in a project's life and incorporated into the resulting program
  • Ensure PCI Compliance oversight with Banfield Information Security policies, standards and architecture
  • Evangelize and promote security awareness through suitable information security training and educational activities
  • Lead or participate in initiatives assuring security best practices around software development and deployment
  • Bachelor’s degree in Computer Science, Business or Technology field preferred, or the equivalent combination of education, training and experience that provides the required knowledge, skills, and abilities
  • Ten years experience in Information Technology with a minimum of five years in an IT Security related role required
  • Supervisory experience leading highly skilled, senior level technical resources required
  • Multi-unit high transaction payment environment required
  • PCI Compliance required with CISSP preferred
  • Software development and deployment preferred
  • Multiple functional roles within IT preferred
  • Microsoft environment preferred
  • Prefer health care background (veterinary or human healthcare, pharmaceutical, etc.)
70

IT Security Strategist Senior Resume Examples & Samples

  • Provides project (expert level) advisory and consulting services for various constituents on technical information security matters
  • Documents current security architecture, researches best practice, conducts trend analysis, and identifies gaps in developing future-state security architecture
  • Develops, validates, maintains and implements security standards, guidelines and procedures and provides subject matter expert level advisory services regarding accepted ‘best practices&#8217
  • Develops logical network diagrams depicting the location/specifications of security tools across the corporate IT network
  • Minimum seven years experience in Information Technology
  • Minimum five years experience in Information Security related positions
  • Minimum five years experience in Information Technology architecture-related roles such as network architecture, architecture project/program management, server architecture, application architecture
  • Minimum one year supervisory or team lead experience
  • Knowledge of how security architecture projects/programs, technologies, processes and/or controls fit into both the Information Services and corporate business environment; requiring systems analysis and organizational skills
  • Expertise with design and development of scalable, mission critical or high-availability systems
  • Expertise in security related Internet protocols such as IPSec, SSL/TLS and familiarity with common Internet protocols such as IP, TCP, UDP, RTP, DNS, HTTP, SIP
  • Expertise with all phases of product life cycle from definition, design, development and test to deployment, field support and end of life
  • Deep understanding and expertise with networking technologies from the link layer to the application layer
  • Expertise with network systems in an enterprise environment, Application Acceleration or WAN Optimization space
  • Excellent organizational skills, technical writing skills, as well as written and verbal communication skills
  • Expertise with industry standard frameworks (NIST, PCI, SOX, Safe Harbor, ISO)
  • Ability to be a self-starter who is accountable, requires minimal supervision and is open to new ideas
71

IT Security Policy Specialist, Senior Resume Examples & Samples

  • 7+ years of experience in writing or revising information system security policies and procedures
  • 7+ years of experience with security control implementation and Plans of Action and Milestones (POA&Ms)
  • 7+ years of experience with information system security risk management, compliance management, or enterprise governance
72

IT Security Auditor Resume Examples & Samples

  • Experience with IT Controls testing / auditing
  • Manages own time and audit activities
  • Demonstrates ability to communicate clear and concrete audit requirements to audit members
  • Ability to multitask and work on various audits and projects in different phases
  • Ability to make good judgments based on observations and supporting information
  • Good interpersonal skills, including oral and written communications, listening, interviewing, fostering open communications, facilitating and influencing
  • Analytical and inquisitive, dig deep to obtain a solid understanding of business processes and IT controls
  • Take responsibility for assigned tasks, understanding and achieving expectations
  • Recognize opportunities and propose solutions to improve business processes
  • 3 - 5 year’s experience within audit and/or IT Controls
  • 3 -5 year’s experience within information technology industry
  • Formal Auditor training and certification – Must have CISA (Certification)
73

IT Security Incident Response Expert Resume Examples & Samples

  • Act as subject matter expert on various aspects of IT Security in the Global Security Operations Center
  • Coordinate response to security incidents, mitigation of risk and remediation
  • Advise Novartis Business Units on remediation of security incidents
  • Support and encourage professional and personal development of the team
  • Active involvement in the development and implementation of Use Cases to be adopted by the SOC
  • Handle escalations, issue management and coordinate the Incident Response team (Level 1 and Level 2 Analysts)
  • Assesses IT risks and analyze potential mitigation strategies to reduce IT Security exposure (Use Cases, Scenarios)
  • Detailed analyses of various security event sources (FW, IDS, PROXY, AD etc.) Acts as the interface with other IT and business departments regarding IT security incidents
  • Collaborates with other security teams in the global IT Security organization in Novartis
  • Serves as a mentor and role model. Maintains the highest standards of professional conduct and behavior in dealings with staff, colleagues, customers and outside contacts. Cooperates with business partners in ensuring the IT Security solutions correspond to their business needs while being cost-efficient at the same time
  • Collaborates and negotiate with external partners to support system operations / development / integration, ensuring reliability, competence, flexibility and cost effectiveness
74

Associate IT Security Analyst Resume Examples & Samples

  • Resource will apply knowledge and experience in the Identity and Access Management space, to identify gaps and work with IT Security Analysis to recommend and craft solutions
  • Deep working knowledge of and previous experience with CyberArk, and/or RACF and Active directory structure/tools, and system/application access provisioning/de-provisioning
  • Knowledge of and previous experience with Identity and Access Management tools
75

Senior Specialist, IT Security Resume Examples & Samples

  • Accountable as part of a team for implementation of the Information Security program for Celgene Corporation
  • Assist with the development, deployment and support of Data Loss Protection (DLP) and File Protection solutions and conduct hands on triage of events
  • Assist in researching investigations of security events (e.g., unauthorized access, non-compliance with company policies, fraud, service exploitation, etc.) to determine malfunctions, breaches, and remediation steps
  • Assist with the implementation of Security Awareness goals defined as part of organization's strategy; help design and implement programs and activities to achieve those goals
  • Develop close working relationships with management, company peers and industry counterparts to ensure alignment of company goals with current information security industry and regulatory trends
  • Stay abreast of current technology solutions and innovative information security management techniques to safeguard organizational assets
  • Bachelor's degree in a technical discipline or equivalent plus a minimum of 7 years of network, computer, or other technical experience, including 3 or more years of information security experience required
  • Well versed in information security concepts (e.g. defense in depth, separation of duties, control environments, malicious software, security awareness etc.)
  • Strong, hands on working experience with security monitoring solutions such as DLP (Data Loss Prevention), File Protection software, encryption and Endpoint
  • Working knowledge of security monitoring solutions (e.g. IPS, NAC, SIEM etc.)
  • Working experience with incident response and forensics
  • Experience in role based application and infrastructure security (e.g. Active Directory / Identity Management / LDAP etc.)
  • Demonstrated understanding of relevant terminology, such as: threat, vulnerability, risk, asset, exposure, safeguards, etc
  • Demonstrated knowledge of industry best practices in regard to network security (e.g. NIST, SANS, NSA etc.)
  • Proficient at multitasking and prioritizing in a fast-paced environment
  • Ability to effectively communicate verbally and in written forms in a professional manner
  • Experience working in a global (multinational) environment is required
76

Senior Director, IT Security Resume Examples & Samples

  • Lead IT Security Technical Engineering team to ensure that Mylan's assets are designed, built and operated to ensure they properly protected. Partners with Information Security organization to understand requirements and select standard security technologies. Lead a team that is able to design, build and transition security technologies that meet the Information Security requirements. The Security technical engineering team will span network, platform, IAM and application technology domains
  • Develop strategy, with long-term and short-term roadmaps, to ensure security is appropriately built into the Mylan technology landscape in alignment with information security's requirements
  • Integrating into Enterprise Architecture and governance processes to infuse security design into all solution proposals
  • Provide security engineers to design and build solutions required for all projects, including Merger and Acquisition activities
  • Minimum of a Bachelor's degree in IT, MIS, Information Security, or equivalent. A master’s degree is preferred. A minimum of 10 years of Information Security Industry experience and 4 years of experience in Information Security Management. However, a combination of experience and/or education will be taken into consideration
  • Knowledge and in-depth knowledge of platform, network and IAM security technologies. Hands-on technical experience and depth to enable direct oversight, problem-solving leadership and participation for designing and delivering secure infrastructure solutions
77

IT Security Product Specialist Resume Examples & Samples

  • Bachelor's degree in Computer Science, Electrical/Electronic Engineering or similar field; equivalent experience may be considered
  • A minimum of 2 years of relevant experience supporting IT security products
  • Proven customer facing skills and the ability to effectively communicate at both a high-level and a technical level
  • Has strong technical knowledge
  • Good written communication, ability to document procedures, and collaborates effectively with others. Good written communication, ability to document procedures, and collaborates effectively with others
  • Strong sense of professionalism and ethics
  • Enthusiasm and interest in information security
  • Ability to build rapport and cooperation among teams and internal stakeholders
  • Methodical and detail oriented
  • Self-motivated
  • Actively seeks to enhance the group through the sharing of knowledge
  • Strong process orientation and understanding
  • Security minded and knows how to handle evidence containing sensitive information
  • Good grasp of information security fundamentals, concepts, and strategy
  • CISSP certification, or ability to obtain via self-study within one year of date of hire, other relevant IT or security certifications
  • BA/BS in Computer Science, Business, Engineering or equivalent work experience
  • 3+ years of relevant technical experience. Technical knowledge of the targeted IT product(s) and services
  • General technical certifications or equivalent recognition
  • Product certifications may be specific to the position. Example certifications for this job title include
  • Windows Server administration experience
  • IBM Qradar experience
  • IP360/SIH experience
  • Beyond trust Retina experience
  • Tripwire Enterprise experience
  • Familiarity with PG&E processes, etc
  • Utility Industry experience
  • Product Management & Operations: Provide 24x7 enterprise support role for existing IBM Qradar, IP360 and Tripwire Enterprise infrastructure with substantial knowledge and experience to include installations, configuration, tuning, maintenance, capacity planning, patching and upgrades
  • Product Lifecycle: Manage the continuous product lifecycle from research, planning and implementation to retirement, including cost management. Introduce new innovative solutions, create support structure and integrate product with company standards. Involved in the implementation, including installation, testing, communicating, and documenting of the product. Advocates and communicates key messages and strategies, promotes the product, educates and trains support staff
  • Support: Work closely with IT professionals to troubleshoot and resolve issues. Drive conventions and standards (such as usage or configuration) across products to maximize user experience. In the absence of a third-tier support specialist, perform the role of third-tier support to other IT professionals
  • Vendor Technical Liaison: Participate in business, technical, and contract negotiations with vendors. Act as a conduit for vendor relationship, licensing, and incident management. An advocate for business unit and IT operational clients to ensure business requirements are cost effective and needs are met. Provide budget support to IT professionals and stakeholders
  • Documentation: Develops a variety of documentation such as strategies, plans, designs, usage or configuration standards, policies, guidelines, user requirements, roadmaps, reports, metrics, process manuals, configuration manuals, and other documentation specific and necessary for the targeted product or service
  • Provide skill-set knowledge transfer that ensures necessary cross-training of other Security Infrastructure team members
78

IT Security Architect Citizenship Required Resume Examples & Samples

  • Develops both current and future IT Security views based on business objectives and goals. Develops the strategic roadmap plans and solution capabilities including cross-functional dependencies required for the future state strategy. Aligns the application portfolio to the various roadmaps in conjunction with the Enterprise lifecycle standards
  • Works with IT architects, business planning analysts, vendors and management to coordinate project-planning activities during the appropriate phases of the project lifecycle
  • Responsible for maintaining architectural design principles related to common technology and strategic technical capabilities
  • Must have a current CISSP, CRISC, ITIL, CCNP, CISA, CISA, TOGAFF or equivalent information, architecture or risk management certification
  • Three to four years strategic planning experience in an IT or Security organization 
  • Minimum one year experience in project management and technical architecture  
  • Two years experience with technical writing  
  • Basic technical editing and review skills  
  • Experience with project management tools and techniques  
  • Ability to work effectively and efficiency with minimum supervision  
  • Oral and written communications skills  
  • Organization skills and ability to interact effectively with both internal and external customers  
  • Ability to work successfully in a team/goal-oriented setting
79

IT Security Architect Citizenship Required CA Rancho Cordova Resume Examples & Samples

  • Under the direction of Security Risk Management, develops, maintains and communicates the Security Strategic Plan. Consolidates business and IT perspectives as well as technology and industry trends into the annual strategic plan and technology documents. This includes all levels of the architecture framework and includes strategic planning, business objectives, process management and solution roadmaps
  • Provides a leadership role in the recommendation, development, and implementation of IS Risk Management programs as required to achieve compliance objectives
  • Compiles, edits and reviews technical documentation including technology and architecture direction and strategy, blueprints, roadmaps and standards. Maintains a library of policies and procedures, letters and other documents supporting technical operational policies and business requirements
  • Recommends technology opportunities and standards to IT Senior Management and Business Leaders to stay aligned with business objectives
  • Ensure that all projects and their designs align to the architecture framework and support the business strategic plan
  • Three to four years strategic planning experience in an IT or Security organization
  • Minimum one year experience in project management and technical architecture
  • Two years experience with technical writing
  • Any combination of academic education, professional training or work experience, which demonstrates the ability to perform the duties of the position
  • Basic technical editing and review skills
  • Experience with project management tools and techniques
  • Ability to work effectively and efficiency with minimum supervision
  • Oral and written communications skills
  • Organization skills and ability to interact effectively with both internal and external customers
80

IT Security Application Engineer Resume Examples & Samples

  • Collaborate with application development teams to ensure that security requirements are satisfied
  • Review design documents and threat models created by application development teams
  • Consult with product teams to provide security best practices and secure design patterns
  • Work to ensure that proper secure coding standards are followed via ongoing security testing and code reviews
  • Assess the security of core platform infrastructure
  • Provide recommendations for hardening environments
  • Analyze incidents and security review findings to determine security impacts
  • Support the integration of IT security architecture, policies, and practices into key IT and business areas
  • Participate in projects, ensuring that security standards of technology and configuration are applied to new system implementations and that other IT risks are adequately mitigated
  • Assist in providing oversight of the various operational systems used to manage, monitor, and respond to various security events and incidents
  • Perform risk assessments on key IT processes or assets, identifying vulnerabilities and proposing solutions to mitigate risk
  • Analyze and define information security requirements and solutions
  • Design and test information security products
  • Identify and recommend solutions to security exposures, upgrades, and contingency management planning and execution
  • Coordinate and conduct vulnerability assessment and penetration testing
  • Support vulnerability and risk mitigation efforts
  • Support the resolution of internal audit, regulatory, or risk management-related issues that could impact the confidentially, availability, or integrity of data or processes
  • Create security project plans and documentation
  • Assess or review third-party partner integration services and interactions
  • Promote implementation of various security initiatives
  • Provide expert advice without formal supervisory responsibility
  • Sun Certified Java Developer certification is preferred
  • Microsoft Certified Solution Developer (MCSD) certification is preferred particularly specializing in C#
  • SOA-Security or Sun Certified Enterprise Architect certification is preferred
  • Certified Information Systems Security Professional (CISSP) certification is preferred
81

IT Security Analyst Specialist Resume Examples & Samples

  • Responds to information security-related questions and inquiries using established information security tools and procedures
  • Identifies opportunities and executes plans to improve workflow and understands and quantifies business impacts of those improvements for communication to management
  • Interfaces with user community to understand security needs and implements procedures to accommodate them. Ensures that user community understands and adheres to necessary procedures to maintain security
82

IT Security Intern Resume Examples & Samples

  • Weeks 1: Information Security Basics
  • Best practices and practical experience in administering various security systems
  • Experience with provisioning and access management
  • Exposure to a corporate work environment
83

IT Security Client Services Consultant Resume Examples & Samples

  • Ensure the delivery of information security services to the customer is in compliance with the contract and is in compliance with any applicable standards and regulatory requirements (e.g., PCI, HIPAA)
  • Participate with the customer in the definition and implementation of information security policies, strategies, procedures and settings to ensure confidentiality, integrity and availability of customer’s environment and data
  • Maintain an information security strategy (forward looking roadmap) for the customer, aligning services / portfolio components to the strategy
84

IT Security & Service Delivery Manager Resume Examples & Samples

  • Ensure that IT compliance and security activities support business objectives and are aligned with executive risk tolerances and expectations
  • Manage relationships with internal and external IT service delivery groups to ensure the divisions' IT and security requirements are met
  • Facilitate communication between staff, management, vendors, and other technology resources within and outside of the organization to monitor completion of tasks
  • Drive the implementation of the Cyber Security Framework to support IT governance, risk and compliance objectives
  • Ensure initiatives to regularly assess the adequacy and effectiveness of IT controls, security policies, and direct remediation activities and initiate actions to ensure that compliance and security gaps are successfully addressed
  • Identify and present options with pros/cons including risks, and work with stakeholders to finalize the best solution that meets business objectives
  • Document and maintain repeatable mechanisms to determine, measure and report to management an accurate view of significant current and near-future IT-related risks, the risk appetite and the risk tolerance of the organization and its business partners
  • Facilitate development of root cause analysis to identify causes of critical incidents by leading and participating in post mortem efforts; working with Subject Matter Experts and Leaders; document problems and recommendations for improvements
  • Develop and manage compliance and security roadmaps in collaboration with senior leadership, formulate and broker support for a portfolio of necessary remediation initiatives, drive those initiatives forward, and provide leadership over resulting project efforts
  • 8+ years of relevant technology experience in multiple disciplines required
  • 4+ years of experience leading a technical team required
85

Head IT Security Technology & Operations Resume Examples & Samples

  • 1 Develop a clear roadmap for maturity of our monitoring and detection capabilities
  • 2 Provide support for IT projects for security monitoring and detection services 3 Lead the overall IS&RM strategy and IGM framework as it pertains to IT security management areas of expertise, (see below)
  • 4 Own Audit and various external/internal assessment gaps/findings as they pertain to security tools operations and monitoring
  • 5 Chairs Patch and Vulnerability management Board
  • 6 Oversee incident root cause analysis and how it impacts the security posture of Novartis IT Security Management
  • 2 Security Operation Center
  • 3 Security Scanning, Monitoring and Remediation
  • 4 Security Tools Management
  • 5 Antivirus and Malware Detection
  • 6 Security incident management
  • 7 Data Loss Prevention
  • 8 Email Security
  • 9 Identity & Access Management
  • Effectively networks and interacts with the external IT Security community
86

Head of IT Security Operations Resume Examples & Samples

  • 50%-Manage Run Activities
  • Drive and ensure operational excellence across all current and new security operations services
  • Manage the contracted security and identity management services with Shire’s service providers
  • BS degree or equivalent experience (required)
  • 10+ years of IT Experience with 8+ years of operations management experience (required)
  • 8+ years of experience managing outsourced IT service providers and managing off-shore resources
  • Knowledge of networks, firewalls, proxies, and security technical risks related to key platforms (required)
  • Experience with the breadth of existing and pending security and identity management tools including: Active Directory, security certificates, DNS/DHCP, firewall, content filtering, intrusion detection, security and event monitoring (Envision), external authentication (OKTA), edge/backbone controls, endpoint security, file permissions and auditing (Varonis) (required)
87

Principal IT Security Architect Resume Examples & Samples

  • Provide technical and security expertise to IT and business teams to identify security technology solutions and develop security reference architectures and strategies to achieve business results. Ensure appropriate implementation of security technology and reference architectures within both the development and production environments
  • Design and develop enterprise-wide security architecture and strategy for all aspects of the security domain in alignment with the business strategy and goals
  • Provide technical guidance and security expertise in the areas of secure application development, security architecture risk management and assessment, security policies and standards, security architectures and implementations
  • Provide technology and security expertise and advice to IT leadership in the
88

Head of IT Security Team Resume Examples & Samples

  • To contribute to the business development by identifying future customers and qualifying the opportunities
  • To build our local portfolio of solutions
  • To build a team to serve our projects
  • Technical Expert with at least 15 years’ experience in IT Architecture and Cyber Security Solutions
  • Business development experience
  • Engineering/Bachelor degree in Computer Science/Technology
89

IT Security Threat Intelligence Specialist Resume Examples & Samples

  • Ability to contribute to operational (short term), tactical (1-2 years) and strategic (3-5 years) planning in support of the overall business plan
  • Ability to measure the quality and quantity of work effort for the purpose of improvement
  • Understanding of effective communication concepts, tools and techniques; ability to effectively transmit, receive, and accurately interpret ideas, information, and needs through the application of appropriate communication behaviors
90

IT Security Operations Resume Examples & Samples

  • Should be knowledgeable about global standards like PCI, ISO 27001, HIPAA, SOX
  • Contribution and participation in internal and external security forums will be added advantage
  • Preferably possess industry certifications like CISSP/CISM/CISA/ISO 27001 (LA or LI)
  • Good IT Security knowledge
91

IT Security Solution Developer Cyber Risk Services Resume Examples & Samples

  • Ability to troubleshoot, problem solve, critical thinking and logical structuring
  • Ability to quickly adapt to a changing environments and quickly learn new concepts
  • Willingness to travel up to 15 percent of the time
92

Head of Global IT Security & Audit Resume Examples & Samples

  • Continuously develop Information Security Strategy in accordance to Corporate and IT strategy, in order to gain maximum business benefit from Digitization
  • Implement and monitor a strategic, comprehensive enterprise information security program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization
  • Facilitate information security governance through the implementation of a governance program, including the formation of an information security steering committee or advisory board
  • Maintain and publish up-to-date information security policies, standards and guidelines. Oversee the approval, training, and dissemination of security policies and practices
  • Communicate and implement a risk-based process for information risk management, including the assessment and treatment for risks that may result from partners, consultants and other service providers
  • Manage information security budgets, and monitor them for variances
  • Manage information security and risk management awareness training programs for all employees, contractors and approved system users
  • Provide regular reporting on the current status of the information security program to enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program
  • Coordinate information security projects with resources from the IT organization and business unit teams
  • Facilitate the information security risk assessment process, including the reporting and oversight of treatment efforts to address findings
93

IT Security Resume Examples & Samples

  • Support incident response efforts as an Oracle Cloud incident responder
  • Coordinate IT resources to effectively perform incident response tasks.|
  • Document steps taken when executing incident response plan
  • Performs investigative tasks as part of specific incidents
94

IT Security TRA & Certification & Accreditation Analyst Resume Examples & Samples

  • Must have a minimum of 5 years cumulative professional experience within the last 8 years, performing Certification and Accreditation (Security Assessment Authorization) assessment for Government of Canada Information Technology Systems
  • Must have a minimum of 2 years’ cumulative experience, in the last 5 years, in authoring security deliverables: Threat Risk Assessment (TRA) and Statements of sensitivity (SoS)
  • Must demonstrate a minimum of 10 months experience in the past 2 years, in using the Security Assessment and Authorization process, as identified in the Information Technology Security Guidance document, “IT Security Risk Management: A Lifecycle Approach (ITSG-33)”, to assess a type 1 High Assurance & Key Management Infrastructure
95

IT Security Intern Cyber Risk Services Resume Examples & Samples

  • Bachelor of Science degree in Cyber Security, Management Information Systems, Computer Science, Engineering, or other IT-related area
  • Minor in Business or Accounting is a plus
  • Strong academic track record (minimum GPA of 3.0)
  • Basic understanding of various security concepts
  • Specific interest in Cyber Security (IT) domain
  • Experience with Microsoft product suite (I.e., Word, Excel, Power Point, Visio, etc.)
96

IT Security Co-op Resume Examples & Samples

  • Work with the team to gain an in-depth understanding of IT Security tools and processes
  • Produce lucid, detailed, and organized documentation for users, developers, and auditors
  • Improve, maintain, and update existing documentation as the environment changes
97

Mgr-it Security Resume Examples & Samples

  • Responsible for oversight of all aspects of IA security functions to include: policies compliance/development, processes, audit management (review, analysis, reporting, in-depth analysis) accounts management, mitigation recommendations, incident reporting, staff training, coordinate with the C&A personnel on issues concerning accreditations, IT security operations and metrics reporting
  • Candidate must be able to assist customer and/or staff with technical issues
  • Applicant must have knowledge of government IA security requirements and processes
  • Candidate will serve as the senior liaison between the sector and USG IT Security (DAA’s, etc.) to de-conflict interpretation of policies, gain approvals as necessary on multi-program systems, support collaboration between industry and USG on any Cyber Security related current/future policy and procedures
  • 5 years of experience with UNIX/LINUX and Windows based operating systems
  • 5 years of experience with MS Office Suite (Word, Excel, PowerPoint, Outlook)
  • Current Certified Information Systems Security Professional (CISSP) and/or Certified Advanced Security professional (CASP) certification required
  • Must meet DoD 8570.1 certification requirements for IAM-III and CND-SPM
  • Experience with writing IT Security and/or IT Systems process and plan documentation
  • Must have active TS/SCI security clearance
98

IT Security Operations Administrator Resume Examples & Samples

  • Develop existing security policies and procedures to oversee and maintain enforcement of all security policies, procedures, and associated plans for system security administration and user system access
  • Accurately configure access and roles for the implementation of user account accesses
  • Drive procedures for the addition, modification, and removal of user access
  • Provide timely response to requests for user account and configuration changes
  • Ensure policies, regulatory, and compliance concerns effectively met and implemented
  • Advise leadership of and remedy any control gaps detected in course of activities
  • Ensure auditability of user access processes and approvals
  • Assist and support internal and external IT audits
  • Document processes, procedures and policies
  • Assist the Information Security team with the development of security policies, procedures, and technical documents
  • Work with other IT staff to mitigate risks in controlled systems
  • Strong understanding and knowledge of regulatory requirements, security concepts, and privacy
  • Proven experience working with network forensic tools
  • Proven experience with SOX control requirements
  • Ability to positively and effectively interact with internal and external customers
  • Regular, reliable and predictable performance required
  • Must be able to successfully pass a pre-employment criminal screen. Additional pre-employment driving and drug screens may be required based on job responsibilities
99

IT Security Design Specialist Resume Examples & Samples

  • Perform IT security planning and prepare IT security design and architectural documents
  • Engage with Technical Authority designated representatives and other identified stakeholder representatives as directed
  • Manage IT security projects and complete project manager activities
  • Lead an IT security requirements working group following ITSG-33 security guidelines to generate project-specific security requirements for high value complex IT security projects
  • Provide IT security strategic planning and advice
  • Complete Departmental and Information System IT security risk management activities as directed by Technical Authority
  • Prepare Information System Security Implementation Process (ISSIP) output documents i.e. security control profiles, security categorization reports, security assurance requirements, advice and guidance responses related to privacy impact assessments (PIA) questions and requests, threat and risk assessments (TRA) and security assessment and authorization (SA&A) package, etc.), based on the methodology and terminology contained in ITSG-33
  • Review, assess and upgrade IT security-related artefacts
  • Engage with Security Authorization and Assessment teams
  • Develop and deliver oral and written presentations to senior management
  • Produce Task Status Reports as directed by the Technical Authority; and
  • Other project and IT security related artifacts as determined by the Technical Authority i.e. design vision papers, business impact assessments, strategic IT requirements analysis
100

IT Security Automation Engineer Resume Examples & Samples

  • Key delivery role in large scale programs to integrate the MyID application across the enterprise components: desktop, distributed, AD, and PKI
  • Design automation utilities that are in alignment with enterprise security and best practices
  • Drive segment and UHG wide project activities for MyID implementation such as the upcoming 10.5 upgrade
  • Identify areas of business risk and process improvements relative to Smart Cards and drive a scaled solution
  • Monitor service delivery, proactively identify risks and remediate them as required
  • 5 or more years of professional IT experience
  • Scripting background in technologies such as shell, python or Perl
101

Senior Administrator, IT Security Resume Examples & Samples

  • Supports system development and maintenance lifecycle by providing guidance on implementation and implementing the secure configuration
  • Develop, implement, maintain, and oversee procedures and associated plans for systems and network security. administration and user system access based on industry-standard best practices
  • 2 years of project experience
  • Preferred Certified Information Systems Security Professional (CISSP) certification; CISSP certification is required within 1 year of hire; additional certifications such as GIAC, CEH, LPT, PCI-ISA, etc. are beneficial
  • 5 years' related information security or engineering experience
  • Cell phone availability required 24x7. Also participate in on-call rotation with team
  • Experience working on Microsoft-based, complex systems in the security engineering role using the security features of Windows 2008/2012 Server products, Windows 7/10, IIS, Sharepoint, Exchange and SQL Server products
  • Experience with Linux, Unix, and AIX operating systems related to configuration and patching
102

Technical Subject Matter Expert IT Security Resume Examples & Samples

  • Act as Subject Matter Expert in specific technologies, product/service or solutions delivery
  • Work with sales/engagement practice team to develop and build value argumentation
  • Support deployment of solution
  • Market Insight
  • Customer Insight
103

Director, IT Security, GBS Resume Examples & Samples

  • Lead Security program maturity of security assessments, application security architecture reviews, and risk modeling for company-developed software, acquired and/or hosted applications and services
  • Lead Security program maturity efforts to ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs
  • Provide direct support to business units as a center point of contact for security defect resolution, including vulnerability remediation and/or mitigation
  • Work with the Operational Security Team to lead the Non-technical aspects of internal and external assessments of deployed software applications and systems including system and network vulnerability scanning, penetration testing, and patch management
  • Support and improve the internal processes and system to collect and report meaningful metrics from security issues identified in all reviews
  • Support the Security team in conjunction with company's software architecture group, to develop a set of architectural and development standards for all application security
  • Lead POC and project plans in support of evaluating outsourced / third-party technologies and hosting environments to ensure they provide adequate protection for the processing, transmission, and storage of company information
  • Support and internal processes that support the resolution of security incidents related to company assets, including root cause analysis
  • Support all efforts for computer and network forensics, system and network security, incident management, intrusion detection, vulnerability and patch management, log analysis, and related technologies
  • Possess strong knowledge of Program and Project leadership , Agile development and governance best practices best practices
  • Excellent communication skills; inter-personal; organizational and analytical skills, written and verbal communications, experience with management presentations at various levels of corporate structure
  • At minimal 8-year hands-on experience Leading large Enterprise technology initiatives
  • At minimal 2-year hands-on experience Leading large scale deployment to end users (device roll-out, security solutions, etc.…)
  • Practical experience in the program and project management for the development of secure java and .Net applications and frameworks
  • 2 years direct experience supporting cloud-based software solutions including Azure, AWS, etc
  • 5 years direct experience with vendor and managed services management, enterprise wide transition and transformation programs
  • Direct experience with leading senior technical advisory and governance boards, relating to the technology services, security standards and policies and industry best practices
  • 5 years direct experience in developing and implementing Enterprise IT program management strategy, and governance programs
  • Experience in developing and implementing Information programs, and IT security policies, standards, processes, and procedures
104

IT Security Analyst Specialist Resume Examples & Samples

  • Work with various regulatory authorities to ensure the examination process is properly executed
  • Review documentation of attempted efforts to compromise security protocol and recommend solutions
  • Review security policies and procedures to control physical and system access
  • Assist in the regulatory efforts of the business to maintain compliance and security
  • Create information security documentation related to multiple environments and completes requests in accordance with company requirements
  • Identify opportunities and execute plans to improve workflow, and understand and quantify business impacts of those improvements for communication to management
  • Interfaces with user community to understand security needs and implements procedures to accommodate them. Ensure that the business understands and adheres to necessary procedures to maintain security
  • Provide status reports on security matters to develop security risk analysis scenarios and response procedures
  • Proficiency in planning, reporting, establishing goals and objectives, standards, priorities, and schedules
  • Outstanding verbal and written communication skills with technical and non-technical audiences of all levels of the organization
  • Experience establishing and maintaining effective working relationships with employees, clients, executives and regulatory agencies
105

Digital It-security Operation Manager Resume Examples & Samples

  • Good exposure in IT security operation management, skillful in running the security projects to reduce the identified risks
  • Good exposure in IT security risk management, capable to develop and implement an ongoing IT risk management program focus on IT security posture across countries
  • Good understanding and skillful in implementing security controls over the external/internal computing environment, e.g. servers, firewalls, applications, workstations etc
  • Skillful in developing and maintaining the security operation standards, benchmark, tracking and reporting mechanism
  • Skillful in developing and maintaining the IT security operation processes and procedures, e.g. Security Patch Management, Vulnerability Scan, Security Health Check, Privilege ID Management, Firefighter ID Management, Continue Business Need Validation, Security Incident Management, User ID and Access Administration Management, System Activation/Deactivation Management etc
  • Good understanding in web, mobile app security against the OWASP Top 10 and skillful in the penetration test tools like Burp Suite, Nessus, Acunetix, Metasploit etc
  • Skillful on the specific solutions like: Enterprise-wide Identity & Access Management (I&AM), Data Loss Prevention (DLP) and Security Information & Event Management (SIEM) solutions etc
  • Responsible for various IT security operation projects as assigned from whatever local and global
106

Edmc IT Security Intern Resume Examples & Samples

  • Development and rollout of a cloud services survey
  • Updating security related documentation (policies, procedures, standards, etc.)
  • Development and delivery of security awareness training programs
  • Performing forensic investigations of security incidents
  • Reviewing and revising security policies and performs high risk and sensitive security strength testing and analysis
  • Currently pursuing a bachelor’s degree in an Information Technology related field of study
  • Works well with others in a collaborative team environment
  • Is eager to learn the intricacies of the Information Security domain
  • Able to conduct themselves in accordance with the highest standards of moral, ethical and legal behavior in the course of professional activities
  • Understands the pillars of information security (confidentiality, integrity, and availability) and able to recognize and apply it
107

IT Security Resume Examples & Samples

  • Conducting and participating in risk/threat vulnerability studies and impact assessments
  • Integration of disaster recovery and business continuity for efficient and effective recovery following an interruption in service caused by a prolonged outage or declared disaster
  • Organizing and managing actual, scenario-driven DR exercises as well as tabletop or simulated exercised with both business and technical staff
  • Ensuring that IT supported applications have a fully documented, and executable DR plan that contains all of the required information, reflects current conditions from an IT infrastructure recovery standpoint, and is able to support the recovery objectives of the organization
  • Designing, coordinating, and executing DR annual test exercises for critical business processes, and product test reports including lessons learned. Coordinating follow up on test results as required
  • Partnering with infrastructure, application development, and business intelligence areas to develop and maintain recovery procedures for key business applications
  • Advising and training IT members in practices of risk-based technology disaster recovery planning
  • Reviewing existing and proposed plans for recoverability efficiency and identifying opportunities for enhancement
108

IT Security Service Manager Resume Examples & Samples

  • Excellent Customer service/relationship skills
  • Process and workflow analysis, development and refinement
  • Serve as the interface for the integration of service management processes and workflows
  • Project/Task Management experience
  • BS degree in Information Technology or related field with a minimum of 10 years of experience
  • Proficient with Microsoft Project, Office and PowerPoint
  • Be capable of explaining information security concepts to non-technical audiences in both written and verbal forms
  • Capable of obtaining a Secret Clearance
109

IT Security Transformation Professionals Resume Examples & Samples

  • Provide solutions to complex business problems for area(s) of responsibility where analysis of situations requires an in depth knowledge of organizational objectives
  • Drive, supervise and review technology diagnosis and assessment activities
  • Identify opportunities for technology-related improvement based on benchmark data and doing high-level cost benefit analysis
  • Develop a high level design which supports robust technology solutions, taking into account the user requirements, technical requirements, etc
  • Review and supervise design components
  • Support sales growth through business development activities working closely with leadership to position offerings with clients
  • Interact with senior management levels at a client and/or within Accenture, which may involve negotiating or influencing on significant matters
  • Manage large teams and/or work efforts (if in an individual contributor role) at a client or within Accenture through structured program or project management methodology
  • Security Operating Model
  • Perimeter & Network Security (e.g. Firewall, IDS/IPS, NAC)
  • IT Infrastructure Security (e.g. Server Hardenning)
  • Application Security (e.g. IAM, Multi-factor Authentication)
  • End-point Security (e.g. DLP, Antivirus, Encryption)
  • Presents ideas clearly and concisely in verbal and written communications
  • Present and communicate information or ideas to technical and non-technical audiences in ways that help them relate to message effectively
  • Work in a team-oriented environment through effective work facilitation and collaboration
  • Flexible team player who thrives in environments requiring ability to effectively prioritize and juggle multiple concurrent challenges
  • Deliver results with minimum supervision and general guidance
  • Work creatively and analytically to describe and solve large or complex problems
  • Highly analytical thinking with demonstrated ability for identifying, scrutinizing, improving, and streamlining complex work processes
  • Make rational and informed decisions that have lasting impact on area of responsibility with the potential to impact outside area of responsibility
  • Focus on end goals and drive progression towards successful outcomes
  • Anticipates and identifies risks, mitigating actions, and ownership
  • Solid experience in Information Technology area for > 5 years of experience (total experience) in developing and implementing IT Security technologies
  • (Advantage) Hold related IT certification in IT Security
  • (Advantage) Has worked for known, well reputable local or international IT Consulting companies
  • (Advantage) Has worked for both local/international big clients with complex IT Landscape
  • (Mandatory) Bachelor’s (or higher) degree in Information Technology
  • (Preffered) PMP
  • (Preffered) CISA
  • (Preffered) CISSP
110

IT Security Support Specialist Resume Examples & Samples

  • Monitors central University SIEM systems, assesses/escalates issues and takes steps to remediate threats. Communicates with impacted customers and/or other departmental IT support staff as appropriate to assist in remediating and restoring services. - Monitors relevant security sites and bulletins to help ensure the University is current as possible with information on perceived and existing threats to its information systems, data integrity, or to customer accounts or networked devices. Ensures this information is disseminated as appropriate
  • Creates reports and dashboards in the SIEM to proactively monitor and assess security threats
  • Maps processes, documents and maintains procedures for SOC incident response to security issues, such as phishing, compromised accounts, IPS alerts, REN-ISAC alerts. - Trains the SOC staff on security essentials and procedures
  • Collaborates closely with the Information Security Office regarding security issues
  • Writes technical articles for the campus knowledge base as well as procedural documentation for the internal SOC document repository
  • Actively participates in professional development in order to maintain and improve technical knowledge
  • Good foundation of IT security analyst skills including CompTIA Security+ or GIAC Security Essentials certification or equivalent credentials or analogous proven experience
  • 2 years experience in a security or network operations center
  • Critical thinking, analytic and problem solving skills
  • Excellent organizational skills, written and oral communication skills, and attention to detail. - Commitment to professional customer service
  • Ability to work in a team environment; strong interpersonal skills
  • Ability to work and communicate well with customers possessing various levels of technical ability and understanding
  • Ability to work in a fast-paced technical support center with rapidly shifting focus
  • Ability to work non-traditional, flexible hours, including evenings and weekends; hours may be subject to change
  • Willingness to work toward mastery of new technologies and skills as the needs of the industry and the user community change
111

IT Security Operations Delivery Analyst Resume Examples & Samples

  • Review and monitor service performance to vendor contract including maintenance of business activities, improvement activities, feedback (This will be the primary function of the role)
  • Function as initial point of contact on day-to-day operational, process, and performance items. Identify trends and areas of improvement
  • Proactively ensure service continuity and improvement through the review of partner improvement plans, the use of Problem Management, quality tools, and report on your activities
  • Actively participate in major incident service restoration and problem management activities by leveraging technical knowledge of systems supported; Drive/document improvements utilizing Problem Management, Quality, SWAT, Technical roundtables and other service improvement tools (will be on call in the event of major incidents)
  • Actively participate in daily change management meetings and activities – Apply technical experience and knowledge of systems supported to review and advise on change requests impacting production environments. Review communications plans, test plans, and communicate as necessary
  • Coordinate activities between various teams as needed to facilitate the provision of the services and incident remediation
  • Use technical knowledge and communication skills to lead major incident service restoration and problem management activities; Drive/document improvements utilizing Problem Management, Quality, SWAT, Technical roundtables or other service improvement tools
  • Requires a 2 year degree and a minimum of 2 years of business experience supporting one or more of the following
  • Patching/Software Deployment/Image Deployment (Symantec Management Agent/Altiris), Endpoint Security (CheckPoint, SEP, Bit9/Carbon Black), VPN (IPSec/SSL), Firewalls (WAN. LAN, Internet), Email Security (SPAM, AV, TrendMicro, TLS encryption), Network Security (IPS/IDS, AppWall, TMG), Single Sign On (ADFS SSO, IDAM SAML SSO), Threat Vulnerability Management (Qualys), Identity & Access Management (Net IQ IDAM), Digital Rights Management (ADRMS), Data @ Rest Encryption (SQL TDE), Privilege Account Management (CyberArk PAM), Enterprise Mobility Management (MobileIron)
  • Vendor management and partnership experience
  • Comfortable working across cultures
  • Background in data analysis and Managing and measuring work
  • ITIL experience, familiar with ITIL terms
  • Microsoft Office experience focusing on the data analysis
  • Security related IT Professional Certification such as Security+, CISM, CISSP, GSEC, etc. highly desirable
  • ServiceNow experience is a plus, or similar Help Desk ticketing software
112

Junior IT Security Position Resume Examples & Samples

  • Excellent opportunity to learn how a Fortune 500 company treats vulnerabilities and threats while getting exposure to large scale tools being utilized in their environment as well as in the rest of the IT market
  • Experience with Excel:creating pivot tables, Vlookups, basic Macro knowledge
  • Excellent written and verbal skills as well as interfacing with all levels of an organization
  • Analysis-data analysis, running SQL queries
113

Enterprise IT Security Architect Resume Examples & Samples

  • Create and develop strategic plans and policies for internal and external security and architecture requirements
  • Build, design, and develop security systems
  • Provide data classification sets for product deployments and define data classification needs with the customer to provide the appropriate output
  • Provide technical expertise across the organization on information security and security architecture
  • Participate in pre-contract reviews to ensure information security requirements are appropriate and within designated guidelines
  • Strategic security architecture alignment
  • Minimum 4 years of system administration (e.g., Firewalls, IDS/IPS, Anti-Virus, Vulnerability Management tools, PKI, DLP, VPN and Wireless Security, etc.) required
  • Minimum 6 years data security experience required
  • Minimum 4 years of experience with designing and building enterprise level security programs preferred
  • Minimum 4 years' experience leading security programs related to National Critical Infrastructure preferred
  • Minimum 4 years of disaster recovery planning, testing, auditing, risk analysis and business continuity planning preferred
  • Minimum 2 years supervisory or lead experience preferred
114

Intermediate IT Security Analyst Resume Examples & Samples

  • The ideal candidate will have multiple years of experience in system administration and security supporting a variety of technologies in addition to supporting information assurance auditing, vulnerability scanning/mitigation, and Certification & Accreditation
  • Familiarity with DoD 8500.1, DoD 8500.2, DoD 8570.01, AR 25-2, AR 380-5, NIST Special Publications is a plus
  • A working knowledge of the following is highly advantageous: identification, authentication, and authorization, principles of IA - confidentiality, integrity, non-repudiation, availability, access control, DoD Accreditation program and processes DIACAP
  • Knowledge of the Risk Management Framework (RMF) replacing DIACAP is a bonus
  • Possess exceptional communication and interpersonal skills
  • Knowledge of DISA Vulnerability Management System (VMS)
  • Knowledge of network specific DISA Security Technical Implementation Guides and checklists
  • Experience with Certification/Security Tests and Evaluation (C/ST&E) events
  • Experience performing IA audits within a DoD organization
  • Logically process and diagnose information assurance and security issues
115

IT Security Analyst Iv-ediscovery Resume Examples & Samples

  • Proactively identifies and escalates incidents as well as operational performance concerns
  • Assists in Continual Service Improvement efforts by identifying opportunities for process improvement. Drives some process improvement efforts
  • Participate in the collection and documentation of departmental knowledge artifacts, participant in the development and population of knowledge management and collaboration systems for the IT Security team
  • 4+ years’ experience in programing or system/network operations and administration preferred
116

Senior Consultant, IT Security Resume Examples & Samples

  • Participating in Solutioning, Delivery and Support activities pertaining to Identity and/or PKI/Data security Technologies
  • Configuring, customizing, setting up and deploying of Identity and Web Access suite, as well as performing solution integration activities
  • Participating in project activities including Requirements, Design, Testing, Documentation, Support, Troubleshooting, etc, as needed during the appropriate phases
  • Degree or Diploma in IT/Computer Science or related discipline with prior experience in Security Solution/Implementation (Involved in some security function as part of projects)
  • Familiar with Web server, Application Server Technology, Tools, Software and Scripting
  • Background in Identity and Access Management Product Solutions (Oracle/NetIQ/SUN/CA Others) preferred
  • Experience with Identity/Application/Data Security solutions is preferred
  • Strong interest in Security Domain covering Identity and Data security Integration
  • Singapore Citizens preferred
  • CISSP & CISA certifications would be advantageous
  • Those with limited experience but with the right aptitude and strong interest to focus in Identity and Data Security Integration, may also be considered
117

IT Security Analyst Quality Resume Examples & Samples

  • Ensuring that IT security services and processes are in compliance with internal and external regulatory environments
  • Plan and perform qualification tasks i.e. create change requests, update system documentation, write quality plans and reports etc
  • Supervise compliance and quality of vendor deliverables
  • Manage non-conformities
  • Identify and drive process improvement initiatives in the IT Security Services organisation
  • Develop, Review or approve documentation/records as appropriate based on impact to GxP and business critical elements
  • Act as interface between the vendor, service managers, architects and QA organisation for all security services
  • Create and approve Changes, NCs in the IT Security and Infrastructure areas
  • Create and execute tests for IT Security service qualification. Assist/coordinate in defect resolution
  • Periodic assessments and reviews of the platform documents for security services
  • Liaison with all necessary vendors, Service managers/architects and QA organization for all the compliance deliverables within IT security services
  • Establish compliance follow up on ITSM processes
  • Ensure all security and compliance requirements are met in the processes and day to day operations
  • Ensure inspection readiness of IT security services
  • Coordinate audit and inspection participation from IT security service area
  • Bachelor or similar graduate degree field in Engineering, Computer Science combined with additional relevant IT and business experience
  • You have 5+ years’ experience working within IT quality in pharmaceutical industry (GxP)
  • Worked in the areas of Infrastructure and IT Security Services Quality control (QC or QA)
  • Experience from an international service or consultancy firm
  • Excellent communication skills in English and comfortable working with different cultures
  • Personality who likes to be self-driven with large degree of flexibility & ability to work under high time pressure while maintaining a good sense of humor
118

IT Security Analyst / Developer Resume Examples & Samples

  • Implements security designs in hardware, software, data, and procedures.Verifies security requirements; performs system certification and accreditation planning and testing and liaison activities. Supports secure systems operations and maintenance
  • Assist in planning and ensuring delivery of all items in the statement of work
  • Participates in the audits of computer systems to ensure they are operating securely and that data is protected from both internal and external attack. Makes recommendations for preventive measures as necessary
  • Provides technical consultation on highly complex security tasks
  • Other duties as assigned relating to the operation of a leading edge security group
  • BS or equivalent + 2 years related experience, or MS + 0 years experience
  • Experience in UNIX (OS X, Linux variants) systems administration
  • Experience in database technologies (e.g. MySQL)
  • Experience with information, software, and network security tools and practices (e.g. Nessus, Snort, Argus, Splunk, Syslog, FISMA)
  • Experience with programming in C, PERL, Python, and/or shell script
  • Understanding of TCP/IP and application protocols (e.g. DNS, HTTP, SMTP, RADIUS, and SSH)
  • Good analytical skills, organizational skills, and interpersonal skills
  • Willing to work rotating on-call 24x7 hours if necessary
  • Big Data experience a plus
  • Highly effective troubleshooting skills in quickly diagnosing and resolving customer problems as well as assisting in the development of internal software tools
  • Have a passion for technology and how it can be used to solve NASA’s IT
119

IT Security & Application Support Manager Resume Examples & Samples

  • All IT Security topics for the Australasia Territory (CIB incl. BP2S & IP), working closely with the APAC Security teams
  • Security Risk Management and Computer Security Incident Response both on a local and regional level for BP2S only
  • A small team consisting two IT Security Correspondents and Application Support staff. In addition to the IT Security tasks, this team provides support to a number of local applications, including but not limited to the HR system (people management and payroll), general ledger for BP2S, Access Rights Management workflow in Lotus Notes, and some ancillary support tools for CIB Finance, CIB (ex. BP2S) Operations and HR. Note that to ensure segregation of duties and no conflict of interest, such local applications should be reviewed on a regular basis (at least yearly) and independently by the regional IT Security teams
  • Ensuring systems run to maximum efficiency through planned maintenance and effective support, including installation of upgrades and other administration tasks
  • Providing support to users to enable them to effectively perform their roles through using the system in the best possible way
  • Managing application incidents and ad-hoc requests, following ITIL best practice, to meet service expectations of users
  • Managing and implementing improvements and solutions according to the business needs, following IT project management principles
  • Providing 2nd-level support to IT Helpdesk for specific systems
  • Liaising with vendors to ensure knowledge of the system remains up to date
  • Development and update of APAC operational playbooks
  • Regular reviews of APAC Cyber Security policies and procedures
  • Contribute to the IT Security Permanent Control framework for implementation of policies and procedures in day-to-day business activities, such as the Control Plan
  • Reporting of all incidents according to the Incident Management System
  • Provide input to the APAC CISO for enhancing the Regional Information Security Strategy
  • Any other tasks within the GPI perimeter if and when required
  • Risk Management professional certification such as CISA or CISM
  • Experience in managing a small team of technical staff
  • Understanding and experience in the Finance industry is an advantage
120

IT Security Analyst Intern Resume Examples & Samples

  • Assist with program administration for security projects that deal with network infrastructure
  • Assist Security Engineers and Analysts with the implementation of Web Application Security initiatives
  • Assist with the delivery of various security awareness training initiatives at the organization
  • Assist with general office work
  • An IT focused degree, IT Security or IT Development preferred
  • Willingness to help with a variety of programs and tasks
  • Well organized and self-motivated
  • Willingness to collaborate with staff and other interns
  • Comfortable in diverse settings
  • Prefer college juniors, seniors, or graduates
  • Broad experience with IT Security programs
  • Training in office management skills, program administration, presentation delivery and writing
121

Nexperia IT Security Analyst Resume Examples & Samples

  • This role will report to the Head of Information Security/Data Privacy and will be responsible for the operational security of Nexperia IT
  • Providing communication and business engagement support for information security awareness and training
  • Providing security support to IT projects
  • Assisting with security impact assessments
  • Drafting high level and detailed security awareness requirements
  • Reviewing conceptual, logical and physical solution designs
  • Assisting with vulnerability assessments, penetration tests and risk remediation
  • Drafting response to customer security RFIs & Security questionnaires
  • Evaluating technology products and solutions
122

IT Security Intern Resume Examples & Samples

  • Exposure to/coursework in managing network and system vulnerability process, monitoring security event alerts
  • Exposure to/coursework in the following information security technologies, such as: IDS/IPS, malware prevention, database activity monitoring, secure password repository, multi-factor authentication, SIEM, SPAM prevention, web content filtering, IdM/IAM, encryption and encryption key management, DLP, change detection
  • Exposure to/coursework in technical understanding of TCP/IP traffic including familiarity with major application-layer protocols such as HTTP, HTTPS, FTP, SFTP, FTPS, SMTP, DNS, etc
  • Exposure to/coursework of network and application attacks: examples include DoS/DDoS, buffer overflows, SQL injection, reconnaissance scanning, and evasive methods attackers use to avoid detection; must be able to demonstrate a minimum level of familiarity with well-known vulnerabilities and exploits
  • Basic knowledge of IT security concepts
123

IT Security Expert Resume Examples & Samples

  • You will be IT Security expert for international Railway Turnkey Projects in Berlin
  • You will be responsible for developing the IT system & solution requirements of based on the technical specification, the country-specific legal basis as well as applicable standards
  • You will be responsible of Product & Solution Security Classifications, Security Concepts, Threat and Risk Analysis (PSS TRA), Security Plan as well as IT safety related application guidelines for the turnkey project
  • You will optimize the system architecture in cooperation with System Engineering in regard to IT security
  • You will take over the verification of the system requirement specification; assessment of IT security requirements
  • You will evaluate the technical solution in regard to IT security and compatibility to the overall project
  • You will develop and execute security verification tests e.g. penetration tests
  • You will define the security requirement of products & solutions of third party suppliers
  • You have a degree in computer science or electrical engineering
  • You have extensive professional experience in IT security with a broad knowledge of Software Architecture, Solution Engineering or Security Consultanting
  • You have good knowledge of centralized IT and cloud solutions are advantageous
  • You have work experience in international project teams
  • You are pro-active and have strong communication skills
  • Your communication skills and strong abilities in assertiveness are great
  • You are fluent in English
  • Due to the international orientation of the projects, mobility and willingness to travel is essential
  • You have an independent and a structured approach to work
124

IT Security Leader Identity & Access Management Resume Examples & Samples

  • Lead the implementation of an automated, streamlined access review process, inclusive of internal and external (ie. supplier, customer, JV, partner) accounts at all layers (application, database and server)
  • Leverage GE Digital shared service tools such as SailPoint, Access Certifier (Oracle Identity Analytics) to design and implement new account extraction and validation process
  • Drive compliance for all of Power to regulatory and internal policies, ie. Sarbanes Oxley (SOx), Highly Privileged Account Operating System (HPA OS) and ISO 27002
  • Develop strategy to migrate Power applications to contemporary platforms, ie. Cloud and Predix
  • Identify, analyze, and interpret trends or patterns in complex data sets
  • Become a subject matter expert in privileged access strategy on applications, databases, and servers
  • Drive improvements by continuously reviewing and analyzing existing access management processes and the related services/processes
  • Manage programs and assigned tasks to ensure dates and commitments are met by collaborating with GE Digital teams and GE Power P&Ls
  • Create and update process documents and instructions
  • Bachelor's Degree in Information Systems, Information Technology, Computer Science or related discipline from an accredited college or university
  • Minimum of 3 years of IT project management experience
  • Minimum of 3 years of IT project management experience in Security or Compliance
  • Knowledge / experience with identity, access management principles and / or technology (e.g. IDM, Domains, DBA roles, etc.)
  • Technical project / program management skills
  • Strong team player – collaborates well with others to solve problems and actively incorporates input from various sources
  • Strong scripting experience
  • Green Belt / Black Belt Certified or Quality training certification
  • Big 4, accounting, consulting, or CISA / CISM certification
125

Consultant, IT Security Resume Examples & Samples

  • Implementation and administration of network/system security hardware and software, enforcing the network/system security policy and complying with customer requirements such as security policy and regulation
  • Performing analysis of network security needs and contributes to design, integration, and installation of hardware and software
  • Maintaining and administering perimeter security systems such as firewalls and intrusion detection systems
  • Excellent knowledge of Security market with industry experience in either Government, Public Sector, Defense, Financial services, Manufacturing, Communications, Media and Entertainment, Transportation, Healthcare, Petrol chemical and energy, and etc
  • Proactive with ability to succeed in an dynamic environment
  • Proven experience in a Technical Consultancy / Sales Engineering position
  • Security background is essential, comfortable with concepts such as Phishing, malware, social engineering, DLP, and PII
  • Excellent knowledge of Networking and Security infrastructure devices and applications (e.g. Firewalls, IPS/IDS, VPN, SIEM, IP Networking, SPAN/TAP ports and etc)
126

IT Security Management Team Lead Resume Examples & Samples

  • Implementation of the Information Security Policy along with identifying potential risk, vulnerabilities and evaluating the effectiveness of security measures currently in place
  • Implementation of Management, Operational and Technical security controls to ensure the Confidentially, Integrity and Availability of IT services and data
  • Coordinating with multiple groups to analyze and investigate IT Security problems and issues that are unique to the enterprise desktop
  • Manage day to day operations, provide direction, instructions and guidance to team members
  • Knowledge and experience with Federal Mandates and Information Security standards including but not limited to user access controls, auditing, common operating systems and domain structures such as (Active Directory) for desktop system and associated vulnerabilities
  • Ability to perform complex IT security access controls for major security projects
  • Up-to-date on current and emerging security principles and practices
  • Information Systems Security Officer (ISSO) and Information Assurance (IA) training and experience (preferred)
  • Working knowledge of Active Directory is required
  • Knowledge of Remedy is required
  • Excellent customer service skills
  • Writing skills are a must. The applicant must be able to effectively maintain spelling and grammar standards while drafting and sending email correspondences
  • 1 year of working on the Vanguard 2.1 contract desired
  • Clearance - Top Secret Security Clearance
127

Global IT Security Security Operations Senior Manager Resume Examples & Samples

  • Responsible for leading the day-to-day IT Security operational activities. This includes the end-point security suite, firewalls, threat detection, security information and event monitoring (SIEM), and incident management
  • Responsible for setting the strategy/roadmap for the Global IT Security operational technologies used to protect Campbell systems
  • Advise on security issues impacting Campbell systems by identifying and mitigating IT security threats and vulnerabilities to Campbell's information systems
  • Develop and maintain the Global IT Security incident response (IR) processes, procedures and tools to support the enforcement of the company’s IR plan
  • Capture and report key security metrics to Senior IT management
128

Senior Mgr / Dep Director IT Security Resume Examples & Samples

  • Manage daily operations for security incident management, hunting activities, and rules development
  • Responsible to develop and maintain the GLOBALFOUNDRIES IT Security Incident Response policies, tools, and security controls. Manage and facilitate the incident management process to ensure successful integration with the other areas in IT security
  • Build a high performance Information Security Operations team. Builds and develops the technical talent of members of the team into a well-rounded team through implementing new ideas and improved processes. Bring industry best practices to develop metrics to trend growth for resource and staffing needs. Coordinate resources to support operational needs and build strong relationships with internal partners to effectively strengthen the delivery of this service
  • Demonstrate deep technical expertise. Oversees team in performing detailed investigations and analysis on security incidents
  • Responsible for vulnerability management program
  • Manage Information Security Operations for continuous improvement in our operational capabilities in handling security incidents and vulnerability management
  • Deliver Information Security Operational metrics
  • Utilize a structured and consistent framework for centralized coordination and tracking of all information security incidents within the enterprise for trending, incident analysis, correlation, and reporting of program metrics
  • Measure the effectiveness of the Incident Response program by developing short term metrics
  • Provides metrics on security operations to CISO
  • Performed similar role in other enterprise organizations
  • Familiar with security incident management framework
  • Experience in a Security Managed Service Provider environment is preferred
  • Bachelor’s Degree in Electrical Engineering, IT, Computer, or related Engineering discipline
  • Masters Degree in Electrical Engineering, IT, Computer, or related Engineering discipline
  • Passion for Cybersecurity
  • Eight or more years of relevant experiences in security with a minimum of two years in a SOC manager position
  • Excellent organization and interpersonal skills
  • Ability to adapt in a dynamic work environment and make independent decisions
  • Detail-oriented with a strong customer service focus
  • Working knowledge in the Semiconductor industry
  • Ability to work in a team environment and independently when needed
  • Highly motivated and positive
129

IT Security Intern Resume Examples & Samples

  • Participate in initiatives requirements meetings
  • Assist in the development and execution of a cyber security tabletop
  • Document the requirements using different techniques
  • Develop and manage PowerPoint decks for various risk and cyber leadership events
  • Document test scenarios and test cases for new security tools
  • Clearly articulate and document project requirements
  • Collaborate with business, security team, and other IT teams
  • Participate in and contribute to project status meetings
  • Escalating project and task concerns to Security Project Director
  • Pursuing a Bachelor’s/Master’s Degree in Computer Science, Information Technology, Management Information Systems, Information Science, Business or related area
  • Previous Business Analysis, Project Coordinator experience preferred
  • Minimum 3.0 GPA required
  • Committed to a full-time, 40 hr/week, extended internship from January – August
  • Proficient with MS Office including Word, Powerpoint, Visio and Outlook
  • General coding experience (Sharepoint, Java, .NET, etc)
  • Self motivated, organized and effective time management skills
  • Foundational analytical, research, critical-thinking, and reasoning skills
  • Committed to the work of the organization through our core values: integrity, customer focus, excellence and teamwork
  • Good interpersonal & consultative skills
  • Some knowledge of technology structures: networks, database, communications, internet
  • Basic understanding of regulatory mandates (i.e., GLBA, HIPAA, PCI, SOX, etc.)
130

IT Security Resume Examples & Samples

  • Must have strong understanding and experience in Information Security Risk Management of IT Infrastructure & Applications
  • Must Have Experience of Managing Internal / External Audits and Performing IT Security Review for Vendors , Data Center, Network Room etc
  • Must have experience in managing IT Security Projects
  • Must have strong Fundamental knowledge and Understanding of IT Security products like Firewall, IDS/IPS, SIEM, Anti-Malware Threat Discussion etc
  • Must have strong understanding of Vulnerability, Patch & Incident Management
  • Understand the fundamental concepts, principles and best practices of IT Security
  • Understanding of IT Security Requirements for Operating Systems (Windows and Unix flavors) and Database (Oracle, MSSQL, Sybase, MYSQL, DB2) platforms
  • Strong communication, presentation & technical writing/diagramming and spoken skills in English
  • Manage IT Security teams located in Multiple City to ensure the service across India
  • Must be able to handle clients in a confident, positive and responsive manner
131

IT Security Auditor Resume Examples & Samples

  • Prepare and conduct IT Security audits and coordinate friendly hacking activities on Siemens systems, products and services
  • Discuss on eye-to-eye level with security architects to challenge their assumptions and improve their solutions whenever possible
  • Design attack scenarios to jeopardize state-of-the-art technologies and prove if they are vulnerable
  • Drive pre-audit planning and perform analysis to ensure a baseline understanding of the IT landscape under the scope and the related processes and controls
  • Provide timely status updates to the engagement manager, ensure escalation of potential issues and actively seek clarification on engagement task requirements
  • Use analytical skills to identify root causes of findings and assist clients in developing improvement measures
  • Participate in closing meetings with management
  • Sponsor new IT Security related internal processes, tools and documentation improvements
  • Provide insight and conduct research on latest developments in IT security technologies and threats
  • Lead engagements reporting to high management
  • Coach Cybersecurity analysts and working students
  • Strong academic history (degree in IT, Computer Science,Engineering or other related fields)
  • At least 4-6 years of professional experience within Siemens or a related industry, or a ‘Big 4’ accounting firm in the fields of IT security audit, cyber security, penetration testing and / or development of industrial IT services and solutions
  • Willingness to learn about the latest trends in cybersecurity and keep up to date in a continuously challenging environment
  • Profound knowledge of some of the following:, cybersecurity, SAP security, SCADA, Web application testing, mobile security, IT general controls, data protection and information security requirements, industrial security controls, software development lifecycle, COBIT
  • Solid project management skills, with experience in working in multicultural environments
  • Good scripting and programming skills preferred but not required
  • Fluent in English and willingness to travel up to 70% - 80% of your time globally
  • Motivated, creative, proactive, innovative, communicative, with solid analytical skills
  • Certifications like OSCP, CEH, CISSP, CISA, CISM preferred but not required
132

Engr, IT Security Resume Examples & Samples

  • Review logs and events Frontier’s Endpoint Suite and investigate any anomalies
  • Process any policy changes needed to Frontier’s Endpoint Suite
  • Stay abreast of developments in the Information Technology industry specifically as they relate to Information Security
  • Maintain proper documentation for all products in Frontier’s Endpoint Security Suite
  • BS in Information Security, Computer Science, Information Technology with concentration in Security or 4 years’ experience in Information Technology field, with at least 2 years working in Information Security
  • Strong in-depth technical knowledge in information security with emphasis on anti-virus, DLP, NAC or MDM
  • Experience using Enterprise Anti-virus and DLP solutions in multi-site environment
  • Ability to deal with changing priorities and multi-task several projects
  • Security certifications, such as: CISSP, GIAC, Security+, etc… are a plus
  • Excellent presentation and communication skills
  • Excellent Technical and business writing skills
133

IT Security Intern Resume Examples & Samples

  • Providing direct support to IT staff for security related issues
  • Assisting in the development and implementation of security policies, procedures and projects
  • Security requirement gathering by evaluating business strategies; researching information security standards
  • Research and recommend the appropriate tools for security monitoring security; implement those tools and processes; and review data from those systems to ascertain risk or issues
  • Tracking and monitoring of system or network security incidents; Enforcing security policies and procedures and coordinating system security and vulnerability analyses and risk assessments
  • IP Address Blacklisting
  • Web Proxy Whitelisting
  • EDiscovery
134

IT Security Operations Administrator Resume Examples & Samples

  • Configure, support and maintain day-to-day operations of security tools
  • Monitor security consoles and remediate alerts as appropriate
  • Respond to, and remediate security incidents, malware infections, etc
  • Conduct security audits and provide recommendations to mitigate risks
  • Create and maintain security related policies, procedures, standards, and documentation as needed
  • Take action to maintain compliance to security standards and policy, escalate non-compliance in a timely and effective manner
  • Evaluate project initiation documents from the perspective of information security standards and practices
  • Maintain current configurations, carry out proper administration and support of information security systems including but not limited to: Content Engines, Intruder Detection, Prevention Systems implementations, anti-virus software, and patch management systems
  • Produce and maintain disaster recovery and business continuity work practices related to information security policies, procedures, processes and tools
  • Maintain current and relevant knowledge of common network, authentication and security protocols, such as SNMP, HTTP, HTTPS, SMTP, NTP, LDAP, KERBEROS, RADIUS and FTP
  • Participate in change management process meetings and working sessions
  • Define and enforce controlled access to corporate security zones as required
  • Participate as an effective contributor in CRH global and Oldcastle Inc, regional security working groups, conferences, programs of work and projects as required
  • Bachelor’s degree in Computer-related discipline; or equivalent professional experience, with 2+ years of IT Operational experience in large, distributed enterprise environments
  • CompTIA Security+, SSCP, or CISSP certifications desired
  • Experience with McAfee ePO a plus
  • Experience with Cisco CES, CWS, and AMP a plus
  • Experience with Qualys Vulnerability Mgt system a plus
  • Experience with a configuration manager tool such as SCCM a plus
  • Experience with forensics tools such as FTK Imager, CAINE, and Autopsy a plus
  • Knowledge of security protocols (L4-L7) such as SSL, HTTP, DNS, SMTP and IPSec
  • Security incident investigation experience
  • Demonstrated understanding of VPNs and remote access
  • Virus protection and content filtering knowledge
  • Experience with web application vulnerability scanning tools
  • Knowledge of encryption techniques and PKI infrastructure
  • Risk assessment, audit and accreditation process experience
  • Security policy knowledge and experience
  • Strong understanding of IT Security Management principles and practices
  • Demonstrated ability to exercise judgement and decision making
  • Specific Technical knowledge
  • Strong oral & written communication, listening and presentation skills
  • Demonstrated critical thinking, situational analysis and problem-solving skills and mindset
  • Ability to conduct research into security issues, standards, and products as required
  • Able to communicate with others by telephone and in person
  • Able to utilize a computer for word processing, email communication, and preparation of documents and presentations
  • The noise level in the work environment is usually quiet
  • The position will require work outside of normal business hours
135

Senior Director, IT Security Resume Examples & Samples

  • 10-12 years working experience in information technology, 5-7 years operating at a leadership/managerial level
  • Expert in IT Security frameworks, cybersecurity, access controls, systems controls & general IT Controls frameworks
  • Is familiar with the principles and practices involved in IT solution development, maintenance and IT service delivery
  • Has extensive technical understanding and the aptitude to remain up to date with IT security and controls practices plus emerging security threats and risks
  • Possesses comprehensive understanding of the business applications of IT
  • Possesses strong communications skills and an enterprise mindset
  • Domestic & International travel will be required – circumstances will vary based on requirements – Estimate 25%
136

IT Security Analyst Intern Resume Examples & Samples

  • To provide analytical reports on Security topics like Symantec, Microsoft patching, Application patching
  • To provide action plans to solve detected gaps
  • To provide trend reports to show the progress on implemented solutions
  • Communicate and assist our internal customers on all security related topics
  • Experience in IT Client support
  • Knowledge of Microsoft Windows client operating systems including XP, Vista, Windows 7
  • LANDesk Management Suite 8.8/9 Administration is an advantage
  • Scripting skills (Powershell, VBS) are an advantage
  • Microsoft Excel (Pivot, reports) is an advantage
137

Summer IT Security Intern Resume Examples & Samples

  • Maintain Security project updates
  • Monitor Security ticket request queue
  • IT Governance tasks
  • Pursuing a degree in Cybersecurity, Information Assurance, or Information Technology, with a focus on Cybersecurity
  • GPA of 3.3 or higher
  • Availability to work up to 40 hours per week
  • Strong technical and organizational skills in addition to excellent written and verbal communication skills
  • A high level of integrity, accuracy, dependability, enthusiasm, and confidentiality
  • Proficient in Microsoft Office applications (Excel, Word, and PowerPoint)
138

Student Assistant for our IT Security Team Resume Examples & Samples

  • Maintain, develop and automate our IT security systems
  • Assist with threat hunting
  • Handle incident response
  • Improve tasks in order to increase performance of SIEM and SOC
  • Participate in projects aimed at improving cyber security resiliency
  • Drive vulnerability and patch management improvements through automated reporting
  • Are passionate about IT security, preferably with relevant experience
  • Have a strong technical understanding and know how to communicate complex technical concepts to both IT and the business
  • Have knowledge and understanding of IT security architecture including network security and Identity & Access Management security concepts
  • Are motivated, self-driven and take ownership of your tasks
  • Have strong interpersonal, written and oral communication skills
  • Are probably studying within the field of computer science
  • Speak and write Danish and English fluently
139

IT Security Project Leader Resume Examples & Samples

  • Bachelors Degree and 6 or more years of experience in the Communications or Project Management area
  • High School Diploma or Equivalent and 8 or more years of experience in the Communications or Project Management area AND
  • Experience in strategic and operational consulting or business systems integration
  • Networking background
  • Adaptable and flexible to learn other technology
  • Project management experience is key, familiarity with project lifecycle and concepts, SDLC, Agile or Waterfall methodology
  • Requirements review experience, change management, and project planning
  • ITIL experience and knowledge preferred
  • Strong vendor management skills preferred
  • Managing Consultants preferred
  • In-depth, strong problem solving analytical skills
  • Insurance Industry Experience preferred
140

Director, IT Security Resume Examples & Samples

  • Partner closely with Facebook’s Information Security team to develop and implement a security roadmap for Facebook’s corporate systems, infrastructure and business applications based on company wide policies and best practices
  • Develop and maintain a threat model for Facebook's corporate infrastructure and internal systems
  • Collaborate with internal stakeholders to define and drive the security agenda for Facebook's corporate information security program
  • Partner with leaders across the company to ensure that corporate information security efforts receive appropriate prioritization and resources
  • Regularly provide the CISO, CIO and CFO with useful measurements of corporate security risks and an action plan to mitigate
  • 10+ years of technical management experience developing and leading large corporate information security programs, and proven ability to contribute at both strategic and operational levels
  • BS/MS in Computer Science or related field, or equivalent experience
  • Experience hiring, managing, and leading technical teams from the ground up
  • Must be able to develop and communicate information security strategies and architectures
  • Demonstrated ability on building solutions for a corporate culture such as Facebook’s
  • Knowledge of attacker life-cycles and strategies to inhibit attacker activity
  • Familiarity with control frameworks such as ISO 27001/2, NIST Cybersecurity Framework, and Center for Internet Security Controls for Effective Cyber Defense
141

IT Security Technical Lead Resume Examples & Samples

  • Experience of working in a customer facing support department
  • Knowledge & Experience of working within security standards PCI, ISO27001 etc
  • Knowledge of EU GDPR
  • Experience of vulnerability scan management
  • Knowledge of generic software development lifecycle processes
  • Demonstrable project management skills
  • Experience in a similar senior information security role
  • Experience of risk assessment and audit processes and techniques within information security
  • Experience with software and security architectures and an understanding of the principles of secure network design
  • Working knowledge of other IT control frameworks, such as ITIL
  • Ability to explain business principles of secure system designs in terms of business risk to senior stakeholders in order to develop strategies, proposals and controls
  • Demonstrate flexibility and be prepared to work across multiple concurrent tasks with varied responsibilities
  • Experience in a range of the following technologies
142

Digital It-security Operation Manager Resume Examples & Samples

  • Take responsibility for all run processes post project launches
  • Responsible for providing consistent reporting to showcase the current situation in support
  • Define the correct SLA’s for incidents and issues
  • Be the IT owner of the Change Request and Enhancements process
  • Responsible to implement global updates into Asia Pacific websites in the region
  • Define process to plan for support during peak periods for countries. E.g. a change freeze period
143

Digital It-security Operation Manager Resume Examples & Samples

  • Rapidly acquires new knowledge on IT solutions and keeps constantly updated of technological opportunities & market trends in his/her field
  • Organizes at his/her level the relevant transmission of the technical and/or project management skills and “know how” DECODES & INFLUENCES
  • Clarifies and simplifies technical concepts / solutions to facilitate action and decision making
  • Listens actively to his partners/clients, to decode needs, qualify them properly and transform them in relevant solutions
  • Takes change management and communication initiatives to facilitate the implementation of solutions and users’ satisfaction
  • Coaches, challenges and develops teams in a cross functional environment and/or matrixed organization
  • Manages efficient interactions with both internal and external contributors to win support
  • Manages methodology, timing, budget and resource allocation on projects (independently of the role within the organization)
  • Ability to interact with, and influence, senior managers and equally able to interact across all teams/levels and geographies
  • 10+ years’ experience in the IT industry with relevant infrastructure implementation and operation management experience in various systems platforms (Private/Public Cloud)
  • Experience with regional implementation and management of region-wide infrastructure, with particular emphasis on digital/private/public cloud experience
  • Strong vendor management and motivational skills, strong professional and time management
  • Strong communication skills and ability to communicate to varied audiences
  • Strong competency in project management processes
  • Ability to understand complex needs for idea definition of Digital (E-commence, Digital Marketing, CRM, Brand/Campaign websites)
  • BA/BS in Computer Science, Computer Engineering or IS Management with relevant professional qualifications
  • Experience in the following areas: Traditional Data center/Public Cloud/Digital technical
  • Strong written and verbal communication skills with a good command of English (Mandarin is a plus)
  • Self-motivated and capable to work without much supervision
  • ITIL/PMP certification is preferred
  • Rich experience in FMCG/Internet industry is preferred
144

IT Security Intern Resume Examples & Samples

  • The intern will analyze information and create presentations for internal and external use
  • Working with substantial independence, the intern will analyze and review technology security requirements and analyze security technology to reduce risk
  • Support a broad range of other assignments with responsibility for recommending and implementing change in methods and procedures in addition to advising management on appropriate next steps
  • Special projects as needed
  • Working towards Bachelor’s Degree in Computer Science, Cyber Security or a related technical field
  • Strong qualitative and analytical skills
  • Security & Networking knowledge/interest
  • Excellent communication and presentation skills, both oral and written
  • Knowledge of enterprise, network, system/end-point and security issues and risks
  • Must be able to prioritize tasks and manage multiple projects in a fast paced environment with minimal supervision
  • Ability to work independently as well as in a team environment and communicate with all levels of management
145

Summer Intern, IT Security Resume Examples & Samples

  • Work at the direction of the Security Manager to further the security architecture for the Company
  • Utilize various scripting languages to query log data and determine next steps
  • Assists with the enforcement of security policies and procedures by monitoring system activity
  • Reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls
  • Reviews Unix security data to ensure that access is appropriate and properly identified with an actual user
  • Reviews Windows security data to ensure that access is appropriate and properly identified with an actual user
  • Utilize various script options to ensure that logins to generic accounts are for approved purposes
  • Assists with the vulnerability management scans and prioritization of identified vulnerabilities
  • Work with users to ensure that appropriate security measures are in place
  • Currently enrolled in an undergraduate degree program from an accredited college or university focused in Computer Science, Information Systems, or other related field
  • Working knowledge of Microsoft Word, Project, Excel, Access, Visio
  • Strong understanding of systems including but not limited to Windows, Unix, Linux and Virtualization technologies
  • Working knowledge of network switches, routers and firewalls
  • Detailed knowledge of tools such as PowerShell, Python, SQL, Nmap, etc
  • Detailed knowledge of Windows, Red Hat Linux and Oracle Linux operating systems
146

Intern, IT Security Resume Examples & Samples

  • Formalize IRM engagement with Agile projects and continue to mature the assessments process
  • Strategy Planning Execution
  • Have a natural ability to be curious about risks, attacks, figure things out and be technical
  • Conduct research related to ESI and its clients
  • Perform data analysis and assist in data reporting as needed
  • Makes or assists in making oral or written presentations to management
  • Full-time student in an accredited 4 year college, graduate program or Pharm. D. Program; Preference given to students with 3.0 GPA or above
  • Proficiency with Microsoft Office Suite
  • Motivated self-starter; Excellent verbal and written communication skills; Attention to detail; Excellent analytical skills; Creative and resourceful; Strong business aptitude; Knowledge of the PBM or healthcare industry preferred; Dates of Internship are May 14th-Aug 3rd, 2017; Students must be available to work M-F 8am-5pm during this time frame
147

IT Security Admin Resume Examples & Samples

  • Performs special projects and participates as a technical advisor for a variety of ad-hoc information security and logical user access projects that will be dictated by current business and technological developments
  • Deploy, manage and maintain all security systems and their corresponding or associated software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus software
  • Design, perform, and/or oversee penetration testing of all systems in order to identify system vulnerabilities
  • Download and test new security software and/or technologies
  • Provide security support to end-users
  • Prior experience managing and maintaining information related to SOX audits
  • Knowledge of applicable practices and laws relating to data privacy and protection
  • Strong organizational skills and excellent attention to detail
  • Ability to effectively prioritize and execute tasks in a fast paced environment
  • Change oriented; actively generates process improvements, champions and drives change initiatives, confronts difficult circumstances in creative ways, balances multiple and competing priorities and executes accordingly
  • Demonstrated customer focus; evaluates decisions through the eyes of the customer, builds strong relationships, creates processes with customer viewpoint and partner with customers to help shape future initiatives
148

Working Student It-security for the Siemens Productcert Resume Examples & Samples

  • As a working student you will support us in the field of security analysis of software components through web-based research
  • You will furthermore provide support for the evaluation and classification of security vulnerabilities
  • Proposal of remediation strategies for vulnerabilities affecting software components used by Siemens will also be part of your tasks
  • You are currently studying Computer Science or a technical field of study and have already completed a minimum of 3 semesters
  • Strong analytical skills are required
  • You provide very good communication and interpersonal skills
  • Proficient English skills round off your profile
149

Director of IT Security Resume Examples & Samples

  • Determines the overall direction and strategy of the Information Security function in collaboration with the CIO and Corporate Leadership teams
  • Determines, builds and optimizes effective security and privacy governance to ensure complete security of organizational data
  • Creates a framework for roles and responsibilities relative to information ownership, classification, and protection
  • Facilitates security risk assessment and risk management processes
  • Develops and implements an end-to-end information security management system that aligns with Kiewit’s business model, risk profile, and existing compliance initiatives and efforts
  • Responsible for iterative application, infrastructure and 3rd party risk assessments
  • Analyze and improve upon existing security standards across the organization to remain current to the changing threat landscape
  • This role is accountable to maintain technical compliance to regulations and standards
  • Author or coordinate the development and maintenance of Information System Security Plan (ISSP), System Security Plan (SSP), Contingency Plan (CP), Continuity of Operations (COP), Disaster Recovery (DR) and Incident Response (IR) plans
  • Stay well-informed of technological advances and continuously research better ways to accomplish tasks, and integrate new security technologies
  • Educate Kiewit employees on security topics, policies, changes to regulations and their responsibilities
  • Senior executive presence, comfortable presenting and collaborating with Senior Leaders as a Business Advisor
  • Shows strong passion and ability for leading and developing individuals and teams
  • Experience managing team size of 5-20 people
  • 10 years general Information Technology experience
  • 5 years Information Security experience
150

Intern, IT Security & Digital Forensics Resume Examples & Samples

  • Low/Informational severity incidents
  • Countermeasure monitoring and reporting coverage
  • Server monitoring and reporting coverage
  • Statistical analysis of incident data
  • Review Data Loss Prevention (DLP) incidents
  • Review daily intel feeds to and apprise the team of major changes
  • Splunk intel application assessments
  • Collaborate with other functional areas on various projects as needed
151

IT Security Operations Lead Resume Examples & Samples

  • Overall responsibility for understanding and leading operational aspects of all Information Security applications/systems (Network ATP, IPS/IDS/Content Filtering, Email Filtering, Endpoint Protection, Decoys and others as deemed in scope of global IT Security)
  • Establish, maintain, and enforce all operational processes, standards, procedures and practices such as incident/problem management, change control process, minor enhancement process, major incident processes based on ITIL in a global 24x7 environment
  • Provide project management for minor projects and initiatives as it pertains to operational effectiveness. May act as designated Project Manager of various projects as needed
  • Troubleshoot and identify sources of problems related to IT security
  • Manage service vendors for break/fix (including dispatch, collaborative troubleshooting and problem resolution)
  • Coordinates cross functional teams to resolve chronic problems
  • Responsible for understanding and reviewing action plans for planned and unplanned changes related to the global applications portfolio
  • Must have analytical skills and the ability to work in a diverse team environment exchanging ideas and information with Developers, Team Leads, Project Managers, and user community
  • Oversight for all Information security Change Control activities
  • Reviews daily/monthly/quarterly operational reports to identify trending issues/gaps, capacity issues/risks. Documents findings and escalates and/or engages the appropriate resources to take action
  • Facilitates meetings with technology and business teams, and vendors to obtain feedback on performance and capacity resolutions, workarounds, and enhancements to ensure that performance or capacity issues are being addressed in a timely manner
  • Develop, maintain, and report relative metrics related to Information Security Operations
  • Provide overall support for quality compliance, SOPs, audit activities, and SOX activities
  • Assures the viability, functionality and effectiveness of essential support tools (e.g., ServiceNow, SIEM, etc)
  • Take a leadership role in developing and maintaining productive relationships and key clients, stakeholders and technology partners to facilitate cross organizational communications and transparency
  • Strong coordination with various Novelis teams and partners (i.e. global applications COE, architecture team, infrastructure team, regional IT leaders, local IT leaders and business leaders as expected, Vendor partners)
  • Timely, clear, concise communication concerning issues and work status to respective individuals/teams
  • Bachelor degree in Computer Science or Information Technology with some specialization around Information Security
  • 5-10+ years of hands on experience within Information Security
  • Expertise with Access Management tools (Active Directory, IAM tools, etc…)
  • Expertise with Network Security Tools (Intrusion Systems, Content Filtering, Firewalls, etc…)
  • Strong understanding of information security architecture and solutions
  • Strong understanding of key security compliance, including ISO 27000, SOX
  • CISSP and ITIL Certifications preferred
  • Ability to prioritize and meet tight deadlines
  • Ability to work with global oversight
  • Ability to work with IT technical resources across all Novelis and with external partners
  • Demonstrated ability to multi-task and manage indirect resources to project deliverables
  • Ability to communicate and interact in a global organization
152

IT Security Intern Resume Examples & Samples

  • Managing workstation anti-virus / anti-malware products
  • Assisting with compliance audit projects
  • Participating in analyzing and resolving IT security alerts
  • Providing assistance to Patterson employees and customers with system access
  • Assisting with penetration testing and vulnerability scanning actions
  • Currently enrolled in an accredited college or university as a freshman, sophomore, or junior
  • Ability to communicate effectively, both oral and written
  • Currently enrolled in a computer, business-related, or criminal justice degree program with the desire for a career in Information Technology Security
  • Ability to communicate on a technical level
153

IT Manager of IT Security Resume Examples & Samples

  • Primarily responsible for the ongoing service delivery, technology, and staff in the IT Security group, including the management and leadership of group staff, setting group priorities, and coordinating and reporting of group activities
  • Creates Security requirements and negotiates priority in partnership with peer IT organizations in the identification, assessment, and implementation of security solutions
  • In partnership with the Enterprise Architecture group provides senior technical leadership in the area of IT Security to ITS and the enterprise including being conversant with the future direction of security systems, impacts of the direction on the enterprise
  • Partners with General Counsel, Human Resources, and Internal Audit departments to align IT security policies, processes, and technologies with compliance, legislative, and human resource challenges. Collaborate with these and other areas to develop and manage an employee awareness training program
  • Recognizes, identifies, and escalates potential areas where existing IT Security policies, technologies, and procedures require change, or where new ones need to be developed, especially regarding future business expansion
  • Supports the development of the IT Security budget and is responsible for the administration and maintenance of the approved budget
  • Supports audit activities sponsored by internal, retained, or external audit areas. Responsible for the collection of documentation, retaining of documentation and execution of remediation plans as agreed to with the IT Management Team
  • Responsible for ensuring appropriate IT Security metrics are being monitored and trended, thresholds have been established, alerting solutions deployed and, periodic status reports provided to stakeholders for all critical systems within their specific area of responsibility
  • Serves as a source of IT Security documentation and standards to help direct the activities of the IT organization
  • BS or BA degree in computer science or related field
  • 5 - 7 years of IT Security experience
  • 2 years of supervisor experience is preferred
  • Ability to express complex technical concepts effectively, both verbally and in writing
  • Ability to work well with people from many different disciplines with varying degrees of technical experience
  • CISSP, GIAC, or equivalent designation preferred
154

IT Security Application Engineering Team Leader Resume Examples & Samples

  • Support the IT Services mission to consult and partner with the business to deliver optimized technology solutions to support the implementation of corporate strategic plans