IT Security Resume Samples

4.6 (99 votes) for IT Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the it security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
RP
R Parker
Rhianna
Parker
8097 Miller Course
New York
NY
+1 (555) 225 3022
8097 Miller Course
New York
NY
Phone
p +1 (555) 225 3022
Experience Experience
Los Angeles, CA
IT Security Intern
Los Angeles, CA
Swift Group
Los Angeles, CA
IT Security Intern
  • Assist with maintaining compliance with Payment Card Industry (PCI) data security standards
  • Work directly with Security team members
  • Other duties as assigned by supervisor
  • Support the development and sourcing of security awareness materials
  • Perform data analysis and metrics reporting in support of security awareness initiatives
  • Research and write content for communication of security awareness topics to end-users
  • Assist in maintaining the group’s standard work documentation
Detroit, MI
IT Security
Detroit, MI
Block Group
Detroit, MI
IT Security
  • Work closely with business, legal, and technology stakeholders to improve review and response processes
  • Assist in the periodic review of volume, analyzing rules with high volumes of false-positives/ non-incidents for further review with engineering and integration team
  • Develop implementation options in line with Incident Management best practices
  • Manages implementation of IT security and risk management framework/tools
  • Learn and apply the various templates that correspond with the OHS workflows or the BHS/FH workflows
  • Performs focused risks assessments of existing or new services and technologies to ensure the protection of the organization’s information assets and our customer information
  • Partnering with infrastructure, application development, and business intelligence areas to develop and maintain recovery procedures for key business applications
present
Chicago, IL
IT Security Expert
Chicago, IL
Bogisich Inc
present
Chicago, IL
IT Security Expert
present
  • Monitoring and managing ongoing health and capacity of firewall environments within multiple data centers
  • Responding to calls & requests from the monitoring teams and other internal customers to assist in troubleshooting level 1 and level 2 network/firewall issues
  • Knowledge of IP networking and network security including Intrusion
  • Contribute to the reporting of all incidents according to the Incident Management System
  • Troubleshooting problems when necessary
  • To minimize operational risks and risks of fraud by implementing regular and sufficient controls related to his / her position
  • You will optimize the system architecture in cooperation with System Engineering in regard to IT security
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of Kentucky
Bachelor’s Degree in Computer Science
Skills Skills
  • Solid knowledge of Microsoft Office Suite
  • Strong verbal and written communications skills with demonstrated ability to explain technical ideas to non-technical audience
  • Ability to handle sensitive matters with discretion and maintain confidentiality
  • Developing and maintaining tools to assist in vulnerability research and exploit development
  • Ability to self-organize, prioritize activities independently, create documentation, and reporting
  • Able to collaborate effectively with business and technology stakeholders, and manage expectations in the delivery of projects
  • Broad security domain knowledge
  • Leadership � Ability to lead projects from initiation to completion and to develop partnerships with key stakeholders
  • Three years previous experience working incidents
  • Experience with Incident Management tools, such as RSA Archer Incident Management, Symantec DLP
Create a Resume in Minutes

15 IT Security resume templates

1

IT Security Engineering & Operations Manager Resume Examples & Samples

  • Manage and participate in the review and approval of changes to Russell’s information security systems, architecture and management practices and procedures. This will include both Russell and outsourced/ managed service initiated changes
  • Manage the effective use of internal and multiple external team resources and participate in the consultation with the IT Security team in the implementation of practices, technical and administrative changes relative to the secure transmission and storage of data, access to computer networks, use of computer resources and the appropriateness of the security architecture. Manage the process for the production of appropriate metrics for this task
  • Assist in the forensic investigation process in response to information security incidents and events. Ensure appropriate management reporting and escalation of security incidents takes place and an incident process exists that incorporates chain of custody records, reporting procedures, and appropriate forensics methods and technologies
  • Manage the processes for reviewing and auditing Russell’s technical infrastructure (including vulnerability scanning, patch management and ethical hacks) and ensure the timeliness of reviews and appropriateness of system and network changes
  • Participate in information security audits performed by Internal Audit and external auditors, including the development of management responses and remediation of exceptions. Assist the audit work in the scope of Russell’s corporate finance audit and the SSAE review
  • Assist in the active promotion of the awareness of security policies and practices with external technical support services. Conduct information security training sessions for associates and external business partners
  • Manage and participate in the testing of security controls and the accomplishment of service level agreements associated with security administration tasks. Manage the process for the production of appropriate metrics for this task
  • Formal training in Firewall Management, SIEM Technologies, 2-Factor Authentication and SSO platforms is preferred
  • 10 – 15 years experience within IT Security, and typically 5 years experience managing security systems to best industry practices such as ISO 27001/27002 is essential and preferably in a global financial services environment
  • This position needs extensive knowledge of networking protocols; network and security best practices including computer network defense, computer network attack and technical intrusion analysis techniques; project management; and security architecture
  • This role requires experience in both direct and indirect management (via an outsourced or managed security-as-a-service provider) responsibilities
  • The ability to communicate (both written and oral) in a tactful, responsive and timely manner is essential
  • Advanced education in computing security, risk management, audit and controls is preferred. CISM and CISSP designations are mandatory
2

VP, IT Security Monitoring Resume Examples & Samples

  • Analysis and response to various industry and commercial cyber intelligence threat feeds
  • Information Security guidance and leadership to junior members of the Security Operations Center team as well as other parts of the business
  • Review, tuning and development of Data Loss Prevention (DLP) alerts
  • Analysis, response and tuning for Network Intrusion Detection systems
  • SIEM alert tuning, response and oversight
  • Proxy traffic analysis, blocking and reporting
  • 8+ years Information Security / Information Technology experience including incident response, event correlation and security management for the following technologies
  • Multifactor authentication (token, soft, sms, etc)
  • Web servers (IIS, Apache, etc)
  • Database (Sybase a plus)
  • Network devices
  • Prior team lead / management experience
  • Effective organization skills
3

IT Security Leader Resume Examples & Samples

  • Responsible for managing security compliance of application portfolio, monitors compliance to key performance metrics
  • Executes security reviews of applications and technology environment, drives remediation actions
  • Responsible for quarterly reviews of user access, data center, and third-party suppliers
  • Establishes IT security policies and procedures and measures compliance
  • Primary support contact for Treasury security and represents Treasury requirements in all security forums
  • Responsible for local incident response and leads forensic investigations
  • Provide constant communication to keep the executive management and operational teams informed of any and all issues
  • Define and manage overall IT security strategic plan
  • Manages a global team of information security professionals and contract workers
  • Fosters, through mentoring and leadership, critical and independent thinking skills and behaviors that drive strong information security practices
  • Working knowledge of current security industry technologies
  • Experience leading direct teams, matrixed teams and/or contractors
  • Possesses project management skills and presentations skills
  • Proven track record of setting goals and delivering results within a team structure
  • Proven ability to build strong partnerships and leverage both internal and external resources
  • Experience as CISO, CSO, or other senior security related function
  • Experience and comfort presenting in front of senior level management
4

IT Security Technology Solutions Architect Resume Examples & Samples

  • Multi-task in complex, global environment while focusing on architectural success of multiple projects
  • Minimum of 7 years of experience as a Technology Solutions Architect
  • Bachelor’s degree in related information technology field
  • Experience with architecting and developing solutions for highly scalable, highly available systems
  • Experience in architecting multi-tiered solutions based on architectural best practices
  • Experience with service oriented architecture (SOA), Enterprise Service Bus (ESB) technology and other middleware technologies
  • Experience with web solution architectures
  • Strong strategic thinker with an ability to communicate your vision
  • Creative thinking and approach, essential to collaboration with BOW customers, product groups and account management to determine solutions that further the business and align with business plans and technology strategies
  • Outstanding analytical skills; able to critically evaluate the information gathered from multiple sources
  • Strong facilitation and listening skills
  • Highly effective written, verbal and presentation skills
  • Interpersonal skills that lend themselves to effectively negotiating priorities and resolving conflicts among project stakeholders
  • Excellent architecture documentation and modeling skills
  • Strong software development, design and application architecture skills
  • Significant Retail Banking experience
5

Mgr IT Security Technology Resume Examples & Samples

  • Budgeting, resource allocation, project costing, contract management, goal development, strategy development, team building, and performance assessment
  • Responsible for management and oversight of day-to-day security operations
  • Consulting executive and senior management, business units, technical units, and vendors on security and technical considerations concerning system architecture, infrastructure, policies and standards
  • Planning, implementing, and maintaining security infrastructure, architecture and strategies, and related software tools used to support those strategies for all bank projects including back-office, distributed computing, and Internet
  • Developing enterprise standards for secure design of both Internet infrastructure and Internet application development
  • Performing information security risk assessments on all systems and vulnerability assessments and testing of all infrastructure (routers, firewalls, servers) and applications
  • Implementing and managing Internet Intrusion Detection and Response system. Responsible for 24x7x365 detection, response and escalation of Internet related security breaches. Responsible for providing recommendations to management for corrective actions
  • Coordinate and manage the processes related to advanced computer and network forensic investigation tasks involving various forms of electronic fraud, identity theft, e-commerce fraud, computer intrusion, theft of information, denial of service, multi-national organized electronic criminal groups, as well as financial fraud investigations
  • Managing contracts between Bank and multiple 3rd party organizations providing security services and consultation for all bank systems
  • Advising the organization with current information about information security technologies and related regulatory issues
  • Provides reports to superiors regarding the effectiveness of network and data security and making recommendations for the adoption of new procedures and technologies as required
  • Stay current with IT security and compliance industry requirements and regulatory changes that will affect security policies and procedures and recommend appropriate technical changes to maintain security protection levels
  • Coordinate and oversee security testing procedures to verify the security of systems, networks and applications, and manage the remediation of identified risks
  • Oversight of maintenance, upgrades and recommendations of security technologies for anti-malware, intrusion detection, scanning, event correlation and monitoring
  • Collaborate with internal and divisional business partners to identify, document and mitigate technology and fraud related risks associated with the development, implementation, upgrade and or changes of the bank’s information assets
  • Create and maintain the enterprise’s IT Security Business Continuity and Disaster Recovery Plans
  • Must possess advanced multi-platform knowledge. Experience with Windows, Linux and IP intranet/Internet security environments including: firewalls, intrusion detection, incident response, vulnerability testing, operating system hardening, regulatory compliance and data classification
  • Must possess understanding of Internet and cloud architectures, methodologies, and processes including set-up and configuration of public (untrusted) and trusted networks utilizing routers, firewalls, and proxies and how security is employed in these areas. This should include 2-3 years hands-on experience
  • Must possess hands on experience with intrusion detection/prevention systems, Content Filtering, Data Loss Prevention systems, forensics software and malware analysis
  • Experience architecting and implementing security solutions, policies, and technologies
  • Understanding of LAN/WAN architecture, design, and network topologies
  • Understanding of security issues relative to third party applications, relational databases, e‑mail, VPN/remote access, Cloud computing and PC / server Operating Systems
  • Must understand security and fraud issues related toall bank initiatives
  • Must possess excellent verbal, written and interpersonal communication skills including demonstrated ability to interface and communicate with all levels of company management, as well as external audit agencies
  • Knowledge about security frameworks and standards such as ISO2700x, FIPS, SAN, NIST, SSAE-16/SAS70
  • Ability to handle multiple projects and priorities simultaneously with a high degree of professionalism and client service orientation
  • Advanced knowledge about how DDoS attacks work and experience with mitigation platforms and techniques
  • Understanding of Application Security Vulnerabilities such as OWASP Top 10, CWE/SANS Top 25 and remediation approaches
  • Knowledge of digital forensics with open source and commercial forensics tools
  • Understanding of network traffic analysis
6

IT Security Solution Integration Specialist Resume Examples & Samples

  • Participating in the development of methods, tools, templates, training to support our GRC client programs
  • Participating in the planning and implementation of Security Solutions meeting customer requirements
  • Participating in the implementation of automated GRC programs
  • Performing requirements analysis and producing detailed solution implementation documentation
  • Contributing to continuous growth of the Security Solutions practice through identification of new opportunities and development of security solutions
  • Experience in implementing/configuring an automated IT program
  • Able to communicate IT Security GRC program points to others at the technical and user levels
  • Strong Project methodology and ability to work closely with project managers
  • Demonstrated experience in implementing IT Security Governance (GRC), Risk and Compliance programs
  • .Net, Java coding experience
  • Prior IT security solution integration experience
7

Show Director, IT Security Resume Examples & Samples

  • Serve as a cross-functional leader representing IT Security across Reed Exhibitions portfolio of security events
  • Set the long-term strategic direction and oversee the development of the go-to-market plans
  • Develop detailed project plans including program roadmap/themes/messaging and positioning/marketing and launch plans
  • Leverage your solid understanding of the multiple security stakeholders and sales channels to develop audience, speaker, and exhibitor acquisition plans
  • Develop strategic partnerships with associations, vendors, thought leaders to leverage participation and involvement in events
  • Provide leadership and oversight around key conference disciplines including: marketing, social media, venue selection, contract negotiation, track development, keynote production, celebrity selection/management, networking events, sponsorships/exhibit management, registration, and overall budget and financial management
  • Lead the sales organization to achieve event goals and meet sales targets
  • Evaluate and report on the effectiveness of go to market initiatives, regularly communicate with members of the senior management team to provide executive accountability
  • Develop the partner ecosystem necessary for driving successful planning and execution
  • Be the primary liaison to industry associations [SIA, ISACs, (ISC)², etc…]
  • Own the P&L for IT Security event
  • Demonstrate passion with a desire to transform the security industry by delivering the premier event to raise awareness, educate, and showcase emerging vendor technologies
  • Please note: This is a hybrid role that requires both event management expertise and a core competency in IT Security. Candidates with this expertise will be preferred
  • Minimum 5 to 10 years' experience in event management and/or event marketing
  • Ideal candidate also has 3 to 5 years of marketing experience in IT Security
  • Proficiency of general IT security concepts [BYOD, Insider Threats, Access Cloud, SaaS, SSO, Authentication, Identity Management] and familiarity with vendor ecosystem
  • Able to cultivate relationships including mobilization of a diverse security industry leaders
  • Proven track record of leadership, managing and driving results of cross-functional teams
  • Proven track record of Project Management experience
  • Excellent written/verbal communication skills
  • Experience in contract negotiations
  • Ability to make “data-driven” decisions, with demonstrated ability to gather and analyze information necessary to formulate business recommendations
  • Demonstrable executive experience with P&L and budgetary cycles
  • Familiarity with marketing automation systems
  • Effective time management, multi-tasking, and problem-solving skills required
  • Able to communicate and be comfortable interacting across organizational levels
  • Accountable and takes responsibility for delivering on organizational commitments
  • Strong customer service orientation with experience in effectively resolving issues in real-time
  • Bachelor’s degree and strong academic credentials required. MBA a plus
  • Certified Meeting Planner (CMP) a plus
  • Must be able to thrive in an environment with high demands and expectations
8

IT Security Operation Resume Examples & Samples

  • · Integrate technical knowledge and business understanding to create superior and secured solutions for HP and for customers. Mentor/consult with team members, other organizations, customers, and vendors on complex issues
  • · Assist with the development and execution of a rolling yearly work plans for the Compliance
  • · Plan, conduct and oversee audit/compliance/risk management activities
  • · Develop/implement audit/compliance/risk management programs
  • · Manage audit/compliance/risk relationships between HP and client
  • · To act as a consultant to HP internal and external clients on matters of internal control and risk management
  • · Manage and drive audit tracking and remediation tasks
  • · Facilitate externally run reviews conducted by clients, external auditors, regulatory bodies and other organizations as required
  • · Maintain currency on laws regulatory requirements, methodologies and standards appropriate for HP and our clients
  • · Develop/manage ongoing reporting
  • · Coach and mentor team members
  • · Establish and maintain effective relationships with people at all organizational levels, internally and externally
  • · Identify and analyze new or existing tools, processes, and procedures
  • · Prepare materials and execute presentations of solutions, proposals, process change etc. to appropriate audiences
  • · Identify and evaluate the significant exposures or risks across functions, locations, accounts, processes, or other variables associated with HP and the client account
  • · Represent HP control interests to clients and external parties by vetting all audit/compliance/risk management responses to clients and external parties to ensure appropriateness of responses
  • · Provide control/risk management expertise in global initiatives that affect the control/risk management environments
  • · Understanding of technology in areas of compliance issues
  • · Apply advanced subject matter knowledge to complex business issues, and regarded as a subject matter expert. Frequently contribute to the development of new ideas and methods
  • · Work on complex problems / projects where analysis of situations or data requires an in depth evaluation of multiple factors
  • · Exercise significant independent judgment within broadly defined policies and practices to determine best method for accomplishing work and achieving objectives. Lead and / or provide expertise to functional project teams and may participate in cross-functional initiatives. May provide mentoring and guidance to lower level employees
  • · Act as an expert providing direction and guidance to process improvements and establishing policies. Frequently represent the organization to external customers/clients
9

IT Security Auditor Secure Works Resume Examples & Samples

  • Develop and administer risk-focused exams for information technology systems
  • Execute and properly document the audit process on a wide variety of computing environments and
  • Apply internal control concepts in a wide variety of information technology processes and
10

IT Security Architect Secure Works Resume Examples & Samples

  • Review of security designs submitted by members of various teams
  • Research and develop/recommend solutions to address gaps in the internal security framework
  • Design and drive/increase the adoption of security-related tools and processes, including network
  • 7+ years’ experience in IT industry including at least 3 from the Information Security sector
  • Four year degree in a relevant field preferred or an equivalent amount of post-secondary education
  • Certifications Given Priority: CISSP, CSSLP, SSCP, SANS GIAC, GSEC
11

Intern Summer IT Security Resume Examples & Samples

  • Monitoring for security anomalies and investigating potential security incidents
  • Develop and test processes for malware detection and remediation. The candidate would assist with testing new malware removal programs and ensuring that our process is successful in cleaning malware from systems. They could help develop the process by which we research and track infections
  • Research on new malware and attack vectors. The candidate would assist in keeping current on malware trends and in researching the details around specific malware that makes it into the company
  • Mapping out the IT environment and creating the appropriate configuration of our Security Monitoring tool to ensure that systems are identified appropriately and that all locations are mapped correctly
  • Assist with documentation around Security processes
  • Freshman through graduate level course work at an accredited college/university with a major in IT, Computer Science, Information Science or similar discipline; An academic grade point average of 3.0 or better on a 4 point scale for the most recent academic session (quarter/semester)
  • Emphasis on networking and/or information security is a plus
12

IT Security Consulting Director Resume Examples & Samples

  • Minimum of 8 years of experience with a mid-market organization IT
  • CISA, CISM, CISSP certification or comparable IT security accreditation preferred
  • PCI QSA and/or PCI ASV certified desired but not mandatory
  • Working knowledge of PCI DSS compliance preferred
  • Outstanding client service skills
  • Attention to detail and accuracy
  • Team player and deadline oriented
  • Ability to communicate clearly, concisely, and in a professional manner
13

IT Security Operations Desk Analyst Resume Examples & Samples

  • At least 6 months experience in Network
  • At least 6 months experience in Security Management
  • At least 6 months experience in Firewall and IDS/IPS
  • English: Intermediate
14

IT Security, Junior Analyst Resume Examples & Samples

  • Review baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.)
  • Monitor operational configurations of all in-place security solutions as per the established baselines
  • Review logs and reports of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.). Interpret the implications of that activity and work with the functional team to devise plans for appropriate resolution
  • Participate in investigations relating to problematic activity
  • Participate in the execution of vulnerability assessments, penetration tests and security audits as directed
  • Provide on-call support for IT management for all in-place security solutions
  • Responsible for special projects as assigned by management
  • Under the supervision of the IT Security, Senior Analyst, consult and advise the IT infrastructure and operations team in the deployment, integration and initial configuration of security solutions and of any enhancements to existing security solutions in accordance with standard best operating procedures generically and the enterprise’s security documents specifically
  • College diploma or university degree in the field of computer science
  • 1 to less than 3 years of work related experience
  • Working technical knowledge in at least two of
  • Analytical and problem-solving abilities
15

IT Security Solutions Professional Resume Examples & Samples

  • Academic degree or equivalent qualification
  • 7 years’ experience in IT environment, preferably IT security solutions
  • CISSP or other similar certifications
  • ISO 27000 series
16

IT Security, Junior Analyst Resume Examples & Samples

  • Strong understanding of IP, TCP/IP, and other network protocols
  • General knowledge of scripting and programming
  • General knowledge of Microsoft Windows or Linux/BSD operating system
17

Head of IT Security Resume Examples & Samples

  • Budget. Directs the prioritization of spend, ensuring value for money, balancing cost vs benefit
  • Internal and external relationships. Global responsibility for a significant part of one of IT Security’ functions
  • People. Functional responsibility for people, expense, strategy and operation
  • Regulatory. Develops procedures and policy in the context of IT frameworks. Collaborate with Regional peers to ensure compliance and adherence to regulations and policy
  • Strategic Input. As strategies evolve for IT and IT Security and for the Sub-Function, ensure they remain congruent with each other and the Bank’s strategy. Ensure full advantage is taken as IT globalizes its functions. Manage challenges where 3rd parties’ (internal and external) goals and strategies are not entirely aligned, seizing the opportunities these differences present
  • Typically educated to degree level
  • Extensive experience in a managerial role within an IT/IT Security or related field, including experience of managing a global function with a geographically dispersed team
  • Ability to build strong relationships and communicate with a wide spectrum of stakeholers
  • Excellent knowledge of the project lifecycle and Group Strategy
  • Understanding of business finance and experience of effective managements of budgets and expenditure
  • Comprehensive understanding of positioning Bank approach and policy in context of wider industry trends and direction
18

Junior IT Security Analyst Resume Examples & Samples

  • Supporting analysis of applicable threats, vulnerabilities, controls and resulting risks (IT Risk Assessments)
  • Performing problem analysis and providing recommendations
  • Interviewing stakeholders and gathering data about the system
19

Senior Consultant IT Security Resume Examples & Samples

  • Manage small-scale and participate in large-scale in IT Risk and Security engagements and in internal projects as Auditor and Consultant
  • Prepare reports and schedules for review that will be delivered to internal and external clients
  • Maintain a professional and proactive communication with your Management which includes updating on progress, identification and communication of risks within engagements
  • Supervise and coach Junior team members, delegating tasks and take responsibility at the same time, monitor quality of team deliverables, provide technical support to team members, etc
  • Work effectively and efficiently as a team member
  • Identify potential business opportunities within existing engagements and work closely with management in pursuing these to support and respond to our client’s needs. 
20

IT Security Intern Resume Examples & Samples

  • Development of various IT Security policies, standards, programs and procedures
  • Assist in development and identification of high risk areas across various business segments
  • Assist in reviewing technology and feature designs and working with various IT and legal teams in order to provide advice regarding IT Security best practices with applicable global information security regulations, standards and corporate policies
  • Work with a wide variety MHE teams on regulatory issues, including contributing to company-wide policies, standards, training and business procedures designed to foster compliance with relevant laws
  • Participate in Network Security Monitoring, Application and Network Scanning
  • Various types of assessments
  • Assist in the implementation of appropriate procedures, products, and controls
  • Assist in the development of Information Security Key Risk Indicator metrics and automation techniques
  • Must be an undergraduate student in your junior or senior year in pursuit of a computer science or computer security related undergraduate degree
  • Basic security and networking knowledge (at least one core security class
  • Basic operating system knowledge: Windows, Linux, Solaris, OS X. Basic IT troubleshooting
  • The desire to learn about new security concepts and techniques
  • Highly organized, efficient and process focused. Ability to prioritize well, effectively manage multiple tasks and meet demanding deadlines in a fast-paced environment
  • Strong networking and interpersonal skills. Demonstrated ability to work collaboratively and across disparate groups, teams and reporting lines. Ability to work independently and effectively in a loosely structured team environment that demands a high degree of cooperation, flexibility, cross-group collaboration and real-time responsiveness
  • Excellent listening skills and proficient oral and written communications
  • Strong problem-solving and decision-making skills with a focus on achieving results that benefit our business as well as the businesses of our customers and partners
  • Proficiency with Word & Excel. Familiarity with Microsoft SharePoint collaboration software
21

IT Security Operations Resume Examples & Samples

  • Overseeing the companies 3rd Party and internal intelligence
  • Monitoring and Threat Analaysis
  • Implementation and management of a Cyber Intelligence partner/provider
  • Manage and ensure ongoing effectiveness of key IT security systems
  • Monitor network activity and potential hackers
  • Responsible for understanding and reporting companies IT risk profile
  • Responsible for companies IT vulnerability management programme
  • Responsible for the effective response and resolution to IT security incidents
  • Network security management
  • Security incident response management
  • Operations enterprise security controls
  • Network forensics, host forensics, malware analysis
  • Familiarity in Cyber Security is a plus
22

Lead IT Security Administration Resume Examples & Samples

  • Responsible for Day to day administration of all request types
  • Ensure team to Process Leave of Absence (LOA) and Return to Work (RTW) requests
  • Ensure execution of daily, weekly checks to ensure access is terminated for exited workers
  • Liaise with Help Desk team members and assist as and when required and develop an customer centric model for increased end user satisfaction
  • Assist and support periodic internal and external IT audit and SOX audits
  • First line of contact for any escalations/concerns from business
  • Responsible for notifying management of any concerns raised by requestor and/or anticipating escalation
  • Ensuring team adherence to all Security Administration Standard Operating Procedures. Notify management when discrepancies are found in SOPs and fix it to ensure they are updated accordingly
  • Responsible/Participate in projects and initiatives in support of regulatory, audit and IdM directives when called upon
  • Responsible for documenting process/technical difficulties being experienced and timely reporting them to management
  • Collate statistical data as requested in support of metrics/measurements and publish them on periodical basis and publish them
  • Responsible for Day-Day Operations/Staffing/Team Needs
  • Reporting /Adherence to Operational Metrics/SLA
  • Identity/Drive Automation Initiative/Efforts to enhance productivity
  • Work Closely with Training/Internal Audit team to drive efficiency
  • Minimum of 5-6 years of Information Technology experience
  • Minimum of
  • 5 year of Security Administration or equivalent experience
  • Ability to handle multiple priorities
  • Experience with working with remote teams
  • Internal Synchrony Candidates should have spent 18 months in Synchrony and 12 months in current role
  • Should have an Role Model or Excellent rating in last 2 EMS
  • Self Motivated
23

Associate Director, IT Security Resume Examples & Samples

  • Develops the business, information and technical artifacts that constitute the enterprise information security architecture and solutions
  • Contributes to the development and maintenance of the information security strategy
  • Analyzes business impact and exposure, based on emerging security threats, vulnerabilities and risks. Communicates security risks and solutions to business partners and IT staff
  • Delivers a leadership role in providing network and system security advice and risk analysis to business units who engage with the Information Security team
  • Expert knowledge of modern network security technologies such as network and host-based intrusion detection/prevention, vulnerability assessment (including app/web-layer interrogation), DDOS protection, Security Information Management, host-based integrity checking, end point security, AV, Data Loss Prevention, etc
  • Pragmatic understanding of security problems as a mix of technology and process issues with the ability to pursue solutions at both layers within the organization
  • Experience with working in a highly outsourced environment (both infrastructure outsourcing and security operations outsourcing)
  • Knowledge of SOX and other regulatory and statutory compliance
  • Proven ability in security organizational design in a leadership capacity
24

IT Security Incident Consultant Resume Examples & Samples

  • Create and maintain team standards and strategy for special projects involving SIEM and Log Data Warehouse solutions
  • Establish key business operations relationships, providing an avenue to assess and recommend operational changes and enhancements
  • Partner with the IT and business operations areas and with both internal and external parties to resolve technical issues with SIEM/Log Data Warehouse technologies
  • Communicate with both technical and non-technical users to determine individual requirements
  • Experience managing an enterprise Security Incident and Event Management (SIEM) or Log Consolidation Warehouse
  • Thorough understanding of security related technologies including hardware, software and operating systems
  • Thorough understanding of logging formats/functions used across various types of logging sources (Windows Event Logging, Microsoft SQL, Syslog, etc.)
  • Working knowledge of networking including routing, architecture, design and logging
  • One or more of the following certifications: CCNA, CCNP,CCIE, CWNA, CWNP, CWNE, CISSP, GCIH or GCIA
  • Certified Information Systems Auditor certifications
25

Manažer IT Security Resume Examples & Samples

  • Define the strategy of IT Security and Information security for GE Money group in Czech republic
  • Execute and manage agreed steps to implement defined strategy organizations
  • Assure smooth run of day-to-day security operations including incident resolution, security monitoring, advisory to other teams
  • Lead a team of IT security experts including coaching, goals and performance management, support skills and career development
  • Coordinate and supervise IT risk management process execution
  • Actively participate in company’s cross-business risk management & anti-fraud committee and contribute to overall operational risk management agenda
  • Engage with GE’s global IT Security function and ensure alignment of local approach and global priorities
  • Manage IT Controllership process – 2nd level controls, compliance assurance
  • Define and implement policies and standards across the company
  • Manage budgets and supplier contracts associated with the IT Security area
  • University degree (Bachelor’s degree or above)
  • Fluent knowledge of English language – both written and oral, good knowledge of Czech (both writtena nd spoken)
  • Minimum of 6 years’ experience in IT area and at least 3 years in area of IT/Information security
  • Proven experience with team management
  • Strong communication, facilitation and collaboration skills
26

Contract Websense IT Security Analyst Resume Examples & Samples

  • Bachelors of Science degree in Computer Science, MIS, Business Administration or equivalent work experience
  • Expert knowledge of IT security concepts (i.e. Defense in Depth, Separation of Duties, Control environments, malicious software, security awareness)
  • Expert knowledge of IT security technologies (i.e. firewalls, IDS/IPS, DMZ, access controls, penetration testing, risk and vulnerability assessment, investigative techniques, authentication systems)
  • Expert knowledge of IT technologies (i.e. operating systems, network protocols, IT security management systems)
  • Expert knowledge of network security products including firewalls, IPS and URL filtering solutions
27

IT Security Analyst Intern Internship Resume Examples & Samples

  • Review Applications logs for recurring anomalies, warnings and errors
  • Review Server logs for recurring anomalies, warnings and errors
  • Create and track item punch lists (tickets) for users, server administrators and application owners to resolve issue
  • Execute utilities and perform applications checks
  • Review data in access logs to identify anomalous behavior
  • Assist in training of colleagues as required
  • Special projects and other related duties as assigned
28

IT Security & Controls Champion Resume Examples & Samples

  • Provide guidance on appropriateness of compensating controls
  • Consulting on Security Control Process to IT Site Management and their business partners
  • Facilitating communications with Operations and General Audit Office (GAO) to confirm controls information
  • Provide metrics and status to management regarding compliance with information security requirements
29

IT Security Intern Resume Examples & Samples

  • Assist with maintaining compliance with Payment Card Industry (PCI) data security standards
  • Assist in balancing business needs with security requirements
  • Work directly with Security team members
  • Must be at work on a regular/scheduled basis
30

IT Security Operations Desk Analyst Resume Examples & Samples

  • Serves as a point of contact between client and IBM Security Services delivery team for operational governance of security services activities and deliverables
  • Maintain and oversee relationships for Managed Security Services (MSS) delivery organizations providing security support
  • Provide oversight and management for operational MSS security actives, processes and polices as required
  • Track, report and resolve quality issues impacting the client
  • Provide continuous improvement through use of service delivery reporting to identify areas of concern in order to develop nhancements where necessary
  • Produce a Standard Operating Procedures Compilations
31

VP, It-security Resume Examples & Samples

  • Establish a robust security and risk management functional capacity and framework across the organization
  • Ensure that clear and timely business advice is provided to executive management on key information security and assurance issues
  • Build sound business relationships across the enterprise to enable a strong understand and close alignment with business needs, direction, and risk appetite
  • Manage the creation and production of timely, accurate and informative business and IT metrics relating to information risk initiatives; utilize metrics to prioritize key initiatives and response to negative trends
  • Ensure that all IT and information security programs are in compliance with applicable laws, regulations, and policies
  • Collaborate with application owners to understand and address (as appropriate) the risk position around key business applications; promote secure development lifecycle principles throughout all development processes in partnership with development team leaders
  • Oversee the development and maintenance of an information security policy set, including standards and processes that fit the organization at all levels; seek and confirm management approval as required
  • Develop and maintain an effective information security architectural approach, ensuring that the approach is implemented in accordance with appropriate standards
  • Evangelize security awareness and best practices throughout all levels of the organization, considering the tactics, techniques, and procedures employed by malicious actors and how they evolve
  • Liaise with enterprise architectural functions to ensure that information security standards, policies, and procedures are enacted consistently across application development projects and programs; collaborate with process owners to define physical, virtual, and logical security architecture specifications and requirements
  • Monitor existing security control efficacy and operational impact leveraging metrics; establish new controls and optimize as necessary in support of business needs while minimizing risk
  • Direct incident response at the highest level in partnership with the appropriate internal and external entities ensuring the management is appraised as necessary during all phases and coordinates response across responsible functions
  • Oversee research into emerging threats, trends in the security industry, and advances technology or methodology and act as a conduit to share these evolutions with technical leadership within the organization to incorporate in design philosophy
  • Deep understanding of the enterprise security architecture disciplines, processes, concepts and best practices
  • Intimate with security program management in a highly focused development environment for a large scale enterprise organization
  • Thorough understanding of the various enterprise security components that comprise an effective program today and a keen eye toward what the future entails
  • Knowledge of technological trends and developments in the area of information security and risk management
  • Able to grasp how new technologies work and how they might be applied to achieve business goals
  • Strong facilitation skills and a clear ability to build relationships with business stakeholders at all levels, including executive managers and vendors
  • Proven problem-solving skills, and the ability to identify, analyze and resolve problems, driving solutions through to resolution
  • Exemplary mentorship capabilities; can coach and develop security professionals across all disciplines and levels to the maximum potential
  • Advanced degree in computer science, engineering, mathematics or a related field of study or equivalent
  • A minimum of 15 years’ of experience in leading comparable information risk, security and governance teams, transforming functions and changing culture
  • Experience with carefully managing budgets to deliver demonstrable value
  • Experience in leading the response to incidents, crises, and investigation with sensitivity, tenacity and focus on detail
  • Extensive experience in information security architecture, consultative stakeholder management and strategic planning
  • Experience with significant outsourced and hosted / cloud models and the appropriate contractual, vendor, and security requirements
32

Director of IT Security Resume Examples & Samples

  • IT Security Operation Centre (SOC)
  • IT Operational Security activities ; patching, antivirus, vulnerability management
  • IT Work-streams of the Cyber IT Security Programme
  • Defining and implementing IT Security strategy and plans
  • Line management and leadership of staff within the IT Security function. Ensure appropriate IT Security organization and infrastructure is implemented in the enterprise to ensure that the information risks of the enterprise are appropriately managed
  • Leadership and strategic direction for the function, ranging from planning and budgeting, developing and implementing Security policies and procedures, to motivational and promotional activities expounding the value of information security
  • Sponsor and drive improvements in IT Infrastructure (hardware, networks, applications) etc to improved our Security maturity and identifying goals, objectives and metrics to reduce the cyber risk to the organization
  • Base the design, implementation, operation and maintenance of the IT Security initiatives (including processes and controls) on the ISO/IEC 27000 series standards
  • Ensures current and future IT activities (e.g. projects and proposals) have considered the security implications from the outset and that any risks, together with mitigating controls / decisions to accept residual risk etc. are fully documented and that appropriate risk management processes have been followed
  • Review and develop processes covering Information Security related concerns such as (but not limited to) patch / vulnerability management, anti-virus protection and change management
  • Conduct security incident investigations, including root cause analysis. Ensure Incident Management processes are in place covering IT Security incidents. Recommend improvements to process to mitigate future incidents
  • Ensure Information Security requirements are included in all Third Party dealings and that these controls remain effective throughout the lifespan of the relationship
  • Liaise with stakeholders including Burberry senior management (e.g. COO, CIO, ISO) and other IT and business functions such as IT Solutions, Service, Operations (Networks and Infrastructure), Regional Teams, IT Compliance, and Business functions including Legal, Security, Risk, HR, lnternal Audit and External Audit to
  • Drive forward IT Security initiatives
  • Provide direction on IT Security matters such as routine security activities plus emerging security risks and control technologies
  • Provide recommendations to IT and the business to ensure that business operations are in line with appropriate IT Security controls including any legal and regulatory requirements
  • Provide a “specialist security expertise ”for IT security offering advice and practical assistance on information security risk and control matters throughout the organization and promoting the commercial advantages of managing information security risks more efficiently and effectively
  • Lease with IT Compliance monitoring and improvement activities to ensure compliance both with internal security policies etc. and applicable laws and regulations
  • Leads / supports information security risk assessments and controls selection activities
  • Supports activities relating to contingency planning, business continuity management and IT disaster recovery in conjunction with relevant functions and third parties
33

IT Security Strategist Resume Examples & Samples

  • Help define the vision and strategy for Identity and Access Management
  • Conduct self-directed research to understand industry trends and analysts perspectives
  • Research open standards, specification, frameworks and protocols that enable interoperability
  • Influence industry to provide solutions to solve our most challenging business problems
  • Review supplier strategies, product roadmaps and existing solutions in the market
  • Participate in benchmarking to share, learn and collaborate on priorities and lessons learned
  • Assess current capabilities across enterprise, consumer and the connected experience
  • Understand business strategies and conduct customer interviews
  • Evaluate and build innovative prototypes to demonstrate feasibility
  • Advocate and make recommendations on tools, methodologies and processes
  • Define and maintain high level strategic plans for Identity and Access Management
  • Establish the position of a service provider relative to other service providers
  • Provide vision and expertise to guide our strategic position and strategic initiatives
  • Assess the impact of industry changes against the existing strategic and tactical plans
  • Maintain strategies and ensure they keep pace with internal and external environments
  • Consult, collaborate, and facilitate internal and external security discussions
  • Communicate and create awareness of the Identity and Access Management Strategy
34

IT Security Access Management Resume Examples & Samples

  • Responsible for the management of the Shared Access Password Management system ( SAPM ) including the testing and development environments. The ideal candidate will understand Unix, Windows Server, Server Clustering, Networking and will have strong scripting skills along with database management, SQL query proficiency, project management skills and a solid understanding security processes
  • Reviews root cause analysis to identify, recommend and implement best practices
  • Manage multiple initiatives and related activities concurrently
  • Identify and solve performance issues
  • Help determine feasibility of product requests and time estimates
  • Work closely with project and product managers to drive technical requirements in products
  • Creating technical documentation to instruct technical resources
  • Make recommendations for implementing desired level of access controls
  • Analysis of the enterprise password vault infrastructure and policies to ensure a healthy state at all times
  • Assist with system upgrades
35

IT Security Resume Examples & Samples

  • Work with the Engineering and Integration teams to understand monitoring needs and priority for onboarding
  • Work with review & response teams to estimate capacity and ongoing resource needs
  • Work closely with business, legal, and technology stakeholders to improve review and response processes
  • Assist in the periodic review of volume, analyzing rules with high volumes of false-positives/ non-incidents for further review with engineering and integration team
  • Proactively assess tools across the Security Incident Response tool suite to identify opportunities for enhanced monitoring, automation, and reporting
  • Develop implementation options in line with Incident Management best practices
  • Demonstrated experience in designing and implementing technology and process solutions to reduce the potential risk of data compromise
  • Ability to understand drivers and priorities, with regard to Business, Security, and regulatory requirements
  • Ability to self-organize, prioritize activities independently, create documentation, and reporting
  • Strong verbal and written communications skills with demonstrated ability to explain technical ideas to non-technical audience
  • Ability to multi-task, with attention to detail, and prioritize as needed to accomplish goals
  • Solid knowledge of Microsoft Office Suite
  • Able to collaborate effectively with business and technology stakeholders, and manage expectations in the delivery of projects
  • Bachelor’s Degree or Equivalent
  • Experience with Incident Management tools, such as RSA Archer Incident Management, Symantec DLP
36

IT Security Solution Integration Specialist Resume Examples & Samples

  • Participating in the development of methods, tools, templates, training to support our client programs
  • Participating in the planning and implementation of solutions that meet customer requirements
  • Contributing to continuous growth of the Security Solutions practice through identification of new opportunities
  • Able to communicate IT Security Risk Management points to others at the technical and user levels
  • MS SQL or Oracle Database design experience
  • Experience in conducting Threat Risk Assessments (TRA)
  • Bilingual: English and French
37

IT Security Resume Examples & Samples

  • 2 to 5 years+ of relevant working experience - information security
  • Significant experience working on complex technical environments and have worked on large network and security projects
  • Familiarity with ISO27001 processes and security controls and experience working within an ISO27001 certified environment
  • In-depth knowledge of network, PC and platform operating systems
  • Persuasive interpersonal skills to support the requirement for security awareness and to work in conjunction with teams
38

IT Security Intern Resume Examples & Samples

  • Support database and core application environment for Oracle Retail and Oracle Business Intelligence platforms
  • Use inputs and direction from leads for implementation on Oracle database and Oracle Applications environments
  • Work on the business logic and back-office integration, using existing ETL processes to manipulate data, integrate with external services, and create jobs for processing data
  • Participate in all aspects of systems management, including software patching, testing, and deployment
  • Work effectively with technical leads and others to implement solutions and resolve issues
  • Must be at work on a regular and predictable basis or as scheduled
39

It-odt-it Security Analyst / Itsa Resume Examples & Samples

  • Must have user admin experience
  • Be able to add, change, and transfer to different groups
  • Must have active directory experience
  • User security administration and provisioning for RACF, Active Directory and application level accounts, permissioning, adds, changes, terms and deletions
  • Providing users and management with technical support on matters related to access control. Implementing security improvements by assessing current situation, evaluating trends anticipating requirements
  • Determining security violations and inefficiencies by conducting periodic audits
  • Acting as a technical information security reviewer of performance reports, system status, operating procedures manual and other documents produced
  • Maintaining technical knowledge about latest developments in the Information Security field
  • Knowledge in vulnerability assessments, intrusion prevention and detection, access control and authorization, policy enforcement, design of secure infrastructure. Incident response
40

IT Security Consulting Manager Resume Examples & Samples

  • Bachelor’s degree in information systems, business administration, accounting, or a related field required
  • Minimum of 5 years of experience in IT consulting or operations in a “hands on” capacity
  • CISA, CISM, CISSP certification or comparable IT security accreditation preferred but not required
  • MCSE, MCTIP, CCNA, GSEC/GIAC, ITIL or comparable accreditation preferred but not required
  • Network administrator level or working knowledge in network and infrastructure security preferred
  • Working knowledge of PCI DSS compliance preferred but not required
  • Working knowledge of network infrastructure and administration, vulnerability assessment scanning, and penetration testing
  • Must be willing to travel
  • Business development skills a plus
41

IT Security Technical Specialist Resume Examples & Samples

  • Demonstrable experience in technology security related roles, with demonstrable experience of identifying and managing information security risks in complex or critical scenarios
  • Understanding of Intrusion Theory and Practice
  • Demonstrable understanding of information security detection and protection methodologies Experience of assisting technical users with identification of information threats/vulnerabilities/risks Understanding of a wide range of information security related topics and industry standards, including ISO27001 and ITIL
  • Ability to convey and explain complex technical information to technical staff
  • Ability to manage multiple tasks and work streams effectively and prioritise accordingly
  • Web application and API development and architectural experience
  • Windows / active directory security understanding and experience
  • Cloud security concepts and solutions understanding such as AWS, and Azure
  • Previous experience of Public Sector and/or Media organisations
  • Technical understanding and experience of enterprise network management and monitoring systems
42

Orvis IT Security Intern Resume Examples & Samples

  • Tokenization and point to point encryption user experience and functionality testing
  • Project technical documentation including system architectural diagram, design guide, build guide, and run book
  • Secure encryption device key injection and management
  • Currently working towards a Bachelor's or Master's degree in Information Technology or Information Security
  • Understanding of the CISSP CBK domains and how they apply them to an Omni-channel retailer
  • Ability to discuss security issues in understandable business terms
  • Analytical, well organized, and able to document complex designs and principles
  • Demonstrated ability to collaborate with team members to deliver security controls to protect the confidentiality, integrity, and availability of the IT environment
  • Proficient in Microsoft applications, including Excel, Word, Powerpoint, and Outlook
  • Demonstrated ability to communicate with all levels of employees
43

Service Desk / IT Security Analyst Resume Examples & Samples

  • 1) User pre-provisioning (checking)
  • 2) User provisioning (access creation, modification & deletion)
  • 3) Password resets (1st line support)
  • 4) Providing audit evidence on request
  • Statistical/problem analysis experience (desirable)
  • ITIL &/or ISO 9001:2008, TickIT & ISO 20000 training/experience (desirable)
  • Lotus Notes, Active Directory admin (intermediate) & Microsoft Office Products (advanced) - (Desirable)
  • Experience of IT security administration, preferably in the financial sector - banking, securities, or similar environment (desirable)
  • CISMP (Certificate in Information Security Management Principles) (desirable)
44

Intermediate IT Security Analyst Data Breach Resume Examples & Samples

  • Support and maintain mechanisms for the management of ongoing digital investigations and/or legal proceedings through the use of an incident and case management solution
  • Ensure that all data gathering and processing methods are conducted following consistent and repeatable processes
  • Perform comprehensive data analysis and mining using specialized solutions such as e-mail archives, relational databases, and investigation platforms
  • Assess and troubleshoot in a variety of technical and information security related issues
  • Participate in the incident management process when needed
45

IT Security Resume Examples & Samples

  • Leadership � Ability to lead projects from initiation to completion and to develop partnerships with key stakeholders
  • Strategic Thinker � Ability to critically assess the environment and propose both tactical and strategic initiatives to further enhance Nomura�s security posture
  • Broad security domain knowledge
  • Understanding of US Financial Regulatory Cyber directives
  • Familiar with NIST SP 800 Series Cyber Security Guidelines as well as ISO 27001 and 27002
  • Experience performing third party and application security reviews/assessments
  • Experience with threat intelligence (OSINT) - basics of intelligence and effective analysis, analytic writing, Open Source collection methods, techniques and tools
  • Ability to evangelize security and develop an effective well balanced training and awareness program that will effectively communicate security messaging across the organization at all levels
  • BS / MS in a technical discipline and a professional certification, CISSP, CISM or related SANs certifications preferred
  • 10+ years of professional work experience which demonstrates growth in both technical and leadership areas
  • Effective communication (written and oral) and ability to collaborate with team members in a geographic and culturally diverse workforce and to convey concepts related to cybersecurity to both technical and non-technical audiences
  • Willingness to learn, a desire to collaborate with others, and the drive to lead significant programs
  • Self-motivated individual, comfortable working independently and with an ability to work to deadlines
46

IT Security & Audit Consultant Resume Examples & Samples

  • Bachelor's degree or a master's degree in information systems, accounting information systems, IT security, or other related fields
  • Professional experience in such areas as IT security management design and implementation, IT security assessment, BCM, and/or business process and control review; prior experience in project planning and management will be a plus
  • Mature, positive working attitude and willing to adapt self for team success
  • Capable to handle multiple tasks and assignments and pressure
  • Familiar with leading IT security and assurance frameworks such as ISO27001/2, ITIL, COBIT, ITGI guidelines and frameworks
  • Thorough understanding of current technical concepts and professional standards and their application
  • Highly proficient in both English and Thai with good written and oral communication and analytical skills
  • Strong interpersonal skills and able to work both independently within given guidelines or as part of a team
  • Good personality and presentation skills
47

Head IT Security EGI Resume Examples & Samples

  • IT security for EGI
  • Vulnerability and Risk assessment of the IT environment
  • Security Investigations related to information leakage (with support and direction from Head of Security EGI and RSD)
  • Address security requirements for all types of local operations, including hosted activities within the functional Units
48

IT Security Analyst Security & Control Resume Examples & Samples

  • Experience with audit practices and methodologies
  • Strong presentation and communication skills
  • The incumbent will conduct reviews of IT application and supporting IT pervasive controls
  • The incumbent will maintain documentation supporting SOX Business Processes and SOX IT Pervasive areas under direction of IS&C management and control owners
  • The incumbent receives general direction from the Manager/ Control Specialist. Day to day tasks are handled independently
  • The incumbent will analyze operational/security risks, threats and potential exposures, escalating immediately any potential security breach situations to supervising line management and effectively report on the condition under review
  • The incumbent is guided by the Bank’s Information Security Policy and Standards and the requirements of Bank regulators and auditors as well as departmental procedures
49

Senior Administrator, IT Security Resume Examples & Samples

  • Supports system development and maintenance lifecycle by providing guidance on implementation and verifying the secure configuration
  • Develop, implement, maintain, and oversee procedures and associated plans for system security administration and user system access based on industry-standard best practices
  • Validates the continued and proper placement, operation, and tuning of security instrumentation, including vulnerability scanners, intrusion detection sensors, DLP, security log monitoring/correlation tools, file integrity monitoring solutions, and other security relevant controls by monitoring the IT security operations
  • Expedites neutralization of threats that pose immediate danger to the confidentiality, integrity, and availability of information assets
  • Design and implement applicable security features throughout the configuration and change management process
  • Identify security requirements and impacts resulting from modifications to the systems, and work with the respective groups to help with remediation
  • Identify and explain false positives
  • Develop mitigations and articulate compensating controls for near-term and planned implementation
  • Assist in the development of alternative remediation or mitigation strategies to minimize vulnerabilities and risks while minimizing the impact to the system functionality and performance, as well as program cost and schedule
  • Supports PCI/PII and other regulatory related activities and remediation
  • Perform threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats, and are free from known vulnerabilities
  • Engineers, implements, deploys and maintains technologies including but not limited to; Network Intrusion Prevention systems, Web Application Firewalls, and Security Information Event Management (SIEM) systems, implements and verifies the secure builds of systems by leveraging the Center for Internet Security (CIS) Benchmarks as well as manages the organization’s managed security services
  • Conduct research on emerging products, services, protocols, and standards in support of security enhancement and development efforts
  • N/a
  • 2 years of project and/or supervisory/management experience
  • Must have current Certified Information Systems Security Professional (CISSP) certification; additional certifications such as GIAC, CEH, LPT, PCI-ISA, etc. are preferred
  • Experience with PCI, ISO 27001/27002, and SOX
  • 7 years’ related information security or engineering experience
  • Fundamental understanding of risk-based information security management, as well as knowledge of applicable regulations, standards, and guidelines pertaining to information assurance (FIPS, NIST, ISO Standards)
  • PCI DSS implementation experience
  • Ability to support the development of system level plan of action and milestones
  • Excellent interpersonal skills and the ability to work within all levels of the organization
  • Solid understanding of networking concepts and project management skills
  • Ability to collaborate effectively
  • Works with other team members, including cross-functional teams, business users, and vendors
  • Mentors new and/or less experienced team members
  • Required to wear a cell phone 24 x 7
  • Occasionally work nights and/or weekend hours for major implementations to minimize impact on organization
  • Experience working on Microsoft-based, complex systems in the security engineering role using the security features of Windows 2003/2008 Server products, Windows 7, IIS, Sharepoint, Exchange and SQL Server products
  • Experience with Tenable Security Center, Forcepoint/Websense DLP, Cisco ASA, Sourcefire, Symantec SEP, Nessus, NMAP, Snort, Burp Suite, or similar products
50

It-das-it Security Analyst / Itsa Resume Examples & Samples

  • Monitor network and information system activity
  • Respond to alerts (analyze, interpret, investigate, resolve) based on monitoring activity, for security (malware, malicious actor), and other purposes (malicious activity, misuse, etc.)Uses creativity and innovation to automate and streamline processes and procedures
  • Manage, update, modify alerts, adjust/fine tune event correlation rules, etc. (e.g. filter false positives, increase accuracy/relevance/effectiveness), create new rules based on threat changes/evolving risk, etc
  • Perform specialized security functions (e.g. forensics for incident response)
  • Q-Radar Ironport Web and Email Security Imperva Certifications in Microsoft Powershell 3.0 scripting background
  • Qualys McAfee Enterprise solutions IPS Splunk Other security related tools. ITIL Knowledge and ITSM Tools
51

IT Security Architecture Team Lead Resume Examples & Samples

  • Leading a small team of security professionals
  • Participate in various Operational and Technology Risk governance processes
  • Deliver security reviews as part of the security assurance process
  • Ensure effective communication between the architecture team and internal clients locally and globally
  • Work with vendors supplying technology and business services to the firm to identify security risks with those services
  • Provide specific security expertise to engineering teams
  • Identify areas of risk on projects where security requirements cannot be fully addressed in the required time frame of the project. Document and present those risks to senior management, IT and security team members
  • Create documentation and guidance on the secure implementation of new technologies in the Firm
  • Knowledge of the primary operating systems (Unix/Windows)
  • Configuration and management of the platform(s)
  • Security risks of the platform(s)
  • Mitigation of the risk of the platform(s)
  • Knowledge of application, network and platform security vulnerabilities and the ability to explain these vulnerabilities to developers
  • Knowledge of enterprise security concepts (Authentication, Entitlements and identity management, Cryptography encryption and hashing)
  • Knowledge of standard network model and risks on each layer, good understanding of network architecture
  • Excellent communication and presentation skills (ability to present outcomes of assessments and obtain buy in from technologists and management)
  • Excellent time management skills (ability to handle multiple concurrent assessments, plan based deliverable management, strong follow up and tracking)
  • Experience in conducting IT Security assessments
  • Experience reviewing technical designs and functional requirements to identify areas of Security weakness
  • Knowledge of MacOS / iOS
  • Knowledge of authentication terminology (SAML, SiteMinder, Kerberos, OpenId)
  • Knowledge of validation checking, software attack methodologies, security throughout full SDLC
  • Knowledge of data protection, data leakage prevention and secure data transfer and storage
  • Knowledge of programming in any OOP language or database design
  • Knowledge of mobile computing
  • Experience in conducting penetration tests, dynamic vulnerability assessments and static vulnerability assessments
  • Experience in testing tools (Veracode, Fortify, AppScan, WebInspect, Burp)
  • CISSP or other industry qualification
  • Technology background in the financial sector
52

Public Sector IT Security Resume Examples & Samples

  • Log Aggregation Technology
  • Communicating a broad range of Firm services
  • Providing candid, meaningful feedback in a timely manner to the Cybercrime team; and
  • Keeping leadership informed of progress and issues.Position contractually requires a TS/SCI federal government security clearance with an adjudicated FS Poly
53

IT Security Resume Examples & Samples

  • Designing and implementing IT security and risk management framework/tools for e-commerce, e-marketing, social, and digital areas
  • Designing and implementing IT security framework/tools for third party risk management
  • Domain competencies in a number of IT-risk-related disciplines, including IT risk management, Cybersecurity, IT audit, business continuity management, privacy and compliance
  • Performs focused risks assessments of existing or new services and technologies to ensure the protection of the organization’s information assets and our customer information
  • Communicates risk assessment findings to stakeholders
  • Ensures compliance with industry, regulatory and L’Oreal Group defined policies and standards
  • Maintains strong working relationships with individuals and groups involved in managing information risks across the organization
  • Performs IT General Control, Application control audits, PCI DSS and other IT related reviews
  • Identifies weaknesses in internal controls and opportunities to enhance operational efficiencies
  • Monitors and assesses Digital/Cyber risks utilizing security tools to proactively identify potential new threats and escalate as necessary
  • Tracks remediation of audit issues noted in internal and external audit reports
  • A commitment to the crucial concept of promoting security as an enabler and not an inhibitor of business
  • Building enterprise IT risk management and governance and compliance programs
  • Strong organization, prioritization, rationalization and analytics skills
  • An ability to cultivate and build collaborative working relationships with a broad range of enterprise stakeholders
  • A well-developed understanding of and appreciation for business needs and a commitment to leading the information risk management team in delivering high-quality, prompt, and efficient service to the business
  • A well-developed understanding of and appreciation for organizational mission, values, and goals and consistent application of this knowledge
  • An ability to communicate complex and technical issues to diverse audiences, orally and in writing, in an easily-understood, authoritative, structured and actionable manner
  • A working knowledge of the following areas of technical expertise: information policy formulation, cybersecurity management, IT risk assessment and management, business continuity management, IT governance formulation, IT vulnerability management, and organizational change management, IT financial management and IT audit
54

IT Security Project Manger Resume Examples & Samples

  • Manage the Project from initiation to completion on budget and time aligned to the projects sponsors' project brief
  • Address all findings and deliver the documented solutions
  • Manage communications to the stakeholders and management with monthly status updates
  • Manage Project and resources according to the Prince 2 framework and deliver requirements to agreed time and budget
  • Ensure that project activities are clearly defined, communicated, committed to and that progress of these activities are timely reported to the Project Board
  • Ensure that Project Board meetings are held and minuted and that progress reports are available
  • Ensure that issues blocking the success of the project are identified and brought to the attention of the Project Board
  • Manage Risks register and ensure it is appropriately documented and communicated to Project Board
  • Responsible for involving the required stakeholders within and outside ITI, IS&D and Security, in order to ensure proper hand-over from project to support phase and to ensure compliance with Regulatory requirements
55

IT Security Intern Resume Examples & Samples

  • Must be enrolled at a University/College or have graduated within the last six months
  • Skilled in Microsoft Office applications (Visio, Word, Excel, Access, Powerpoint)
  • Focus study within the area of IT
56

Das-it Security PM / PM Resume Examples & Samples

  • End Point Protect (End Point, White Listing and Policy Auditor)
  • Database Encryption
  • Enterprise Password Vaulting
  • Intrusion Protection
  • Security Information & Event Management
  • Database Activity Monitoring
  • Must have experience in managing at least one large program (collection of related projects) that was more than 1 year long, more than a year in duration and a budget great than $1 million
  • 5-8 years of experience managing medium to large sized projects
  • Managing teams of 10-15 people from differing vertical lines of technology and/or business
  • Experience managing several significant projects simultaneously
  • Experience following project management best practices and methodologies
  • Experience with project management applications (WorkFront preferred) and Microsoft Office suite of products
57

AVP, IT Security & Infrastructure Resume Examples & Samples

  • Serves as the information technology infrastructure and security expert and thought leader working closely with other members of the IT leadership, infrastructure component and application owners to deliver secure solutions that align with strategic direction
  • Determines security requirements by evaluating business strategies and requirements, implementing information security standards, conducting system security and vulnerability analysis and risk assessments, recommending secure architecture, and identifying/driving remediation of integration issues
  • Plans infrastructure and security systems by evaluating network, server, data center and security technologies; developing requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related security and network devices; designs public and private facing network/Internet protocol usage methodologies including; configuration and use of certification authorities (CAs) DNS, digital signature, encryption technologies as well as hardware and software; adhering to industry standards and driving future methodologies and implementations for a more secure computing environment
  • Implements security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures; creating, transmitting, and maintain keys; providing technical support
  • Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analysis; developing and conducting training programs
  • Creates, maintains and drives information security technology strategies and road maps
  • Researches/analyzes emerging technologies, designs and advocates new technologies, architectures, and security products
  • Provides expert knowledge of solution/application architecture and tier 3-4 support
  • Enforces security standards, procedures, and methodologies for the software development life cycle
  • Interacts with stakeholders and possesses the ability to influence direction, articulate risks and sell secure solutions/road maps
  • Establishes alternative security mitigations/compensating controls to allow for business to continue while protecting the company’s assets
  • Partners with various cross functional teams to ensure compliance to industry and company standards
  • Updates job knowledge by tracking and understanding emerging security practices and standards; participating in educational opportunities; reading professional publications; maintain personal networks; participating in professional organizations
  • Provides subject matter expertise for overall enterprise architect and other technologists
  • Regular attendance
  • Sitting, talking, hearing, and walking
  • Concentrated mental and visual attention with normal hand-eye coordination
  • Clarity of vision at 20 inches B corrected or uncorrected
  • Generally negligible physical effort, but occasional moving of 1 to 10 lb. items
  • CISSP and other expert level industry security certifications preferred. GSE highly preferred
  • Strong understanding of infrastructure and security architecture concepts
  • Demonstrated ability to stay current with best practices, existing and emerging technology platforms, architectural and systems engineering industry trends with an emphasis on security systems
  • Implementation and architecture experience with purchased, open source and customized solutions/projects
  • Demonstrated experience of cloud technologies
  • Good oral communications and written communication skills
58

Director, Regional IT Security Resume Examples & Samples

  • The development, implementation and oversight of policies, processes, controls and toolkits supporting a Regional IT Security Framework for PCA's Life & Funds Businesses. This IT Security Framework will be used to guide long-term IT Security strategies and contribute to the management of security issues across all business lines on a daily operations perspective
  • Ensure alignment with the corporate governance frameworks, monitor changes in global and regional guidelines to support the tactical adoption of Group Security strategies
  • Evaluate IT Security technologies by proactively ensuring the regular maintenance, update, publication and communication of new technologies introduced to the organization
  • Evaluate vendors, propose standard technologies and maintain key IT Security vendor relationships
  • Support business and IT alignment and implementation through close partnerships with IT teams in the other APAC offices
  • Develop an IT Security regulatory control matrix for all of the regulatory authorities within the operating area in the organization
  • Ensure IT Security Regulatory compliance at the IT Hubs
  • Support business units in achieving IT Security compliance
  • Work with internal/external auditors and regulatory agencies as appropriate for IT Security Audits
  • Candidate must have more than 8 years of experience in IT Security and more than 4 years of experience in project management
  • Required to have a University Degree or above
  • Experience gathered in insurance or other financial institutions
59

IT Security Deployment Engineering Manager Resume Examples & Samples

  • Strong staff management skills; must have served as a recent manager in a previous role, including staff lifecycle management
  • Strong infrastructure familiarity to pinpoint dependencies in large scale DMZ build outs
  • Strong vendor management skills (including directing site-to-site shipments, billing inquiries, order procurement, etc)
  • Strong proactive inventory lifecycle management (especially around tracking End-of-Sale/End-of-Life hardware)
  • Strong budgeting skills; candidate must have managed multi-million dollar inventories in prior jobs
  • Strong datacenter knowledge in terms of power & rackspace allocations for equipment as well as experience with equipment airflow and cooling characteristics & specifications
  • Moderate physical networking abilities (Knows how to cable RJ45 jacks, familiar with creating out-of-band dongles, modems, etc)
  • Moderate networking (knows how to subnet, knows how IP addressing works, etc)
  • Moderate hands-on router/switch configuration capabilities
  • Basic Hands-on configuration of non-router/switch security devices (Knows how to direct others which cables to plug into which ports)
  • Basic security hardware knowledge (knows what proxies, firewalls, servers, Network Intrusion Devices, etc are. Candidate does not have to know them intimately, just know how they function on a high level)
  • Basic systems administration skills (knows how to navigate a unix command prompt)
  • Microsoft Office (Sharepoint , Excel, Powerpoint, etc)
  • Lab management
  • Staff fiscal management
  • Telecom/Datacenter experience
  • Financial firms experience
  • Strong Networking/Systems knowledge
  • Scripting capabilities (Shell, python, perl)
60

Senior Associate, IT Security Resume Examples & Samples

  • Five (5) or more years of professional experience required
  • Ability to work in a fast-paced, high-growth environment with multiple high-priorities
  • Approximately 20% out-of-town travel to client locations is typical for IT security consultants
  • Consultants work from their local office when not visiting client locations, or remotely when testing is required out of office hours
61

IT Security Consulting Manager Resume Examples & Samples

  • Supervises the day-to-day workload of staff on assigned engagements and reviews work product
  • Ensures staff is trained on all relevant software
  • Evaluates the performance of staff and assists in the development of goals and objectives to enhance professional development
  • Delivers periodic performance feedback and completes performance evaluations for staff in accordance with Firm guidance
  • Acts as mentor to staff, as appropriate
  • Eight (8) or more years of professional experience required
  • Experience performing IT Security Assessments, including static, dynamic, and manual assessments preferred
  • Experience leading and managing teams of security consultants preferred
  • A strong understanding of web, mobile, and thick client Application Security, static and dynamic testing, and Secure SDLCs
  • A working understanding of application layer vulnerabilities, and the business impact associated with those vulnerabilities
  • Have an understanding of how to create unique exploit code, bypass AV and mimic adversarial threats
  • A strong desire to be a part of and grow a nationwide, elite IT Security team
  • Strong written and oral communication skills
  • Ability to travel 25% to perhaps as much as 50% of the time, as needed
  • Consultants work from their local office when not visiting client locations
62

IT Security Specialists Resume Examples & Samples

  • Conduct research on emerging security threats
  • Develops focused reporting and briefings for cyber threats and activity
  • Supports Security Operation Center analysis, handling and response activity
  • Maintains situational awareness reports for advanced threats such as advance persistent threats
  • Author Global Standard Operating Procedures and training documentation when needed
  • Participate on team to assist to provide analysis, communication abilities and mentorship of other analysts
  • Must have experience on a shared services environment
  • Strong analytical skill, problem solving, attention to detail, and can handle multiple task
  • Ability to identify and assess reasonably foreseeable internal and external risks to the security, confidentiality and availability of information and systems using a documented approved process
  • Strong problem solving, analytical, technical and troubleshooting skills
63

IT Security User Provisioning Specialist Resume Examples & Samples

  • High school diploma is required
  • 3+ years of security provisioning or Level 2 (or higher) help desk experience is required
  • Active Directory, Exchange, and SAP provisioning experience is required
  • Strong verbal, written, and interpersonal communication skills are required
64

IT Security Analyst, /I Resume Examples & Samples

  • Creates, modifies, and deletes user access to files/data on numerous platforms using various tools and operating system command line interfaces
  • Performs advanced and complex tasks for security projects including training, documentation, testing, scanning, and reviewing IT security
  • Leads and manages small IT security projects
  • Operates security scanners and security products, reviews security logs, configures complex security products, assists with testing, and participates in building security solutions
  • Investigates, reviews, tests, and pilots security products
  • Reviews and correlates security data; presents findings to management and third parties
  • Provides support and direction during a crisis situation. Provide direct contribution to the IT Security objectives with efforts in the many areas of administering, reviewing and testing IT security
  • 1-5 years’ experience in IT administration or IT support
  • Lead and organize small projects
  • Excellent technical and communication skills
65

IT Security User Access Administration Analyst G Resume Examples & Samples

  • Analyze complex business requirements and develop effective technology solutions. High level technical contributor with expertise in particular business processes responsible for formulating systems scope and objectives relative to the organization's business plan and industry requirements
  • Information security best practices
  • Principles of a service oriented architecture
  • Design tools and techniques
  • 5+ years in compliance, operational risk, IT systems security, business process management, of which at least 2 years must include direct experience in compliance or operational risk management (includes audit, legal, or the management of a process or business with accountability for compliance or operational risk)
  • 5+ years security user access administration experience on multiple platforms (Windows / Active Directory, RSA Secure ID, UNIX, OS390 Mainframe)
  • 5+ years direct experience with management and implementations of RSA SecureID Multi-Factor solutions
  • Ability to work independently or as a member of a team
66

IT Security Intrusion Analyst Resume Examples & Samples

  • Understanding of the issues related to the decision-making process; ability to analyze situations fully and accurately, and reach productive decisions
  • Knowledge of practices and policies governing disclosure of information about the organization, its business activities, and employees; ability to apply this knowledge appropriately to diverse situations
  • Knowledge of and the ability to utilize tools and techniques for assessing the effectiveness of information security measures, identifying potential risk exposures, and protecting the availability, confidentiality and audit trails of information from destruction or manipulation
67

IT Security Forensic Digital Resume Examples & Samples

  • Knowledge of and the ability to detect and prevent data security vulnerabilities of coding throughout the software development life cycle within software development organizations
  • Knowledge of and ability to design, implement and evaluate standard operating procedures affecting daily and strategic business operations in order to increase operational efficiency
  • Knowledge of and the ability to utilize a variety of administrative skill sets and technical knowledge to manage organizational IT policies, standards, and procedures
  • Knowledge of and the ability to detect and prevent business crimes that involve computers/networks as instruments
  • Knowledge of technical troubleshooting approaches, tools and techniques, and the ability to anticipate, recognize, and resolve technical (hardware, software, application or operational) problems
68

IT Security Architect Lead Resume Examples & Samples

  • Perform threat modeling activities to articulate risks affecting the PNC enterprise
  • Participate in threat analysis activities and facilitate the development of security architecture-based risk mitigation strategies
  • Deliver technical and internal strategy development presentations, internal webcasts, whitepapers, RFI and RFP questions, and research pertaining to PNC information security, and knowledge transfer with respect to developing and CERT operations, scenario planning, and red team assessments
69

Director IT Security Resume Examples & Samples

  • Live and exemplify the Five Principles of Mars, Inc. within self and team
  • Provide executive level influence (internal/external) to ensure security interests are represented, championed, and prioritized in alignment with business needs and risk management
  • Lead the design and operation of related compliance monitoring and improvement activities to ensure agreement both with internal security policies and applicable laws and regulations
  • Evaluate and recommend risk management, protocols and strategies around industry best practices, ensuring the protection of the practice
  • Direct the preparation and authorization of implementation of necessary information security policies, standards, procedures and guidelines, in conjunction with the business
  • Work closely in a confidential manner with Legal on security related litigation and legal hold cases
  • Proactively collaborate with IT and business units regarding major systems and application changes, helping to ensure that information security standards and issues are addressed early in a project's life and incorporated into the resulting program
  • Ensure PCI Compliance oversight with Banfield Information Security policies, standards and architecture
  • Evangelize and promote security awareness through suitable information security training and educational activities
  • Lead or participate in initiatives assuring security best practices around software development and deployment
  • Bachelor’s degree in Computer Science, Business or Technology field preferred, or the equivalent combination of education, training and experience that provides the required knowledge, skills, and abilities
  • Ten years experience in Information Technology with a minimum of five years in an IT Security related role required
  • Supervisory experience leading highly skilled, senior level technical resources required
  • Multi-unit high transaction payment environment required
  • PCI Compliance required with CISSP preferred
  • Software development and deployment preferred
  • Multiple functional roles within IT preferred
  • Microsoft environment preferred
  • Prefer health care background (veterinary or human healthcare, pharmaceutical, etc.)
70

IT Security Strategist Senior Resume Examples & Samples

  • Provides project (expert level) advisory and consulting services for various constituents on technical information security matters
  • Documents current security architecture, researches best practice, conducts trend analysis, and identifies gaps in developing future-state security architecture
  • Develops, validates, maintains and implements security standards, guidelines and procedures and provides subject matter expert level advisory services regarding accepted ‘best practices&#8217
  • Develops logical network diagrams depicting the location/specifications of security tools across the corporate IT network
  • Minimum seven years experience in Information Technology
  • Minimum five years experience in Information Security related positions
  • Minimum five years experience in Information Technology architecture-related roles such as network architecture, architecture project/program management, server architecture, application architecture
  • Minimum one year supervisory or team lead experience
  • Knowledge of how security architecture projects/programs, technologies, processes and/or controls fit into both the Information Services and corporate business environment; requiring systems analysis and organizational skills
  • Expertise with design and development of scalable, mission critical or high-availability systems
  • Expertise in security related Internet protocols such as IPSec, SSL/TLS and familiarity with common Internet protocols such as IP, TCP, UDP, RTP, DNS, HTTP, SIP
  • Expertise with all phases of product life cycle from definition, design, development and test to deployment, field support and end of life
  • Deep understanding and expertise with networking technologies from the link layer to the application layer
  • Expertise with network systems in an enterprise environment, Application Acceleration or WAN Optimization space
  • Excellent organizational skills, technical writing skills, as well as written and verbal communication skills
  • Expertise with industry standard frameworks (NIST, PCI, SOX, Safe Harbor, ISO)
  • Ability to be a self-starter who is accountable, requires minimal supervision and is open to new ideas
71

IT Security Policy Specialist, Senior Resume Examples & Samples

  • 7+ years of experience in writing or revising information system security policies and procedures
  • 7+ years of experience with security control implementation and Plans of Action and Milestones (POA&Ms)
  • 7+ years of experience with information system security risk management, compliance management, or enterprise governance
72

IT Security Auditor Resume Examples & Samples

  • Experience with IT Controls testing / auditing
  • Manages own time and audit activities
  • Demonstrates ability to communicate clear and concrete audit requirements to audit members
  • Ability to multitask and work on various audits and projects in different phases
  • Ability to make good judgments based on observations and supporting information
  • Good interpersonal skills, including oral and written communications, listening, interviewing, fostering open communications, facilitating and influencing
  • Analytical and inquisitive, dig deep to obtain a solid understanding of business processes and IT controls
  • Take responsibility for assigned tasks, understanding and achieving expectations
  • Recognize opportunities and propose solutions to improve business processes
  • 3 - 5 year’s experience within audit and/or IT Controls
  • 3 -5 year’s experience within information technology industry
  • Formal Auditor training and certification – Must have CISA (Certification)
73

IT Security Incident Response Expert Resume Examples & Samples

  • Act as subject matter expert on various aspects of IT Security in the Global Security Operations Center
  • Coordinate response to security incidents, mitigation of risk and remediation
  • Advise Novartis Business Units on remediation of security incidents
  • Support and encourage professional and personal development of the team
  • Active involvement in the development and implementation of Use Cases to be adopted by the SOC
  • Handle escalations, issue management and coordinate the Incident Response team (Level 1 and Level 2 Analysts)
  • Assesses IT risks and analyze potential mitigation strategies to reduce IT Security exposure (Use Cases, Scenarios)
  • Detailed analyses of various security event sources (FW, IDS, PROXY, AD etc.) Acts as the interface with other IT and business departments regarding IT security incidents
  • Collaborates with other security teams in the global IT Security organization in Novartis
  • Serves as a mentor and role model. Maintains the highest standards of professional conduct and behavior in dealings with staff, colleagues, customers and outside contacts. Cooperates with business partners in ensuring the IT Security solutions correspond to their business needs while being cost-efficient at the same time
  • Collaborates and negotiate with external partners to support system operations / development / integration, ensuring reliability, competence, flexibility and cost effectiveness
74

Associate IT Security Analyst Resume Examples & Samples

  • Resource will apply knowledge and experience in the Identity and Access Management space, to identify gaps and work with IT Security Analysis to recommend and craft solutions
  • Deep working knowledge of and previous experience with CyberArk, and/or RACF and Active directory structure/tools, and system/application access provisioning/de-provisioning
  • Knowledge of and previous experience with Identity and Access Management tools
75

Senior Specialist, IT Security Resume Examples & Samples

  • Accountable as part of a team for implementation of the Information Security program for Celgene Corporation
  • Assist with the development, deployment and support of Data Loss Protection (DLP) and File Protection solutions and conduct hands on triage of events
  • Assist in researching investigations of security events (e.g., unauthorized access, non-compliance with company policies, fraud, service exploitation, etc.) to determine malfunctions, breaches, and remediation steps
  • Assist with the implementation of Security Awareness goals defined as part of organization's strategy; help design and implement programs and activities to achieve those goals
  • Develop close working relationships with management, company peers and industry counterparts to ensure alignment of company goals with current information security industry and regulatory trends
  • Stay abreast of current technology solutions and innovative information security management techniques to safeguard organizational assets
  • Bachelor's degree in a technical discipline or equivalent plus a minimum of 7 years of network, computer, or other technical experience, including 3 or more years of information security experience required
  • Well versed in information security concepts (e.g. defense in depth, separation of duties, control environments, malicious software, security awareness etc.)
  • Strong, hands on working experience with security monitoring solutions such as DLP (Data Loss Prevention), File Protection software, encryption and Endpoint
  • Working knowledge of security monitoring solutions (e.g. IPS, NAC, SIEM etc.)
  • Working experience with incident response and forensics
  • Experience in role based application and infrastructure security (e.g. Active Directory / Identity Management / LDAP etc.)
  • Demonstrated understanding of relevant terminology, such as: threat, vulnerability, risk, asset, exposure, safeguards, etc
  • Demonstrated knowledge of industry best practices in regard to network security (e.g. NIST, SANS, NSA etc.)
  • Proficient at multitasking and prioritizing in a fast-paced environment
  • Ability to effectively communicate verbally and in written forms in a professional manner
  • Experience working in a global (multinational) environment is required
76

Senior Director, IT Security Resume Examples & Samples

  • Lead IT Security Technical Engineering team to ensure that Mylan's assets are designed, built and operated to ensure they properly protected. Partners with Information Security organization to understand requirements and select standard security technologies. Lead a team that is able to design, build and transition security technologies that meet the Information Security requirements. The Security technical engineering team will span network, platform, IAM and application technology domains
  • Develop strategy, with long-term and short-term roadmaps, to ensure security is appropriately built into the Mylan technology landscape in alignment with information security's requirements
  • Integrating into Enterprise Architecture and governance processes to infuse security design into all solution proposals
  • Provide security engineers to design and build solutions required for all projects, including Merger and Acquisition activities
  • Minimum of a Bachelor's degree in IT, MIS, Information Security, or equivalent. A master’s degree is preferred. A minimum of 10 years of Information Security Industry experience and 4 years of experience in Information Security Management. However, a combination of experience and/or education will be taken into consideration
  • Knowledge and in-depth knowledge of platform, network and IAM security technologies. Hands-on technical experience and depth to enable direct oversight, problem-solving leadership and participation for designing and delivering secure infrastructure solutions
77

IT Security Product Specialist Resume Examples & Samples

  • Bachelor's degree in Computer Science, Electrical/Electronic Engineering or similar field; equivalent experience may be considered
  • A minimum of 2 years of relevant experience supporting IT security products
  • Proven customer facing skills and the ability to effectively communicate at both a high-level and a technical level
  • Has strong technical knowledge
  • Good written communication, ability to document procedures, and collaborates effectively with others. Good written communication, ability to document procedures, and collaborates effectively with others
  • Strong sense of professionalism and ethics
  • Enthusiasm and interest in information security
  • Ability to build rapport and cooperation among teams and internal stakeholders
  • Methodical and detail oriented
  • Self-motivated
  • Actively seeks to enhance the group through the sharing of knowledge
  • Strong process orientation and understanding
  • Security minded and knows how to handle evidence containing sensitive information
  • Good grasp of information security fundamentals, concepts, and strategy
  • CISSP certification, or ability to obtain via self-study within one year of date of hire, other relevant IT or security certifications
  • BA/BS in Computer Science, Business, Engineering or equivalent work experience
  • 3+ years of relevant technical experience. Technical knowledge of the targeted IT product(s) and services
  • General technical certifications or equivalent recognition
  • Product certifications may be specific to the position. Example certifications for this job title include
  • Windows Server administration experience
  • IBM Qradar experience
  • IP360/SIH experience
  • Beyond trust Retina experience
  • Tripwire Enterprise experience
  • Familiarity with PG&E processes, etc
  • Utility Industry experience
  • Product Management & Operations: Provide 24x7 enterprise support role for existing IBM Qradar, IP360 and Tripwire Enterprise infrastructure with substantial knowledge and experience to include installations, configuration, tuning, maintenance, capacity planning, patching and upgrades
  • Product Lifecycle: Manage the continuous product lifecycle from research, planning and implementation to retirement, including cost management. Introduce new innovative solutions, create support structure and integrate product with company standards. Involved in the implementation, including installation, testing, communicating, and documenting of the product. Advocates and communicates key messages and strategies, promotes the product, educates and trains support staff
  • Support: Work closely with IT professionals to troubleshoot and resolve issues. Drive conventions and standards (such as usage or configuration) across products to maximize user experience. In the absence of a third-tier support specialist, perform the role of third-tier support to other IT professionals
  • Vendor Technical Liaison: Participate in business, technical, and contract negotiations with vendors. Act as a conduit for vendor relationship, licensing, and incident management. An advocate for business unit and IT operational clients to ensure business requirements are cost effective and needs are met. Provide budget support to IT professionals and stakeholders
  • Documentation: Develops a variety of documentation such as strategies, plans, designs, usage or configuration standards, policies, guidelines, user requirements, roadmaps, reports, metrics, process manuals, configuration manuals, and other documentation specific and necessary for the targeted product or service
  • Provide skill-set knowledge transfer that ensures necessary cross-training of other Security Infrastructure team members
78

IT Security Architect Citizenship Required Resume Examples & Samples

  • Develops both current and future IT Security views based on business objectives and goals. Develops the strategic roadmap plans and solution capabilities including cross-functional dependencies required for the future state strategy. Aligns the application portfolio to the various roadmaps in conjunction with the Enterprise lifecycle standards
  • Works with IT architects, business planning analysts, vendors and management to coordinate project-planning activities during the appropriate phases of the project lifecycle
  • Responsible for maintaining architectural design principles related to common technology and strategic technical capabilities
  • Must have a current CISSP, CRISC, ITIL, CCNP, CISA, CISA, TOGAFF or equivalent information, architecture or risk management certification
  • Three to four years strategic planning experience in an IT or Security organization 
  • Minimum one year experience in project management and technical architecture  
  • Two years experience with technical writing  
  • Basic technical editing and review skills  
  • Experience with project management tools and techniques  
  • Ability to work effectively and efficiency with minimum supervision  
  • Oral and written communications skills  
  • Organization skills and ability to interact effectively with both internal and external customers  
  • Ability to work successfully in a team/goal-oriented setting
79

IT Security Architect Citizenship Required CA Rancho Cordova Resume Examples & Samples

  • Under the direction of Security Risk Management, develops, maintains and communicates the Security Strategic Plan. Consolidates business and IT perspectives as well as technology and industry trends into the annual strategic plan and technology documents. This includes all levels of the architecture framework and includes strategic planning, business objectives, process management and solution roadmaps
  • Provides a leadership role in the recommendation, development, and implementation of IS Risk Management programs as required to achieve compliance objectives
  • Compiles, edits and reviews technical documentation including technology and architecture direction and strategy, blueprints, roadmaps and standards. Maintains a library of policies and procedures, letters and other documents supporting technical operational policies and business requirements
  • Recommends technology opportunities and standards to IT Senior Management and Business Leaders to stay aligned with business objectives
  • Ensure that all projects and their designs align to the architecture framework and support the business strategic plan
  • Three to four years strategic planning experience in an IT or Security organization
  • Minimum one year experience in project management and technical architecture
  • Two years experience with technical writing
  • Any combination of academic education, professional training or work experience, which demonstrates the ability to perform the duties of the position
  • Basic technical editing and review skills
  • Experience with project management tools and techniques
  • Ability to work effectively and efficiency with minimum supervision
  • Oral and written communications skills
  • Organization skills and ability to interact effectively with both internal and external customers
80

IT Security Application Engineer Resume Examples & Samples

  • Collaborate with application development teams to ensure that security requirements are satisfied
  • Review design documents and threat models created by application development teams
  • Consult with product teams to provide security best practices and secure design patterns
  • Work to ensure that proper secure coding standards are followed via ongoing security testing and code reviews
  • Assess the security of core platform infrastructure
  • Provide recommendations for hardening environments
  • Analyze incidents and security review findings to determine security impacts
  • Support the integration of IT security architecture, policies, and practices into key IT and business areas
  • Participate in projects, ensuring that security standards of technology and configuration are applied to new system implementations and that other IT risks are adequately mitigated
  • Assist in providing oversight of the various operational systems used to manage, monitor, and respond to various security events and incidents
  • Perform risk assessments on key IT processes or assets, identifying vulnerabilities and proposing solutions to mitigate risk
  • Analyze and define information security requirements and solutions
  • Design and test information security products
  • Identify and recommend solutions to security exposures, upgrades, and contingency management planning and execution
  • Coordinate and conduct vulnerability assessment and penetration testing
  • Support vulnerability and risk mitigation efforts
  • Support the resolution of internal audit, regulatory, or risk management-related issues that could impact the confidentially, availability, or integrity of data or processes
  • Create security project plans and documentation
  • Assess or review third-party partner integration services and interactions
  • Promote implementation of various security initiatives
  • Provide expert advice without formal supervisory responsibility
  • Sun Certified Java Developer certification is preferred
  • Microsoft Certified Solution Developer (MCSD) certification is preferred particularly specializing in C#
  • SOA-Security or Sun Certified Enterprise Architect certification is preferred
  • Certified Information Systems Security Professional (CISSP) certification is preferred
81

IT Security Analyst Specialist Resume Examples & Samples

  • Responds to information security-related questions and inquiries using established information security tools and procedures
  • Identifies opportunities and executes plans to improve workflow and understands and quantifies business impacts of those improvements for communication to management
  • Interfaces with user community to understand security needs and implements procedures to accommodate them. Ensures that user community understands and adheres to necessary procedures to maintain security
82

IT Security Intern Resume Examples & Samples

  • Weeks 1: Information Security Basics
  • Best practices and practical experience in administering various security systems
  • Experience with provisioning and access management
  • Exposure to a corporate work environment
83

IT Security Client Services Consultant Resume Examples & Samples

  • Ensure the delivery of information security services to the customer is in compliance with the contract and is in compliance with any applicable standards and regulatory requirements (e.g., PCI, HIPAA)
  • Participate with the customer in the definition and implementation of information security policies, strategies, procedures and settings to ensure confidentiality, integrity and availability of customer’s environment and data
  • Maintain an information security strategy (forward looking roadmap) for the customer, aligning services / portfolio components to the strategy
84

IT Security & Service Delivery Manager Resume Examples & Samples

  • Ensure that IT compliance and security activities support business objectives and are aligned with executive risk tolerances and expectations
  • Manage relationships with internal and external IT service delivery groups to ensure the divisions' IT and security requirements are met
  • Facilitate communication between staff, management, vendors, and other technology resources within and outside of the organization to monitor completion of tasks
  • Drive the implementation of the Cyber Security Framework to support IT governance, risk and compliance objectives
  • Ensure initiatives to regularly assess the adequacy and effectiveness of IT controls, security policies, and direct remediation activities and initiate actions to ensure that compliance and security gaps are successfully addressed
  • Identify and present options with pros/cons including risks, and work with stakeholders to finalize the best solution that meets business objectives
  • Document and maintain repeatable mechanisms to determine, measure and report to management an accurate view of significant current and near-future IT-related risks, the risk appetite and the risk tolerance of the organization and its business partners
  • Facilitate development of root cause analysis to identify causes of critical incidents by leading and participating in post mortem efforts; working with Subject Matter Experts and Leaders; document problems and recommendations for improvements
  • Develop and manage compliance and security roadmaps in collaboration with senior leadership, formulate and broker support for a portfolio of necessary remediation initiatives, drive those initiatives forward, and provide leadership over resulting project efforts
  • 8+ years of relevant technology experience in multiple disciplines required
  • 4+ years of experience leading a technical team required
85

Head IT Security Technology & Operations Resume Examples & Samples

  • 1 Develop a clear roadmap for maturity of our monitoring and detection capabilities
  • 2 Provide support for IT projects for security monitoring and detection services 3 Lead the overall IS&RM strategy and IGM framework as it pertains to IT security management areas of expertise, (see below)
  • 4 Own Audit and various external/internal assessment gaps/findings as they pertain to security tools operations and monitoring
  • 5 Chairs Patch and Vulnerability management Board
  • 6 Oversee incident root cause analysis and how it impacts the security posture of Novartis IT Security Management
  • 2 Security Operation Center
  • 3 Security Scanning, Monitoring and Remediation
  • 4 Security Tools Management
  • 5 Antivirus and Malware Detection
  • 6 Security incident management
  • 7 Data Loss Prevention
  • 8 Email Security
  • 9 Identity & Access Management
  • Effectively networks and interacts with the external IT Security community
86

Head of IT Security Operations Resume Examples & Samples

  • 50%-Manage Run Activities
  • Drive and ensure operational excellence across all current and new security operations services
  • Manage the contracted security and identity management services with Shire’s service providers
  • BS degree or equivalent experience (required)
  • 10+ years of IT Experience with 8+ years of operations management experience (required)
  • 8+ years of experience managing outsourced IT service providers and managing off-shore resources
  • Knowledge of networks, firewalls, proxies, and security technical risks related to key platforms (required)
  • Experience with the breadth of existing and pending security and identity management tools including: Active Directory, security certificates, DNS/DHCP, firewall, content filtering, intrusion detection, security and event monitoring (Envision), external authentication (OKTA), edge/backbone controls, endpoint security, file permissions and auditing (Varonis) (required)
87

Principal IT Security Architect Resume Examples & Samples

  • Provide technical and security expertise to IT and business teams to identify security technology solutions and develop security reference architectures and strategies to achieve business results. Ensure appropriate implementation of security technology and reference architectures within both the development and production environments
  • Design and develop enterprise-wide security architecture and strategy for all aspects of the security domain in alignment with the business strategy and goals
  • Provide technical guidance and security expertise in the areas of secure application development, security architecture risk management and assessment, security policies and standards, security architectures and implementations
  • Provide technology and security expertise and advice to IT leadership in the
88

Head of IT Security Team Resume Examples & Samples

  • To contribute to the business development by identifying future customers and qualifying the opportunities
  • To build our local portfolio of solutions
  • To build a team to serve our projects
  • Technical Expert with at least 15 years’ experience in IT Architecture and Cyber Security Solutions
  • Business development experience
  • Engineering/Bachelor degree in Computer Science/Technology
89

IT Security Threat Intelligence Specialist Resume Examples & Samples

  • Ability to contribute to operational (short term), tactical (1-2 years) and strategic (3-5 years) planning in support of the overall business plan
  • Ability to measure the quality and quantity of work effort for the purpose of improvement
  • Understanding of effective communication concepts, tools and techniques; ability to effectively transmit, receive, and accurately interpret ideas, information, and needs through the application of appropriate communication behaviors
90

IT Security Operations Resume Examples & Samples

  • Should be knowledgeable about global standards like PCI, ISO 27001, HIPAA, SOX
  • Contribution and participation in internal and external security forums will be added advantage
  • Preferably possess industry certifications like CISSP/CISM/CISA/ISO 27001 (LA or LI)
  • Good IT Security knowledge
91

IT Security Solution Developer Cyber Risk Services Resume Examples & Samples

  • Ability to troubleshoot, problem solve, critical thinking and logical structuring
  • Ability to quickly adapt to a changing environments and quickly learn new concepts
  • Willingness to travel up to 15 percent of the time
92

Head of Global IT Security & Audit Resume Examples & Samples

  • Continuously develop Information Security Strategy in accordance to Corporate and IT strategy, in order to gain maximum business benefit from Digitization
  • Implement and monitor a strategic, comprehensive enterprise information security program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization
  • Facilitate information security governance through the implementation of a governance program, including the formation of an information security steering committee or advisory board
  • Maintain and publish up-to-date information security policies, standards and guidelines. Oversee the approval, training, and dissemination of security policies and practices
  • Communicate and implement a risk-based process for information risk management, including the assessment and treatment for risks that may result from partners, consultants and other service providers
  • Manage information security budgets, and monitor them for variances
  • Manage information security and risk management awareness training programs for all employees, contractors and approved system users
  • Provide regular reporting on the current status of the information security program to enterprise risk teams, senior business leaders and the board of directors as part of a strategic enterprise risk management program
  • Coordinate information security projects with resources from the IT organization and business unit teams
  • Facilitate the information security risk assessment process, including the reporting and oversight of treatment efforts to address findings
93

IT Security Resume Examples & Samples

  • Support incident response efforts as an Oracle Cloud incident responder
  • Coordinate IT resources to effectively perform incident response tasks.|
  • Document steps taken when executing incident response plan
  • Performs investigative tasks as part of specific incidents
94

IT Security TRA & Certification & Accreditation Analyst Resume Examples & Samples

  • Must have a minimum of 5 years cumulative professional experience within the last 8 years, performing Certification and Accreditation (Security Assessment Authorization) assessment for Government of Canada Information Technology Systems
  • Must have a minimum of 2 years’ cumulative experience, in the last 5 years, in authoring security deliverables: Threat Risk Assessment (TRA) and Statements of sensitivity (SoS)
  • Must demonstrate a minimum of 10 months experience in the past 2 years, in using the Security Assessment and Authorization process, as identified in the Information Technology Security Guidance document, “IT Security Risk Management: A Lifecycle Approach (ITSG-33)”, to assess a type 1 High Assurance & Key Management Infrastructure
95

IT Security Intern Cyber Risk Services Resume Examples & Samples

  • Bachelor of Science degree in Cyber Security, Management Information Systems, Computer Science, Engineering, or other IT-related area
  • Minor in Business or Accounting is a plus
  • Strong academic track record (minimum GPA of 3.0)
  • Basic understanding of various security concepts
  • Specific interest in Cyber Security (IT) domain
  • Experience with Microsoft product suite (I.e., Word, Excel, Power Point, Visio, etc.)
96

IT Security Co-op Resume Examples & Samples

  • Work with the team to gain an in-depth understanding of IT Security tools and processes
  • Produce lucid, detailed, and organized documentation for users, developers, and auditors
  • Improve, maintain, and update existing documentation as the environment changes
97

Mgr-it Security Resume Examples & Samples

  • Responsible for oversight of all aspects of IA security functions to include: policies compliance/development, processes, audit management (review, analysis, reporting, in-depth analysis) accounts management, mitigation recommendations, incident reporting, staff training, coordinate with the C&A personnel on issues concerning accreditations, IT security operations and metrics reporting
  • Candidate must be able to assist customer and/or staff with technical issues
  • Applicant must have knowledge of government IA security requirements and processes
  • Candidate will serve as the senior liaison between the sector and USG IT Security (DAA’s, etc.) to de-conflict interpretation of policies, gain approvals as necessary on multi-program systems, support collaboration between industry and USG on any Cyber Security related current/future policy and procedures
  • 5 years of experience with UNIX/LINUX and Windows based operating systems
  • 5 years of experience with MS Office Suite (Word, Excel, PowerPoint, Outlook)
  • Current Certified Information Systems Security Professional (CISSP) and/or Certified Advanced Security professional (CASP) certification required
  • Must meet DoD 8570.1 certification requirements for IAM-III and CND-SPM
  • Experience with writing IT Security and/or IT Systems process and plan documentation
  • Must have active TS/SCI security clearance
98

IT Security Operations Administrator Resume Examples & Samples

  • Develop existing security policies and procedures to oversee and maintain enforcement of all security policies, procedures, and associated plans for system security administration and user system access
  • Accurately configure access and roles for the implementation of user account accesses
  • Drive procedures for the addition, modification, and removal of user access
  • Provide timely response to requests for user account and configuration changes
  • Ensure policies, regulatory, and compliance concerns effectively met and implemented
  • Advise leadership of and remedy any control gaps detected in course of activities
  • Ensure auditability of user access processes and approvals
  • Assist and support internal and external IT audits
  • Document processes, procedures and policies
  • Assist the Information Security team with the development of security policies, procedures, and technical documents
  • Work with other IT staff to mitigate risks in controlled systems
  • Strong understanding and knowledge of regulatory requirements, security concepts, and privacy
  • Proven experience working with network forensic tools
  • Proven experience with SOX control requirements
  • Ability to positively and effectively interact with internal and external customers
  • Regular, reliable and predictable performance required
  • Must be able to successfully pass a pre-employment criminal screen. Additional pre-employment driving and drug screens may be required based on job responsibilities
99

IT Security Design Specialist Resume Examples & Samples

  • Perform IT security planning and prepare IT security design and architectural documents
  • Engage with Technical Authority designated representatives and other identified stakeholder representatives as directed
  • Manage IT security projects and complete project manager activities
  • Lead an IT security requirements working group following ITSG-33 security guidelines to generate project-specific security requirements for high value complex IT security projects
  • Provide IT security strategic planning and advice
  • Complete Departmental and Information System IT security risk management activities as directed by Technical Authority
  • Prepare Information System Security Implementation Process (ISSIP) output documents i.e. security control profiles, security categorization reports, security assurance requirements, advice and guidance responses related to privacy impact assessments (PIA) questions and requests, threat and risk assessments (TRA) and security assessment and authorization (SA&A) package, etc.), based on the methodology and terminology contained in ITSG-33
  • Review, assess and upgrade IT security-related artefacts
  • Engage with Security Authorization and Assessment teams
  • Develop and deliver oral and written presentations to senior management
  • Produce Task Status Reports as directed by the Technical Authority; and
  • Other project and IT security related artifacts as determined by the Technical Authority i.e. design vision papers, business impact assessments, strategic IT requirements analysis
100

IT Security Automation Engineer Resume Examples & Samples

  • Key delivery role in large scale programs to integrate the MyID application across the enterprise components: desktop, distributed, AD, and PKI
  • Design automation utilities that are in alignment with enterprise security and best practices
  • Drive segment and UHG wide project activities for MyID implementation such as the upcoming 10.5 upgrade
  • Identify areas of business risk and process improvements relative to Smart Cards and drive a scaled solution
  • Monitor service delivery, proactively identify risks and remediate them as required
  • 5 or more years of professional IT experience
  • Scripting background in technologies such as shell, python or Perl
101

Senior Administrator, IT Security Resume Examples & Samples

  • Supports system development and maintenance lifecycle by providing guidance on implementation and implementing the secure configuration
  • Develop, implement, maintain, and oversee procedures and associated plans for systems and network security. administration and user system access based on industry-standard best practices
  • 2 years of project experience
  • Preferred Certified Information Systems Security Professional (CISSP) certification; CISSP certification is required within 1 year of hire; additional certifications such as GIAC, CEH, LPT, PCI-ISA, etc. are beneficial
  • 5 years' related information security or engineering experience
  • Cell phone availability required 24x7. Also participate in on-call rotation with team
  • Experience working on Microsoft-based, complex systems in the security engineering role using the security features of Windows 2008/2012 Server products, Windows 7/10, IIS, Sharepoint, Exchange and SQL Server products
  • Experience with Linux, Unix, and AIX operating systems related to configuration and patching
102

Technical Subject Matter Expert IT Security Resume Examples & Samples

  • Act as Subject Matter Expert in specific technologies, product/service or solutions delivery
  • Work with sales/engagement practice team to develop and build value argumentation
  • Support deployment of solution
  • Market Insight
  • Customer Insight
103

Director, IT Security, GBS Resume Examples & Samples

  • Lead Security program maturity of security assessments, application security architecture reviews, and risk modeling for company-developed software, acquired and/or hosted applications and services
  • Lead Security program maturity efforts to ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs
  • Provide direct support to business units as a center point of contact for security defect resolution, including vulnerability remediation and/or mitigation
  • Work with the Operational Security Team to lead the Non-technical aspects of internal and external assessments of deployed software applications and systems including system and network vulnerability scanning, penetration testing, and patch management
  • Support and improve the internal processes and system to collect and report meaningful metrics from security issues identified in all reviews
  • Support the Security team in conjunction with company's software architecture group, to develop a set of architectural and development standards for all application security
  • Lead POC and project plans in support of evaluating outsourced / third-party technologies and hosting environments to ensure they provide adequate protection for the processing, transmission, and storage of company information
  • Support and internal processes that support the resolution of security incidents related to company assets, including root cause analysis
  • Support all efforts for computer and network forensics, system and network security, incident management, intrusion detection, vulnerability and patch management, log analysis, and related technologies
  • Possess strong knowledge of Program and Project leadership , Agile development and governance best practices best practices
  • Excellent communication skills; inter-personal; organizational and analytical skills, written and verbal communications, experience with management presentations at various levels of corporate structure
  • At minimal 8-year hands-on experience Leading large Enterprise technology initiatives
  • At minimal 2-year hands-on experience Leading large scale deployment to end users (device roll-out, security solutions, etc.…)
  • Practical experience in the program and project management for the development of secure java and .Net applications and frameworks
  • 2 years direct experience supporting cloud-based software solutions including Azure, AWS, etc
  • 5 years direct experience with vendor and managed services management, enterprise wide transition and transformation programs
  • Direct experience with leading senior technical advisory and governance boards, relating to the technology services, security standards and policies and industry best practices
  • 5 years direct experience in developing and implementing Enterprise IT program management strategy, and governance programs
  • Experience in developing and implementing Information programs, and IT security policies, standards, processes, and procedures
104

IT Security Analyst Specialist Resume Examples & Samples

  • Work with various regulatory authorities to ensure the examination process is properly executed
  • Review documentation of attempted efforts to compromise security protocol and recommend solutions
  • Review security policies and procedures to control physical and system access
  • Assist in the regulatory efforts of the business to maintain compliance and security
  • Create information security documentation related to multiple environments and completes requests in accordance with company requirements
  • Identify opportunities and execute plans to improve workflow, and understand and quantify business impacts of those improvements for communication to management
  • Interfaces with user community to understand security needs and implements procedures to accommodate them. Ensure that the business understands and adheres to necessary procedures to maintain security
  • Provide status reports on security matters to develop security risk analysis scenarios and response procedures
  • Proficiency in planning, reporting, establishing goals and objectives, standards, priorities, and schedules
  • Outstanding verbal and written communication skills with technical and non-technical audiences of all levels of the organization
  • Experience establishing and maintaining effective working relationships with employees, clients, executives and regulatory agencies
105

Digital It-security Operation Manager Resume Examples & Samples

  • Good exposure in IT security operation management, skillful in running the security projects to reduce the identified risks
  • Good exposure in IT security risk management, capable to develop and implement an ongoing IT risk management program focus on IT security posture across countries
  • Good understanding and skillful in implementing security controls over the external/internal computing environment, e.g. servers, firewalls, applications, workstations etc
  • Skillful in developing and maintaining the security operation standards, benchmark, tracking and reporting mechanism
  • Skillful in developing and maintaining the IT security operation processes and procedures, e.g. Security Patch Management, Vulnerability Scan, Security Health Check, Privilege ID Management, Firefighter ID Management, Continue Business Need Validation, Security Incident Management, User ID and Access Administration Management, System Activation/Deactivation Management etc
  • Good understanding in web, mobile app security against the OWASP Top 10 and skillful in the penetration test tools like Burp Suite, Nessus, Acunetix, Metasploit etc
  • Skillful on the specific solutions like: Enterprise-wide Identity & Access Management (I&AM), Data Loss Prevention (DLP) and Security Information & Event Management (SIEM) solutions etc
  • Responsible for various IT security operation projects as assigned from whatever local and global
106

Edmc IT Security Intern Resume Examples & Samples

  • Development and rollout of a cloud services survey
  • Updating security related documentation (policies, procedures, standards, etc.)
  • Development and delivery of security awareness training programs
  • Performing forensic investigations of security incidents
  • Reviewing and revising security policies and performs high risk and sensitive security strength testing and analysis
  • Currently pursuing a bachelor’s degree in an Information Technology related field of study
  • Works well with others in a collaborative team environment
  • Is eager to learn the intricacies of the Information Security domain
  • Able to conduct themselves in accordance with the highest standards of moral, ethical and legal behavior in the course of professional activities
  • Understands the pillars of information security (confidentiality, integrity, and availability) and able to recognize and apply it
107

IT Security Resume Examples & Samples

  • Conducting and participating in risk/threat vulnerability studies and impact assessments
  • Integration of disaster recovery and business continuity for efficient and effective recovery following an interruption in service caused by a prolonged outage or declared disaster
  • Organizing and managing actual, scenario-driven DR exercises as well as tabletop or simulated exercised with both business and technical staff
  • Ensuring that IT supported applications have a fully documented, and executable DR plan that contains all of the required information, reflects current conditions from an IT infrastructure recovery standpoint, and is able to support the recovery objectives of the organization
  • Designing, coordinating, and executing DR annual test exercises for critical business processes, and product test reports including lessons learned. Coordinating follow up on test results as required
  • Partnering with infrastructure, application development, and business intelligence areas to develop and maintain recovery procedures for key business applications
  • Advising and training IT members in practices of risk-based technology disaster recovery planning
  • Reviewing existing and proposed plans for recoverability efficiency and identifying opportunities for enhancement
108

IT Security Service Manager Resume Examples & Samples

  • Excellent Customer service/relationship skills
  • Process and workflow analysis, development and refinement
  • Serve as the interface for the integration of service management processes and workflows
  • Project/Task Management experience
  • BS degree in Information Technology or related field with a minimum of 10 years of experience
  • Proficient with Microsoft Project, Office and PowerPoint
  • Be capable of explaining information security concepts to non-technical audiences in both written and verbal forms
  • Capable of obtaining a Secret Clearance
109

IT Security Transformation Professionals Resume Examples & Samples

  • Provide solutions to complex business problems for area(s) of responsibility where analysis of situations requires an in depth knowledge of organizational objectives
  • Drive, supervise and review technology diagnosis and assessment activities
  • Identify opportunities for technology-related improvement based on benchmark data and doing high-level cost benefit analysis
  • Develop a high level design which supports robust technology solutions, taking into account the user requirements, technical requirements, etc
  • Review and supervise design components
  • Support sales growth through business development activities working closely with leadership to position offerings with clients
  • Interact with senior management levels at a client and/or within Accenture, which may involve negotiating or influencing on significant matters
  • Manage large teams and/or work efforts (if in an individual contributor role) at a client or within Accenture through structured program or project management methodology
  • Security Operating Model
  • Perimeter & Network Security (e.g. Firewall, IDS/IPS, NAC)
  • IT Infrastructure Security (e.g. Server Hardenning)
  • Application Security (e.g. IAM, Multi-factor Authentication)
  • End-point Security (e.g. DLP, Antivirus, Encryption)
  • Presents ideas clearly and concisely in verbal and written communications
  • Present and communicate information or ideas to technical and non-technical audiences in ways that help them relate to message effectively
  • Work in a team-oriented environment through effective work facilitation and collaboration
  • Flexible team player who thrives in environments requiring ability to effectively prioritize and juggle multiple concurrent challenges
  • Deliver results with minimum supervision and general guidance
  • Work creatively and analytically to describe and solve large or complex problems
  • Highly analytical thinking with demonstrated ability for identifying, scrutinizing, improving, and streamlining complex work processes
  • Make rational and informed decisions that have lasting impact on area of responsibility with the potential to impact outside area of responsibility
  • Focus on end goals and drive progression towards successful outcomes
  • Anticipates and identifies risks, mitigating actions, and ownership
  • Solid experience in Information Technology area for > 5 years of experience (total experience) in developing and implementing IT Security technologies
  • (Advantage) Hold related IT certification in IT Security
  • (Advantage) Has worked for known, well reputable local or international IT Consulting companies
  • (Advantage) Has worked for both local/international big clients with complex IT Landscape
  • (Mandatory) Bachelor’s (or higher) degree in Information Technology
  • (Preffered) PMP
  • (Preffered) CISA
  • (Preffered) CISSP
110

IT Security Support Specialist Resume Examples & Samples

  • Monitors central University SIEM systems, assesses/escalates issues and takes steps to remediate threats. Communicates with impacted customers and/or other departmental IT support staff as appropriate to assist in remediating and restoring services. - Monitors relevant security sites and bulletins to help ensure the University is current as possible with information on perceived and existing threats to its information systems, data integrity, or to customer accounts or networked devices. Ensures this information is disseminated as appropriate
  • Creates reports and dashboards in the SIEM to proactively monitor and assess security threats
  • Maps processes, documents and maintains procedures for SOC incident response to security issues, such as phishing, compromised accounts, IPS alerts, REN-ISAC alerts. - Trains the SOC staff on security essentials and procedures
  • Collaborates closely with the Information Security Office regarding security issues
  • Writes technical articles for the campus knowledge base as well as procedural documentation for the internal SOC document repository
  • Actively participates in professional development in order to maintain and improve technical knowledge
  • Good foundation of IT security analyst skills including CompTIA Security+ or GIAC Security Essentials certification or equivalent credentials or analogous proven experience
  • 2 years experience in a security or network operations center
  • Critical thinking, analytic and problem solving skills
  • Excellent organizational skills, written and oral communication skills, and attention to detail. - Commitment to professional customer service
  • Ability to work in a team environment; strong interpersonal skills
  • Ability to work and communicate well with customers possessing various levels of technical ability and understanding
  • Ability to work in a fast-paced technical support center with rapidly shifting focus
  • Ability to work non-traditional, flexible hours, including evenings and weekends; hours may be subject to change
  • Willingness to work toward mastery of new technologies and skills as the needs of the industry and the user community change
111

IT Security Operations Delivery Analyst Resume Examples & Samples

  • Review and monitor service performance to vendor contract including maintenance of business activities, improvement activities, feedback (This will be the primary function of the role)
  • Function as initial point of contact on day-to-day operational, process, and performance items. Identify trends and areas of improvement
  • Proactively ensure service continuity and improvement through the review of partner improvement plans, the use of Problem Management, quality tools, and report on your activities
  • Actively participate in major incident service restoration and problem management activities by leveraging technical knowledge of systems supported; Drive/document improvements utilizing Problem Management, Quality, SWAT, Technical roundtables and other service improvement tools (will be on call in the event of major incidents)
  • Actively participate in daily change management meetings and activities – Apply technical experience and knowledge of systems supported to review and advise on change requests impacting production environments. Review communications plans, test plans, and communicate as necessary
  • Coordinate activities between various teams as needed to facilitate the provision of the services and incident remediation
  • Use technical knowledge and communication skills to lead major incident service restoration and problem management activities; Drive/document improvements utilizing Problem Management, Quality, SWAT, Technical roundtables or other service improvement tools
  • Requires a 2 year degree and a minimum of 2 years of business experience supporting one or more of the following
  • Patching/Software Deployment/Image Deployment (Symantec Management Agent/Altiris), Endpoint Security (CheckPoint, SEP, Bit9/Carbon Black), VPN (IPSec/SSL), Firewalls (WAN. LAN, Internet), Email Security (SPAM, AV, TrendMicro, TLS encryption), Network Security (IPS/IDS, AppWall, TMG), Single Sign On (ADFS SSO, IDAM SAML SSO), Threat Vulnerability Management (Qualys), Identity & Access Management (Net IQ IDAM), Digital Rights Management (ADRMS), Data @ Rest Encryption (SQL TDE), Privilege Account Management (CyberArk PAM), Enterprise Mobility Management (MobileIron)
  • Vendor management and partnership experience
  • Comfortable working across cultures
  • Background in data analysis and Managing and measuring work
  • ITIL experience, familiar with ITIL terms
  • Microsoft Office experience focusing on the data analysis
  • Security related IT Professional Certification such as Security+, CISM, CISSP, GSEC, etc. highly desirable
  • ServiceNow experience is a plus, or similar Help Desk ticketing software
112

Junior IT Security Position Resume Examples & Samples

  • Excellent opportunity to learn how a Fortune 500 company treats vulnerabilities and threats while getting exposure to large scale tools being utilized in their environment as well as in the rest of the IT market
  • Experience with Excel:creating pivot tables, Vlookups, basic Macro knowledge
  • Excellent written and verbal skills as well as interfacing with all levels of an organization
  • Analysis-data analysis, running SQL queries
113

Enterprise IT Security Architect Resume Examples & Samples

  • Create and develop strategic plans and policies for internal and external security and architecture requirements
  • Build, design, and develop security systems
  • Provide data classification sets for product deployments and define data classification needs with the customer to provide the appropriate output
  • Provide technical expertise across the organization on information security and security architecture
  • Participate in pre-contract reviews to ensure information security requirements are appropriate and within designated guidelines
  • Strategic security architecture alignment
  • Minimum 4 years of system administration (e.g., Firewalls, IDS/IPS, Anti-Virus, Vulnerability Management tools, PKI, DLP, VPN and Wireless Security, etc.) required
  • Minimum 6 years data security experience required
  • Minimum 4 years of experience with designing and building enterprise level security programs preferred
  • Minimum 4 years' experience leading security programs related to National Critical Infrastructure preferred
  • Minimum 4 years of disaster recovery planning, testing, auditing, risk analysis and business continuity planning preferred
  • Minimum 2 years supervisory or lead experience preferred
114

Intermediate IT Security Analyst Resume Examples & Samples

  • The ideal candidate will have multiple years of experience in system administration and security supporting a variety of technologies in addition to supporting information assurance auditing, vulnerability scanning/mitigation, and Certification & Accreditation
  • Familiarity with DoD 8500.1, DoD 8500.2, DoD 8570.01, AR 25-2, AR 380-5, NIST Special Publications is a plus
  • A working knowledge of the following is highly advantageous: identification, authentication, and authorization, principles of IA - confidentiality, integrity, non-repudiation, availability, access control, DoD Accreditation program and processes DIACAP
  • Knowledge of the Risk Management Framework (RMF) replacing DIACAP is a bonus
  • Possess exceptional communication and interpersonal skills
  • Knowledge of DISA Vulnerability Management System (VMS)
  • Knowledge of network specific DISA Security Technical Implementation Guides and checklists
  • Experience with Certification/Security Tests and Evaluation (C/ST&E) events
  • Experience performing IA audits within a DoD organization
  • Logically process and diagnose information assurance and security issues
115

IT Security Analyst Iv-ediscovery Resume Examples & Samples

  • Proactively identifies and escalates incidents as well as operational performance concerns
  • Assists in Continual Service Improvement efforts by identifying opportunities for process improvement. Drives some process improvement efforts
  • Participate in the collection and documentation of departmental knowledge artifacts, participant in the development and population of knowledge management and collaboration systems for the IT Security team
  • 4+ years’ experience in programing or system/network operations and administration preferred
116

Senior Consultant, IT Security Resume Examples & Samples

  • Participating in Solutioning, Delivery and Support activities pertaining to Identity and/or PKI/Data security Technologies
  • Configuring, customizing, setting up and deploying of Identity and Web Access suite, as well as performing solution integration activities
  • Participating in project activities including Requirements, Design, Testing, Documentation, Support, Troubleshooting, etc, as needed during the appropriate phases
  • Degree or Diploma in IT/Computer Science or related discipline with prior experience in Security Solution/Implementation (Involved in some security function as part of projects)
  • Familiar with Web server, Application Server Technology, Tools, Software and Scripting
  • Background in Identity and Access Management Product Solutions (Oracle/NetIQ/SUN/CA Others) preferred
  • Experience with Identity/Application/Data Security solutions is preferred
  • Strong interest in Security Domain covering Identity and Data security Integration
  • Singapore Citizens preferred
  • CISSP & CISA certifications would be advantageous
  • Those with limited experience but with the right aptitude and strong interest to focus in Identity and Data Security Integration, may also be considered
117

IT Security Analyst Quality Resume Examples & Samples

  • Ensuring that IT security services and processes are in compliance with internal and external regulatory environments
  • Plan and perform qualification tasks i.e. create change requests, update system documentation, write quality plans and reports etc
  • Supervise compliance and quality of vendor deliverables
  • Manage non-conformities
  • Identify and drive process improvement initiatives in the IT Security Services organisation
  • Develop, Review or approve documentation/records as appropriate based on impact to GxP and business critical elements
  • Act as interface between the vendor, service managers, architects and QA organisation for all security services
  • Create and approve Changes, NCs in the IT Security and Infrastructure areas
  • Create and execute tests for IT Security service qualification. Assist/coordinate in defect resolution
  • Periodic assessments and reviews of the platform documents for security services
  • Liaison with all necessary vendors, Service managers/architects and QA organization for all the compliance deliverables within IT security services
  • Establish compliance follow up on ITSM processes
  • Ensure all security and compliance requirements are met in the processes and day to day operations
  • Ensure inspection readiness of IT security services
  • Coordinate audit and inspection participation from IT security service area
  • Bachelor or similar graduate degree field in Engineering, Computer Science combined with additional relevant IT and business experience
  • You have 5+ years’ experience working within IT quality in pharmaceutical industry (GxP)
  • Worked in the areas of Infrastructure and IT Security Services Quality control (QC or QA)
  • Experience from an international service or consultancy firm
  • Excellent communication skills in English and comfortable working with different cultures
  • Personality who likes to be self-driven with large degree of flexibility & ability to work under high time pressure while maintaining a good sense of humor
118

IT Security Analyst / Developer Resume Examples & Samples

  • Implements security designs in hardware, software, data, and procedures.Verifies security requirements; performs system certification and accreditation planning and testing and liaison activities. Supports secure systems operations and maintenance
  • Assist in planning and ensuring delivery of all items in the statement of work
  • Participates in the audits of computer systems to ensure they are operating securely and that data is protected from both internal and external attack. Makes recommendations for preventive measures as necessary
  • Provides technical consultation on highly complex security tasks
  • Other duties as assigned relating to the operation of a leading edge security group
  • BS or equivalent + 2 years related experience, or MS + 0 years experience
  • Experience in UNIX (OS X, Linux variants) systems administration
  • Experience in database technologies (e.g. MySQL)
  • Experience with information, software, and network security tools and practices (e.g. Nessus, Snort, Argus, Splunk, Syslog, FISMA)
  • Experience with programming in C, PERL, Python, and/or shell script
  • Understanding of TCP/IP and application protocols (e.g. DNS, HTTP, SMTP, RADIUS, and SSH)
  • Good analytical skills, organizational skills, and interpersonal skills
  • Willing to work rotating on-call 24x7 hours if necessary
  • Big Data experience a plus
  • Highly effective troubleshooting skills in quickly diagnosing and resolving customer problems as well as assisting in the development of internal software tools
  • Have a passion for technology and how it can be used to solve NASA’s IT
119

IT Security & Application Support Manager Resume Examples & Samples

  • All IT Security topics for the Australasia Territory (CIB incl. BP2S & IP), working closely with the APAC Security teams
  • Security Risk Management and Computer Security Incident Response both on a local and regional level for BP2S only
  • A small team consisting two IT Security Correspondents and Application Support staff. In addition to the IT Security tasks, this team provides support to a number of local applications, including but not limited to the HR system (people management and payroll), general ledger for BP2S, Access Rights Management workflow in Lotus Notes, and some ancillary support tools for CIB Finance, CIB (ex. BP2S) Operations and HR. Note that to ensure segregation of duties and no conflict of interest, such local applications should be reviewed on a regular basis (at least yearly) and independently by the regional IT Security teams
  • Ensuring systems run to maximum efficiency through planned maintenance and effective support, including installation of upgrades and other administration tasks
  • Providing support to users to enable them to effectively perform their roles through using the system in the best possible way
  • Managing application incidents and ad-hoc requests, following ITIL best practice, to meet service expectations of users
  • Managing and implementing improvements and solutions according to the business needs, following IT project management principles
  • Providing 2nd-level support to IT Helpdesk for specific systems
  • Liaising with vendors to ensure knowledge of the system remains up to date
  • Development and update of APAC operational playbooks
  • Regular reviews of APAC Cyber Security policies and procedures
  • Contribute to the IT Security Permanent Control framework for implementation of policies and procedures in day-to-day business activities, such as the Control Plan
  • Reporting of all incidents according to the Incident Management System
  • Provide input to the APAC CISO for enhancing the Regional Information Security Strategy
  • Any other tasks within the GPI perimeter if and when required
  • Risk Management professional certification such as CISA or CISM
  • Experience in managing a small team of technical staff
  • Understanding and experience in the Finance industry is an advantage
120

IT Security Analyst Intern Resume Examples & Samples

  • Assist with program administration for security projects that deal with network infrastructure
  • Assist Security Engineers and Analysts with the implementation of Web Application Security initiatives
  • Assist with the delivery of various security awareness training initiatives at the organization
  • Assist with general office work
  • An IT focused degree, IT Security or IT Development preferred
  • Willingness to help with a variety of programs and tasks
  • Well organized and self-motivated
  • Willingness to collaborate with staff and other interns
  • Comfortable in diverse settings
  • Prefer college juniors, seniors, or graduates
  • Broad experience with IT Security programs
  • Training in office management skills, program administration, presentation delivery and writing
121

Nexperia IT Security Analyst Resume Examples & Samples

  • This role will report to the Head of Information Security/Data Privacy and will be responsible for the operational security of Nexperia IT
  • Providing communication and business engagement support for information security awareness and training
  • Providing security support to IT projects
  • Assisting with security impact assessments
  • Drafting high level and detailed security awareness requirements
  • Reviewing conceptual, logical and physical solution designs
  • Assisting with vulnerability assessments, penetration tests and risk remediation
  • Drafting response to customer security RFIs & Security questionnaires
  • Evaluating technology products and solutions
122

IT Security Intern Resume Examples & Samples

  • Exposure to/coursework in managing network and system vulnerability process, monitoring security event alerts
  • Exposure to/coursework in the following information security technologies, such as: IDS/IPS, malware prevention, database activity monitoring, secure password repository, multi-factor authentication, SIEM, SPAM prevention, web content filtering, IdM/IAM, encryption and encryption key management, DLP, change detection
  • Exposure to/coursework in technical understanding of TCP/IP traffic including familiarity with major application-layer protocols such as HTTP, HTTPS, FTP, SFTP, FTPS, SMTP, DNS, etc
  • Exposure to/coursework of network and application attacks: examples include DoS/DDoS, buffer overflows, SQL injection, reconnaissance scanning, and evasive methods attackers use to avoid detection; must be able to demonstrate a minimum level of familiarity with well-known vulnerabilities and exploits
  • Basic knowledge of IT security concepts
123

IT Security Expert Resume Examples & Samples

  • You will be IT Security expert for international Railway Turnkey Projects in Berlin
  • You will be responsible for developing the IT system & solution requirements of based on the technical specification, the country-specific legal basis as well as applicable standards
  • You will be responsible of Product & Solution Security Classifications, Security Concepts, Threat and Risk Analysis (PSS TRA), Security Plan as well as IT safety related application guidelines for the turnkey project
  • You will optimize the system architecture in cooperation with System Engineering in regard to IT security
  • You will take over the verification of the system requirement specification; assessment of IT security requirements
  • You will evaluate the technical solution in regard to IT security and compatibility to the overall project
  • You will develop and execute security verification tests e.g. penetration tests
  • You will define the security requirement of products & solutions of third party suppliers
  • You have a degree in computer science or electrical engineering
  • You have extensive professional experience in IT security with a broad knowledge of Software Architecture, Solution Engineering or Security Consultanting
  • You have good knowledge of centralized IT and cloud solutions are advantageous
  • You have work experience in international project teams
  • You are pro-active and have strong communication skills
  • Your communication skills and strong abilities in assertiveness are great
  • You are fluent in English
  • Due to the international orientation of the projects, mobility and willingness to travel is essential
  • You have an independent and a structured approach to work
124

IT Security Leader Identity & Access Management Resume Examples & Samples

  • Lead the implementation of an automated, streamlined access review process, inclusive of internal and external (ie. supplier, customer, JV, partner) accounts at all layers (application, database and server)
  • Leverage GE Digital shared service tools such as SailPoint, Access Certifier (Oracle Identity Analytics) to design and implement new account extraction and validation process
  • Drive compliance for all of Power to regulatory and internal policies, ie. Sarbanes Oxley (SOx), Highly Privileged Account Operating System (HPA OS) and ISO 27002
  • Develop strategy to migrate Power applications to contemporary platforms, ie. Cloud and Predix
  • Identify, analyze, and interpret trends or patterns in complex data sets
  • Become a subject matter expert in privileged access strategy on applications, databases, and servers
  • Drive improvements by continuously reviewing and analyzing existing access management processes and the related services/processes
  • Manage programs and assigned tasks to ensure dates and commitments are met by collaborating with GE Digital teams and GE Power P&Ls
  • Create and update process documents and instructions
  • Bachelor's Degree in Information Systems, Information Technology, Computer Science or related discipline from an accredited college or university
  • Minimum of 3 years of IT project management experience
  • Minimum of 3 years of IT project management experience in Security or Compliance
  • Knowledge / experience with identity, access management principles and / or technology (e.g. IDM, Domains, DBA roles, etc.)
  • Technical project / program management skills
  • Strong team player – collaborates well with others to solve problems and actively incorporates input from various sources
  • Strong scripting experience
  • Green Belt / Black Belt Certified or Quality training certification
  • Big 4, accounting, consulting, or CISA / CISM certification
125

Consultant, IT Security Resume Examples & Samples

  • Implementation and administration of network/system security hardware and software, enforcing the network/system security policy and complying with customer requirements such as security policy and regulation
  • Performing analysis of network security needs and contributes to design, integration, and installation of hardware and software
  • Maintaining and administering perimeter security systems such as firewalls and intrusion detection systems
  • Excellent knowledge of Security market with industry experience in either Government, Public Sector, Defense, Financial services, Manufacturing, Communications, Media and Entertainment, Transportation, Healthcare, Petrol chemical and energy, and etc
  • Proactive with ability to succeed in an dynamic environment
  • Proven experience in a Technical Consultancy / Sales Engineering position
  • Security background is essential, comfortable with concepts such as Phishing, malware, social engineering, DLP, and PII
  • Excellent knowledge of Networking and Security infrastructure devices and applications (e.g. Firewalls, IPS/IDS, VPN, SIEM, IP Networking, SPAN/TAP ports and etc)
126

IT Security Management Team Lead Resume Examples & Samples

  • Implementation of the Information Security Policy along with identifying potential risk, vulnerabilities and evaluating the effectiveness of security measures currently in place
  • Implementation of Management, Operational and Technical security controls to ensure the Confidentially, Integrity and Availability of IT services and data
  • Coordinating with multiple groups to analyze and investigate IT Security problems and issues that are unique to the enterprise desktop
  • Manage day to day operations, provide direction, instructions and guidance to team members
  • Knowledge and experience with Federal Mandates and Information Security standards including but not limited to user access controls, auditing, common operating systems and domain structures such as (Active Directory) for desktop system and associated vulnerabilities
  • Ability to perform complex IT security access controls for major security projects
  • Up-to-date on current and emerging security principles and practices
  • Information Systems Security Officer (ISSO) and Information Assurance (IA) training and experience (preferred)
  • Working knowledge of Active Directory is required
  • Knowledge of Remedy is required
  • Excellent customer service skills
  • Writing skills are a must. The applicant must be able to effectively maintain spelling and grammar standards while drafting and sending email correspondences
  • 1 year of working on the Vanguard 2.1 contract desired
  • Clearance - Top Secret Security Clearance
127

Global IT Security Security Operations Senior Manager Resume Examples & Samples

  • Responsible for leading the day-to-day IT Security operational activities. This includes the end-point security suite, firewalls, threat detection, security information and event monitoring (SIEM), and incident management
  • Responsible for setting the strategy/roadmap for the Global IT Security operational technologies used to protect Campbell systems
  • Advise on security issues impacting Campbell systems by identifying and mitigating IT security threats and vulnerabilities to Campbell's information systems
  • Develop and maintain the Global IT Security incident response (IR) processes, procedures and tools to support the enforcement of the company’s IR plan
  • Capture and report key security metrics to Senior IT management
128

Senior Mgr / Dep Director IT Security Resume Examples & Samples

  • Manage daily operations for security incident management, hunting activities, and rules development
  • Responsible to develop and maintain the GLOBALFOUNDRIES IT Security Incident Response policies, tools, and security controls. Manage and facilitate the incident management process to ensure successful integration with the other areas in IT security
  • Build a high performance Information Security Operations team. Builds and develops the technical talent of members of the team into a well-rounded team through implementing new ideas and improved processes. Bring industry best practices to develop metrics to trend growth for resource and staffing needs. Coordinate resources to support operational needs and build strong relationships with internal partners to effectively strengthen the delivery of this service
  • Demonstrate deep technical expertise. Oversees team in performing detailed investigations and analysis on security incidents
  • Responsible for vulnerability management program
  • Manage Information Security Operations for continuous improvement in our operational capabilities in handling security incidents and vulnerability management
  • Deliver Information Security Operational metrics
  • Utilize a structured and consistent framework for centralized coordination and tracking of all information security incidents within the enterprise for trending, incident analysis, correlation, and reporting of program metrics
  • Measure the effectiveness of the Incident Response program by developing short term metrics
  • Provides metrics on security operations to CISO
  • Performed similar role in other enterprise organizations
  • Familiar with security incident management framework
  • Experience in a Security Managed Service Provider environment is preferred
  • Bachelor’s Degree in Electrical Engineering, IT, Computer, or related Engineering discipline
  • Masters Degree in Electrical Engineering, IT, Computer, or related Engineering discipline
  • Passion for Cybersecurity
  • Eight or more years of relevant experiences in security with a minimum of two years in a SOC manager position
  • Excellent organization and interpersonal skills
  • Ability to adapt in a dynamic work environment and make independent decisions
  • Detail-oriented with a strong customer service focus
  • Working knowledge in the Semiconductor industry
  • Ability to work in a team environment and independently when needed
  • Highly motivated and positive
129

IT Security Intern Resume Examples & Samples

  • Participate in initiatives requirements meetings
  • Assist in the development and execution of a cyber security tabletop
  • Document the requirements using different techniques
  • Develop and manage PowerPoint decks for various risk and cyber leadership events
  • Document test scenarios and test cases for new security tools
  • Clearly articulate and document project requirements
  • Collaborate with business, security team, and other IT teams
  • Participate in and contribute to project status meetings
  • Escalating project and task concerns to Security Project Director
  • Pursuing a Bachelor’s/Master’s Degree in Computer Science, Information Technology, Management Information Systems, Information Science, Business or related area
  • Previous Business Analysis, Project Coordinator experience preferred
  • Minimum 3.0 GPA required
  • Committed to a full-time, 40 hr/week, extended internship from January – August
  • Proficient with MS Office including Word, Powerpoint, Visio and Outlook
  • General coding experience (Sharepoint, Java, .NET, etc)
  • Self motivated, organized and effective time management skills
  • Foundational analytical, research, critical-thinking, and reasoning skills
  • Committed to the work of the organization through our core values: integrity, customer focus, excellence and teamwork
  • Good interpersonal & consultative skills
  • Some knowledge of technology structures: networks, database, communications, internet
  • Basic understanding of regulatory mandates (i.e., GLBA, HIPAA, PCI, SOX, etc.)
130

IT Security Resume Examples & Samples

  • Must have strong understanding and experience in Information Security Risk Management of IT Infrastructure & Applications
  • Must Have Experience of Managing Internal / External Audits and Performing IT Security Review for Vendors , Data Center, Network Room etc
  • Must have experience in managing IT Security Projects
  • Must have strong Fundamental knowledge and Understanding of IT Security products like Firewall, IDS/IPS, SIEM, Anti-Malware Threat Discussion etc
  • Must have strong understanding of Vulnerability, Patch & Incident Management
  • Understand the fundamental concepts, principles and best practices of IT Security
  • Understanding of IT Security Requirements for Operating Systems (Windows and Unix flavors) and Database (Oracle, MSSQL, Sybase, MYSQL, DB2) platforms
  • Strong communication, presentation & technical writing/diagramming and spoken skills in English
  • Manage IT Security teams located in Multiple City to ensure the service across India
  • Must be able to handle clients in a confident, positive and responsive manner
131

IT Security Auditor Resume Examples & Samples

  • Prepare and conduct IT Security audits and coordinate friendly hacking activities on Siemens systems, products and services
  • Discuss on eye-to-eye level with security architects to challenge their assumptions and improve their solutions whenever possible
  • Design attack scenarios to jeopardize state-of-the-art technologies and prove if they are vulnerable
  • Drive pre-audit planning and perform analysis to ensure a baseline understanding of the IT landscape under the scope and the related processes and controls
  • Provide timely status updates to the engagement manager, ensure escalation of potential issues and actively seek clarification on engagement task requirements
  • Use analytical skills to identify root causes of findings and assist clients in developing improvement measures
  • Participate in closing meetings with management
  • Sponsor new IT Security related internal processes, tools and documentation improvements
  • Provide insight and conduct research on latest developments in IT security technologies and threats
  • Lead engagements reporting to high management
  • Coach Cybersecurity analysts and working students
  • Strong academic history (degree in IT, Computer Science,Engineering or other related fields)
  • At least 4-6 years of professional experience within Siemens or a related industry, or a ‘Big 4’ accounting firm in the fields of IT security audit, cyber security, penetration testing and / or development of industrial IT services and solutions
  • Willingness to learn about the latest trends in cybersecurity and keep up to date in a continuously challenging environment
  • Profound knowledge of some of the following:, cybersecurity, SAP security, SCADA, Web application testing, mobile security, IT general controls, data protection and information security requirements, industrial security controls, software development lifecycle, COBIT
  • Solid project management skills, with experience in working in multicultural environments
  • Good scripting and programming skills preferred but not required
  • Fluent in English and willingness to travel up to 70% - 80% of your time globally
  • Motivated, creative, proactive, innovative, communicative, with solid analytical skills
  • Certifications like OSCP, CEH, CISSP, CISA, CISM preferred but not required
132

Engr, IT Security Resume Examples & Samples

  • Review logs and events Frontier’s Endpoint Suite and investigate any anomalies
  • Process any policy changes needed to Frontier’s Endpoint Suite
  • Stay abreast of developments in the Information Technology industry specifically as they relate to Information Security
  • Maintain proper documentation for all products in Frontier’s Endpoint Security Suite
  • BS in Information Security, Computer Science, Information Technology with concentration in Security or 4 years’ experience in Information Technology field, with at least 2 years working in Information Security
  • Strong in-depth technical knowledge in information security with emphasis on anti-virus, DLP, NAC or MDM
  • Experience using Enterprise Anti-virus and DLP solutions in multi-site environment
  • Ability to deal with changing priorities and multi-task several projects
  • Security certifications, such as: CISSP, GIAC, Security+, etc… are a plus
  • Excellent presentation and communication skills
  • Excellent Technical and business writing skills
133

IT Security Intern Resume Examples & Samples

  • Providing direct support to IT staff for security related issues
  • Assisting in the development and implementation of security policies, procedures and projects
  • Security requirement gathering by evaluating business strategies; researching information security standards
  • Research and recommend the appropriate tools for security monitoring security; implement those tools and processes; and review data from those systems to ascertain risk or issues
  • Tracking and monitoring of system or network security incidents; Enforcing security policies and procedures and coordinating system security and vulnerability analyses and risk assessments
  • IP Address Blacklisting
  • Web Proxy Whitelisting
  • EDiscovery
134

IT Security Operations Administrator Resume Examples & Samples

  • Configure, support and maintain day-to-day operations of security tools
  • Monitor security consoles and remediate alerts as appropriate
  • Respond to, and remediate security incidents, malware infections, etc
  • Conduct security audits and provide recommendations to mitigate risks
  • Create and maintain security related policies, procedures, standards, and documentation as needed
  • Take action to maintain compliance to security standards and policy, escalate non-compliance in a timely and effective manner
  • Evaluate project initiation documents from the perspective of information security standards and practices
  • Maintain current configurations, carry out proper administration and support of information security systems including but not limited to: Content Engines, Intruder Detection, Prevention Systems implementations, anti-virus software, and patch management systems
  • Produce and maintain disaster recovery and business continuity work practices related to information security policies, procedures, processes and tools
  • Maintain current and relevant knowledge of common network, authentication and security protocols, such as SNMP, HTTP, HTTPS, SMTP, NTP, LDAP, KERBEROS, RADIUS and FTP
  • Participate in change management process meetings and working sessions
  • Define and enforce controlled access to corporate security zones as required
  • Participate as an effective contributor in CRH global and Oldcastle Inc, regional security working groups, conferences, programs of work and projects as required
  • Bachelor’s degree in Computer-related discipline; or equivalent professional experience, with 2+ years of IT Operational experience in large, distributed enterprise environments
  • CompTIA Security+, SSCP, or CISSP certifications desired
  • Experience with McAfee ePO a plus
  • Experience with Cisco CES, CWS, and AMP a plus
  • Experience with Qualys Vulnerability Mgt system a plus
  • Experience with a configuration manager tool such as SCCM a plus
  • Experience with forensics tools such as FTK Imager, CAINE, and Autopsy a plus
  • Knowledge of security protocols (L4-L7) such as SSL, HTTP, DNS, SMTP and IPSec
  • Security incident investigation experience
  • Demonstrated understanding of VPNs and remote access
  • Virus protection and content filtering knowledge
  • Experience with web application vulnerability scanning tools
  • Knowledge of encryption techniques and PKI infrastructure
  • Risk assessment, audit and accreditation process experience
  • Security policy knowledge and experience
  • Strong understanding of IT Security Management principles and practices
  • Demonstrated ability to exercise judgement and decision making
  • Specific Technical knowledge
  • Strong oral & written communication, listening and presentation skills
  • Demonstrated critical thinking, situational analysis and problem-solving skills and mindset
  • Ability to conduct research into security issues, standards, and products as required
  • Able to communicate with others by telephone and in person
  • Able to utilize a computer for word processing, email communication, and preparation of documents and presentations
  • The noise level in the work environment is usually quiet
  • The position will require work outside of normal business hours
135

Senior Director, IT Security Resume Examples & Samples

  • 10-12 years working experience in information technology, 5-7 years operating at a leadership/managerial level
  • Expert in IT Security frameworks, cybersecurity, access controls, systems controls & general IT Controls frameworks
  • Is familiar with the principles and practices involved in IT solution development, maintenance and IT service delivery
  • Has extensive technical understanding and the aptitude to remain up to date with IT security and controls practices plus emerging security threats and risks
  • Possesses comprehensive understanding of the business applications of IT
  • Possesses strong communications skills and an enterprise mindset
  • Domestic & International travel will be required – circumstances will vary based on requirements – Estimate 25%
136

IT Security Analyst Intern Resume Examples & Samples

  • To provide analytical reports on Security topics like Symantec, Microsoft patching, Application patching
  • To provide action plans to solve detected gaps
  • To provide trend reports to show the progress on implemented solutions
  • Communicate and assist our internal customers on all security related topics
  • Experience in IT Client support
  • Knowledge of Microsoft Windows client operating systems including XP, Vista, Windows 7
  • LANDesk Management Suite 8.8/9 Administration is an advantage
  • Scripting skills (Powershell, VBS) are an advantage
  • Microsoft Excel (Pivot, reports) is an advantage
137

Summer IT Security Intern Resume Examples & Samples

  • Maintain Security project updates
  • Monitor Security ticket request queue
  • IT Governance tasks
  • Pursuing a degree in Cybersecurity, Information Assurance, or Information Technology, with a focus on Cybersecurity
  • GPA of 3.3 or higher
  • Availability to work up to 40 hours per week
  • Strong technical and organizational skills in addition to excellent written and verbal communication skills
  • A high level of integrity, accuracy, dependability, enthusiasm, and confidentiality
  • Proficient in Microsoft Office applications (Excel, Word, and PowerPoint)
138

Student Assistant for our IT Security Team Resume Examples & Samples

  • Maintain, develop and automate our IT security systems
  • Assist with threat hunting
  • Handle incident response
  • Improve tasks in order to increase performance of SIEM and SOC
  • Participate in projects aimed at improving cyber security resiliency
  • Drive vulnerability and patch management improvements through automated reporting
  • Are passionate about IT security, preferably with relevant experience
  • Have a strong technical understanding and know how to communicate complex technical concepts to both IT and the business
  • Have knowledge and understanding of IT security architecture including network security and Identity & Access Management security concepts
  • Are motivated, self-driven and take ownership of your tasks
  • Have strong interpersonal, written and oral communication skills
  • Are probably studying within the field of computer science
  • Speak and write Danish and English fluently
139

IT Security Project Leader Resume Examples & Samples

  • Bachelors Degree and 6 or more years of experience in the Communications or Project Management area
  • High School Diploma or Equivalent and 8 or more years of experience in the Communications or Project Management area AND
  • Experience in strategic and operational consulting or business systems integration
  • Networking background
  • Adaptable and flexible to learn other technology
  • Project management experience is key, familiarity with project lifecycle and concepts, SDLC, Agile or Waterfall methodology
  • Requirements review experience, change management, and project planning
  • ITIL experience and knowledge preferred
  • Strong vendor management skills preferred
  • Managing Consultants preferred
  • In-depth, strong problem solving analytical skills
  • Insurance Industry Experience preferred
140

Director, IT Security Resume Examples & Samples

  • Partner closely with Facebook’s Information Security team to develop and implement a security roadmap for Facebook’s corporate systems, infrastructure and business applications based on company wide policies and best practices
  • Develop and maintain a threat model for Facebook's corporate infrastructure and internal systems
  • Collaborate with internal stakeholders to define and drive the security agenda for Facebook's corporate information security program
  • Partner with leaders across the company to ensure that corporate information security efforts receive appropriate prioritization and resources
  • Regularly provide the CISO, CIO and CFO with useful measurements of corporate security risks and an action plan to mitigate
  • 10+ years of technical management experience developing and leading large corporate information security programs, and proven ability to contribute at both strategic and operational levels
  • BS/MS in Computer Science or related field, or equivalent experience
  • Experience hiring, managing, and leading technical teams from the ground up
  • Must be able to develop and communicate information security strategies and architectures
  • Demonstrated ability on building solutions for a corporate culture such as Facebook’s
  • Knowledge of attacker life-cycles and strategies to inhibit attacker activity
  • Familiarity with control frameworks such as ISO 27001/2, NIST Cybersecurity Framework, and Center for Internet Security Controls for Effective Cyber Defense
141

IT Security Technical Lead Resume Examples & Samples

  • Experience of working in a customer facing support department
  • Knowledge & Experience of working within security standards PCI, ISO27001 etc
  • Knowledge of EU GDPR
  • Experience of vulnerability scan management
  • Knowledge of generic software development lifecycle processes
  • Demonstrable project management skills
  • Experience in a similar senior information security role
  • Experience of risk assessment and audit processes and techniques within information security
  • Experience with software and security architectures and an understanding of the principles of secure network design
  • Working knowledge of other IT control frameworks, such as ITIL
  • Ability to explain business principles of secure system designs in terms of business risk to senior stakeholders in order to develop strategies, proposals and controls
  • Demonstrate flexibility and be prepared to work across multiple concurrent tasks with varied responsibilities
  • Experience in a range of the following technologies
142

Digital It-security Operation Manager Resume Examples & Samples

  • Take responsibility for all run processes post project launches
  • Responsible for providing consistent reporting to showcase the current situation in support
  • Define the correct SLA’s for incidents and issues
  • Be the IT owner of the Change Request and Enhancements process
  • Responsible to implement global updates into Asia Pacific websites in the region
  • Define process to plan for support during peak periods for countries. E.g. a change freeze period
143

Digital It-security Operation Manager Resume Examples & Samples

  • Rapidly acquires new knowledge on IT solutions and keeps constantly updated of technological opportunities & market trends in his/her field
  • Organizes at his/her level the relevant transmission of the technical and/or project management skills and “know how” DECODES & INFLUENCES
  • Clarifies and simplifies technical concepts / solutions to facilitate action and decision making
  • Listens actively to his partners/clients, to decode needs, qualify them properly and transform them in relevant solutions
  • Takes change management and communication initiatives to facilitate the implementation of solutions and users’ satisfaction
  • Coaches, challenges and develops teams in a cross functional environment and/or matrixed organization
  • Manages efficient interactions with both internal and external contributors to win support
  • Manages methodology, timing, budget and resource allocation on projects (independently of the role within the organization)
  • Ability to interact with, and influence, senior managers and equally able to interact across all teams/levels and geographies
  • 10+ years’ experience in the IT industry with relevant infrastructure implementation and operation management experience in various systems platforms (Private/Public Cloud)
  • Experience with regional implementation and management of region-wide infrastructure, with particular emphasis on digital/private/public cloud experience
  • Strong vendor management and motivational skills, strong professional and time management
  • Strong communication skills and ability to communicate to varied audiences
  • Strong competency in project management processes
  • Ability to understand complex needs for idea definition of Digital (E-commence, Digital Marketing, CRM, Brand/Campaign websites)
  • BA/BS in Computer Science, Computer Engineering or IS Management with relevant professional qualifications
  • Experience in the following areas: Traditional Data center/Public Cloud/Digital technical
  • Strong written and verbal communication skills with a good command of English (Mandarin is a plus)
  • Self-motivated and capable to work without much supervision
  • ITIL/PMP certification is preferred
  • Rich experience in FMCG/Internet industry is preferred
144

IT Security Intern Resume Examples & Samples

  • The intern will analyze information and create presentations for internal and external use
  • Working with substantial independence, the intern will analyze and review technology security requirements and analyze security technology to reduce risk
  • Support a broad range of other assignments with responsibility for recommending and implementing change in methods and procedures in addition to advising management on appropriate next steps
  • Special projects as needed
  • Working towards Bachelor’s Degree in Computer Science, Cyber Security or a related technical field
  • Strong qualitative and analytical skills
  • Security & Networking knowledge/interest
  • Excellent communication and presentation skills, both oral and written
  • Knowledge of enterprise, network, system/end-point and security issues and risks
  • Must be able to prioritize tasks and manage multiple projects in a fast paced environment with minimal supervision
  • Ability to work independently as well as in a team environment and communicate with all levels of management
145

Summer Intern, IT Security Resume Examples & Samples

  • Work at the direction of the Security Manager to further the security architecture for the Company
  • Utilize various scripting languages to query log data and determine next steps
  • Assists with the enforcement of security policies and procedures by monitoring system activity
  • Reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls
  • Reviews Unix security data to ensure that access is appropriate and properly identified with an actual user
  • Reviews Windows security data to ensure that access is appropriate and properly identified with an actual user
  • Utilize various script options to ensure that logins to generic accounts are for approved purposes
  • Assists with the vulnerability management scans and prioritization of identified vulnerabilities
  • Work with users to ensure that appropriate security measures are in place
  • Currently enrolled in an undergraduate degree program from an accredited college or university focused in Computer Science, Information Systems, or other related field
  • Working knowledge of Microsoft Word, Project, Excel, Access, Visio
  • Strong understanding of systems including but not limited to Windows, Unix, Linux and Virtualization technologies
  • Working knowledge of network switches, routers and firewalls
  • Detailed knowledge of tools such as PowerShell, Python, SQL, Nmap, etc
  • Detailed knowledge of Windows, Red Hat Linux and Oracle Linux operating systems
146

Intern, IT Security Resume Examples & Samples

  • Formalize IRM engagement with Agile projects and continue to mature the assessments process
  • Strategy Planning Execution
  • Have a natural ability to be curious about risks, attacks, figure things out and be technical
  • Conduct research related to ESI and its clients
  • Perform data analysis and assist in data reporting as needed
  • Makes or assists in making oral or written presentations to management
  • Full-time student in an accredited 4 year college, graduate program or Pharm. D. Program; Preference given to students with 3.0 GPA or above
  • Proficiency with Microsoft Office Suite
  • Motivated self-starter; Excellent verbal and written communication skills; Attention to detail; Excellent analytical skills; Creative and resourceful; Strong business aptitude; Knowledge of the PBM or healthcare industry preferred; Dates of Internship are May 14th-Aug 3rd, 2017; Students must be available to work M-F 8am-5pm during this time frame
147

IT Security Admin Resume Examples & Samples

  • Performs special projects and participates as a technical advisor for a variety of ad-hoc information security and logical user access projects that will be dictated by current business and technological developments
  • Deploy, manage and maintain all security systems and their corresponding or associated software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus software
  • Design, perform, and/or oversee penetration testing of all systems in order to identify system vulnerabilities
  • Download and test new security software and/or technologies
  • Provide security support to end-users
  • Prior experience managing and maintaining information related to SOX audits
  • Knowledge of applicable practices and laws relating to data privacy and protection
  • Strong organizational skills and excellent attention to detail
  • Ability to effectively prioritize and execute tasks in a fast paced environment
  • Change oriented; actively generates process improvements, champions and drives change initiatives, confronts difficult circumstances in creative ways, balances multiple and competing priorities and executes accordingly
  • Demonstrated customer focus; evaluates decisions through the eyes of the customer, builds strong relationships, creates processes with customer viewpoint and partner with customers to help shape future initiatives
148

Working Student It-security for the Siemens Productcert Resume Examples & Samples

  • As a working student you will support us in the field of security analysis of software components through web-based research
  • You will furthermore provide support for the evaluation and classification of security vulnerabilities
  • Proposal of remediation strategies for vulnerabilities affecting software components used by Siemens will also be part of your tasks
  • You are currently studying Computer Science or a technical field of study and have already completed a minimum of 3 semesters
  • Strong analytical skills are required
  • You provide very good communication and interpersonal skills
  • Proficient English skills round off your profile
149

Director of IT Security Resume Examples & Samples

  • Determines the overall direction and strategy of the Information Security function in collaboration with the CIO and Corporate Leadership teams
  • Determines, builds and optimizes effective security and privacy governance to ensure complete security of organizational data
  • Creates a framework for roles and responsibilities relative to information ownership, classification, and protection
  • Facilitates security risk assessment and risk management processes
  • Develops and implements an end-to-end information security management system that aligns with Kiewit’s business model, risk profile, and existing compliance initiatives and efforts
  • Responsible for iterative application, infrastructure and 3rd party risk assessments
  • Analyze and improve upon existing security standards across the organization to remain current to the changing threat landscape
  • This role is accountable to maintain technical compliance to regulations and standards
  • Author or coordinate the development and maintenance of Information System Security Plan (ISSP), System Security Plan (SSP), Contingency Plan (CP), Continuity of Operations (COP), Disaster Recovery (DR) and Incident Response (IR) plans
  • Stay well-informed of technological advances and continuously research better ways to accomplish tasks, and integrate new security technologies
  • Educate Kiewit employees on security topics, policies, changes to regulations and their responsibilities
  • Senior executive presence, comfortable presenting and collaborating with Senior Leaders as a Business Advisor
  • Shows strong passion and ability for leading and developing individuals and teams
  • Experience managing team size of 5-20 people
  • 10 years general Information Technology experience
  • 5 years Information Security experience
150

Intern, IT Security & Digital Forensics Resume Examples & Samples

  • Low/Informational severity incidents
  • Countermeasure monitoring and reporting coverage
  • Server monitoring and reporting coverage
  • Statistical analysis of incident data
  • Review Data Loss Prevention (DLP) incidents
  • Review daily intel feeds to and apprise the team of major changes
  • Splunk intel application assessments
  • Collaborate with other functional areas on various projects as needed
151

IT Security Operations Lead Resume Examples & Samples

  • Overall responsibility for understanding and leading operational aspects of all Information Security applications/systems (Network ATP, IPS/IDS/Content Filtering, Email Filtering, Endpoint Protection, Decoys and others as deemed in scope of global IT Security)
  • Establish, maintain, and enforce all operational processes, standards, procedures and practices such as incident/problem management, change control process, minor enhancement process, major incident processes based on ITIL in a global 24x7 environment
  • Provide project management for minor projects and initiatives as it pertains to operational effectiveness. May act as designated Project Manager of various projects as needed
  • Troubleshoot and identify sources of problems related to IT security
  • Manage service vendors for break/fix (including dispatch, collaborative troubleshooting and problem resolution)
  • Coordinates cross functional teams to resolve chronic problems
  • Responsible for understanding and reviewing action plans for planned and unplanned changes related to the global applications portfolio
  • Must have analytical skills and the ability to work in a diverse team environment exchanging ideas and information with Developers, Team Leads, Project Managers, and user community
  • Oversight for all Information security Change Control activities
  • Reviews daily/monthly/quarterly operational reports to identify trending issues/gaps, capacity issues/risks. Documents findings and escalates and/or engages the appropriate resources to take action
  • Facilitates meetings with technology and business teams, and vendors to obtain feedback on performance and capacity resolutions, workarounds, and enhancements to ensure that performance or capacity issues are being addressed in a timely manner
  • Develop, maintain, and report relative metrics related to Information Security Operations
  • Provide overall support for quality compliance, SOPs, audit activities, and SOX activities
  • Assures the viability, functionality and effectiveness of essential support tools (e.g., ServiceNow, SIEM, etc)
  • Take a leadership role in developing and maintaining productive relationships and key clients, stakeholders and technology partners to facilitate cross organizational communications and transparency
  • Strong coordination with various Novelis teams and partners (i.e. global applications COE, architecture team, infrastructure team, regional IT leaders, local IT leaders and business leaders as expected, Vendor partners)
  • Timely, clear, concise communication concerning issues and work status to respective individuals/teams
  • Bachelor degree in Computer Science or Information Technology with some specialization around Information Security
  • 5-10+ years of hands on experience within Information Security
  • Expertise with Access Management tools (Active Directory, IAM tools, etc…)
  • Expertise with Network Security Tools (Intrusion Systems, Content Filtering, Firewalls, etc…)
  • Strong understanding of information security architecture and solutions
  • Strong understanding of key security compliance, including ISO 27000, SOX
  • CISSP and ITIL Certifications preferred
  • Ability to prioritize and meet tight deadlines
  • Ability to work with global oversight
  • Ability to work with IT technical resources across all Novelis and with external partners
  • Demonstrated ability to multi-task and manage indirect resources to project deliverables
  • Ability to communicate and interact in a global organization
152

IT Security Intern Resume Examples & Samples

  • Managing workstation anti-virus / anti-malware products
  • Assisting with compliance audit projects
  • Participating in analyzing and resolving IT security alerts
  • Providing assistance to Patterson employees and customers with system access
  • Assisting with penetration testing and vulnerability scanning actions
  • Currently enrolled in an accredited college or university as a freshman, sophomore, or junior
  • Ability to communicate effectively, both oral and written
  • Currently enrolled in a computer, business-related, or criminal justice degree program with the desire for a career in Information Technology Security
  • Ability to communicate on a technical level
153

IT Manager of IT Security Resume Examples & Samples

  • Primarily responsible for the ongoing service delivery, technology, and staff in the IT Security group, including the management and leadership of group staff, setting group priorities, and coordinating and reporting of group activities
  • Creates Security requirements and negotiates priority in partnership with peer IT organizations in the identification, assessment, and implementation of security solutions
  • In partnership with the Enterprise Architecture group provides senior technical leadership in the area of IT Security to ITS and the enterprise including being conversant with the future direction of security systems, impacts of the direction on the enterprise
  • Partners with General Counsel, Human Resources, and Internal Audit departments to align IT security policies, processes, and technologies with compliance, legislative, and human resource challenges. Collaborate with these and other areas to develop and manage an employee awareness training program
  • Recognizes, identifies, and escalates potential areas where existing IT Security policies, technologies, and procedures require change, or where new ones need to be developed, especially regarding future business expansion
  • Supports the development of the IT Security budget and is responsible for the administration and maintenance of the approved budget
  • Supports audit activities sponsored by internal, retained, or external audit areas. Responsible for the collection of documentation, retaining of documentation and execution of remediation plans as agreed to with the IT Management Team
  • Responsible for ensuring appropriate IT Security metrics are being monitored and trended, thresholds have been established, alerting solutions deployed and, periodic status reports provided to stakeholders for all critical systems within their specific area of responsibility
  • Serves as a source of IT Security documentation and standards to help direct the activities of the IT organization
  • BS or BA degree in computer science or related field
  • 5 - 7 years of IT Security experience
  • 2 years of supervisor experience is preferred
  • Ability to express complex technical concepts effectively, both verbally and in writing
  • Ability to work well with people from many different disciplines with varying degrees of technical experience
  • CISSP, GIAC, or equivalent designation preferred
154

IT Security Application Engineering Team Leader Resume Examples & Samples

  • Support the IT Services mission to consult and partner with the business to deliver optimized technology solutions to support the implementation of corporate strategic plans
  • Protect enterprise information, intellectual assets and business operations from accidental or intentional disruption, disclosure or destruction
  • Participate in the development of security architecture strategies
  • Identification of emerging needs and new security technologies
  • Provide leadership for security project planning and project management following defined project management methodology
  • Ensure effectiveness of security controls through maturing refinement of policies, procedures, standards, processes, technologies and services, including auditing these controls
  • Maintain effective methodologies for measuring performance of security controls
  • Monitor compliance with policies, standards and guidelines
  • Assist in the developing and maintaining policies and procedures necessary to ensure compliance with applicable standards and regulations (e.g. NERC CIP, Sarbanes Oxley)
  • Provide security consulting to business clients and IT Services ensuring alignment of group activities with department, business unit and company strategies and objectives
  • Provide security awareness and education
  • Provide incident response leadership
  • Support disaster avoidance and recovery policies and plans for security architectures, conduct periodic testing of plans and report on plan effectiveness
  • Interface with corporate leadership on personal and confidential security matters
  • Ensure cost-effective utilization of IT and corporate IT assets
  • Manage spending within budget targets
  • Develops team members that take ownership for resolving problems, embraces root cause analysis and quick problem resolution
  • Fosters a cross-functional approach to resource allocation and management
  • Candidates must possess a Bachelor’s Degree in Information Security, Information Systems, Information Technology, Business or other related technical field
  • Minimum of 5 years’ experience in information technology field. Supervisory experience leading others is preferred
  • Demonstrated leadership skills, coaching and development of others
  • Experience leading implementation of technology initiatives; including planning, visioning, and execution
  • Experience leading projects using formal project management tools and methodologies
  • Experience with information security program focused on NERC CIP and Sarbanes Oxley compliance
  • Understanding of IT security concepts including, defense in depth, least privilege, access control, prevention, detection, vulnerability risk and threat and incident response
  • Understanding of IT security technologies including, network security, user authentication, firewalls, intrusion prevention, advance persistent threat, data loss prevention, vulnerability scanning, endpoint protection, network protection, remote access, web filtering
155

Junior IT Security Analyst Resume Examples & Samples

  • Respond in a timely manner to information security incidents and/or loss or misuse of information assets and participate in investigations and remediation
  • Maintain assigned information protection related systems, ensuring proper operation and functionality
  • Create, update and maintain security policies, procedures and guidelines that are in compliance with Sparrow Health System policies and industry accepted information security guidelines
  • Bachelor's degree from accredited university in Computer Science (or related field) required and at least 2 years of related experience
  • Must have strong communication and teamwork skills; able to effectively collaborate with others to address complex and difficult issues/situations in a professional manner
  • Must be able to troubleshoot and resolve information security issues in an efficient and effective manner
  • Must be highly organized and have effective time management skills
  • Must have broad technical knowledge and experience to include one of the following areas: network devices, server operating systems (Windows/Unix), desktop operating systems, application system administration, application implementation and support
  • Must have medium level knowledge and experience on the following IT security categories: Network security, access control, vulnerability management, security policy and procedures, security tools, BCP/DRP, hardening, security monitoring and security compliance
156

Intern IT Security Resume Examples & Samples

  • Assist in developing an IT Security Awareness Program that would be included within New Employee Orientation, disbursed throughout official training platform, and Employee Handbook
  • Conduct Log Analysis and utilize current IT Security Tools for mitigation of threats
  • Assist in creating and storage of Security documentation via SharePoint
  • Conduct Security Risk and Vulnerability Assessments of the Boyd Gaming IT environments
  • Gain an understanding of Boyd IT Environment to participate and make suggestions on key security issues and resolutions
  • Draft initial Audit Responses and remediation implementation efforts
  • Learn basic project coordination and communication skills for small security projects
  • Schedule and participate in general IT meetings, and Security related meetings
  • Perform and participate in other IT Security tasks as assigned
  • Minimum age 21
  • Undergraduates must be entering their senior year
  • Be currently enrolled in an accredited college or university and obtaining a degree in Computer Science, Cyber Security, Software/Computer Engineering, or any STEM degree
  • Have at least a 3.0 GPA (be able to submit current transcript for verification purposes)
  • Students must receive school credit for completing an internship with the Company
  • Must have strong communication skills and proficiency in English (both oral and written)
  • Ability to communicate and interact with team members of all levels
  • Have proof of eligibility to work in the United States
  • Must be able to obtain and pay for any required licensing
  • Understanding of basic information security concepts Demonstrated analytical and problem solving skills
  • Familiarity with administration of Win7-10
  • Familiarity with DHCP, file sharing, TCP/IP, POP, SMTP, Active Directory
  • Any experience in PowerShell, Perl, Bash, Python, Java, or PHP coding
  • Experience with hardware, network cards, hard drives, laptops, troubleshooting both Windows/Linux
  • Current transcript (an unofficial transcript is acceptable)
  • Cover letter (no longer than 2 pages) that addresses the 3 following questions
  • What skills do you want to gain from this internship experience?
  • Tell us about some of your school involvements and how they relate to this position
  • What single quality attracted you to Boyd Gaming?
157

Associate Consultant, IT Security Resume Examples & Samples

  • The security engineer plays a key part in ensuring managed security services is rendered at the highest quality and standard. The individual will also be responsible for implementation and administration of network/system security hardware and software, enforcing the network/system security policy and complying with customer requirements such as security policy and regulation
  • Analysing, troubleshooting and correcting network problems remotely and on-site
  • Diploma in relevant fields (e.g. Engineering, computer science, data communication, and etc)
  • At least 2 years’ experience in IT Security or Post-sales engineering roles
  • Knowledge of Security market with industry experience in either Government, Public Sector, Defense, Financial services, Manufacturing, Communications, Media and Entertainment, Transportation, Healthcare, Petrol chemical and energy, and etc
  • Excellent knowledge of Networking and Security infrastructure devices and applications (eg. Firewalls, IPS/IDS, VPN, SIEM, IP Networking, SPAN/TAP ports and etc)
  • Ability to solve technical problems independently
  • Experienced network/system security engineer
  • Experience working in a sales environment, familiar with quotas, quarterly focus, reporting structures and standard operating procedures
  • Successful track record of IT security software and technology implementation in an enterprise/complex environment
  • Distinct ability to communicate technology effectively to individuals and management with varying degrees of expertise
  • Proven experience in a Technical Consultancy/Sales Engineering position
  • Relevant security certifications will be advantageous
  • Knowledge of IPS, Firewall, sandbox technologies
158

IT Security Operations Desk Analyst Resume Examples & Samples

  • At least 6 months experience in apply problem solving Techniques
  • At least 6 months experience in analyze or perform technical troubleshooting in Network Security Solutions
  • At least 6 months experience in understand Firewall Solutions and Device Applicability
  • Demonstrated Communication skills
  • At least 1 year experience in applying problem solving techniques
  • At least 1 year experience in analyzing or performing technical troubleshooting in Network Security Solutions
  • At least 6 Months experience in service desk / help desk
159

Director IT Security Resume Examples & Samples

  • Lead a team of global technical resources in designing, building and maintaining a robust Security infrastructure supporting all Mattel information systems and technologies
  • Drive innovative solutions based on evolving industry trends in security
  • Partner closely with GIT technical teams to ensure all new programs and projects have information security designed into the infrastructure
  • Mentor and coach technical team members to support professional learning and growth
  • As part of a global Mattel IT team, partner and network across teams to ensure consistent application of security solutions and architecture in delivering robust solutions
  • Manage capital and expense budgets to support growth in a disciplined manner
  • Creates an environment that thrives on continuous learning and creating innovative solutions for emerging challenges
  • Highly collaborative with internal IT teams, business colleagues and external partners
  • Emotional intelligence, demonstrates tact and diplomacy, team player
  • Demonstrates confidence, champions values, cool under pressure
  • Good communicator, oral and written
  • Builds and maintains relationships
  • Self-starter with the ability to take ownership and develop solutions with minimal guidance
  • Bachelor's Degree or equivalent degree in Computer Science, Software Engineering or related field
  • Minimum of 10 years of security technology execution with progressively increasing responsibilities
  • Proven track record of delivering enterprise scale security initiatives with high quality and adherence to timelines/budgets
  • Experience with direct accountability for delivering and maintaining a high-performing security infrastructure
  • Solid understanding of analytics and ability to drive business opportunities across channels based on effective use of relevant data
  • Practical experience in delivering security solutions across multiple platforms
  • Proven ability to lead large globally distributed teams in delivering high quality solutions ' through excellent technical analysis, design and problem solving skills
  • Solid written and oral business communications skills
  • CISSP, CISA, CISM or similar certifications
  • Knowledge of architecture, security systems administration, performance engineering of large scale, high performance installations
  • Experience with network technologies including: routers, switches, firewalls, IDS/IPS, VPN, and other security technologies
  • Experience with recognized SIEM, Vulnerability Scanners, Web Proxies and Secuirty Monitoring tools
  • Knowledge with Microsoft, Cisco, McAfee and cloud security helpful
  • Experience in endpoint security technologies including: personal firewalls, anti-virus, anti-malware, patch management solutions, HIDS/HIPS, hard disk encryption as well as any other relevant security technologies
  • Experience with implementing security technologies to ensure compliance with the following: Sarbanes-Oxley, PCI-DSS, NIST, and ISO-27001
160

IT Security Audit Manager Resume Examples & Samples

  • Bachelor's degree in business or information systems discipline
  • 5 years minimum information security and cyber-security audit experience
  • Certification in an audit and risk management discipline such as CPA, CIA, CISA, or CRISC
  • Candidates should be able to demonstrate experience and strong competency in
  • Master’s degree in information security or related discipline
  • Certification in a security discipline such as CISM, CISSP, CSXP, or CEH
  • Experience in information security or cyber-security operations and governance is a plus
  • Experience Performing technical testing (such as penetration testing), and evaluating technical testing results provided by security partners to identify issues, assess root cause, and recommend sound solutions
161

Student Assistant for our IT Security Team Resume Examples & Samples

  • Assist the business and IT in performing business impact assessments and risk assessments
  • Assist in advisory tasks on IT and information security and compliance issues
  • Maintain our intraweb site
  • Maintain the IT Disaster Recovery Plan
  • Evaluate internal IT controls performed by fellow colleagues in DONG Energy
  • Assist in facilitating the process of the IT department when being audited by both external and internal auditors
  • Assist in the process of evaluating external vendors
  • Handle ad hoc IT-security related assignments
  • Are passionate about IT security
  • Are studying a relevant bachelor’s or master’s degree within IT and preferably have some relevant experience within the area of IT security
  • Have a proactive attitude and a willingness to grow in the position
  • Are motivated, self-driven and can take ownership of your tasks
  • Have strong interpersonal, written, and oral communication skills
  • Speak and write English and Danish fluently
162

Healthcare IT Security Architect Resume Examples & Samples

  • Provide technical subject matter expertise to security leadership (CISO and ISM) to support security strategy development and assist the Information Security Manager in quantifying risks to assist the ISM and CISO in recommending which risks should be prioritized when setting security strategy
  • Maintain infrastructure and applications incident response plan, perform incident response and investigations, and consolidate incident data for analysis and reporting
  • Develop and maintain information security plan and secure configuration standards for applications and infrastructure
  • Perform Intrusion Detection System (IDS/HIDS) management, including system management and maintenance, and intrusion detection analysis and reporting
  • Perform data loss prevention management, including incident detection and remediation
  • Perform web security management, including content filtering system management, and acceptable use monitoring and identification
  • Hands-on security activities such as relocating security equipment during a move or being the “smart-hands” on site to support SOC troubleshooting activities of security equipment
  • Perform standard information security risk assessments and incident investigation support
  • Provide support related to processes used for data collection and standard data handling chain of custody procedures
  • Provide technical subject matter expertise on the capabilities and limitations of emerging threats in support of security product selections
  • Perform security review and security design direction for new implementation of applications and infrastructure, such as access controls and base configuration for server, desktop, and network device images to ensure appropriate security settings are configured
  • Act as point of contact for auditors for responses and clarifications on security related items, and ensure secure configuration standards audit and HIPAA compliance for new systems and upgrades
163

IT Security Services Account Manager Resume Examples & Samples

  • *This position requires working onsite daily in Plano, TX, and ability to obtain US Federal Public Trust Security Clearance (6C)
  • Provide oversight of service delivery processes, which may include incident management, problem management, request management, service level management, and configuration management
  • Resource coordination and technical resolution management
  • Manage customer communications at various levels during services engagements from tactical (incident based) to strategic (Global Account Management Strategies)
  • Ensure contractual service support requirements are understood and managed
  • Ensure effective communication and coordination of problem-solving efforts between support teams, account service personnel and customers
  • Collaborate with other team members to ensure consistency of delivery, adherence to standard practices, and continuous improvement
  • Present operational and service level reports and explains service level support available to internal or external customers
  • Administer and manage the configuration of process related tools, reporting tools, and associated technologies
  • Compile, analyze and report statistical data and trends relating to service level compliance and operational effectiveness
  • Provide training and mentoring for functional teams to ensure that process guidelines are understood and followed
  • Provide point of contact for process related questions or issues and facilitates process related meetings
164

IT Security Leader Resume Examples & Samples

  • Research the latest information technology security trends
  • Monitor Deloitte networks for security breaches and investigate violations when they occurs
  • Help to design, implement, and maintain IT security plan
  • Develop and direct implementation of security standards and best practices
  • Direct the installation and use of security tools (e.g., firewalls, data encryption), to protect sensitive information
  • Recommend security enhancements to IT Management
  • Ensure that IT security audits are conducted periodically or as needed (e.g., when a security breach occurs)
165

IT Security Service Manager Resume Examples & Samples

  • Experience and knowledge of change management principles, methodologies and tools
  • Assessing the overall organizational units affected by the change management system
  • Developing, implementing and defining change management strategy
  • Assessing the change management impact to the organization
  • In-depth knowledge of project management tools, approaches and phases of the project lifecycle
166

Director, IT Security Resume Examples & Samples

  • Assist in developing strategy, with long-term and short-term roadmaps, to ensure security is appropriately built into the Mylan technology landscape in alignment with information security's requirements
  • Provide technical IT security leadership across all of IT to ensure Mylan standards are designed, delivered and operated to meet information Security's requirements
  • Management of IT security engineers specializing in network, platform, identity and access management
  • Providing leadership and technical direction to all engineers and partners to ensure security is part of each engineer’s responsibility
  • Partnering with Information Security to define technology standards, designs and processes
  • Ensure all new technologies are effectively transitioned into our outsource partners control with proper training to operate and maintain technology
  • Minimum of a Bachelor's degree in IT, MIS, Information Security, or equivalent. A master’s degree is preferred. A minimum of 8 years of Information Security Industry experience and 2 years of experience in Information Security Management. However, a combination of experience and/or education will be taken into consideration
  • CISSP, Cisco CCNP or CCNA, CISM or CISA are highly preferred but not required
  • Experience in large, global organizations with various security and compliance regulation and requirements: IT Security best practices, M&A Experience, Management of internal and external IT Security build teams, Integration with Financial Management, and Executive Communications
  • Proficiency in speaking, comprehending, reading and writing English are required
167

Director IT Security Resume Examples & Samples

  • Bachelor's degree in Computer Science, Engineering, or related discipline. Equivalent experience is acceptable
  • At least 8 years of IT experience with a broad range of exposure to all aspects of business/system planning, analysis, and application development
  • At least 6 years of experience with information security concepts and practices with at least two years in a management capacity
  • Familiarity with multi-platform technology environments and their operational/security considerations
  • Proven experience successfully developing and implementing technology
  • Strong project management skills, with experience in managing resources to meet goals on simultaneous/multiple projects
  • Two to three years of retail industry experience in a technology role
  • Experience in data administration and security methods
  • CISSP, CISM or similar security certifications
168

IT Security Incident Response Analyst Resume Examples & Samples

  • Support assessment of IT risks and analysis potential mitigation strategies to reduce IT Security exposure (Use Cases, Scenarios)
  • Provide response to IT alerts, threats and incidents
  • Active operation of global SIEM and other supporting tools on daily basis
  • Detailed analyses of various security event sources (FW, IDS, PROXY, AD etc.)
  • Design and fine-tuning of scenarios covering identification, analysis and remediation
  • Increase awareness of IT Security Risk responsibilities within Novartis
  • Serve as a mentor for Level 1 IT Security Analysts
  • Master’s Degree or BA or BSc in Computer Science, Information Technology or related field
  • English - fluent
  • Certifications such as CISSP, Certified Incident Handler (GIAC), Certified Ethical Hacker (CEH) preferred
  • At least 4 years working in IT, of which at least 2 in the IT security field
  • Knowledge of IT Security Standards, Control Frameworks
  • Proven skills and experience in log analysis, incident investigations – including guidance for remediation
  • Effective interpersonal and organizational skills
169

Director of IT Security Resume Examples & Samples

  • Strong interpersonal communication skills, analytical abilities, detail focused, quality focused, and problem solving skills, as well as broad knowledge of business functions, information technologies, and security and compliance practice on a global level
  • A demonstrated ability to integrate various security, network and data protection technologies and controls into a cohesive solution that sufficiently mitigates risk
  • Bachelor’s degree in Information Technology or related technical field
  • CISSP or CISSP-ISSAP or similar security certificate required
  • A minimum of 12 years demonstrated experience in enterprise solutions and implementation of technology and process solutions to reduce the potential risk of data compromise and network viability
  • A minimum of 7-10 years of experience exclusively in IT & network security (network, application or data) experience
  • Proven working experience in building and maintaining security and network infrastructure; hands on experience in security systems, including firewalls, intrusion detection systems, anti-virus software, authentication systems, log management, content filtering, etc
  • Demonstrated experience in delivering comprehensive solutions for complex security issues on a global scale
  • 10-15 years of demonstrated experience in using industry standards, such as ISO/IEC 27001 and 27002, COBIT, TOGAF, CEH, GCIH, GPEN, GWAPT, CISM, CISA, CGEIT, or CRISC certifications
170

Princ Anlst IT Security Resume Examples & Samples

  • Experience with one or more security product sets from the following :Palo Alto, Checkpoint, Bluecoat, Arcsight, and Tenable
  • RSA SecurID experience
  • Troubleshooting and configuration abilities with excellent TCP/IP networking skills
  • Ability to address customer needs in a professional manner
171

IT Security Project Specialist Resume Examples & Samples

  • Proven IT Security subject matter expertise in approaches and technologies to support identified projects in job duties such as Active Directory, SolarWinds, Splunk, SSO, Cisco/Meraki, IT control design, anti-virus, vulnerability scanning, Linux, etc
  • Proven project coordination/management skills including capability to clearly articulate project roles and responsibilities, strong interpersonal skills to drive project completion in a matrixed environment and reporting
  • Ability to coordinate internal resources and third parties/vendors for the successful execution of projects
  • Ability to develop product or service specifications and conduct analysis and research of solution options and recommendations
  • Comfortable working on a deadline
  • Knowledge of appropriate verification techniques to manage changes in project scope, schedule and costs
  • General familiarity with security tools such as Nessus, Snort, McAfee, Qualys, Nexpose, MBSA, etc
  • Solid educational background, preferably in the fields of computer science, IT Security or engineering for technical project managers
  • Designations such as PMP, CISSP, CISA, CISM
  • Solid grasp of leading information security standards including ISO 27002, OWASP, NIST 800-53r4, HIPAA and SANS Critical Security Controls
172

Senior Principal IT Security Analyst Resume Examples & Samples

  • Subject Matter Expert (SME) within the Threat & Vulnerability Management team for vulnerability assessment methods, architecture, processes and tools
  • Review and assess vulnerabilities on target systems for impact to company security posture and policy compliance
  • Coordinate remediation with business and system owners
  • Deliver measurements and reporting on the performance of the monitoring/scanning service
  • Provide weekly status reports and tracking of all assigned projects
  • Support client facing / end user help desk and other IT Support Team escalations 24x7 for emerging threats and vulnerabilities
  • Responsible for maintaining service OLAs and SLAs and meeting all schedules
  • Ensuring service tickets are fully updated with the most current data. Provide proper escalations and hand-offs to management and support staff
  • Provide backup support, training and mentoring on all team supported security technologies and services
  • Candidate will need to become familiar with all Symantec's security policies and standards and the Symantec change control environment
  • Ensure that the operations teams keep all standards, procedures, run books and topology / data flow drawings for each solution up-to-date and current
  • Achieve Certifications and/or continued training to stay current in technologies and skills relevant to job responsibilities
  • Candidate willing to rotate 24x7 on-call duties
  • Hands on operational experience performing and evaluating vulnerability scans with Qualys, Trustwave App Scanner, Fortify SCA or comparable tools
  • Any experience with IBM AppScan, Burpsuite, Acunetix Web Security Scanner, Nessus, Paros, WebScarab, Kali Linux, Metasploit is a plus
  • Candidate must have strong analytical skills and willing to defend corporate security practices
  • Candidate must have 5+ years of experience working in vulnerability management
  • Candidate must have working knowledge of network concepts, protocols, services, tools, and architecture
  • Candidate must have working knowledge of Windows and Unix Operating Systems
  • Candidate must have working knowledge of SSL/TLS and best practice configurations
  • Understanding of OWASP Top 10, CVE, and CVSS scoring
  • Software/Application development experience is a plus
  • Understanding of policy compliance and best practice standards/frameworks
  • Understanding of patch management tools and their limitations
  • Solid understanding of PCI Scanning, standards, and report attestations
  • Required IT Security certifications at least one of the following: CISSP, CISM, CISA, SANS GIAC, Security+
  • Additional IT certifications such as ITIL, CASS, CCSK, CCSP, CEH, etc. are a plus
  • Candidate must be team oriented, self-motivated, and able to work without supervision
  • Travel requirements <=25% that would include GSO all hands meetings, team offsite meetings, training and client facing presentations
173

Senior Principal IT Security Analyst Resume Examples & Samples

  • Administer and maintain Network Security management tools
  • Understand and apply network security principles to include mitigation options and strategies both technology and policy based
  • Support client facing / end user help desk and other IT Support Team's escalations 24x7 for emergency security review and approval
  • Hands on operational experience with network gear such as routers switches and firewalls a plus
  • Candidate must have working knowledge of network security concepts, protocols, services, tools, and architecture
  • Understanding of network gear configuration best practices to enforce security policies
  • Additional Vendor - Product Certifications such as CCNA, CCNP, CCNP Security, JNCIA, JNCIS-SEC or similar, are a plus
  • Hands on experience administering network security tools such as RedSeal, Firemon, Skybox is highly desired
174

IT Security Analyst Iv-racf Administration Resume Examples & Samples

  • Develops and manages security for business units across the enterprise to prevent hackers from compromising company systems and information
  • Enforces security policies and procedures by administering and monitoring security profiles; reviews security violation reports; investigates possible security exceptions; and updates, maintains, and documents security controls
  • Performs other related duties as assigned
  • Knowledge of BKFS’ business environment and the ability to evaluate information security risk implications
  • Advanced knowledge of RACF administration required
  • Ability to write JCL required
  • Experience with TSO/ISPF required
  • Ability to develop partnership-oriented relationships with business executives and functional leaders, especially as it relates to operations and technology
175

IT Security Graduate Specialist Resume Examples & Samples

  • Actively participate in Security projects
  • Provide advice to IBM, business partners and customers teams
  • Provide technical pre-sales support to various entities for the purpose of promoting and selling products/services. Entities include: potential customers, existing customers, partners, and resellers. Pre-sales activities will also include close interaction with internal groups such as product management, marketing, R&D and post sales support
  • Provide technical leadership to enterprise customers through a range of pre sales support functions including, supporting product evaluations, pre-sales technical consultation, post-sales support advocacy, and proactive needs analysis
  • Deliver technical presentations tailored for technical and non-technical audiences ranging from Firewall admins to executive and C-Level
  • Deliver consistent product training, technology updates, release updates, and roadmap information
  • Responsible for managing and improving scoping within Context, working with operations and assigning projects where necessary to the best placed Consultant to perform scoping
  • Represent IBM Security at conferences and events
  • Provide technical training to the sales team and junior pre sales executives (if relevant)
  • Attend sales meetings to help win new business
  • Grow existing business through identifying new opportunities
  • Perform scoping for assurance projects where sales team require technical assistance
  • Provide assistance on large or complex proposals and RFP’s
  • Continued improvement of sales resources (methodologies, scoping materials, proposal templates, etc), working with designated sales service owners and Marketing Manager
  • Be a Subject Matter Expert (SME) and trusted advisor to our clients
  • Partner with clients to understand their business goals and make recommendations for solutions
  • Evangelize about new or emerging technologies
  • Participate in the design process working with other Engineers & Architects
  • Assist with proposal generation, bills of materials, scopes of work, presentations, RFPs, etc
  • Knowledge of Win\Linux administration
  • Basic knowledge of database administration
  • Good understanding of network protocol (TCP/IP) and network architecture
  • Understanding of risk management process
  • Understanding of application security threats and OWASP TOP10
  • Understanding of network security threats and network security technologies
  • Understanding of SIEM technologies
  • Understanding attack techniques
  • Must have proven team working skills balanced with ability to work alone
  • Ability to quickly assimilate technical and non-technical information
  • Desire to act proactively
  • Ability to deliver technical and sales presentations
  • Ukrainian: fluent
  • Russian: fluent
  • English: upper intermediate
176

IT Security Identity Specialist Resume Examples & Samples

  • Minimum of one year IT or IT security experience
  • Secondary Education Diploma
  • Desirable
177

IT Security SOC Engineer Resume Examples & Samples

  • Perform Incident Response functions for the SOC team to ensure incidents are handled appropriately to minimize risk and impact to the company
  • Analyze and process case work relating to computer security vulnerabilities, phishing, malware, and forensic investigations
  • Lead security incidents to ensure timely mitigation and remediation efforts are completed
  • Preserve, harvest, and process electronic data according to company policies and regulatory requirements. Participate in forensic investigations as required, to include the collection, preservation of electronic evidence, analysis, and creation of a final report
  • Evaluate, test and select security tools, evaluation products and control products
  • Assist with annual SOX, CIP and SOC assessment and related remediation efforts
  • Bachelor’s degree in Information Systems or a related technical field
  • A minimum of 5 years of experience in the field of information security. Strong working knowledge of information systems security standards and practices. Experience with one or more of the following: security monitoring, database security, policy and procedure, Active Directory, cryptography/PKI, application security assessments, risk assessments, security awareness, or related information security subject area
  • SANS Incident response training, degree in Information Security or security certification preferred
178

Manager, Global IT Security Resume Examples & Samples

  • The development of security standards across the organization
  • Lead project management activities associated with the implementation of hardware, software, and network configurations of new systems and/or upgrades (both local and global) including project planning, execution and closeout
  • Work with infrastructure teams and partner outsourced services in the development of SOPs and procedural documentation for the design, implementation, configuration, support and management of the Alkermes infrastructure services
  • Develop project plans and coordinate infrastructure activities with current infrastructure teams and outsourced partner services. Delegate tasks to internal/external resources and manage delivery of these tasks, in agreement with the site Infrastructure Manager
  • Work with the site Infrastructure Manager to manage relationships with external vendors, ensuring that the performance and provision of services are meeting expectations. Assist with the management of vendor resource allocations for specific projects/tasks
  • Build strong relationships with stakeholders (both internal and external to IT) to improve/implement IT infrastructure services
  • Act as a first point of contact for infrastructure requests, translating application requirements into server and network access requirements and planning/delegating delivery of these tasks in agreement with the site Infrastructure Manager
  • Facilitate knowledge sharing IT management, staff, and IT stakeholders. Ensure personnel are updated on the status of infrastructure initiatives, and that relevant instructions are provided on the operation, support and troubleshooting of the business critical solutions
  • Proactively engage in problem determination and decision making for all system problems. Coordinate both internal and external resources in problem resolution. Record and analyze problems to help prevent recurrence
  • Ensure that all aspects of work conform to agreed approved standards and set procedures
  • Participates in IT strategy planning and strategic/operational governance processes of the company as a member of the IT team
  • Perform review/approval of identified security risks across Alkermes infrastructure
  • BS/BA in Computer Science, IT, Information Systems, or equivalent experience
  • 5-7 years of experience working in a similar technical role
  • Strong understanding of IT security, risk, and compliance principles and governance thereof
  • Extensive experience in enterprise security architecture design
  • Extensive experience in enterprise security document creation
  • Experience in technical writing--primarily policies, procedures and training materials
  • Knowledge and experience with developing and managing IT controls
  • Experience generating reports, interpreting the data, and taking actions to drive improvements
  • Experience managing the performance of an outsourced partner
  • Experience in a GxP and/or regulated environment
  • Must have experience successfully managing direct reports
  • Knowledge of common IT industry and IT security standards (e.g. ISO 27001, 27002, NIST, COBIT, 21 CFR Part 11, ITIL)
179

IT Security Analyst, Specialist Resume Examples & Samples

  • Assists the Information Security staff in identifying, developing, implementing and maintaining vulnerability management processes across the organization to reduce risks, and limit exposure to liability in order to reduce financial loss to the organization
  • Maintains company firewall and utilizes applicable encryption methods
  • Resolves and/or performs follow through to resolve all information security issues and questions
  • Advanced intermediate decision-making and problem solving skills
  • Advanced verbal and written communication skills to technical and non-technical audiences of various levels in the organization
  • Knowledge and experience with vulnerability scanning solutions such as Qualys, Rapid7, Nexpose, and Tenable Nessus
  • Knowledge and experience with programming languages such as Python, Ruby, Perl, etc
180

Consultant, IT Security Resume Examples & Samples

  • Providing technical consulting and advice
  • Leading, validating/evaluating in the technical assessment and delivery of specific technical solutions to meet the technical requirements and specifications
  • Engaging in technical problem solving across multiple technologies
  • Participating in the project implementation and coordinate new installations, designs and migrations for technology solutions
  • Working with diverse teams to facilitate solutions
  • Degree in IT with 2 to 3 years of hands-on system integration experience in 2 or 3 of the major products, such as firewalls, Log management, RSA, IPS
  • 3 years of IT/Network experience
  • Knowledge in scripting
  • Ability to drive pursuits and engage in complex deals, matching outcomes to expectations
  • Ability to work easily with diverse and dynamic teams
181

IT Security Services Consultant Resume Examples & Samples

  • Participate with the customer in the strategic design process to translate security and business requirements into processes and systems; evaluate new / emerging security products and technologies and making recommendations to customer leadership in regards to the security posture impact on the organization
  • Manage and drive remediation efforts related to information security; remediation may be from incidents, penetration tests, vulnerability scans, internal/external audits and Critical Practice assessments
  • Identify information security weaknesses and/or gaps in the customer’s current operations and working with the customer to bring information security operations up to standards
  • Represent information security in delivery / operational meetings; conduct an information security operational review meetings with account (e.g., Customer Delivery Executive) and customer (e.g., CISO) key stakeholders with topics including information security status and performance
  • Review service management reports to ensure tickets (i.e., incidents, problems, requests, changes), related to information security, are being acknowledged, worked and Service Level Agreements are being met; providing direction on ticket remediation and ensuring remediation is complete
  • Conduct an ongoing security awareness program for Dell personnel supporting the customer ensuring individuals understand and are compliant with the relevant information security obligations in support of the customer; program should address relevant security topics and adequately provide guidance on security policies and supporting documentation
  • Cultivate trusted partner relationships with account and customer; keeping consistent and open dialogue to uncover issues, challenges, risks
  • Maintain an information security strategy (forward looking roadmap), for your customer, aligning services / portfolio components to the strategy
182

Principal IT Security Analyst Security Engineering Resume Examples & Samples

  • Must have a Bachelor’s Degree in Management Information Systems, Computer Science, Business, or other technical/analytical disciplines, or equivalent experience,
  • Must have at least five years of experience in IT security providing technical support/system administration for enterprise security tools such as file integrity monitoring software, web application firewalls, file encryption, data loss prevention, and host based intrusion detection/advanced persistent threat software,
  • Must have previous experience with project management, and technical documentation writing,
  • Must have excellent customer service skills and commitment to teamwork,
  • Must be flexible and able to handle stressful situations in a professional manner,
  • Must have strong analytical, problem-solving, and conceptual skills,
  • Must have some basic automation and scripting skills using batch, PowerShell, Python or other,
  • Must have basic knowledge of at least one of the following: PCI-DSS, SOX, HIPAA and/or TR-39 (TG-3) requirements
  • Must have excellent written and verbal communication skills with the ability to relate to all levels of Publix associates,
  • Must have the ability to resolve complex business and technical issues by making decisions using sound business judgment,
  • Must have a high degree of confidentiality, maturity, self-motivation, commitment, and integrity and,
  • Nine years of experience in IT security providing technical support/system administration for enterprise security tools such as file integrity monitoring software, web application firewalls, file encryption, data loss prevention, and host based intrusion detection/advanced persistent threat software,
  • Strong understanding of systems administration on Windows, Linux/Unix, operating systems – including secure configuration of these operating systems,
183

IT Security Analyst Security Engineering Resume Examples & Samples

  • Must have at least two years of experience in IT security providing technical support/system administration for enterprise security tools such as file integrity monitoring software, web application firewalls, file encryption, data loss prevention, and host based intrusion detection/advanced persistent threat software,
  • Must demonstrate ability to work under minimal supervision,
  • Must show enthusiasm, initiative, pride in work, and a commitment to Publix and our Mission
  • Continued education including additional or advanced degrees in analytical, technical, or business discipline,
  • Fire to six years of experience in IT security providing technical support/system administration for enterprise security tools such as file integrity monitoring software, web application firewalls, file encryption, data loss prevention, and host based intrusion detection/advanced persistent threat software,
  • Strong interpersonal and leadership skills including experience in organizing, planning, and executing large scale, cross functional efforts,
  • Experience in project management and leading projects to completion,
  • Automation and scripting skills using PowerShell, Python or other,
  • Strong understanding of networking infrastructure components and protocols,
  • One or more of the following certifications: Microsoft Certified Information Technology Professional (MCITP), Microsoft Certified Systems Engineer (MCSE), Security +, and/or Certified Information Systems Security Professional (CISSP), ISSAP/ISSEP/ISSMP concentration preferred
184

Avp-it Security Operations Resume Examples & Samples

  • Overseeing data security and privacy practice
  • Executing data security and privacy procedures
  • Maintaining Data Loss policies and infrastructure
  • Maintaining database security policies and infrastructure
  • Maintaining data masking processes and infrastructure
  • Review and respond to data security events
  • Coordinate data security event response with Information Risk teams
  • Provide metrics and reports as required by management
  • Serve as subject-matter expert and attend to internal customer requests
  • Identify and suggests roadmap for improving data security and privacy program
  • A minimum of 5 plus years in information security, preferably in financial industry
  • Have a deep understanding of data loss prevention practices
  • Have demonstrated experience with of Symantec Data Loss Prevention technologies
  • Have demonstrated experience with Data Masking requirements and processes
  • Have demonstrated experience with database security controls such as Guardium and Imperva
  • Have CISSP or other recognized security certifications
  • Demonstrated ability to manage IT projects
  • Be able to demonstrate database level encryption
  • Experience with encryption of information while traveling across networks
  • Ability to work with other functions to achieve security objectives
  • B.S in Information Technology or Information Security
  • 10 plus years in Information Technology experience with a minimum of 5 plus years in information security
185

IT Security Intern Resume Examples & Samples

  • Work on security awareness training program (administration of the training portal, communication, newsletters, posters, phishing testing, metrics, etc.)
  • Help with security incident response and analysis
  • Help on security/PMO projects and tasks
  • Must be enrolled in an accredited university and studying toward a degree
  • Prefer Computer Science, Math, Statistics, Computer Engineering, Management Information Systems, or other technical degrees with computer training
  • Ability to document using Microsoft Office, Excel, and Visio; need to be very proficient with Excel formulas, pivot tables, field/spreadsheet comparisons, etc
  • Detail oriented, good with numbers, responsible, trustworthy, careful, self-motivated
  • Must be able to work at least 15-20 hrs. a week in general but can be flexible due to school schedule
186

Architect IT Security Resume Examples & Samples

  • Strategizes, and defines consistent security architecture and technology solutions to address and align with Health System’s business goals, threat landscape and risk appetite
  • Works with Chief Information Security Office (CISO) and other architects to ensure threats and risk management consideration are part of security strategies and standards
  • Works with CISO to create models to evaluate and mitigate risk
  • Understands evolving business needs and technology capabilities to optimize approaches to information security
  • Builds high level security design, development and testing strategies. Works with vendors, business partners, team members and affiliated teams, as appropriate
  • Builds an engagement model that can be leveraged to augment security resources during times of high demand or projects requiring highly specialized knowledge
  • Prepares impact analysis, functional specifications and designs for technical architectures required to meet business and security objectives
  • Works with Domain and Solution Architects, provides consensus-based enterprise solutions that are secure, scalable, adaptable and aligned with changing business needs
  • Ensures adherence to security standards and policies. Identifies changes required to support future technology architectures
  • Participates in the development of policies, standards and guidelines that directs the selection, development, implementation, and use of Information Technology
  • Participates and represents IT Security Team in the Architecture Review Board
  • Performs related duties, as required
  • Minimum of five (5) years progressively responsible security, enterprise experience, required. Experience in healthcare, preferred
  • Professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials, preferred
  • Knowledge of common information security management frameworks, such as HITRUST, NIST and ISO 27001
  • Security experience across multiple technical domains including network, infrastructure, web, mobile applications and services and middleware
187

IT Security Event Management Analyst Resume Examples & Samples

  • *This position requires working onsite daily in Plano, TX
  • Assist incident response efforts
  • Support and participate in SOC engineering efforts such as tool integration, development of automation, scripts, testing of new tools and evaluation of new technologies
  • Perform real-time log analysis to provide network and data security for NTT Data Services clients, leveraging log correlation platforms
188

IT Security Services Client Consultant Resume Examples & Samples

  • Ensure the delivery of information security services to the customer is in compliance with the contract and is in compliance with any applicable standards and regulatory requirements (e.g., PCI, SOX, FISMA)
  • Identify, review and recommend information security improvements as they relate to the achievement of the customer’s business goals and objectives
  • Participate in internal and external audits for the customer (e.g., SOX, PCI) and coordinating information security services activities
189

Associate IT Security Analyst Resume Examples & Samples

  • Support the operation and improvement of the Information Security Program, as well as the identification and selection of future objectives for the Program to pursue
  • Oversee Information Security projects and initiatives and / or complete specific tasks related to Information Security projects and initiatives
  • Identify threats and risks to the confidentiality, integrity, and availability of data residing on TWG systems
  • Collaborate with SMEs to maintain an understanding of TWG systems and conduct tests to ensure they are integrated in a secure manner consistent with business objectives, organizational risk tolerance, and policies
  • Observe and interface-with user community to understand their security needs and propose or implement procedures to accommodate them
  • Maintain IT Security systems, and keep current any relevant documentation
  • Perform collection, monitoring and review of logs from systems
  • Conduct IT Data and Cyber Security awareness programs through presentation and education
  • Maintain the enterprise identity management platform, overseeing access requests and periodic access certifications
  • Satisfy compliance requests for auditors, customers, and other contacts
  • Bachelor’s degree in IT or related field
  • 1-2 years of experience working in Information Security
190

Consultant, IT Security Resume Examples & Samples

  • Responsible for discovering and exploiting vulnerabilities affecting Dell software and firmware
  • Communicates information security procedures to the business
  • Escalate issues to vendors, security team, and engineering through standard escalation processes
  • 5+ years direct or equivalent experience in areas of vulnerability research, exploit development, reverse engineering and fuzzing
  • Experience in vulnerability research, exploit development, reverse engineering and kernel debugging
  • Competency with any of the following tools: User and kernel-mode debuggers (WinDbg, OllyDbg/Immunity Debugger), IDA Pro, Hex-Rays, Visual Studio, Driver Verifier
  • Familiar with the Metasploit framework
191

IT Security Intern Resume Examples & Samples

  • Basic knowledge of department computer applications, systems and business processes
  • Basic knowledge of Information Security, Fraud, and/or business controls
  • Intermediate to advanced MS Excel, MS Word, MS PowerPoint
192

Student Assistant, IT Security Resume Examples & Samples

  • Collaborate internationally with experienced Accenture’s teams to solve assigned tasks
  • Provide support in relation with client work, for example in the following domains
  • Currently studying your Master’s degree and are a top performer
  • You have a strong interest in IT Security and a wish to develop this further
  • You have worked with programming and/or software development
  • Ability to work creatively and analytically with others to address complex problems
193

Lead Consultant IT Security Frankfurt Resume Examples & Samples

  • Lead different security projects in the EU in the following domains. The list is indicative and not comprehensive
  • Risk assessment, governance and compliance: Whilst knowledge of regulation is essential we will expect the candidate to understand the elements of risk management with experience in conducting risk assessment, gap analysis and risk mitigation exercise as part of past experiences
  • Knowledge of identity and access management: Candidate is expected to understand the domain of identity and access management. We welcome product agnostic views however in the field of identity and access management the knowledge is better demonstrated with product experience. We expect the candidate to have designed experience in identity and access management domain
  • The candidate is expected to understand software development life cycle stages and security processes and technologies involved within SDLC to ensure application security is bolted-in from the start
  • Professional certifications like CISM, CISSP, CSA, CISA ToGAF
194

Lead Consultant IT Security Resume Examples & Samples

  • View Security as an enabler to business and data protection. Today, Information Security is more embedded as a critical piece of enterprise risk management. As a result, IT security has matured into a new central role within the enterprise and opened the door for security positions requiring more of a business or product development orientation. We expect the candidate to know and demonstrate on how security can act as an enabler to the business and this knowledge is expected across different industry verticals or at least he is expected to demonstrate the knowledge in one of the industry verticals
  • Compliance and regulations: Federal laws and regulations including SOX, GLBA, FFIEC, FISMA mandate information security, auditing and data protection practices. These are expanding, increasing and sustaining long-term demand for specific security opportunities, We expect the candidate to understand these regulations and have hands on experience in implementing one of these regulations
  • Knowledge of enterprise architecture and role of security: Although not mandatory candidate is expected to understand security architecture concepts and standards with the likes of SABSA and ToGAF
  • Cloud and Infrastructure security: Candidate should have solid understanding of virtualization technologies and design and implemented security solutions in cloud, Candidate should have experience in handling security when migrating enterprise applications to cloud. The experience can range from data and application protection in cloud, partitioning and security zones in cloud instances, identity and access management for all cloud and hybrid environments, enterprise firewalls, proxy and intrusion prevention systems
  • High analytical skills
  • A high degree of initiative and flexibility
  • High customer orientation
195

Consultant, IT Security Resume Examples & Samples

  • Analyze network and host-based security logs to identify potential security threats
  • Industry Certifications such as CISSP, CISA, GCIA, GCIH, etc
  • 7+ years of experience with different aspects of Information Security including knowledge of network, web and platform technologies and secure application development methods
  • Ability to obtain required government clearances
  • Extensive knowledge of the Linux operating system
  • Strong understanding of TCP/IP protocol
  • Experience scripting and software automation (Python, Perl, Ruby)
  • Experience with some of the following types of technologies
  • College degree with an IT or Security focus
  • Experience with some of the following technologies is highly desirable
196

Project Lead-it Security Credentialing Resume Examples & Samples

  • Experience with ITIL, including change and release management practices
  • 5-7 years of experience managing and supporting information systems within the health care industry or industries which provide services to health care entities
  • Direct experience supporting Morrissey or other credentialing and privilege management systems
  • Demonstrable knowledge and experience implementing business continuity and disaster recovery practices
197

IT Security Resume Examples & Samples

  • CISSP, CIPP, CMP, APR or equivalent certification
  • BA, BS or other advanced degrees in Computer Science, English, the Law or other educational pursuits that demonstrates you care about communication and writing
  • 5+ years Information Security, business analysis, or related professional services consulting experience
  • Experience writing policies, standards, guidance and other authoritative documentation
  • Experience developing training content delivered through multiple modalities (e.g., print, web, video, classroom, etc.)
  • Experience presenting, training and facilitating groups in a workplace setting
198

Associate IT Security Analyst Resume Examples & Samples

  • Bachelor’s degree in Computer Science, Information Systems or an analytical discipline and/or equivalent experience
  • Understanding of Windows, and/or Linux/Unix, computing technologies and architectures – including secure configuration of these operating systems
  • Understanding of networking infrastructure components and protocols – including Firewall, IDS, A/V, Web Content Filtering and/or AV
  • Understanding of application and database security standards and their implementation
  • Must have strong interpersonal and leadership skills
  • 1 year of IT security or audit experience
  • Experience with centralized security event logging and monitoring solutions
  • Experience conducting security incident investigations
  • Experience with Microsoft Active Directory including a strong understanding of its capabilities and design
  • Experience with secure remote access technologies, including VPN, SSL, SSH, Citrix, DirectAccess, and/or multi-factor authentication mechanisms
  • Experience with Public Key Infrastructure (PKI) systems and encryption and key management security practices including X.509 and EMV certificates life cycle management
  • Experience conducting security assessments, vulnerability assessments, and penetration testing, including the analysis of results and coordinating action plans for remediation
  • Knowledge of regulatory compliance standards such as PCI, SOX, HIPAA and/or TR-39 (TG-3) requirements, and
  • Successful completion of one or more of the following certifications: CISSP, Security+, GIAC, or vendor specific certification
199

Consultant, IT Security Resume Examples & Samples

  • Develop and maintain incident response processes and procedures to support a unified response capability
  • Lead technical analysis of computer security incidents as it relates to malware, intrusion attempts, and system level log analysis
  • Coordinate incident response with the appropriate business functions
  • Provide security control enhancement recommendations based on security incident data and identified threat landscape
  • Identify additional areas for monitoring and logging to enhance visibility
  • Perform analysis on data streams and review structured reports to identify anomalies
  • Develop correlation rules, reports, and other content for implementation into deployed technologies
  • Build security utilities and tools for internal use by themselves or team to enhance efficiencies
  • Experience working in an incident response team
  • Deep technical understanding of web technologies, networking protocols, Microsoft Windows and Linux/Unix platforms and tools
  • Technical experience and familiarity with various types and techniques of cyber-attacks
  • Hands-on experience in building automated tools in Python, Ruby, PowerShell, Bash, Batch, C, or C++
  • Ability to think analytically and solve technical and business problems
  • Ability to analyze and distill relevant findings and determine root cause
  • Ability to conduct investigations on suspected compromised systems
200

Mgr IT Security Resume Examples & Samples

  • Bachelor’s Degree in Business Administration, Computer Science or related technology field, required
  • Minimum of five (5) years progressively responsible security experience, including management experience, required. Experience in a healthcare environment, HIPPA and HITRUST, preferred
  • Certified Information Systems Security Professional certification, preferred
201

IT Security Ananlyst Resume Examples & Samples

  • Proven ability to provide a high level of customer service
  • Demonstrated working knowledge in the (2) areas listed of the CISSP Common Body of Knowledge
  • Internal/External Contacts
  • Both email and voice communication within IT will be necessary to provide notification and status updates on events
  • Email and voice communication will be required to communicate with third parties for incident response
  • In isolated cases this role may be required to contact third parties for systems or software problem resolution
  • Are there any unusual physical conditions surrounding your work that can be considered disagreeable (such as heat, cold, wet, fumes, noise, etc.) and/or are you exposed to any accident and health hazards? If so, please give examples and occurrence frequency
  • On-call rotation required for 24x7 coverage
  • More than average keyboarding required for data entry and business communications
  • Additional Comments
  • Satisfactory performance in all Level I duties
  • 2 Demonstrate a satisfactory level of fundamental knowledge and understanding of the operational support and performance of documented routine tasks required to support technology and processes in the IT Security department
  • Demonstrate satisfactory verbal and written communication skills, team effort, and customer service skills with policyholder credit unions, co-workers and other parties
  • Demonstrate a satisfactory level of productivity, quality, creativity, and reliability in the performance of the work necessary to maintain operational excellence for IT Security systems and software
  • Demonstration of a commendable level of proficiency in all Level I job duties including quality of work, productivity, initiative and job knowledge as it relates to the performance of the work necessary to maintain operational excellence for IT Security systems and software
  • Demonstration of a commendable level of dependability, attendance, and contribution to team effort
  • Demonstration of a commendable level of verbal and written communications skills, creative skills, and customer service skills in operational support situations
  • Successful completion of professional certifications, training and professional experience and working knowledge in CISSP Common body of Knowledge and information security concepts as listed in the minimum requirements for Level II
  • Completion of at least 24 months at Level I or a comparable work experience
  • Completion of sufficient cross training in Level II work to indicate the ability to perform adequately at that level
  • Demonstration of the desire and capability to assume the more responsible duties of Level II
  • Satisfactory performance in all Level II duties
  • Demonstrate a satisfactory level of developed knowledge for the performance of the work necessary to maintain operational excellence for IT Security systems and software, to perform the tactical work necessary for the planning and control of IT Security systems and software, and for providing subject matter expertise for projects and technical consulting as needed
  • Demonstrate satisfactory verbal and written communication skills, team effort, and customer service skills with policyholder credit unions, co-workers, and other parties
  • Demonstrate a satisfactory level of productivity, quality, creativity, and reliability in providing operational support in the performance of documented routine tasks required to support technology and processes in the IT Security department
  • Demonstration of a commendable level of proficiency in all Level II job duties including quality of work, productivity, job knowledge, and initiative as it relates to providing operational support in the performance of documented routine tasks required to support technology and processes in the IT Security department
  • Demonstration of a commendable level of verbal and written communication skills, creative skills, and customer service skills in operational support duties, technical consulting and project participation situations
  • Successful completion of professional certifications, training and professional experience and working knowledge in CIPPS Common body of Knowledge and information security concepts as listed in the minimum requirements for Level III
  • Completion of at least 24 months years experience at Level II or comparable work experience
  • Completion of sufficient cross-training in Level III work to indicate the ability to perform adequately at that level
  • Demonstration of the desire and capability to assume the more responsible duties of Level III
  • Demonstrated leadership potential in working with Level I and Level II personnel
  • Satisfactory performance in all Level III job duties
  • 2 Demonstrate a satisfactory level of in-depth knowledge and understanding of performance of the tactical work necessary for the planning and control of IT Security systems and software, operational support and function as a subject matter expert for projects and technical consulting as required
  • Demonstrate a satisfactory level of verbal and written communications skills, team effort, and customer service skills with policyholder credit unions, co-workers, and other parties
  • Demonstrate a satisfactory level of productivity, quality, creativity, and reliability in providing the operational and tactical support required to support technology and processes in the IT Security department
  • Demonstrate a satisfactory level of leadership in assisting management in training and providing technical assistance to Level I and Level II personnel
  • Demonstration of a commendable level of proficiency in all Level III job duties including quality of work, productivity, job knowledge, and initiative as it relates to providing the operational and tactical support required to support technology and processes in the IT Security department
  • Successful completion of professional certifications, training and professional experience and working knowledge in CIPPS Common body of Knowledge and information security concepts as listed in the minimum requirements for Level IV
  • Completion of at least 24 months experience at Level III or comparable work experience
  • Completion of sufficient cross-training in Level IV work to indicate the ability to perform adequately at that level
  • Demonstration of the desire and capability to assume the more responsible duties of Level IV
  • Demonstrated leadership potential in working with Level I, Level II Level III personnel
202

IT Security Incident Response Analyst Resume Examples & Samples

  • Manages IT Security Incident Response life cycle (preparation; detection and analysis, containment, eradication and recovery; post-incident activity)
  • Ensures continuity in SOC leadership and succession planning and be available for coaching of staff in both functional and core competencies
  • Serves as a mentor and role model. Maintains the highest standards of professional conduct and behavior in dealings with staff, colleagues, customers and outside contacts
  • Cooperates with business partners in ensuring the IT Security solutions correspond to their business needs while being cost-efficient at the same time
203

IT Security Application Architect Resume Examples & Samples

  • Continuously improve and refine SAP’S IT Security architecture with a focus on business applications and orchestration
  • Provide security architectural guidance for SAP’s IT projects and teams to drive security improvements and changes into the organization
  • Support the continuous development of the Security strategy and its execution
  • Define, manage & derive IT security requirements and security reference architectures for the (business) application level
  • Provide professional advice to internal and external parties
  • Manage and drive the creation of mitigation plans and follow up their implementation
  • Manage & conduct internal and external IT security reviews and ensure effectiveness of such reviews
  • Graduate in Computer Science, Software engineering or equivalent
  • Strong communication skills in English and German are a requirement
  • Theoretical & practical knowledge in the area of IT Security
  • Good knowledge of SAP´s product technology and underlying security concepts
  • Good Knowledge on (secure) operations of IT systems and landscapes
  • Hands-on experience in the area of security hacking or penetration testing is a plus
  • Experience with SAP authorization concept, Roles and User administration
  • Knowledge in networking concepts (e.g. routing, IPv4/6, ...)
  • Good knowledge on IT infrastructure technologies, such as operating systems and network technologies
  • Knowledge of regulatory requirements for IT Security (e.g. ISO 27001, SOX) is a plus
  • Knowledge in software security (authentication mechanisms, cryptography, system and network security, security breaches…) is an advantage
  • At least 3-5 years professional experience in the field of Information Technology (preferably IT security)
204

IT Security Intern Resume Examples & Samples

  • Supports the development, implementation, and management of security policies and procedures to ensure they remain aligned with business objectives and meet regulatory requirements
  • Provides support with third party security risk assessments and IT audit, and provides tracking for findings and resolution.Responds to customer inquiries regarding company’s security practices
  • Assist in the development of training for CY2017 and Security Awareness Programs
  • Assist in the SOX ITGC Audit
  • Aids in the development of, and enforces and maintains NetScout’s Information Security controls, procedures, and standards; may participate in audits, as necessary
  • Provides project support for security function. This includes assisting with security design and preparing security documentation for internal process as well as internal/external audits and assessments
  • Perform additional duties and projects as assigned by management
  • Excellent verbal and written communication skills to develop positive relationships and effectively communicate with employees, customers, auditors, business partners, and all levels of management
  • Strong analytical, writing, and problem solving skills
205

IT Security Intern Resume Examples & Samples

  • Perform functions as a member of Product Security - Vulnerability Management Program
  • Perform vulnerability and penetration testing of software using provided tools/applications
  • Perform research in the area of vulnerability and penetration testing
  • Document vulnerability findings and remediation steps
  • Work with developers to implement remediation and track accordingly
  • Burp Suite
  • Knowledge of or ability to write code in python, .net or java programming language
  • Knowledge of vulnerability and penetration testing a plus
206

It-security Infrastructure Analyst Senior Resume Examples & Samples

  • Relevant Experience or Degree in: Computer Science, Information Technology or related field and/or the equivalent of training and experience
  • Typically Minimum 4 Years Relevant Exp
  • Experience in the implementation of secure enterprise size systems, network development and/or network operational environment, PCP/IP networking with knowledge of security practices, knowledge of Checkpoint firewalls, firewall clustering models and stateful failover, firewall operation and rule specification, IP routing principles and protocols, implementation of security techniques around internet facing services and Local Network Operation
  • Computer Science, Information Technology or related field and/or the equivalent of training and experience
  • Experience working with encryption products, understanding of network management tools and SNMP, security in IP environment, operation and configuration of networks multi-layer switches, intrusion prevention systems, proxies and applications, remote access service SSL/VPN, security equipment and network cabling to industry best practices, Windows and Unix server networking and knowledge of Radius and 802.1X 2 Factor Authentication
  • GCFW (GIAC Certified Firewall Analyst), CCNA (Cisco Certified Network Associate), CISSP (Certified Information Systems Security Professional)
  • Skills / Knowledge - A seasoned, experienced professional with a full understanding of area of specialization; resolves a wide range of issues in creative ways. This job is the fully qualified, career-oriented, journey-level position
  • Job Complexity - Works on problems of diverse scope where analysis of data requires evaluation of identifiable factors. Demonstrates good judgment in selecting methods and techniques for obtaining solutions. Networks with senior internal and external personnel in own area of expertise
  • Supervision - Normally receives little instruction on day-to-day work, general instructions on new assignments
  • Detail-Orientation - Delivers accurate and precise results; work meets or exceeds specifications
  • Problem Solving - Pinpoints potential trouble; seeks and implements standard and alternative solutions to problems
  • Adaptability - Deals with multiple, competing demands while demonstrating flexibility in adapting to change
207

IT Security Expert Resume Examples & Samples

  • Network Security / Firewalls / Daily operations
  • As a Team member, manage the status of assigned firewall tickets and perform modifications of firewall configurations and rule in compliance with approved firewall request forms & policies
  • Actively participating to business & infrastructure projects in order to provide firewall consultancy
  • Working with network service team, to setup new firewall rules and to troubleshoot problems when necessary
  • Responding to calls & requests from the monitoring teams and other internal customers to assist in troubleshooting level 1 and level 2 network/firewall issues
  • Ensuring policies and procedures for network security are implemented and enforced
  • Monitoring and managing ongoing health and capacity of firewall environments within multiple data centers
  • Maintain the tools used by the Team and its customers (Tufin…)
  • Assists on Forensics/Security Incidents investigations (exceptionally)
  • Daily Performance/Service Management
  • Network Security / Firewalls / Change
  • Work actively with local teams and global teams on the evolution of the Network from an IT Security perspective
  • Perform housekeeping activities and review the FW Rules in order to improve our Security and efficiency
  • Update/upgrade the tools used by the Team
  • Network Security / IDS-IPS
  • Work actively with the APAC Production Security teams in India on the IDS/IPS management
  • Troubleshooting problems when necessary
  • To actively coordinate and cooperate with other IT and IT Security teams ﴾local, global and regional) to ensure best IT Security practices and deliveries and a smooth interaction
  • Disaster Recovery Plan
  • To understand Asia Pacific various Business Continuity Management's roadmaps
  • To actively participate to Business Continuity Plan rehearsals
  • Controls & Procedures
  • To ensure that work is conducted adhering to compliance ﴾including firewall﴿, data protection ﴾customer & personal data and other regulatory requirements
  • To minimize operational risks and risks of fraud by implementing regular and sufficient controls related to his / her position
  • To escalate to his management and/or Operational Risks & Permanent Control any issues identified
  • Contribute to the Permanent Control framework for implementation of policies and procedures in day‐to‐day business activities, such as Control Plan/level 1 controls
  • Solid understanding and experience regarding Network Security and especially Firewalls
  • Understanding TCP/IP addressing and sub‐net masking
  • A good understanding of dynamic routing protocols and static routing, with the ability to perform network protocol analysis and raw data capture
  • Knowledge of IP networking and network security including Intrusion
  • Detection, DMZ, encryption, IPSec, PKI, VPNs, MPLS/VPN, Site to Site VPN tunnels, SSL/VPN, proxy services, and DNS
  • Must have strong analytical and problem‐solving skills and a solid understanding of how to troubleshoot connectivity and performance
  • Basic UNIX skills
  • 5 year experience in IT Security minimum
  • 1-3 year experience in Network minimum
  • Experience in a Production environment is appreciated
  • Experience in a multi-cultural environment is appreciated
  • CISSP or other Security certifications are appreciated
  • Curious and implicated in IT Security
208

Lead Consultant, IT Security Resume Examples & Samples

  • Provide technical consulting and advice
  • Lead, validate/evaluate in the technical assessment and delivery of specific technical solutions to meet the technical requirements and specifications
  • Engage in technical problem solving across multiple technologies
  • Participate in the project implementation and coordinate new installations, designs and migrations for technology solutions
  • Work with diverse teams to facilitate solutions
  • 2 to 3 years of hands-on system integration experience in 2 or 3 of the major products, such as firewalls, Log management, RSA or IPS
  • Preferably with IT and/or network experience
  • Good knowledge in scripting
  • Good interpersonal, communication, written and presentation skills
  • Comfortable working in a project based/client serving model
  • Work with diverse and dynamic teams
  • Work in a matrix management model
209

Jsog IT Security Resume Examples & Samples

  • Must be able to accurately communicate ideas in writing and verbal communication
  • Must comply with all “drug free workplace” requirements as mandated by directives issued by the appropriate federal contracting officer and the company, which requires drug testing for use of illegal drugs by employees in sensitive positions
  • Government security clearance may be required in the future
210

IT Security Principal / Analyst Resume Examples & Samples

  • Lead support of Global Systems related to Data Protection and Cyber Security: Data Loss Prevention, PGP Encryption, End-point Security, Load Balancer/Proxy, OS-hardening, and Mobile Device Management
  • Develop and refine security plans and procedures to proactively respond in securing IT systems
  • Provide Global Windows OS and Server Support : Application tuning and troubleshooting, OS security patch management, network security, account and network share management, new system implementations, and storage maintenance
  • Cross-functional support of Backup Infrastructure, Virtual Systems, Storage (SAN), Communications Systems (Exchange/Lync), MS SQL, and Active Directory environments
  • Provide 24x7 on-call escalation support for systems-related issues
  • Interface with both internal and external customers to support business related IT requirements
  • Provide secondary audio/video support for All-Hands, and Business Unit communication meetings
211

IT Security Monitoring & Response Analyst Resume Examples & Samples

  • Leverage dashboards or platform specific consoles / repositories and/or third party security services associated with security processes and tools to represent threats and vulnerabilities in the environment; perform instrumentation oversight of security tools and information security monitoring of systems that are operated by the IT organization
  • Continuously identify opportunities to expand the usage of security monitoring tools to improve the security of the environment, including detection, prevention and policy enforcement; identify gaps in the definition of security configuration for monitoring tools, including alerts, correlation rules, and reporting
  • Support related technologies and services; create and maintain system documentation for security tools; perform system health checks; create test scripts and support the upgrade of security tools; work on the implementation of related improvements
  • Maintain awareness of and act on relevant product / technical information on known issues, hot fixes and new releases
  • Stay abreast of the latest information security controls, practices, techniques and capabilities in the marketplace; conduct knowledge sharing sessions
  • Execute the processes and procedures supporting the tools and technologies that enable data loss prevention and related monitoring; implement related incident response activities
  • Three years of experience with End Point security infrastructure environment using tools such as Symantec End Point Security and DLP
  • Bachelor's degree from an accredited college/university or equivalent work experience
  • Understanding of network, desktop and server technologies, including experience with network intrusion methods, network containment, and segregation techniques and technologies such as Symantec (a.k.a. Vontu) Data Loss Prevention
  • Proficiency in End point Security Products (e.g. Symantec Products SEP, DLP, Encryption, SCSP, ePO NAS, etc.) and operating systems including Windows 7 and Windows 10
  • Proficiency in monitoring and defending attacks utilizing security technologies, including, advanced anti-malware solutions, network forensics, and visibility solutions
  • Ability to generate periodic reports from the Symantec products; US citizenship required
212

IT Security Analyst, Incident Response Resume Examples & Samples

  • Perform daily detect & respond functions, working closely with SOC processes
  • Accurate and timely routing of verified compromises to the appropriate IT operations teams for further analysis and follow through to remediation
  • Train and mentor staff as needed
  • Additional risk management activities as needed
  • Have an in-depth understanding in at least three of the following areas: Telecommunications, Network, and Internet Security; Operations Security; Risk and Compliance; Access Control Systems and Methodologies; Security Architectures and Models; Security Management Practices; Law Enforcement; Investigative techniques
  • Ability to define and communicate risk in business-relevant language
  • Ability to react to high pressure dynamically changing environments
213

IT Security Resume Examples & Samples

  • Must be mindful of HIPAA and "minimal necessary" when making changes to access
  • Will need to be on-call to assist with an emergency issues that should arise for OneChart (The Epic EMR)
  • Day to day support
  • Look for ways to reduce manual work
  • Where applicable ensure role-tables are updated so that future requests are automated
  • Participate in meetings and offer solutions
  • Follow all BH defined Epic standards, processes and techniques
  • Learn and apply the various templates that correspond with the OHS workflows or the BHS/FH workflows
  • Bachelor degree or equivalent combination of work experience and education
  • 3+ years experience working on in an Epic Security coordinator capacity or other similar role
  • Understands the workflow differences / requirements associated with Single Instance is a plus
  • Epic 2010 and higher
  • Experience with EMP, SER, LPR, E2R and other similar security-based INI's
  • Excellent Analytical and problem solving skills
  • Business Requirements skills
  • Epic non-programmer Chronicles certification a plus
  • Must be able to travel to Troy, Dearborn, Westland, Farmington Hills as required (home office will be in Troy)
  • Must be willing to be on call and carry a pager
  • Strong knowledge of HIPAA and other similar legislation
  • Great team player
  • Seeks new ways to doing the job more efficiently
  • Outgoing, sense of urgency, not afraid to ask questions, energetic and willingness to learn
  • Experience with the use of TEXT/Cache
  • Experience with system level settings
  • Experience with Nova
  • Epic Security Certified a plus
214

Dgm-it Security & Infrastructure Operations Resume Examples & Samples

  • End to End Management of Security service operations & delivery for other Services delivered for ITSSC from Bangalore on Cloud & Hosting Solution support
  • End-to-End accountability for service readiness and quality assurance in Service Transition for new services in the above referred areas. This includes ownership of the operational requirements catalogue, of the quality criteria for operational gates, and accountability for provision of operational impact and risk assessments
  • End-to-End accountability for service enablement, comprising all deliverables and activities required to ensure that all entities participating in delivery of a service during Service Operations are able to provide support, including staffing, training, access to systems and applications and to operational tools, access to and knowledge of documentation, test and acceptance of process interfaces
  • Ownership and responsibility for the Continuous Service Improvement process for relevant services
  • Overall IT infrastructure management
  • Handling large and multiple teams in different Infrastructure Domains
  • Excellent Knowledge of ITIL / ITSM Processes for Service Operations and Service Management & Service Transitioning skills
  • Budget and Cost Management
  • New Business management
  • Knowledge of Continual Improvement Quality tools Ex. Six Sigma
215

IT Security Documentation Coordinator Resume Examples & Samples

  • Understand eClinicalWorks responsibilities for ensuring the confidentiality of Protected Health Information and electronic Protected Health Information (PHI/ePHI) under HIPAA legislation and industry best practices
  • Understand technical aspects of how PHI/ePHI as well as company assets are protected within datacenters, networks, and physical company facilities
  • Stay current with changing legislation related to HIPAA / IT Security Standards as well as new techniques and technologies for protecting PHI and company assets
  • Analyze security-related questions submitted by clients or by prospective clients in order to respond professionally, with the required level of detail and accuracy, and within a timely fashion
  • Coordinate a comprehensive response from among the involved subject matter experts into a client-facing response
  • Work with internal departments and clients to ensure that proper documentation is received from the client prior to releasing information that is considered company-confidential
  • Confer with subject matter experts as needed to understand and respond to the client’s requirements for security information; coordinate all answers into a cohesive response
  • Write and edit security documentation regarding eClinicalWorks’ security policies and procedures in support of internal processes and client requirements for documentation
  • Complete all assignments according to set standards regarding order, clarity, conciseness, style, and terminology
  • Manage multiple assignments simultaneously, working independently and with others
  • Manage and co-ordinate internal team meetings, follow-ups and write meeting minutes
  • Manage tight deadlines appropriately to ensure the response sent to the client and all documentation is accurate, comprehensive, and received on time
  • Manage team tasks including but not limited to: document management, quiz and training creation, sending invites, building a knowledgebase
  • Manage vendor/partner related documents and follow-up on security documentation with vendors and customers
  • Follow up with teams as needed to obtain all information and work on other projects as assigned
  • Organize, type, format, publish, and distribute the response and/or documentation
  • A bachelor's degree
  • Technical knowledge: Understanding of IT & Security
  • Ability to write and edit policy and procedure documentation using standard English language writing conventions
  • Ability to assemble content and technical responses from subject matter experts, blending the answers into a single “voice”
  • Must have excellent verbal, writing, and editing skills
  • Must have excellent time-management, multi-tasking, and organizational skills
  • Must be flexible and have ability to interact with all levels of company and customer staff
  • Must be highly motivated and able to grasp complex technologies, tools, and knowledge and learn quickly
  • Must have a demonstrated ability to work well under pressure and within tight, non-negotiable deadlines
  • Must have strong computer skills using Microsoft Office Suite: Word, PowerPoint, Excel, and Outlook
  • Must have the ability to learn about industry regulations, HIPAA legislation, eClinicalWorks technology and security practices, etc
  • Must be able to organize ideas and be able to translate technical terms into content that any reader can understand
  • Ability to work a schedule that supports tight deadlines
216

IT Security Intern Resume Examples & Samples

  • Work with Information Security leads to establish target security profile for all monitored assets; define performance metrics and measure and report performance against established metrics on a regular basis
  • Manage process for reviewing security for CEB vendors, contractors, and other third-party service providers
  • Document service level agreements associated with monitoring and incident response functionality
  • Assist in the design, implementation, documentation, operation and maintenance of security functionality relative to a wide variety of business applications, IT platforms and environments
  • Proven documentation skills, including proficiency with the documentation and documentation maintenance for process work flow diagrams
  • Programming and/or scripting skills in C++, Python, Perl, PHP desired, but not required
  • Strong work ethic; willingness to work additional hours to meet business need and coordinate with colleagues globally
  • Strong interpersonal skills; ability to work successfully with both IT and non-IT colleagues
  • Excellent attention to detail; ability to manage multiple work streams and correctly prioritize
217

IT Security Services Transition Manager Resume Examples & Samples

  • *This position requires working onsite daily in Plano, TX, and ability to travel in domestic U.S. up to 25%
  • Complete information security transition projects within given constraints of scope, schedule, budget and quality through the duration of the project
  • Maintain current project status for information security tasks; communicating and interacting with project stakeholders on project status
  • Escalate issues to the Information Security Project Manager
  • Ensure all transition project documentation is kept up to date and communicated to relevant stakeholders on a timely basis
  • Participate in transition project related meetings and contributing as a security SME
  • Collaborate with service management to ensure the proper service management functionality for security services is completed
  • Maintain open communications among project participants and affected parties
  • Maintain strong focus on customer satisfaction by delivering exceptional project performance and predictable, repeatable project results
  • Assist account personnel in the specifications and procurement of security related equipment / products
  • Work through formal and informal channels to obtain information
  • Identify security weaknesses and/or gaps in current operations and working with stakeholders to bring programs up to standards as well as provide input to program timeline, costs, and implementation
  • Evaluate and defining risks associated with current and proposed technologies; brief customers and management on challenges with Information Security technology and practices
218

IT Security Cyber Defense Platform Management Team Member Resume Examples & Samples

  • Ongoing operations and tuning of cyber defense tools/services to defend the company, including in the areas of Anti-Virus, Client/Server Security, Anomaly Detection, Messaging Security, Web Security, Network Security, Application Security, and Security Incident Event Monitoring and Logging
  • Using cyber defense tools/services consistent with company policies and all applicable laws and regulations, without causing negative impact to IT and business operations
  • Develop recommendations for continuous improvement involving cyber defense tools/services Produce audience-specific written reports, presentations and briefings
  • Obtain, develop and maintain tools, scripts and documentation associated with cyber defense tools and those who leverage the tools, such as Incident Response personnel
  • Identifies, collects and analyzes information from various sources in order to use and prepare cyber defense tools/service to effectively defend the company
  • Provides guidance and assistance to peers in Cyber Defense functions, IT and/or business
  • Conducts industry research and technical evaluation of sources and vendor supplied intelligence--with specific emphasis on healthcare sector and advanced and sophisticated cyber tactics, techniques, and procedures for purposes of enhancing the effectiveness of cyber defense tools/services
  • Subject matter expert regarding ongoing tuning and operations of cyber defense tools/services
  • Aids in performing root cause analysis of incidents identified by third-party vendor, or internal systems and workforce. Once root cause is determined, proposes and participates in cross-departmental efforts, if required, to implement appropriate security enhancements, controls and solutions that will mitigate risk, as well as safeguard systems and data
  • Develops and maintains documentation regarding Cyber Defense Platform Management Team activities and procedures
  • Participates in the development of proposed design, configuration, and implementation of security architecture and engineering
  • 3 or more years of work experience in performing cyber defense tool operations, tuning and/or engineering
  • Experienced using cyber defense COTS and customizable tools and techniques
  • Strong technical knowledge of security tools and controls with specific demonstrated experience associated with threat detection, mitigation, and resolution of advanced cyberattacks and/or threats
  • Strong technical knowledge of security infrastructure including security firewalls, data loss prevention, encryption, and end point protection appliances
  • Ability to learn from mistakes and apply constructive feedback to improve performance
  • Ability to adapt to a rapidly changing environment and quickly identify new trends and industry changes specific to security and advanced cyberattacks
  • High critical thinking skills required to evaluate complex, multi-sourced security intelligence information for purposes enhancing operations, tuning and effectiveness of cyber defense tools/services
219

IT Security Investigations & Forensics Team Member Resume Examples & Samples

  • Plan, coordinate and conduct IT security-related investigations and forensics involving IT systems, infrastructure and applications and/or to assist other Corporate Functions such as Legal, HR, Privacy, etc, consistent with company policies and all applicable laws and regulations, without causing negative impact to IT and business operations
  • Utilize IT security investigation and forensic tools and techniques
  • Develop recommendations for mitigation and remediation based on investigative findings. Produce audience-specific written reports, presentations and briefings
  • Obtain, develop and maintain investigative and forensic testing tools, scripts and documentation
  • Identifies, collects and analyzes IT security-related evidence from various sources and analyzes to establish the identity and modus operandi of suspects and malicious users active in the computing environment or posing potential threats to the computing environment. Provides guidance and assistance to peers in Cyber Defense functions, IT and/or business
  • Conducts industry research and technical evaluation of sources and vendor supplied intelligence--with specific emphasis on healthcare sector and advanced and sophisticated cyber tactics, techniques, and procedures for purposes of investigations/forensics activities
  • Subject matter expert in investigations/forensics
  • Performs detailed investigations and reports, research and analysis of open source information for purposes of investigations/forensics activities
  • Develops and maintains documentation regarding investigations/forensics activities and procedures
  • Participates in the development of proposed design, configuration, and implementation of security incident/event monitoring and investigations/forensics architecture
  • Serve as a subject matter expert for team members regarding investigations/forensics
  • 5 or more years of work experience in role involving IT Security Investigations/Forensics in a corporate setting
  • Experienced using COTS and customizable investigations/forensics tools
  • In-depth knowledge of IT security investigations/forensics concepts, and principles and impact
  • Experience working and managing security vendor performance and service level agreements
  • Proven leadership abilities including effective knowledge sharing, conflict resolution, facilitation of open discussions, fairness and displaying appropriate levels of assertiveness
  • Proven ability to work under stress in emergencies with flexibility to handle multiple high pressure situations simultaneously
  • High critical thinking skills required to evaluate complex, multi-sourced security intelligence information for purposes of investigations/forensics
  • Security Certifications (e.g., CISSP)
220

IT Security Threat Intelligence Analyst Resume Examples & Samples

  • Identifies, collects and analyzes IT security-related threat data from various sources and analyzes security events to establish the identity and modus operandi of malicious users active in the computing environment or posing potential threats to the computing environment. Provides guidance and assistance to peers in Cyber Defense functions, IT and/or business
  • Conducts industry research and technical evaluation of all sources and vendor supplied intelligence--with specific emphasis on healthcare sector and advanced and sophisticated cyber tactics, techniques, and procedures
  • Subject matter expert in the detection and identification of cyber attack signatures, tactics, techniques and procedures associated with advanced threats
  • Performs assessments and development of cyber threat profiles of current events based on collection, research and analysis of open source information
  • Performs root cause analysis of monitoring alerts and threats identified by third-party vendor, or internal systems and workforce. Once root cause is determined, proposes and participates in cross-departmental efforts, if required, to implement appropriate security controls and solutions that will mitigate risk and vulnerabilities, as well as safeguard systems and data
  • Prepares detailed audience-specific technical papers, presentations, recommendations, and findings
  • Develops and maintains documentation for security threat intelligence monitoring and analysis procedures
  • Participates in the development of proposed design, configuration, and implementation of threat-related monitoring architecture
  • Serve as a subject matter expert for team members, specializing in IT security threat-related space
  • 5 or more years of work experience in IT Security
  • Strong technical knowledge regarding Windows and Linux operating systems, and, secure hardening configurations; application and web application security; database security; network security
  • Strong technical knowledge of security tools and controls with specific demonstrated experience associated with threat detection, mitigation, and resolution of advanced cyber attacks and/or threats
  • In-depth knowledge of information threat analysis and detection concepts and principles and impact
  • Strong customer focus with ability to manage customer expectations and experience and build long-term relationships
  • Ability to adapt to a rapidly changing environment and quickly identify new trends and industry changes specific to security and advanced cyber attacks
  • High critical thinking skills required to evaluate complex, multi-sourced security intelligence information, analyze and confirm root cause, and help to identify mitigation alternatives and solutions that safeguard our technical environment
221

IT Security Incident Response Analyst Resume Examples & Samples

  • IT security incident and vulnerability response and escalations
  • Detection and escalation of account privilege abuse
  • IT Security process improvement and documentation including roadmaps and runbooks
  • IT Security risk and audit analysis including metric reporting
  • Must have a be open to schedule changes and working non business hours
  • A degree in Computer Science or Engineering or related field with a minimum of 4 years dedicated to IT, IT security, and/or security infrastructure experience OR a combination of equivalent work experience and education
  • Certifications which demonstrate baseline competency in the areas of IT Security or related filed (CISSP, GIAC) is a plus
  • Awareness of APT – Advanced Persistent Threat remediation and detection, Vulnerability and Remediation is helpful
  • Knowledge of HIPAA, HITECH, PCI-DSS, ISO 2700X, the healthcare industry and proper application of the Security and Privacy Rules is a plus
  • Overall work experience: 12 years minimum; 15 years preferred
222

IT Security Incident Response Analyst Resume Examples & Samples

  • A degree in Computer Science or related field with a minimum of 4 years dedicated to IT, IT security, and/or security infrastructure experience OR a combination of equivalent work experience and education
  • Good written and verbal communication skills at different levels with the ability to articulate with both technical and non-technical audiences
  • Positive can-do outlook, rebounds quickly from frustrations, and maintains composure and friendly demeanor while dealing with demanding situations
  • Independence – able and willing to perform tasks and duties without supervisions or with limited guidance
  • Cooperative – willing to work and collaborate with peers, leads, and management and is compromising where necessary
  • Experience: 12 years minimum of work experience
223

IT Security Incident Analyst Resume Examples & Samples

  • Work in a globally matrix (virtual) team environment along side with other Security Teams / SME’s
  • Escalate security events / alerts in a timely manner per Service Level Agreements
  • Analyse, handle and document security alerts / incidents in a consistent, comprehensive, risk driven manner
  • Track ticket progress with the ability to escalate horizontally or vertically - as necessary
  • Quickly adapt new working procedures and risk driven measures ensuring seamless, consistent processes
  • Trigger and support accuracy of security incident detection and monitoring
  • Support the Security Incident Management process and desired mitigation outcome
  • Information share best practice and knowledge based articles with global team
  • Support projects to onboard systems and solutions into security event monitoring (Transitions)
  • Prepare and check functional and operational reports
  • Perform operational tasks and incident handling around security procedures
  • Maintain certifications, training and skill sets at highest level
  • The chosen candidate will act as the Security Operations Analyst within the CISO organization. This challenging role is critical in order for Deutsche Bank to protect and defend the DB brand and reputation. This role requires someone with a passion for Cyber Security (in particular the ability to analyze alerts, patterns and signals). This role requires someone with a strong work ethic, flexibility, investigative nature, good perception and judgment
  • The candidate will need to have sound, broad security and technical knowledge as well as excellent communication and coordination skills, working fluently in English
  • At least 3 years of Security Experience (within a technical role in a security domain in particular Network and Operating System Security / Security Incident Response)
  • Expertise SIEM operations and maintenance
  • Good knowledge in NIDS systems
  • Good understanding of and exposure to security tools such as firewalls, IDS/IPS, A/V, anti-spam, proxies
  • Solid experience working with Internet and network technologies; specifically TCP/IP, UDP, SMTP, HTTP,
  • HTTPS and FTP
  • Fundamentals of Application Security - Strengths and Weaknesses
  • ITIL Fundamentals
  • Successful integration into global virtual teams
  • Experience in Security Alert analysis, handling and documentation
  • Experience in troubleshooting (technical analysis, documentation and remediation)
  • Experience in Service Definition, Service Level Management, KPI tracking
  • Experience in working in dynamic processes
  • Excellent verbal and written English skills
224

Dir IT Security Resume Examples & Samples

  • Assess the strategic and practical needs of McDonald’s globally to help ensure that the Company has a world class Information Governance Program
  • Ensure the visibility, value, security, integrity and availability of electronic data and information throughout the Company
  • Devise a program that helps ensure that all data and information is properly categorized, controlled, protected and retained in accordance with its value and risk, and retained pursuant to applicable legal and regulatory requirements
  • Work with cross-functional teams to identify and implement cost and risk reducing opportunities for data and information
  • Lead the McDonald’s security Risk Management team with a focus on proactively identifying and illustrating threats and/or vulnerabilities in the system
  • Perform functions in a timely manner and with an extreme level of attention to detail, urgency and thoroughness
  • Drive strategic deployment process within Risk Management and own development and implementation of regular improvement priorities. (Continuous improvement methodology)
  • Facilitation of risk, control and security policies, standards, procedures, and guidelines
  • Perform and deliver analytics of the Risk Management program and creation and distribution of reporting / dash-boarding in form of the Technology Risk Report and other mechanisms
  • Remediation and risk mitigation planning, execution and oversight as facilitated by the RA/RA (Risk Assessment / Risk Acceptance
  • Lead the McDonald's risk management team in the development and deployment of a security awareness program
  • Identifies developmental needs of members assigned to project teams and develops suggestions to address those needs. Acts as mentors to team members on projects and provides on the job training. Schedules work, assigns responsibility, and delegates authority for assigned projects
  • Develop strategies and procedures to ensure the classification, confidentiality, privacy, security, retention and lawful disposal of Company information
  • Develop and oversee the implementation of a strategic program applying industry-leading practices and methodologies to support the achievement of short, medium and long-term goals
  • Develop and implement appropriate policies, SOPs, training and guidelines for the management of all information
  • Work to identify, categorize, manage and protect personal data
  • Collaborate with key business unit and capability stakeholders, including, but not limited to, Privacy, IT, Internal Audit, InfoSec and Compliance to develop and implement the company's IG and RIM programs
  • Work closely with the information management program vendors and consultants to improve the IG and RIM programs
  • Support business units and capabilities (e.g., IT, Law Department, HR, Finance) day-to-day business needs and special projects
  • Manage and mentor team
  • Identify legacy records management systems through the organization, and ensure that both the IG and RIM programs cover all information assets, in all formats and media, and in both electronic and paper records throughout the Company
  • Manage third party vendors, as applicable for off-site records storage, including budgets and billing
  • Managing the annual departmental budget and capital requirements
  • Perform risk assessments, document results and maintain reports of significant risks and recommendations
  • Partner with stakeholders on actions to be taken to address identified risks and track progress
  • Create policies, standards, guidelines, and procedures in response to identified risks
  • Provide training and technical support to management and employees regarding risk management strategies and programs
  • BS in Business, Engineering, Communications, Computer Science, or Statistics is required
  • 5-10 years of experience with specific leadership experience with information governance and risk
  • Basic understanding of security technologies such as vulnerability management, firewalls, IDS /IPS A/V and Anti-Malware, encryption, identity and access management systems and event logging and correlation technologies
  • Familiarity with complex multi-national companies and distributed business models is a plus
  • Experience and willingness to manage a 24x7x365 team and work non regular hours
  • Deep experience in event / crisis management and reporting
  • Ability to interpret and understand business needs and convey such issues to information security teams
  • Proficient in technical writing and leveraging various creative mechanisms to communicate to diverse audiences
  • Strong ability to assess urgency and prioritization and make good decision based upon situation circumstances
225

IT Security Strategist Resume Examples & Samples

  • Develops technical security standards, requirements and implementation of appropriate technology architectures to mitigate information security risks to the enterprise, specifically
  • Develops and maintains the security technology plan and roadmap, including the security device inventory
  • Builds and manages the deployment of technical solutions, standards, processes and the implementation of supporting tools to support the mitigation of technical threats
  • Establishes program to develop and maintain solution architectures to mitigate identified threats based on a supporting prioritization process
  • Establishes information security referential architectures and strategies for service areas such as Identity and Access Management, Cloud Computing, Virtualization, Infrastructure Security (Network, Unix, Wintel, Wifi), Application Security (Secure Web Development), Secure Data Management (Encryption, DLP);Required to demonstrate broad knowledge of the above and similar emerging IT topics, with demonstrated deep expertise in one or more
  • Monitors and guides security administrators, architects, analysts, project/program managers and liaisons regarding their compliance to standards
  • Provides a leadership role in the development, implementation and maintenance of application and infrastructure architecture security efforts
  • Minimum seven years experience in Information Technology. Minimum five years experience in Information Security related positions
  • License/Certification: Must have a current CISSP, PMP, CCNP or related advanced IT certification
226

IT Security Architect Virginia / DC Resume Examples & Samples

  • Track and understand emerging security practices and standards
  • Determine security requirements by evaluating business strategies and requirements
  • Identify security gaps; evaluate and implement enhancements
  • Prepare system security reports by collecting, analyzing, and summarizing data and trends
  • Design and write engaging reports which communicate findings succinctly and clearly convey the message in a way which is appropriate for the audience, and rooted in the client’s needs
  • In-depth understanding of TCP/IP and networking
  • Any of the following certifications: CISSP, CISA, CISM, CRISC or other relevant information security certifications
227

IT Security Project Coordinator Resume Examples & Samples

  • 2+ years of experience as an IT Security subject matter expert
  • Experience with Active Directory, SolarWinds, Splunk, SSO, Cisco/Meraki, IT control design, anti-virus, vulnerability scanning, Linux, etc
  • Familiarity with security tools, such as Nessus, Snort, McAfee, Qualys, Nexpose, MBSA, etc
  • Proven Project Coordination / Management skills
  • Bachelor's Degree in Computer Science, IT Security or Engineering
  • Solid grasp of leading Information Security standards, including ISO 27002, OWASP, NIST 800-53r4, HIPAA and SANS Critical Security Controls
228

Mgr IT Security Resume Examples & Samples

  • 10 years’ experience in information security with at least 3 years in management
  • Manage and provide ongoing support for security hardware/software, appliances and vendor coordination; perform periodic reviews of infrastructure to ensure compliance with standards with the premise of identifying and resolving problems before an issue occurs
  • Manage, create and maintain documentation of guidelines and standards for specific technologies; assist in monitoring performance levels and trends throughout the firm to determine quality of service for the entire infrastructure
  • Provide 2nd and 3rd level incident support; diagnostics and corrective actions; implementation and 3rd party engagement and coordination; vulnerability management; physical break fix; and “on-call coverage
  • Manage and provide post mortems for incidents; provide timely incident reporting to IT and business; track, update and close action items; provide statistical data pertaining to short term incidents and chronic network problems
  • Manage and implement scheduled changes on time, within a scheduled window and without causing an incident
  • Primary responder, manager and documenter of MASC (inter-organizational security bulletin) communications
  • Manage, work and close MASC items that don’t require additional support
  • Manage security log reviews process
  • Review security logs and documents outcomes
  • Manage vulnerability and configuration management process and outcomes
  • Manage and document patch process and outcomes
  • Coordinate with Wellmed/Optum/UHG (parent company) security teams
  • Perform security reviews and risk assessments on new software/hardware/contracts being added to the environment
  • Perform planning in coordination with IT and business representative on new security policies and processes that need to be implemented
  • Participate and manage the IT response for security audit activities
  • Manage and participate in the response to security issues and conduct any forensic analysis as required
229

It-security Incident Response Engineer Resume Examples & Samples

  • Provide innovation within the context of the Incident Response (IR) program in relation to both process and technology
  • Design, implement, and support threat detection and prevention solutions identified as necessary for the protection of Firm assets
  • Serve as a Subject Matter Expert (SME) for the IR function
  • Serve as the system owner for common IR toolsets, platforms, and processes, such as SIEM, log management, packet capture, and breach detection systems
  • Engage in forensic examinations and chain -of-custody procedures utilizing common tools such as Encase
  • Provide input into policies, standards and procedures. Author standards and procedures designed to safeguard sensitive information
  • Monitor internal control systems to ensure that appropriate information access levels and security clearances are maintained
  • Provide input into security risk assessments by leveraging specialized knowledge
  • Report compliance failures to management for immediate remediation
  • Provide status reports and relevant metrics to the Information Security Manager
  • Contribute to the Firm's security-related information repositories and other marketing/awareness endeavours
  • Mentor junior members of the IR group
  • Commanding knowledge of IR concepts and best practices, including forensics and chain-of-custody
  • Experience with common IR tools such as SIEM, log management, IDS, breach detection systems (APT/BDS), and packet capture
  • Broad understanding of TCP/IP, DNS, and other foundational topics
  • Authoritative understanding of malware detection, analysis, and evasion techniques
  • Extensive knowledge of the threat landscape and the ability to adapt practices to evolving circumstances
  • Ability to gather and analyze facts, draw conclusions, define problems, and suggest solutions
  • Maintain critical thinking and composure under pressure
  • Strong written and oral communication skills. Ability to convey complex concepts to non-technical constituents. Proficiency in oral and written English
  • Understands IR in the context of risk management and organizational priorities
  • Passionate in the practice and pursuit of IR excellence
  • Demonstrates some proficiency in scripting or other automation tools
  • Possess a Computer Science Bachelor’s Degree or substantial equivalent experience
  • Five years of professional experience in information security with a focus on incident response and forensics
  • CISSP or SSCP
  • GIAC GCIA, GMON, or GCIH
  • Encase EnCE or equivalent experience
230

Senior Cyber IT Security Architect Resume Examples & Samples

  • Serves as security architecture subject matter expert to business areas, project teams and vendors to apply and execute appropriate use of technology solutions and lead efforts to examine technology vision, opportunities and challenges
  • Investigates and reports on security threats and incidents and conducts post-event reviews of security incidents
  • Evaluates strengths and flaws in Security Architecture designs including performance, confidentiality, integrity, availability, access and total cost of ownership
  • Selects and designs tools that allow reuse of design components and patterns between projects
  • Develops actual working solutions or prototypes based on their own designs and resolves any issues that arise
  • O Health care industry related experience
231

It-it Security Analyst Resume Examples & Samples

  • Performs day to day firewall policy administration
  • Maintains security framework across the enterprise
  • Participates in security improvement/optimization initiatives
  • Maintains up-to-date documentation of security infrastructure, changes, and security strategies
  • Proactively identifies/makes recommendations on potential security issues and solutions
  • Participates in on-call rotation duties
  • Configures, installs, and maintains security hardware
  • Deploys code upgrades
  • Represents IT Security organization professionally in interaction with internal business partners and other IT Support groups
  • Additional relevant industry certifications
  • Current Cisco CCNP - credentials will be verified
  • Experience with IDPS functionality
  • Experience troubleshooting across firewall infrastructure
  • Ability to speak and write about complex technical topics to less technical audiences
232

IT Security Management Specialist Resume Examples & Samples

  • University degree or high school (Computer Science or similar field),
  • Communicative english,
  • Multiple years working experience in Information Security,
  • Understanding (and the interest in) of system and network security controls,
  • Understanding of system and network security concepts,
  • Expert in ISO 2700x,
  • Certification CISSP or CISM welcome,
  • Experiences with project management welcome
233

Senior Consultant, IT Security Resume Examples & Samples

  • 25% travel may be required for this position
  • Contribute to the development and delivery of competitive services, methodologies, and deliverables in the security marketplace
  • Provide timely support for advanced malware analysis and reverse engineering escalations
  • Serve as a top subject matter expert in key elements of the practice (e.g. Forensics, Malware Analysis, Security Technologies...)
  • Work as an internal subject matter expert for other departments, including marketing, product management, and the broader Counter Threat Unit research team
234

IT Security Incident Response Analyst Resume Examples & Samples

  • Analyze security breaches and policy violations to determine root cause
  • Perform vulnerability and compliance scans and evaluate adequacy and effectiveness of controls
  • Facilitate the incident response process to ensure the appropriate urgency and discretion is used and communication is facilitated within the incident response guidelines
  • Provide correlation and trending of cyber incident activity
  • Research and recommend innovative and, when possible, automated approaches for completing information security-related tasks
  • Create and maintain documentation of IT security procedures, processes, configurations and diagrams
  • Analyze data and recommending changes to security policies, procedures and controls
  • Conduct research to keep abreast of latest security issues to anticipate incidents and reduce their likelihood
235

IT Security Auditor Resume Examples & Samples

  • This position will work on the CTO’s team to develop, enhance and maintain documentation required for the FedRAMP certification and continuous monitoring process
  • This individual will be working with Infrastructure and Operation’s (I & O) Audit and Compliance unit to review and interpret FedRAMP controls, enhance existing—and develop new—standards, policies, and procedures, that meet FedRAMP program requirements
  • This process includes the collection all information needed to achieve initial accreditation, as well as continuous maintenance of required documentation, ensuring the information remains current and is aligned with both the SOM cloud environment, and FedRAMP program
  • This will include but is not limited to researching and reviewing, establishing best practices, writing documentation and other manuals and materials, and outlining roles and responsibilities required for the broader FedRAMP readiness process
  • This individual will be working with DTMB technical staff throughout I & O, Cyber Security, Enterprise Architecture and other technical teams, to transfer their systems drawings, runbooks and technical documents into FedRAMP appropriate formats
  • Overseeing the writing, editing, publishing and distribution of FedRAMP specific audit documents, documenting compliance processes, audit team roles and responsibilities, and audit policies needed to operationalize the FedRAMP continuous monitoring documenting compliance processes, audit team roles and responsibilities, and audit policies needed to operationalize the FedRAMP continuous monitoring
  • Ensuring timely completion and consistent formatting of these documents will be a primary function of the position
  • The resource will be required to participate in weekly technical workshops, project team meetings and 1x1 meetings with team members
  • Resources are required to familiarize themselves with both the FedRAMP program, and the types of documentation required for FedRAMP readiness before starting the work at State office
  • This overview is critical to the candidate’s ability to establish realistic expectations of the scope and type of documentation and work which accompanies the FedRAMP accreditation process
  • Experience with performing IT security audits, 15 years
  • Experience in regulatory compliance audits, 10 years
  • Advanced knowledge of security standards and regulatory compliance auditing, 10 years
  • Experience in technical writing for IT Infrastructure projects and programs, 8 years
  • Advance knowledge and understanding of Cloud Infrastructure, 8 years
  • Advanced knowledge of NIST Special Publication 800-53 R4 and all NIST family replies, particularly those pertaining to continuous monitoring, 8 years
  • Capabilities in teaching new concepts to individuals that have limited familiarity with the subject matter, 8 years
  • Capabilities of reading and analyzing technical and architectural Visio drawings to produce written documentation in support of the SSP, 2 years
  • Familiarity with typical FISMA and FedRAMP appendices, 2 years
  • Working knowledge of System Security Plans for FISMA or FedRAMP, 2 years
236

Senior Consultant, IT Security Resume Examples & Samples

  • Report to the Director of Security & Compliance
  • Assist with documenting and regularly reviewing security policies, processes and procedures
  • Assist in the creation, generating, and updating of Plans of Action and Milestones (POA&M)
  • Assist with performing DoD RMF, FedRAMP, SSAE18/SOC2, PCI-DSS, ISO, NIST and other framework audits
  • Assist with DoD RMF and FedRAMP continuous monitoring and compliance activities
  • Assist with Disaster Recovery test exercises documentation updates
  • Act as IT security liaison between external clients and internal teams to assess risk, identify, develop, and enforce policies, procedures and internal controls
  • Help identify, implement, and maintain appropriate security and compliance measures
  • Contribute to security awareness and training activities
  • Assist in ensuring departmental goals are achieved, timelines are met, and service excellence is provided in all aspects of security work
  • Perform other security related tasks such as responding to incidents and emergency situations, as needed
  • Minimum of five (5) years of general and broad-based experience in the Information Technology (IT) field to include the information system authorization to operate (ATO) process used in the Federal environment
  • Experience with the following security frameworks: ISO, CSA-STAR, PCI-DSS, FISMA, HIPAA, NIST, SSAE16/SOC2, and FedRAMP
  • Working knowledge of NIST SP800-37 rev.1, and NIST SP800-53 rev. 4
  • Firm understanding of cloud-based information systems and network architecture
  • Hands on experience with security tools including centralized logging, vulnerability scanning, firewalls, intrusion detection and SIEM tools
  • Experience developing or enhancing security policies and procedures
  • Sound knowledge of Federal IT Compliance Standards
  • Working knowledge of virtualization technologies
  • Excellent MS office, Visio, Project skills
  • Be able to work effectively in the high tech, high pressure business culture
  • Be dynamic and creative – with a desire to work in a rapidly evolving organization
  • Be able to work within a team as well as alone
  • Have the ability to prioritize and meet deadlines
  • Have flexibility and desire to travel, as client assignments require
  • Have good communication skills
  • Possess enthusiasm and drive
  • Align with corporate culture
  • Bachelor’s Degree in Information Technology and/or IT Security
237

IT Security & Business Continuity Analyst Resume Examples & Samples

  • Helps to prepare status reports on security matters to develop security risk analysis scenarios and response procedures
  • Manages and enforces security policies and procedures. Administers and monitors security profiles. Reviews security violation reports and investigates possible security exceptions. Updates, maintains, and documents security controls and policies. Assist with password maintenance requests from end-users
  • Ensures integrity, confidentiality, and availability of data to end-users
  • Maintains network security end-user ID’s, directory access, and mailboxes
  • Provides support for data encryption requirements
  • Provides security documentation and cross training to Information Technology staff backups
  • Participate in reviews of new or changes to existing systems to ensure security requirements are satisfied, prior to implementation, including risk assessment
  • Ensure compliance with Sarbanes-Oxley and audit requirements for all systems. Coordinate with internal audit staff and assist with regular tests and audits. Resolves security issues from Audit reports
  • Participate in external security and penetration tests with vendors
  • Equivalent of 2 or more years of network administration, security and/or disaster recovery experience
  • Familiarity with Microsoft operating systems and Active Directory
  • Customer service oriented
238

IT Security Sailpoint Application Architect Resume Examples & Samples

  • Serving as the primary Application Architect for SailPoint
  • Serving as a subject matter expert for SailPoint integrations, configurations and development
  • Ensuring best practices and standard coding is adhered to within the application and for any integration points
  • Assisting with setting direction for the SailPoint development team
  • Serving as a mentor to both the SailPoint Development and Operation team members
  • Assisting with release schedules and prioritization
  • Working in conjunction with SailPoint integrators and the IDM Program Team to execute deliverables
  • 5 or more years of relevant SailPoint consulting experience
  • 2 or more years of relevant leadership experience
  • Ability to plan and prioritize workload
  • Ability to manage priorities within a constantly changing environment
  • 5 or more years of experience working in Identity & Access Management (preferred)
  • 3 or more years working with SailPoint Identity IQ
  • Strong understanding of Microsoft Active Directory,
239

IT Security Executive Resume Examples & Samples

  • Understanding of factory organization and accountabilities and responsibilities
  • Excellent communication skills both written and spoken ability to work in a team
  • Demonstrated project management competency
  • Strong achievement and service focus i.e. high energy levels and commitment to end results
  • Background in Information Technology with a relevant degree
  • 2+ years experience in the one or more of the required technology specialization
  • Advanced Microsoft Office Skills
  • Able to handle and resolve recurring problems
  • Able to effectively maintain relationships horizontally & vertically
  • Able to manage stress and aggressive deadlines
240

IT Security Applications Project Manager Resume Examples & Samples

  • Provide oversight and manage Globe Life interests for projects managed through a third party vendor
  • Periodically manage software development projects leading project teams through all phases of the standard project lifecycle
  • Develop project charter and planning documents
  • Scope management
  • Provide status reporting, communications planning and management
  • Incorporate risk mitigation strategy and contingency planning
  • Develop and manage project schedules
  • Manage change to project scope, schedule and budget
  • Balance the art and science of project management to scale and leverage techniques and processes efficiently
  • Understand and know how to apply application development project management methods
  • Ability to prioritize and manage work to critical project timelines in a fast-paced environment
  • Strong and effective communicator and leader
  • Intermediate ability with Microsoft Project
  • 10+ years of hands on IT project management experience implementing application development projects
  • 3+ years of experience with the support and delivery of IT Security applications and services
  • Bachelor level degree in a related field
  • Successful history of accomplishments in a team environment
241

IT Security SOC Analyst Resume Examples & Samples

  • Not less than 3 years’ experience of security operations and governance
  • One or more of the following certifications desirable
  • Participate in the day-to-day running of the SOC investigating and remediating any incidents as required
  • Monitor recognised industry security bulletin boards and other sources in order to advise of potential security weaknesses within the company
  • Attend project design workshops in order to advise of best practice security requirements
  • Run the vulnerability scanning solution and ensure actions are tracked
  • Conduct IT risk assessments for new services
  • Participate in the creation of enterprise security procedure documents under the direction of the IT Security Manager or Principal IT Security Analyst, where appropriate
  • Maintain up-to-date detailed knowledge of the IT security industry including awareness of new or revised solutions, improved processes and the development of new attacks and threat vectors
  • Perform product assessments for potential new security solutions
  • Identify security risks, threats and vulnerabilities of the companies networks, systems and applications
  • Ensure the enforcement of Cobham security requirements including, but not limited to US (FOCI, SSA, NISP, CUI/CPI, ITAR). UK (List-X, SPF, ITAR, NATO)
  • Periodically audit in-place security solutions for efficient and appropriate operations
242

Junior IT Security Resume Examples & Samples

  • Self-starter and have no problem with the ability to take the initiative to help drive process and procedural improvements
  • CISSP and/or CEH preferred
  • Customer Focused: Passionate drive to delight our customers and offer unique solutions that deliver on their expectations
  • Team Mentality: Partnering effectively to drive our culture and execute on our common goals
243

Engineer, IT Security Resume Examples & Samples

  • Perform risk assessments and track remediation
  • Lead penetration testing efforts
  • Integrate existing technology and new technology into current processes
  • Work with other areas of IT to design efficient and scalable processes
  • Minimum of 7 years of relevant experience in consumer finance and manufacturing environments preferred
  • Technical certifications such as a CISSP, CISA are desirable
  • Familiarity with industry frameworks and standards, such as ISO 27002, COBIT and SSAE16
  • Working knowledge of network infrastructure and security monitoring tools
  • Experience with Sarbanes Oxley (SOX) ITGC controls
  • Ability to scope and perform risk assessments
  • Experience with 3rd party management and vendor risk assessments
  • Experience with Managed Security Service vendors and technology
244

IT Security Analyst, Intelligence Resume Examples & Samples

  • Compiling and analyzing cyber threat information and making recommendations based on suspected or known context in order to draw insights and conclusions regarding its relative threat to the company
  • Producing, editing, and distributing a variety of concise and actionable threat analysis and warning products in written and presentation form to an audience that spans a range of customers from senior company executives to security analysts
  • Conducting studies and making recommendations to identify cyber threats, threat vectors, threat actors, and threat trends
  • Identifying and developing threat signatures from all available sources and providing direction to Proactive Threat teams to remediate
  • Implementing and supporting standard procedures for incident response
  • Excellent Organizational skills and the ability to follow Incidents to their conclusion
  • Independent and self-directed
  • Strong problem solving and analytical skills
245

Senior Engineer, IT Security Resume Examples & Samples

  • Bachelor or Master’s degree in Computer Engineering, MIS, IT or related field
  • At least 2 – 3 year experiences in computer security area
  • Have a foundation in good information security practices
  • Functional knowledge of networks, products, and LAN protocols (TCP/IP, VPNs, IPSec, firewalls, MLS systems, access-control lists, route redistribution, IP Multicast)
  • Experience with security technologies, including Intrusion Detection System (IDS) monitoring, Incident Response, Disaster Recovery Planning
  • Experience in Antivirus and Patch Management System
  • Experience in facilitating information security risk assessments
  • Excellent interpersonal and verbal communication skills
  • Technical writing, documentation development, process mapping, and visual communication skills
  • Proficiency in word processing, spreadsheets, desktop applications, and electronic mail programs
  • Service-minded, good attitude, and willing to work hard
  • Skill
  • Reasoning and problem solving skills
  • Excellent verbal and written communications skills are a must
  • CISSP, CISM, CISA, or similar general security certification is very desirable
246

VP, IT Security Resume Examples & Samples

  • Live our Values: People, Quality, Service and Innovation
  • Lead the IT Security and Risk & Compliance functions to implement consistent security safeguards and controls throughout the organization
  • Assess business and technology risks to aid in formulating strategies for innovation that favor continued business expansion
  • Identify, prioritize and evaluate opportunities to increase the efficiency and effectiveness of security practices across RH through automation and the use of emerging technologies and innovative techniques
  • Providing strategic security guidance to the leadership team to implement appropriate control mechanisms and security architecture based on risk tolerance
  • Lead internal Security teams in partnership with external auditors and regulators to ensure RH is in compliance with applicable regulations
  • Provide security oversight to RH associates, affiliate marketing partners, alliances, or other third parties, ensuring proper information security clearance in accordance with established organizational information security policies and procedures
  • Initiate, facilitate and promote programs to create information security awareness within the organization
  • Monitor the internal control systems to ensure that appropriate access levels are maintained
  • Lead preparation of company disaster recovery plan
247

IT Security Business Systems Manager Resume Examples & Samples

  • Providing the highest level of customer support to business units
  • Capacity and work planning for a group of up to 10 business analysts
  • Managing and reporting risks and related action plans
  • Maintaining schedules and organizing the SailPoint user entitlement review cycle
  • Managing the intake process for enhancement requests and new application integrations
  • Scheduling and managing disaster recovery events
  • Managing vendor relationships and driving bug and enhancement requests
  • Working with management to define system road maps and upgrade schedules
  • 5 or more years of relevant business analyst experience
  • 2 or more years of relevant leadership / management experience
  • Ability to plan and prioritize workload for teams of up to 10 people
  • Ability to take ownership of problems and bring them to resolution
  • Ability to build relationships with business partners at all level of the organization
  • Advanced communication skills (written and verbal) with ability to interact at senior leadership level
  • 2 or more years of experience working in Identity & Access Management (preferred)
  • 2 or more years of experience working with SailPoint preferably working with Identity IQ
  • Strong understanding of Microsoft Active Directory
248

Director of IT Security Resume Examples & Samples

  • Industry related certifications
  • SOC experience
  • IT Security Management experience within large environments
  • Prior experience writing instructions and technical documentation will be of great help
249

IT Security Analyst / Itsa Resume Examples & Samples

  • Perform user security administration and provisioning for both Active Directory and application level accounts, permissions, adds, changes, terms and deletions
  • Provides users and management with technical support on matters related to access control
  • Implements security improvements by assessing current situation, evaluating trends anticipating requirements
  • Perform application updates to Security applications and devices
  • Act as a technical information security reviewer of performance reports, system status, operating procedures manual and other documents produced
  • May assist with the selection, installation of automated tools that enforce or monitor the compliance with information security policies, standards, procedures and similar information security requirements
  • Maintain technical knowledge about latest developments in the Information Security field
  • Knowledge in vulnerability assessments, intrusion prevention and detection, access control and authorization, policy enforcement, design of secure infrastructure, protocol analysis, and firewall rulesets
  • LAN and personal computer security methods
  • RQCF
  • PSRM
  • AIX
  • Establish access levels and monitor system performance
  • Experience with coordinating state and federal data processing audit
  • Experience analyzing new and existing computer systems to determine appropriate access levels for resources and data files
250

Director of IT Security Resume Examples & Samples

  • Experience with Data Security and Privacy programs surrounding PCI compliance and HIPAA regulations
  • Will be responsible for implementing, managing, and enforcing information security directives as mandated by PCI and HIPAA standards
  • Will lead efforts to establish, develop, and maintain business relationships with key internal and external partners
  • Must possess knowledge of Cisco switches, Palo Alto firewalls(architecture and management), SIEM Configuration and Management, FIM Configuration and Management, AVDS Configuration and Management, VPN, IDS/IPS Configuration and Management, Active Directory, enterprise WAN architecture, and Malware analysis
  • Will need to lead Information Security Awareness and training initiatives
  • Will be responsible for all activities related to the development, implementation and maintenance of the organization's data and network infrastructure security program