IT Security Specialist Resume Samples

4.8 (41 votes) for IT Security Specialist Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the it security specialist job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume by selecting wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

CHOOSE THE BEST TEMPLATE - Choose from 10 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
BO
B Okuneva
Bonnie
Okuneva
295 Bonnie Land
Philadelphia
PA
+1 (555) 856 3886
295 Bonnie Land
Philadelphia
PA
Phone
p +1 (555) 856 3886
Experience Experience
11/2014 present
Houston, TX
IT Security Specialist Senior
Houston, TX
IT Security Specialist Senior
11/2014 present
Houston, TX
IT Security Specialist Senior
11/2014 present
  • Performs or coordinates penetration testing of systems and networks
  • Perform cyber-threat hunting processes to proactively identify internal risks that might exist in the bank’s IT infrastructure
  • Monitors outside intelligence sources to identify emerging threats and associated protections and determines how they apply to the enterprise environment
  • Serves as technical lead in responding to information security events and performance of initial diagnostics/forensics
  • Evaluates and recommends new and emerging security solutions and best practices
  • Performs architecture assessments of systems and networks
  • Implements an enterprise-wide definition of security, establishes and maintains data, network and system security-related infrastructure, and applications and processes
12/2009 07/2014
Chicago, IL
Senior IT Security Specialist
Chicago, IL
Senior IT Security Specialist
12/2009 07/2014
Chicago, IL
Senior IT Security Specialist
12/2009 07/2014
  • Assist developers, analysts, and designers in conceptualizing and developing new Security for programs and applications
  • Works closely with the Database Architects and Database Administrators (DBA’s) to establish Security guidelines and best practices
  • Manage security risk software vendor relationship to improve use of automated security risk assessment tools
  • Work with OIS leadership to establish and document security risk assessments
  • Build relationships with corporate wide business unit personnel, third parties providing support to HPHC, and information operations personnel
  • This position synthesizes data and information to create reports, manuals, and procedures and presentations of varying levels of complexity
  • Keeps users informed by preparing performance reports; communicating system status
06/2005 07/2009
Philadelphia, PA
IT Security Specialist
Philadelphia, PA
IT Security Specialist
06/2005 07/2009
Philadelphia, PA
IT Security Specialist
06/2005 07/2009
  • Develop, manage and improve security processes
  • Knowledge of incident and problem management frameworks (eg NIST, ITIL)
  • Manage process for reviewing security for CEB vendors, contractors, and other third-party service providers
  • Perform monitoring of SOX compliance for application access and provide monthly reporting
  • Assist with technology evaluations, trade studies, briefing development, and engineering analyses
  • Providing third level support to the Identity & Access Management team
  • Provides meaningful Information Security metrics, which include identifying historical trends, areas of risks/gaps, violations and/or improvements
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Howard University
Bachelor’s Degree in Computer Science
Skills Skills
  • Strong attention to detail, analytical skills, ability to multi-task, and ability to work both independently as well as part of an assessment team
  • Demonstrated outstanding level of professionalism in providing management support, including ability to exercise good judgment, discretion, tact and diplomacy
  • Strong conceptual thinking ability
  • Proven Technical expertise, at least 4 years in Information Technology and 2 years on Security products with hands-on experience on -Basic system management (Linux, Windows, Unix-like) and networking knowledge (TCP/IP networking protocol)
  • Solid knowledge of PMBOK standards, ITIL principles, and SDLC processes
  • You have a strong conceptual knowledge of IT Security
  • Strong analytical, problem-solving and decision-making capabilities with the ability to analyze situations, identify existing or potential problems and recommend solutions
  • Knowledge of Vulnerability Scanning Solutions - Nessus or Qualys
  • Knowledge of IT Security principles, techniques and technologies (including IDS/IPS, Firewalls, Vulnerability Management, Pen Testing
  • A dynamic profile, a result-oriented approach to work and an ability to motivate others to deliver results
Create a Resume in Minutes
1

IT Security Specialist / Engineer Resume Examples & Samples

  • Create, maintain and drive technology strategies and roadmaps within the area of responsibilities, e.g. Incident Response, SIEM , IDS, and VARM
  • Develop and enhance the existing SIEM and VARM environment and continuously implement improvements
  • Analyze and manage reported events
  • Handle security Incidents by following standards such as (ISO, NIST)
  • Security Incident investigation and classification
  • Execute regular vulnerability assessments, report the findings and drive the remediation
  • Log file analyses
  • Cyber intelligence
  • Consult various stakeholders, like IT, business and 3rd parties, on implementation of security controls and measures
  • Assist in driving security awareness to the end users
2

IT Security Specialist Resume Examples & Samples

  • Arcsight ESM content creation experience
  • Arcsight Logger content creation experience
  • ArcSight flex connector development experience
  • Proven knowledge of Red Hat Linux system administration and logging infrastructures
  • Working with stakeholders and systems analysts to translate business needs into functional requirements
  • Creating and archiving systems documentation and support procedures for operations teams
  • Written and spoken English (can conduct in depth conversations about business and technical matters in English)
  • Masters Degree or Bachelors Degree in Information Systems or related technical field with compensating experience
  • Previous work on parsing events from DLP, Windows, UNIX, NIDS, HIPS, Database, & Malware sources
  • Experience upgrading to and using ArcSight ESM 5.0
  • UNIX/Linux Perl, Python, shell scripting, task management, JVM tuning
  • Experience with network diagnostics (TCD/UDP)
3

IT Security Specialist Level Resume Examples & Samples

  • A Bachelor’s degree, preferably in a related technical field
  • A minimum of five (5) years of experience as UNIX or Windows system administrator, and an additional five (5) years of full-time network security and incident handling experience managing vulnerability management tools, firewalls, intrusion detection systems
  • Experience managing vulnerability management tools, firewalls, intrusion detection systems, and responding to network/computer intrusions and supporting inquiries. Knowledge of requirements analysis principles and methods
  • Knowledge of information systems security principles and methods, the requirements for certification and accreditation of systems testing and evaluation, and performance management methods
  • Knowledge of test and assessment methods to evaluate security authentication technologies
  • Knowledge of network operations and protocols, and development life cycle management
  • Mastery of information systems security principles, concepts, and methods, and knowledge of the total infrastructure protection environment to integrate information systems security with other security disciplines
  • Thorough knowledge of the infrastructure protection environment, enterprise IT architecture, interrelationships of multiple IT disciplines, and Federal IT security hierarchy to implement higher-level security requirements such as OMB Memos and Presidential Directives
  • Knowledge of the Federal information systems security community and hierarchy to ensure coordination of and/or collaboration on security activities
  • Knowledge of systems security control assessment (SCA) requirements and processes to certify systems or acquire network authorization as well as Authorization to Operate (ATO)
  • Proven experience with a wide variety of IT security, networking, and system administration tools
  • Proven experience with federal security guidelines and regulations
  • History of success preventing IT security breaches across applications and infrastructure
  • Excellent written and oral communication skills and the ability to communicate technical issues to non-technical audiences
  • The ability to work as part of a development team as well as work independently on assigned tasks
4

IT Security Specialist Level Resume Examples & Samples

  • A minimum of five (5) years’ experience as UNIX or Windows system administrator, and an additional 7 years’ experience as a system security administrator in a heterogeneous system/network environment
  • 5 years of hands on TCP/IP network experience with in-depth knowledge of key network protocols, routing, VLAN, switching, and the ability to utilize packet sniffers and read packet traces
  • 5 years’ experience using SCAP-compliant vulnerability management systems, intrusion detection systems and responding to network/computer intrusions and supporting inquiries
5

Advisory IT Security Specialist Resume Examples & Samples

  • At least 4 years experience in IT SEcurity and compliancework
  • At least 2 years experience in Working in an international environment
  • At least 2 years experience in Risk Management experience
  • At least 1 year experience in years Cisco network devices and Server Administration/Management on Wintel platforms experience in a production environment
  • Hungarian: Fluent
6

IT Security Specialist Resume Examples & Samples

  • Coordinating security operations in an international environment
  • Analyzing and reporting on security service performance indicators
  • Forensics on security incidents
  • Advance Persistent Threat mitigation
  • Vulnerability hunting
  • Consulting and assisting on security related issues
  • Preparing and assisting in security related service changes
  • Assessing and providing requirements for security controls
  • You have a strong conceptual knowledge of IT Security
  • You are a skilled, disciplined and self guiding IT security specialist that is used to coping with high workloads
  • You are content oriented, result driven and focused on continuous improvement
  • You know what our business partners and second line colleagues need to be wow-ed
  • You are a real team player and have experience with working in a large, corporate, organization
  • You pro-actively bring solutions and pragmatic improvements which balance risk and benefit
  • You have proven experience with End User Computing Software and implementations in a corporate environment that is highly regulated
  • You are master or bachelor educated (informatics or business administration) and have at least 5 years as an IT security specialist
  • You are fluent in English and preferably Dutch
7

IT Security Specialist Resume Examples & Samples

  • Staffing to support our Client's full range of IT services in order to develop and deliver new products support high employee productivity, develop secure and maintain new IT systems and design deploy and maintain the underlying infrastructure
  • Provides support to plan coordinate and implement the organization’s information security
  • Provides support for facilitating and helping agencies identify their current security infrastructure and define future programs design and implementation of security related to IT systems
  • Oversees the efforts of security staff to design develop engineer and implement solutions to security requirements
  • Responsible for the implementation and development of IT security. Gathers and organizes technical information about an organization's mission goals and needs existing security products and ongoing programs in the MLS arena
  • Must show demonstrated knowledge of IT/IA policies and procedures
  • Must show demonstrated knowledge of project management
  • Must have demonstrated knowledge of vulnerability management policies and procedures
  • Must have demonstrated knowledge of the NIST Certification and Accreditation processes and procedures
8

IT Security Specialist Resume Examples & Samples

  • Manage the IT Security Monitoring program
  • Develop and refine monitoring coverage, alerting and reporting processes
  • Coordination of Incident Response activities
  • Vulnerability Management administration, coordination and reporting
  • Lead the security owned projects in the areas of Identity & Access Management
  • Carry out risk assessments using risk assessment methodologies
  • Systems Administration of one or more of the following Linux, Solaris, Windows 2000/2003 server administration including Active Directory and/or iSeries AS/400
  • Knowledge of Vulnerability Scanning Solutions - Nessus or Qualys
  • Knowledge of Dell One Identity Manager
  • Firewall administration & change management
  • Knowledge of OWASP Guidelines
  • Application risk analysis
  • IT related Degree or equivalent work experience
  • SANS Qualifications, such as GCIH, is a bonus
  • Formal security certifications such as Security+, CEH
  • Candidate should have or be working towards CISSP, CISM or CISA
9

IT Security Specialist Resume Examples & Samples

  • ~3 years'+ IT Security experience
  • IT Security Incident Handling experience
  • Working knowledge of SIEM Solutions - RSA enVision or HP ArcSight
10

Senior IT Security Specialist Resume Examples & Samples

  • At least 2-3 years of experience in information technology and/or information security,
  • Experience in conducting or supporting IT Security audits
  • Experience in management of IT Security/IT Security compliance tools
11

IT Security Specialist Resume Examples & Samples

  • Good understanding of computer networking (TCP/IP), knowledge of Windows, Linux and Cisco operating systems and information security
  • Very good analytical and problem solving skill as well as interpersonal skills to interact with customers, team members and upper management
  • Good understanding of below listed security domains
12

IT Security Specialist Resume Examples & Samples

  • Python programming experience (2+ years) (Flask, Celery, web-based apps)
  • Web development experience (2+ years) (CSS, Javascript, AngularJS, HTML, Bootstrap)
  • Experience with SQL databases and MongoDB
  • Strong focus on writing high quality technical documentation
  • Ability to create and reuse APIs to improve integration between existing and new security systems
  • Good knowledge of Linux, Docker, Ansible, git, nginx
13

IT Security Specialist Resume Examples & Samples

  • Ability to communicate and collaborate with a wide variety of individuals inside and outside the organization
  • Candidate must have the ability to work independently under limited supervision and provide management with status of projects, problems or other outstanding issues
  • Candidate must demonstrate solid communication skills
14

IT Security Specialist Resume Examples & Samples

  • 6-8 years of experience in IT system security related work
  • Knowledge of or experience with NASA systems and security requirements
  • Technical understanding in IT areas such networks and system administration
15

IT Security Specialist Resume Examples & Samples

  • Knowledge of techniques and tools that promote effective analysis and the ability to determine the root cause of organizational problems and create alternative solutions that resolve the problems in the best interest of the business
  • Knowledge of and ability to develop and implement policies, standards and procedures to ensure the integrity and safety of information
  • Knowledge of and the ability to gather, communicate and store useful information within and across organizations in order to enhance employee knowledge and improve organizational performance
  • Knowledge of and ability to select, use and improve encryption technologies to ensure the privacy of organizational information
  • Knowledge of and ability to protect an organization's data to ensure privacy during the process of storage and communication
16

IT Security Specialist, Senior Resume Examples & Samples

  • 3+ years of experience with information assurance and security practices, including NIST Risk Management Framework, IT Audit, FISMA, or other IT security-related compliance processes
  • 1+ years of experience with Certification and Accreditation support
  • 1+ years of experience with developing and updating security artifacts, including System Security Plan (SSP), Contingency Plan (CP), Privacy Impact Assessment (PIA), or Risk Assessment (RA)
  • 1+ years of experience with ST&E and Security Control and Assessment (SCA) processes
  • Knowledge of testing methodologies for Oracle databases, network devices, including routers, switches, and firewalls, operating systems, including UNIX variants and Windows, and COTS applications, as necessary
  • Ability to work independently and adapt to a highly dynamic client environment
  • Ability to work with operational level staff and mid-level management, research IT security best practices independently, and develop test steps
  • Knowledge of a variety of technologies, including Windows, Oracle and SQL, and network components, including Cisco, routers, and switches preferred
17

Is / IT Security Specialist Resume Examples & Samples

  • Ensure Projects comply with security standards
  • Conduct Proof of Concept projects
  • Contribute to assessments using the Security Assessment methodology
  • Use Risk Management methods and tools to monitor, identify, report and track risks related to Information Security
  • Work with other to ensure information security is anchored into the mindset and ways of working of all security customers
  • Provide 2nd and 3th level support on security solutions
  • Ensure security controls are in place
  • Experience in design and development of security solutions
  • Experience in running risk assessments
18

IT Security Specialist Resume Examples & Samples

  • Establishes policies and procedures necessary to ensure the security of information system assets and to protect them from intentional or inadvertent access, disclosure, or destruction
  • Security focus areas will focus in the digital and CRM functions as well as data domain
  • Performs risk assessments and security audits of internal and external facilities against established standards
  • Bachelor’s degree in computer related field, or 14 – 18 years equivalent experience
  • 8 – 12 years of relevant working experience
  • 5+ years experience in information systems environment, with a focus area in IT Security
  • Understanding of data communication networks
  • Experience with security tools and systems
  • LI-CK1
19

IT Security Specialist Resume Examples & Samples

  • Assist in Identity and Access Management tasks by ensuring proper account creation for staff members and contractors, as well as assigning the appropriate access levels
  • Respond to security questionnaires from CEB client’s regarding CEB Security capabilities. This requires understanding CEB’s security environment and risk posture
  • Perform monitoring of SOX compliance for application access and provide monthly reporting
  • Organize and participate in IT security planning sessions
  • Functional knowledge of security information and management products, investigatory procedures, and event documentation/tracking preferred
  • Familiarity with Microsoft Forefront Identity Management is a plus
  • Security+, SANS GIAC, CISSP, CISA, Microsoft, and Cisco certifications desired, but not required
  • Familiarity with relevant SOX, COBIT and/or ISO standards related to data security/IT operations and business continuity is a plus
  • Undergraduate degree required; degrees and/or significant coursework in computer science, information assurance, information science, business or related ideal
  • 3-5 years of professional experience preferred; will provide training and professional development
20

Junior IT Security Specialist Resume Examples & Samples

  • Communication with regional and global counterparts
  • Creating assessments on findings regarding all things IT risk related in the Japan office
  • Reporting to seniority in a timely fashion is key to this role
  • Proven project management experience (Qualifications in this area would be a distinct advantage)
  • 7-10 years working in an international financial firm in Japan preferably in an IT Risk, Infosec, governance
  • Proven ability to work with international teams and its people
  • Strong written and spoken communication skills in both English and Japanese. (Fluency is a must for both)
  • Finance industry
  • IT background
  • Experience working with IT auditors and regulators would be a big advantage in terms of experience
21

IT Security Specialist Resume Examples & Samples

  • Experience with Windows and Linux client/server security administration and the underlying technologies such as TCP/IP, DNS, LDAP, and the security subsystem (IA&A)
  • Be experienced in evaluating hardware security such as Trusted Platform features, EEFI/BIOS security, and sanitization measures
  • Possess current DoD 8570 certification
22

IT Security Specialist Resume Examples & Samples

  • Perform duties as subject matter expert and the Mustang formally appointed employee to address requirement listed in DoDI 8510.01, Risk Management Framework (RMF) for DoD Information Technology (IT), NIST Special Publication 800 series, NISPOM chapter 8, ODAA Process Manual, and DoD Security Baseline Documents
  • Ability to develop and review System Security Plans (SSP) In accordance with NISPOM and other security directives is required
  • Schedule, perform and maintain records of required Information Security auditing, patching, maintenance, software/hardware changes, and scanning based on evolving threat/vulnerabilities and customer compliance requirements
  • Build, configure and maintain Windows systems in compliance with DoD cyber security requirements
  • Perform periodic self-inspections, tests and reviews of the Information Security program to ensure that systems are operating as authorized/accredited and that conditions have not changed. Ensure corrective actions are taken for identified findings and vulnerabilities
  • Ensure systems are operated, maintained, and disposed of in accordance with security policies and procedures
  • Develop and conduct test procedures for verification of Certification & Accreditation (C&A), Authorization and Accreditation (A&A), Risk Management Framework (RMF) safeguards to meet customer requirements based upon NISPOM, NISPOM Overprint, DCID 6/3, JAFAN 6/3, JSIG, ICD 503, CNSSI 1253 and related NIST publications
  • Perform as the liaison to government information assurance organizations and other information assurance professionals
  • Remain current on Information Assurance regulations and contract security requirements
  • Coordinate with Facility Security Officer (FSO) and Contractor Program Security Officers (CPSO) to define, implement and maintain information security policies, strategies, and procedures
  • Create and conduct AIS Security briefings for multiple programs
  • 8+ Years as an Industrial Security professional
  • 5+ years direct experience as an Information System Security Manager as defined in chapter 8 of the NISPOM or as defined in chapter 2 of JAFAN 6/3 or comparable experience
  • Excellent people skills, with experience leading and collaborating in a multi-disciplinary, diverse, and dynamic team environment
  • Outstanding work ethic and commitment to organizational success
  • CISSP certification (If not currently certified then it must be earned within 6 months of hire date)
  • DoD 8570.01m IAM III certified credentials
23

IT Security Specialist Resume Examples & Samples

  • Scheduling, planning and execution of penetration tests and application risk assessments within Honeywell's application, cloud and mobility environments utilizing manual and automated testing procedures
  • Scheduling, planning and execution of risk assessments of cloud, mobile and new technologies utilizing manual procedures and automated analysis tools/scripts
  • Support the secure integration of acquisitions, joint ventures and divestitures
  • Provide technical consultation, guidance, training, and assistance to developers, management, system owners, and users in relation to security standards, requirements and best practices, remediation and regression testing, and application architectures recommendations
  • Collaborate with developers, system owners, and business stakeholders to identify security controls and risk mitigation strategies
  • Contribute and manage expectations related to the technical understanding and promotion of new and existing security standards, solutions, and tools
  • Partner with Honeywell product development groups globally to assess, consult and assist with security activities related to Honeywell software products, services, and solutions
  • Provide clear and concise security recommendations in written and verbal form to both business and technology personnel
  • Evaluate, monitor, and operate security assessment tools and technology
  • Provide and publish operational and risk metrics relating to the effectiveness and health of the service and environment
  • Some travel, not to exceed 25%, may be required
  • CISSP or other security certification, such as GCEH, required
  • Proven relevant security assessment and testing experience required
  • Project management certification, such as PMP, preferred
  • Demonstrable knowledge related to security assessment methodology, business, regulatory and contractual requirements, and system and application architectures
  • Detailed knowledge and experience within the elements of cloud, mobile and application security
  • Understanding of international business and regulatory requirements and related security risks
24

IT Security Specialist Senior Resume Examples & Samples

  • Knowledge of and the ability to manage an organization's architectures, data resources, polices, practices and procedures to appropriately and effectively address business and stakeholder's needs
  • Knowledge of and the ability to develop and maintain an organization's data in order to meet business requirements
  • Knowledge of and ability to design and improve organizational IT structures and blueprints in order to better support business operations and efficiently achieve organizational objectives
  • Knowledge of and ability to investigate, troubleshoot, resolve and prevent the recurrence of incidents that interfere with the normal delivery of IT services
25

IT Security Specialist Resume Examples & Samples

  • Extensive experience working in a large and complex multinational corporation, preferably in financial services or similar IT service area
  • 5+ years of experience, programming using scripting and platform languages e.g. Perl, JAVA, C++, Python, .NET, Powershell
  • 5+ years engineering solutions with Oracle PL/SQL, Microsoft MSQL and Sybase back-end
  • Experience using CyberArk privileged session management product and/or Avecto Privilege Guard products
  • Hands-on engineering experience with CyberArk, including Safe design, CPM and PVWA policy design in PIM/PSM version 9.x
  • Experience with developing solutions leveraging LDAP directories
  • Knowledge of Single Sign On Systems, SIEM systems, ticketing systems such as ServiceNow, enterprise monitoring and alerting using SNMP
  • Experience in IT Infrastructure service delivery. 3rd level application support
  • Good understanding of process design and implementation including good knowledge and experience of ITIL and incident management processes
  • Knowledge of regulatory issues facing large financial organisations
  • Understanding of Windows RDP
26

IT Security Specialist Resume Examples & Samples

  • Maintains smooth operation of multi-user computer systems, including networks
  • Duties may include setting up user accounts, maintaining library of system documentation and installing system-wide software and allocation of mass storage space
  • Activities may include administration of personal computers, client servers, electronic mail, on-line and internet resources, local area networks and wide area networks, and standard application software products
  • Interacts with users and analyses vendor products
  • May recommend purchase of hardware and software, and coordinates installation with vendors and/or technicians
  • Trains internal users
  • Develops and monitors policies and standards of allocation and use of office automation equipment and resources
  • Bachelor's degree in Computer Science, Engineering, or related discipline
  • At least three years of experience in systems support and working knowledge of specific technology to be administered
  • Familiarity with multi-platform environments
  • Understanding of security systems.Search Jobs US
27

Regional IT Security Specialist Resume Examples & Samples

  • Engage with internal and external stakeholders to maintain complete awareness, expertise and governance of all Boeing Information Security policies and standards including the Government prescribed directives and controls
  • Partner with internal IT services providers to ensure compliance with IT security requirements
  • Manage the operations of the perimeter security devices and the perimeter security infrastructure
  • Evaluate information security risks and develop corrective action plans as required
  • Provide compliance and audit support, communicating compliance status to internal stakeholders
  • Participate in and/or lead incident response
  • Provide guidance on IT security issues to internal and external stakeholders
  • Contribute to service improvement activities within the IT organization
  • Support long range business planning in conjunction with other IT stakeholders
  • Some travel may be required, as well as flexibility as off-hours activity will be needed to coordinate with globally dispersed teammates and stakeholders
  • Extensive experience in IT security roles across infrastructure and application domains ideally in large scale complex organizations
  • Experience in leading cross-functional teams
  • Ability to represent company to a broad range of internal and external stakeholders
  • Comprehensive knowledge IT security policy and standards particularly in aerospace, government and defense sectors
  • Technical/bachelor's degree (Computing, Information System, Engineering, B.Sc or BCA degree) and 17 or more years' related work experience with minimum 10+ years in Information Security Domain is MUST
  • Master’s degree desirable
  • Relevant Professional Security certifications (CISSP, CISA, CISM, CRISC etc.) highly desirable
28

IT Security Specialist Resume Examples & Samples

  • Serve as Team lead for a small project team providing technical guidance and day-to-day team leadership, system and task assignments, task progress monitoring and control, and reporting guidance and approval
  • Develop annual schedules and project plans for security programs, including A&A, POA&M remediation, configuration management, scanning, testing, and other IT Security requirements
  • Assists with technology evaluations, trade studies, briefing development, and engineering analyses
  • Conduct audits and provide guidance of security programs including A&A and Continuous Monitoring based upon NIST, FISMA, DOC and NOAA guidelines, policies and procedures
  • Perform and support ISSO duties as designated by the Task Manager
  • Prepare risk analysis reports and provide recommendations to the client
  • Analyze penetration testing and vulnerability scan reports on all systems as required
  • Provide impact analysis for updates and version changes required by the National Institute of Standards and Technology (NIST) Security Publications and FISMA notices
  • Update and develop security Standards and templates as required to meet new government and regulatory requirements
  • Use risk management techniques to develop and complete risk assessments based on NIST standards to ensure Information Assurance design sufficiently mitigates the risk
  • Determine acceptable risk levels in conjunction with the Task Manager for enterprise computing platforms including supporting documentation and assumptions
  • Oversee internal quality assurance processes and controls for all documents prepared by the team for issue to the Task Manager, System Owners, or other designated parties
  • Utilize proficient, clear and concise English written and verbal communication skills to effectively interact with clients and with team members
  • Prepare weekly and monthly status reports, budget/actual projections, and other administrative support tasks as assigned by the Program Director
  • Conduct off-site reviews, as needed, involving limited travel to support off-site systems, ISSO needs, and other tasks approved by the Task Manager and Program Director
  • Bachelor's Degree from an accredited college or university required in Engineering, Business Administration, Information Technology or related field, equivalent years of experience in lieu of a degree may be considered in special circumstances, but not preferred
  • Master's Degree from an accredited college or university preferred
  • At least three (3) of the following industry-recognizable professional security certifications with CISSP preferred as 1 of the 3 certifications
29

IT Security Specialist Tx Resume Examples & Samples

  • Provide support to plan, coordinate and implement and organization's information security
  • Maintain knowledge of computer and network technology, security policy and procedures and familiarity with the specific mission and function of assigned information systems
  • Oversees the efforts of security staff to design, develop, engineer and implement solutions to security requirements of the NSA IT security
  • Knowledge of current security tools available
  • Different communication protocols
30

IT Security Specialist Ga Resume Examples & Samples

  • Provide support for facilitating current security infrastructure and define future programs, design and implementation of security related to IT systems. *Hardware/software security implementation
  • Ensure IA and IA-enabled software, hardware, and firmware comply with appropriate security configuration guidelines, policies and procedures. *Deployment and usage of appropriate communication protocols and encryption techniques/tools
  • Complete and maintain Information Security plans and documentation. *Participate in IS risk assessment during the Certification and Accreditation (C&A) process
  • Conduct continuous monitoring on accredited systems and review results. *Ensure assigned information systems are accredited and are operated and maintained in accordance with their C&A documentation
  • Perform Analysis of existing/proposed IT systems, problems, security or requirements, general design or redesign of computer systems or subsystems. *Direct or participate in all phases of study development with emphasis on problem definition & analysis
  • Research new Information Security technologies
  • Design and prepare technical reports and related documentation
  • Report security incidents in accordance with appropriate policies. Respond, when applicable, to tasking received via the NISIRT
  • Gathers and organizes technical information about an organization's mission goals and needs, existing security products, and ongoing programs in the MLS arena
  • Hardware/ software security implementation
  • Encryption techniques/tools
  • Familiarity with commercial products and current internet/EC technology
31

IT Security Specialist Resume Examples & Samples

  • Bachelor's degree with minimum of three (3)+ years of experience in one or more of the following areas: Information System Security Officer, Security System Design, Desktop and LAN Support
  • Must have active Secret security clearance
  • Must have Security+ Certification or be able to obtain within 6 months of hire
  • Additional experience/knowledge/skills
32

IT Security Specialist Resume Examples & Samples

  • Leverage your In-depth knowledge and proven proficiency in Managing ( Device and Policy Mgmt ) of F/W , IDS / IPS , eMail Security, EPP, DLP & SIEM Solutions to support / manage the Security Perimeter for multiple commercial clients
  • Demonstrated knowledge and skills in Support of FireEye (Zero day threat prevention) , Voltage (eMail Security),
  • Support of firewall technologies including Checkpoint and Cisco
  • Administration, configuration and troubleshooting of Security Appliances
  • Analyze and implement complex firewall rules on Checkpoint firewalls security devices
  • Engage in client facing liaison, supporting and managing client(s) IT Security Posture and associated technology solution
  • Engage in weekly cadence with client and provide value add by means of recommendations to drive efficiency and value while minimizing vulnerabilities
  • Demonstrate your proven hands-on experience with firewalls and a comprehensive knowledge of IP networking and network security including Intrusion Detection, DMZ, encryption, IPSec, PKI, VPNs, VPN, Site to Site VPN tunnels, SSL/VPN, proxy services, and DN
  • At least 2 years experience in a Security Operations Role
  • At least 2 years experience managing various security technologies such as Firewalls, IDPS, Vulnerability Management Systems (VMS), Security Information and Event Management (SIEM), Content Filtering, Advanced Persistent Threat (APT) / Data Leakage Protection (DLP), etc
  • In-depth knowledge and proven proficiency in Managing ( Device and Policy Mgmt ) of F/W , IDS / IPS , eMail Security, EPP, DLP & SIEM Solutions
  • At least 2 years Managed Security Services experience in industry leading Security solutions such as Checkpoint , Cisco , Juniper , Qradar , ArcSight , Tripwire, Websense , Symantec , F5 & PaloAlto
  • Thorough understanding of IT Security principles and practices, with at least 3 years experience in the IT Security field
  • Sound understanding of Industry Leading security Solutions
  • Industry recognized security certifications This can include security methodology (Eg. CISSP, CISA, ITIL, etc.) or vendor specific (product) certifications (Eg. CCSP, JNCIS-FWV, etc.)
  • Experience with Cisco routers and switches, and a good understanding of IP sub netting and routing such OSPF and BGP
  • Experience using Linux-based systems
  • Basic knowledge and understanding of Databases
  • Canadian Securities Secret clearance
33

IT Security Specialist Resume Examples & Samples

  • User administration and user authorization experience
  • Knowledge of user or system administration of Server Operating systems in one or more of the following environments - Intel, Unix, midrange or mainframe
  • Knowledge of user or system administration of server applications (e.g. DB2, Lotus Notes etc.)
  • Knowledge of ticketing tools (ex. Maximo, Remedy)
  • Bash / Python / Powershell scripting skills
  • Good Microsoft Excel skills
  • Ability to meet tight deadlines
  • Master's Degree in Computer Science or another IT related discipline
34

It-dps-it Security Specialist / Itss Resume Examples & Samples

  • Understands customer support, likes to work with people and can ensure that the customer is satisfied
  • Understanding of basic Networking principles, including network troubleshooting for connectivity issues, DHCP, DNS, use of tools like PING, NSLOOKUP and NETSTAT
  • Perform event correlation, analysis of malicious activity indicators, and appropriate response, based on review and access to multiple security tools and services
  • Provide routine security and general support (tickets, ad-hoc requests, etc.) to all DPS departments/users, IT groups/resources, external (other state agencies, public), etc
  • 10 Total years IT experience
  • 8 Years IT security experience
  • 8 Years customer service experience
  • 2 Years SIEM experience (Q-Radar preferred)
  • 4 Years' experience with Web and Email Filtering and Security (IronPort preferred)
  • 5 Years' experience with Web Application Firewall/Database Activity Monitoring (Imperva preferred)
  • 3 Years of endpoint protection experience (McAfee preferred)
  • 1 year of vulnerability scanning experience (Qualys preferred)
  • 1 year of application security scanning experience (AppScan preferred)
  • 3 years IPS (IBM preferred)
  • Proven contributor to continuous process improvements to increase the efficiency of section
  • 8 Years troubleshooting experience
  • 8 Years' experience with Active Directory
  • 8 Years knowledge of Networking to including PING, NETSTAT, DHCP, DNS, and NSLOOKUP
  • IBM Q-Radar
  • IronPort Web/Email Security
  • Imperva
  • Qualys
  • McAfee Enterprise solutions
  • IBM IPS
  • Other security related tools
  • Certifications in Microsoft
  • PowerShell 3.0 scripting background
  • ITIL Knowledge and ITSM Tools
35

IT Security Specialist Resume Examples & Samples

  • Document program monitoring and incident response program elements at both policy and procedural levels
  • Perform hands-on implementation tasks of hardware and software required to maintain information security and conform to firm-wide policies
  • Familiarity with ISO 22301 and ISO 27001 is a plus
  • Security+, SANS GIAC, CISSP, CISA, Microsoft, ISO Lead Auditor, and Cisco certifications desired, but not required
36

Mainframe IT Security Specialist Resume Examples & Samples

  • Technical knowledge of IBM Mainframe operating systems with Z/OS preferred and a working knowledge of networking, installation, and maintenance a plus. Strong working knowledge of the Mainframe external security manager CA Top Secret Security preferred although RACF is acceptable
  • Experience working with industrial and/or National Security Information security systems and implementation procedures
  • Possess or obtain a security clearance as required by contract or government regulation
  • Experience working with IBM Mainframes
  • Experience with system security processes
  • Experience with procedures for handling sensitive and classified information
37

IT Security Specialist Resume Examples & Samples

  • Refresh and maintain the identity and access governance strategy
  • Complete a current state assessment of the ESI identity environments and develop a plan to mitigate areas of concern or long standing security issues
  • Lead an effort around active directory clean-up and implement an effective governance structure
  • Engage in threat modeling of ESI environments and solutions to advise on risk and direct remediation activities
  • Serve as an escalation point for risk based decisions
  • Engage as a consulting resource on efforts requiring information protection support
  • Guide the successful completion of major project functions as needed
  • Mentor junior resources
  • 6+ years’ experience with master’s degree, 8+ years’ experience with bachelors or 14+ years equivalent experience
  • Minimum 5+ years of relevant working experience in security with a focus on identity and access management
  • Minimum 3+ years developing strategy and governance models
  • Preferred IT architecture or engineering background
  • Excellent organizational skills and ability to communicate with internal/external entities a must
  • Strong written communication and technical documentation skills
  • Demonstrated ability to coordinate people and teams to objective completion and the ability to work in a team environment, delegating workloads and responsibilities
  • LI-AB1
38

IT Security Specialist Resume Examples & Samples

  • Refresh and maintain strategy and engineering documents
  • Design solutions to solve problems from a backlog of complex security challenges
  • Engage in Agile transformation helping build security stories into team backlogs
  • Drive the completion of pipeline that allows for security approval of software
  • Minimum 6+ years of relevant working experience in IT security
  • Preferred background in infrastructure or application engineering
39

IT Security Specialist Resume Examples & Samples

  • Plan and implement data analyses and reporting projects of varying degrees of complexity using a variety of databases and software
  • Develop and produce reports of varying technical complexity. The Senior IT Security Specialist confers with users to determine problems, resolutions, and requirements
  • Gather facts, analyze data, and prepare synopsis comparing alternatives in terms of cost, time, availability of tools and personnel, and recommend a course of action
  • Demonstrated oral and written communication skills in the preparation and presentation of security concept or evaluation documents; preparation of clear requirements documentation, user and system manuals, test cases, or other technical documents
40

IT Security Specialist Resume Examples & Samples

  • With direction, participates in the analysis, implementation, and evaluation of current and proposed security initiatives and needs including performing various activities to support Access Control activities including maintaining and monitoring user access, performing monthly reviews, monitoring access to the Network, reviewing audit activities, performing monthly reviews and annual user reviews on applications, IT Resources and Outsourced Contractor Services
  • Performs the assigned tasks that have a high level of technical complexity or organizational visibility or requires specialized technical or analytical expertise
  • Synthesize data and information to create reports, manuals, policies and procedures and presentations of varying levels of complexity
  • Identifies and recommends resolution of processing problems
  • Develops and produces reports of varying technical complexity
  • The IT Security Specialist confers with users to determine problems, resolutions, requirements, while keeping the FDIC personnel informed
  • They will gather facts, analyze data, and prepare synopsis comparing alternatives in terms of cost, time, availability of tools and personnel, and recommends a course of action
  • This position could have access to personally identifiable information (PII) and will have access sensitive information (SI)
  • Three (3) years related work experience in the IT Security Field in supporting the development, maintenance, and retirement of applications, IT Resources and Outsourced Services
41

IT Security Specialist Resume Examples & Samples

  • Bachelor’s Degree (STEM degree)
  • Minimum of 8 years of experience in Information Assurance and/or Information Security
  • Understanding of System Development Lifecycle (SDLC) models
  • Ability to schedule network scanning tools such as Nessus
  • Strong client-facing skills with superior public speaking and organizational skills
  • Ability to work in independent environments under aggressive timelines with varying degrees of complexity
  • Exercise significant independent judgment within broadly defined policies and practices
  • Experience creating Assessment and Authorization (A&A) documentation
  • Documented information Assurance and/or Information Security experience
  • Working knowledge of government agency specific policies
  • Working knowledge of system administration or system engineering in the context of IT Security
  • Experience working with vulnerability scans on systems of varying complexity
  • Perform document reviews and data analysis of electronically stored information
  • Maintain cooperative relationship with business partners or other interconnected systems
  • Maintain awareness of security directives, orders, standards, plans and procedures
  • Support engineering and integration initiatives by assessing security policies, standards and guidelines, as necessary to facilitate certification and accreditation
  • Support the investigation of incidents, installation, modification or replacement of hardware or software components and any configuration change(s) that affects security, as necessary
  • Experience preparing certification packages and/or coordinating C&A and or A&A activities
  • Experience in several of the following areas: Hardware/Software/OS security , communication protocols, encryption techniques/tools, internet, web, application, firewall and/or network security , IP networking, networking protocols , intrusion detection and authentication technologies
  • Ability to work independently, balance and prioritize work
42

Senior IT Security Specialist Resume Examples & Samples

  • TS/SCI with Polygraph security clearance required
  • Bachelor’s Degree in Computer Science or IT Engineering is desired and may be substituted for four years of experience; substitution of work experience is at the discretion of the COR
  • Twelve years of related work experience in the field of security authorization is required
  • DoD 8570-01-M compliance with Level III Information Assurance Management. (IAM, Level III, Level I [minimum], GISF, GSLC, Security +, CAP)
43

IT Security Specialist Resume Examples & Samples

  • 10 years of related work experience
  • Has a working knowledge of the security authorization processes and procedures
  • Experience in several of the following areas is required: knowledge of current security tools, hardware/software security implementation; different communication protocols; and encryption techniques/tools
  • Familiarity with commercial security products, security authorization techniques, security incident management, and PKI and authorization services
  • DoD 8570 compliance with Level III Information Assurance Technology
  • Level III [CISA, CISSP (or Associate), GSE, SCNA, GCIH]
44

Advisory IT Security Specialist Resume Examples & Samples

  • 2+ years Risk Management experience
  • 3+ years IT security experience
  • 1+ years Cisco network devices and Server Administration/Management on Wintel platforms experience in a production environment
  • Well organized, structured approach
  • Excellent interpersonal and communication skills
  • Strong self-motivation and orientation toward results
45

IT Security Specialist Resume Examples & Samples

  • Conduct an assessment of the current security status of all our Client's public facing websites and make recommendations to improve and enhance their relative security posture as related to OMB M-15-13 and HTTPS
  • Consults with project teams, client, and end users to identify website security requirements
  • Develop recommendations to FEMA for implementing secure technology for all FEMA public facing websites (in compliance with OMB M-15-13) and ways to otherwise improve and enhance the security of systems or processes
  • As part of a larger Identity Management Support (IMS) program, this project will develop and deploy an External User Active Directory Registration Portal to proper control, process approval and authorize our Client's external users
  • 5 years experience implementing/configuring secure webservers (HTTPS)
  • Excellent understanding of digital certificates, SSL and TLS
  • Experience with IAM credentialing, administration, provisioning, access governance, privileged access management, and multi-factor authentication Other Familiar with most standard Software Development Lifecycles
  • 2 years experience implementing IAM solutions and/or PKI design and implementation
46

IT Security Specialist Resume Examples & Samples

  • Hardware/Software/OS security
  • Cloud
  • Perimeter security
  • Application development
  • Training of users
  • Demonstrated the ability to work proactive and show “can-do” attitude
  • A dynamic profile, a result-oriented approach to work and an ability to motivate others to deliver results
  • A self-motivating personality with a great deal of entrepreneurship
  • Well-developed presentation and facilitation skills
  • An international mindset
47

IT Security Specialist Associate Resume Examples & Samples

  • Gather information and intelligence as the first line of defense against threats and vulnerabilities, exploits and attacks, against the Enterprise. Determine appropriate course of action with Supervisory assistance
  • Work shifts that rotate throughout month/year covering all possible schedule variations/rotation possibilities
  • Develop clear documentation and convey information to senior team members or other agencies, depending on the situation, enabling them to prevent situations from escalating further
  • Obtain and adhere to strict procedures established to ensure effective and successful operations of the SOC
  • Plan activities effectively within the context of round-the-clock, shift operations
  • Develop working relationships with other or senior SOC personnel, ensuring seamless operation within this context
48

IT Security Specialist Resume Examples & Samples

  • Min. 2 years of web development experience with Python web frameworks (preferably Flask)
  • Web development frontend skills: JavaScript, jQuery, HTML/CSS, Twitter Bootstrap, JavaScript Frameworks(preferably AngularJS)
  • Ability to create and reuse Restful APIs to improve integration between existing and new security systems
  • Upper-intermediate command of English (you would communicate daily with colleagues from abroad)
49

IT Security Specialist Resume Examples & Samples

  • Must have a degree on Information Technology, Computer Science or any related course
  • At least 3 years of experience in IT security operation
  • IT Security Operations Center environment experience with security monitoring experience a must
  • Solid working experience with any of the following tools is required: UNIX, Windows, Sourcefire IDS, McAfee EPO, Cisco ASA, or other packet capturing solutions
  • Provide expertise with security technologies including Intrusion Detection and Prevention Systems, Firewalls and Log Analysis, SIEM, Network Behavior Analysis Tools, Antivirus, Network Packet Analyzers, malware analysis and forensic tools
  • Ability to interact with vendors, clients and internal teams in a professional and articulate way
  • Should have Shared Services industry experience
50

IT Security Specialist Resume Examples & Samples

  • Works with both internal and external customers to understand business requirements and needs
  • Benchmark, monitor, enhance IAM systems to improve their reliability and scalability in accordance to the action plan and related projects
  • Reviews and analyzes existing security services for effectiveness and efficiency, and then develops strategies for improving or leveraging these systems
  • Perform third party vendor risk, project risk, or technology risk assessments
  • Oversees the security project portfolio to ensure tasks, milestones and deadlines are being met
  • Researches and makes recommendations on security products and services in support of information technology efforts
  • Develop, manage and improve security processes
  • Creates and maintains analytics to review and manage
  • 2-5 years enterprise experience in selected technology field
  • Experience with software development lifecycle (SDLC) methodology
  • Certifications in CISSP, CISA, CISM, CCSP/CCIE, GIAC is preferred
  • Experience with security standards, controls and frameworks (PCI, SOX, NIST, Cobit, ITIL)
  • Experience with product implementation is preferred
  • Experience with Identity & Access Management technology is preferred
  • Comprehensive knowledge of compliance frameworks such as Sarbanes-Oxley, PCI, or ISO
  • Strong knowledge of Database (Oracle/SQL)
  • Strong knowledge of incident response
  • Strong knowledge of risk assessment
  • Advanced ability to create KPI's, dashboards, metrics and reporting
  • Advanced ability to work on Information Security sponsored projects, which includes providing necessary documentation, establishing and meeting timelines
  • Proficiency in MS Office Suite
  • Strong ability to work independently, work in a fast paced environment, and manage workload prioritization to deliver high quality work products on time with minimal direction
  • Strong critical thinking skills with the ability to use proven problem-solving approaches to most solutions
  • Demonstrated collaboration skills with the ability to handle conflict and to work with a distributed team
  • Ability to communicate and present to the business and speak in front of people
  • Understanding of governance processes
51

IT Security Specialist Resume Examples & Samples

  • Bachelor’s degree in Information Technology, or related field
  • 5+ years relevant security assessment and testing experience
  • CISSP or other security certification, such as GCEH
  • Demonstrable knowledge related to security assessment methodology, business, regulatory and contractual requirements, system and application architectures
52

IT Security Specialist Senior Iv-must be Clearable Resume Examples & Samples

  • Participates in IA risk assessments during the C&A process
  • Prepares recommendations for the DAA
  • Reviews security safeguards to determine that security concerns identified in approved policies, plans, and doctrine have been fully addressed
  • Develops and implements programs to ensure that systems, network, and data users are aware of, understand, and follow IA policies and procedures
  • Implements effective security monitoring protocols; appropriately responds to and remediates information security threats
  • Interacts with various departments and individuals across the enterprise to achieve information security objectives
  • Assures successful implementation and functionality of security requirements and appropriate IT policies and procedures that are consistent with the organization's mission and goals
  • Serves as the primary point of contact for IA/cybersecurity policy, guidance, and DIACAP Certification and Accreditation (C&A) and RMF requirements and implementation
  • DoD 8570-01M IAT Level III certification (CISSP, CISA, or similar)Desired Certifications
  • Must have an Active TS/SCI with Poly clearance to start
53

Mau-it Security Specialist Resume Examples & Samples

  • Works on multiple projects as a project leader or technical leader/consultant
  • Knowledge of security technologies (encryption, data protection, design, privilege access, etc.)
  • Direct experience and proficiency with 4 or
54

IT Security Specialist Resume Examples & Samples

  • Ensure the right controls are in place and that they are monitored and actioned as required, controls such as: - Conduction penetration tests - Password cracking tools - Qualys scanning for missing patches on all applications - Data retention and scanning tools for improving email scanning and high levels of accuracy for email searches. - Forensics tools for computer scanning for litigation and case relevant information, inappropriate media and desktop and servers. - Liasing with ITI to ensure operational set up, patching, password management etc are according to Daimler standards - Ensure all system incidents are logged, have root cause defined and action plans for remediation. Report on incidents on a monthly basis to ensure learning from past incidents occurs
  • Assisting with the Information Security processes as they apply to: - Reviewing the asset classification status and trigger the appropriate activities where the classification is missing or not documented in PlanningIT - Conducting application compliance checks ISDC and review the status of the ISDC checks and initiate the appropriate remediation activities where an ISDC check is missing or not documented in PlanningIT
  • Serve as a Center of Excellence for all inquiries regarding Information Security and improve Information Security management capabilities, knowledge, competence and skills within the IT department. - Organize and deliver Information Security management-related training and informational sessions to IT and Business Units leaders. - monitor the Security Office as the single point of contact for all inquiries relating to Information Security. - Gain a reputation for influencing a culture of robust information security standards consistent with Daimler standards. - Schedule, prepare and conduct a regular Local Information Security Forum at MBUSA. - Regularly conduct Security Self Assessments at MBUSA and update the DAG Questionnaire. - Organize and support the on-site assessments according to the assessment plan provided by DAG. - Ensure new security requirements in DISC (Daimler Information Security Compendium) are communicated to all affected parties including employees, contractors and other external users or partners. - Conduct specialized security training for groups dealing such as and not limited to associates dealing with personal data, developers and administrators. - Conduct regular awareness programs on relevant security topics. - Provide consulting support to the MBUSA Legal Team on data collection methods and tools
  • Establish and continuously improve the Information Security Program at MBUSA. - Utilize standard tools and templates developed by headquarters in Germany and adjust as necessary for the needs of MBUSA. - Where no global solutions are available, develop and implement alternatives appropriate for the local environment. - Establish regular dialog with Security counterparts in the region and at headquarters in Germany. - Address local concerns and ideas for changes and/or improvements to global standards and tools to regional and headquarter contacts to ensure that local needs are sufficiently expressed. - Monitor the status of global process and tool changes and ensure that changes are successfully communicated and implemented at MBUSA. Adapt local procedures where necessary to comply with global standards. - Maintain focus on emerging information security trends and best practices and make recommendations for local use where appropriate and in alignment with global standards. - Define and implement a process to solicit regular feedback from project leaders and IT management security management standards and tools to determine knowledge gaps requiring future training, as well as the need for additional supporting tools to assist application managers in successfully developing their applications
  • Monitor the information security processes by: - Quality checking and approving of application classification for all new applications and applications in PlanningIT - Complete application compliance checks for Information Security Disc Compliance (ISDC) and quality checks - Ensuring Houston IT quality checks for all application development - Quality check and approval of risk analysis and RAA’s and ensure all RAA’s are uploaded into the RAA database. - Support the resolution of all local security incidents and the escalation of incidents where required using CSIM - Complete a quality check of all ITSCM plans. - Support the procurement process to ensure the inclusion of proper information security requirements in the contracts with external parties and vendors
  • Act as the IT department coordinator for compliance and audit-related tasks and projects. - Coordinate the annual Internal Control System (ICS) process within IT. Ensure adherence to defined deadlines for completion of ICS tasks to ensure proper quality and correctness. - Ensure early and ongoing participation in the project definition phase to ensure all ICS compliance requirements are included. - Coordinate other audits performed in the IT area, e.g. Corporate Audits, internal assessments, ISO audits, etc. Support onsite field visits from auditors. Coordinate responses to audit reports and track and facilitate the timely and proper implementation of audit remediation items. - Coordinate the performance of self-audits to validate the adequacy of remediation steps taken. - Coordinating all audit remediation, including tracking of open audit items, preparation of audit documentation, confirmation letters, etc. - Coordinate efforts regarding awareness & training, including creating presentation materials, E-mail notifications, etc
  • Computer/Information Science
  • Business Administration / Management
  • Economics
  • Technical Management-Logistics
  • Project Management and/or Process Improvement focus
  • MBA or equivalent is highly preferred
  • Ability to collect data and establish facts and identify trends and variances
  • Ability to integrate information from a variety of sources with varied levels of complexity
  • Ability to review and interpret and evaluate statistical information
  • Ability to incorporate new technology into current and future business applications
  • Ability to develop plans/projects from conceptualization to implementation
  • Ability to organize workflow and direct tasks as well as document milestones and ROI’s and resolve problems
  • Ability to organize and manage a team
  • Ability to negotiate contract terms and have a network of contacts in the industry
  • Strong conceptual thinking ability
  • Strong analytical, problem-solving and decision-making capabilities with the ability to analyze situations, identify existing or potential problems and recommend solutions
  • Excellent leadership and influencing skills to drive adoption of consistent processes, methodology and practices throughout the IT department
  • Superior interpersonal skills including courtesy, professionalism and a cooperative attitude
  • Demonstrated outstanding level of professionalism in providing management support, including ability to exercise good judgment, discretion, tact and diplomacy
  • Succinct, direct and grammatically correct communication skills are a must
  • Outstanding presentation skills. Previous teaching or facilitation experience is a plus
  • Demonstrated ability to supervise and motivate a team to gain credibility within the organization
  • Customer-service driven
  • Energetic self-starter with a positive attitude and the ability to be resourceful
  • Thrive in a dynamic, fast-paced environment where you must take on multiple responsibilities and do what it takes to get things done
  • Excellent relationship building/partnering skills
  • Ability to work with varying levels of individual contributors and management
  • Strong interest in and proven tracking record in teaching/mentoring others
  • Solid knowledge of PMBOK standards, ITIL principles, and SDLC processes a plus
  • Previous experience in managing projects
  • Information security knowledge and understanding
  • Understanding of Information security controls and management
55

IT Security Specialist, Risk Management Resume Examples & Samples

  • Designing and implementing IT security and risk management framework/tools for business-to-business (B2B) solutions, cloud-based CRM solutions such as Salesforce.com
  • Manages implementation of IT security and risk management framework/tools
  • BS in Computer Science, Information Security, or a related field. MBA is preferred
  • 5+ years of experience working with national and international regulatory compliance frameworks such as ISO27000, COBIT, NIST, HIPAA, and PCI DSS
56

IT Security Specialist Resume Examples & Samples

  • Proven Technical expertise, at least 4 years in Information Technology and 2 years on Security products with hands-on experience on -Basic system management (Linux, Windows, Unix-like) and networking knowledge (TCP/IP networking protocol)
  • Required knowledge either on SIEM products (Qradar, ArcSight), IAM (Identity & Access Management - Governance) products, -Vulnerability Assessment tools like AppScan, Nessus, etc. - at least 2 years of proven working experience on security products
  • Required Italian mother tongue (written and spoken)
  • Required English written and spoken knowledge - intermediate level
  • Required "landed" resource available to travel to different customers in Italian IMT
  • Certification on security products (SIEM, IAM, Vulnerability Assessment tools)
57

Senior IT Security Specialist Resume Examples & Samples

  • Support business users and Security anomalies 24/7 through the IT On-Call procedures
  • Command and Control for SCADA and critical infrastructure a plus
  • Maintains quality service by following organization standards
  • Administer critical analysis of Security test results and deliver solutions to problem areas
  • Generate statistics and prepare and write reports for management and/or team members on the status of the Security process
  • Assist in the development and maintenance of user manuals and guidelines
  • Install security products for end users as required
  • Liaise with network administrators, IT analysts, DBA’s, System Administrators, and the IT Enterprise Architect to assist in resolving problems with Security products or company software systems
  • Provide guidance to network and IT analysts
  • Provides support in the area of process improvements & automations
  • Provides support to security standards and SOX Compliancy
  • Performs special projects and assignments as required
  • Provides data for timekeeping, budget authorizations, and performance measurements
  • Assists with Disaster Recover / Business Recovery Planning & Testing
  • Performs duties inherent in all professional salary environments. Consistent with all positions in this classification, additional projects, tasks and/or duties beyond what is outlined here may be assigned as required
  • 7-10 years of Security experience with Oracle and SQL based platforms
  • 7-10 years of experience in building security and enterprise architectures
  • Working technical knowledge of Network Firewalls
  • Working technical knowledge of TCP/IP
  • Working technical knowledge of Risk Based and Profile based authentication
  • Working technical knowledge System Administration
  • Working technical knowledge Network Security
  • Working technical knowledge Information Security Policies
  • Working technical knowledge Firewall Administration
  • Working technical knowledge Network Protocols, Routers, Hubs, and Switches
  • Experience working with SSL VPN’s
  • Extensive focus on Encryption technologies
  • Experience working with enterprise applications
  • Knowledge of Change Management Tools and methodologies
  • Solid working knowledge of current Internet technologies, including XML, HTML
  • Hands-on security troubleshooting experience
  • Knowledge of applicable data privacy policies & Security best practices
  • Familiarity with energy & utility industries
  • We are committed to developing and implementing innovative projects that increase energy efficiency and save clients money
  • We provide an opportunity to build a successful and rewarding career in a variety of functional business areas
  • We foster individual talents and abilities while promoting the value of teamwork
  • Our culture prepares you for a lifetime of learning and professional development
58

IT Security Specialist Resume Examples & Samples

  • Executing IT-Security projects in particular in cloud environments (AWS, Azure) and cloud services
  • Identifies areas where existing security architecture requires change or development
  • Providing risk analyses for business
  • Providing IT security consultancy for IT operation
  • Provides IT-Security awareness programs
  • Reviews IT Compliance with legal and contractual environments
  • Enabling business and IS-Organization to perform the IT risk management process
  • Overseeing business impact analysis to ensure resources are adequately protected with proper security measures
  • Providing IT-Security-risk universe (internal and external risks) and IT Security risk mitigation for his / her area of responsibility
  • On-going knowledge transfer to management, team members and clients on security products and standards
  • Conducts and reports on internal investigations of possible security violations
59

IT Security Specialist Resume Examples & Samples

  • Prepares, distributes, and maintains plans, instructions, guidance, and standard operational procedures concerning Information Security
  • Prepares, reviews, and evaluates documentation of compliance
  • Reviews IA and IA enabled software, hardware, and firmware for compliance with appropriate security configuration guidelines, policies, and procedures
  • Reviews IA security plans
  • Identifies alternative functional IA security strategies to address organizational security concerns
  • Develops, implements, and maintains information security programs appropriate for multiple networks
  • Manages information security compliance efforts, with an emphasis on regulatory requirements (DIACAP, RMF)
  • Conducts information security risk assessments and effectively communicates risk to program manager and client
  • Develops procedures to maintain security and protect systems from security threats. Works with IT Support Manager to ensure that best practices are incorporated into policy in support of our quality management efforts
  • Provides leadership and concurrence in configuration control, planning and implementation of projects for computer security and enterprise systems administration
  • Ensures adherence to IA/cybersecurity policies, procedures and training for all assigned staff
60

IT Security Specialist Login to Save This Vacancy Resume Examples & Samples

  • Monitor security vulnerabilities, threats and events in network and host systems
  • Manage security technologies such as network, intrusion detection and prevention systems, Anti-Malware and Email Gateways
  • Anticipate security alerts, incidents and disasters and reduce their likelihood
  • Perform or co-ordinate penetration testing, vulnerability testing, risk analyses and security assessments
  • Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and/or destruction
  • Analyse security breaches to determine their root cause
  • Update and upgrade security systems as needed
  • Defend systems against unauthorized access, modification and/or destruction
  • Provide technical advice to colleagues
  • Knowledge of industry security regulations and regulatory practices
  • Strong communications skills
61

IT Security Specialist Resume Examples & Samples

  • Responsible for administration and supporting SiteMinder R12 systems
  • Understanding in integrating SSO with externally hosted vendor (3rd party) applications using SAML ( specifically using Ping Identity Federation )
  • Experience in supporting CA Directory server and Ping Fedrate
  • Experience in supporting complex PKI infrastructure
  • Should exhibit disciplined, process-driven and result oriented approach in daily activities
  • Provide day to day Production support
  • General knowledge and understanding of UNIX / Linux operating systems
  • Demonstrates ability to work both as an individual contributor and in a team environment
  • Open to work in shifts and weekend to support 24*7 operations support
  • Experience providing production support services to critical IAM applications
  • Good understanding of network protocols, LAN, WAN, SSL, Firewall, Load Balancer, and DMZ configurations
  • ITIL V3 Foundation Certification
62

IT Security Specialist Resume Examples & Samples

  • Performs day-to-day security log review and analysis in adherence with corporate requirements and industry security best practices. The log reviews include, but are not limited to, operating systems, databases, applications, networks and security applications
  • Responsible for reporting, escalating, and remediating anomalous events based on the established protocol. The reporting, escalating and remediating will require working knowledge of protecting operating systems and networks using malware protection, firewalls and other security tools
  • Provides meaningful Information Security metrics, which include identifying historical trends, areas of risks/gaps, violations and/or improvements
  • Works with Security Team to tune and maintain the log analysis/management tools in order to reduce the occurrence of false positives and improve anomalous detection capabilities
  • Works with product owners to define requirements for logs requiring collection and review
  • Keep abreast of current global security risks
  • Stay aligned to Lutron’s culture and values
63

IT Security Specialist Resume Examples & Samples

  • Develop annual schedules and project plans for security programs, including A&A, Plan of Action & Milestones (POA&M) remediation, configuration management, scanning, testing, and other IT Security requirements
  • Assist with technology evaluations, trade studies, briefing development, and engineering analyses
  • Conduct audits and provide guidance of security programs including A&A and Continuous Monitoring based upon National Institute of Standards and Technology (NIST), FISMA, Department of Commerce (DOC) and National Oceanic and Atmospheric Administration (NOAA) guidelines, policies and procedures
  • Perform and support Information Systems Security Officer (ISSO) duties as designated by the Task Manager
  • Provide impact analysis for updates and version changes required by the NIST Security Publications and FISMA Notices
  • Update and develop security standards and templates as required to meet new government and regulatory requirements
  • Bachelor's Degree from an accredited college or university required in Engineering, Business Administration, Information Technology or related field; equivalent years of experience in lieu of a degree may be considered in special circumstances
  • At least three (3) of the following industry-recognizable professional security certifications with CISSP preferred as one (1) of the three (3) certifications
64

IT Security Specialist Resume Examples & Samples

  • Provides technical installation support to field technicians
  • Responds to, reviews and approves operational quality of system equipment
  • Conducts site surveys of customer sites and plans and designs systems installations
  • Resolves customer application questions or problems regarding system configurations/setup, product functionality and/or bugs enhancement
  • Communicates project status, deliverables, priorities and contingencies
  • Acts as liaison between project team members, customers and installation team to ensure project is implemented seamlessly
  • Troubleshoots, diagnoses, and applies logical solutions to installation problems
  • Verbal/written communication skills
  • Desk side support experience
65

Senior IT Security Specialist Resume Examples & Samples

  • Participate in the analysis, implementation, and evaluation of current and proposed security initiatives and needs including performing various activities to support Access Control activities including maintaining and monitoring user access, performing monthly reviews, monitoring access to the Network, reviewing audit activities, performing monthly reviews and annual user reviews on applications, IT Resources and Outsourced Contractor Services
  • Perform assigned tasks that have a high level of technical complexity or organizational visibility or requires specialized technical or analytical expertise
  • Maintain knowledge of emerging and current information, technology, products and services that address business needs and enhance the quality of work
  • This position synthesizes data and information to create reports, manuals, and procedures and presentations of varying levels of complexity
  • Identify and recommend resolution of processing problems
  • Five (5) years related work experience in the IT Security Field in supporting the development, maintenance, and retirement of applications, IT Resources and Outsourced Services
  • Demonstrated experience supporting the development of requirements and approaches; analysis of alternative tools and methodologies; providing review, guidance, or assistance in the implementation of complex technical security solutions; analysis of operations and methods to improve quality and effectiveness or directing and reviewing the activities of teams performing security assessment of applications IT Resources and Outsourced Services
  • Knowledge and experience with system life cycle development methodologies such that a high level of competence has been demonstrated
66

IT Security Specialist Junior / Senior Resume Examples & Samples

  • Communicative english ,
  • Understanding (and the interest) of system and network security controls,
  • Understanding of intrusion detection and prevention systems,
  • Experiences with methodology ISO 2700x welcomed,
  • Experiences with project management welcomed
67

IT Security Specialist Resume Examples & Samples

  • Proven understanding of Network and endpoint security technologies like WAF (Web Application Firewalls like Signal sciences, KONA, etc), in Firewalls, IDS/IPS, ePO, Database transaction monitoring tools (McAfee, Guardium, Symantec products)
  • Understanding of enterprise level application and infrastructure security fundamentals and system hardening configuration
  • Proven understanding of analyzing the vulnerabilities and remediation approach on infrastructure and middleware components
  • Worked in enterprise IT Security environment and managed different building blocks of infrastructure security like Network, Systems and application security technologies like Firewalls, IPS/IDS, End point security, threat detection/management, application security components, compliance tools etc
  • Ethical hacking methodologies and using of Ethical hacking tools
  • Knowledge on Application, Middleware and Database technologies
  • Understanding of Unix, Windows Operating systems and scripting
  • Understanding of Application and middleware technologies and associated components
68

IT Security Specialist Senior Resume Examples & Samples

  • Identifies technical security vulnerabilities and develops plans to mitigate
  • Performs hands-on implementation and operation for a wide variety of security technologies including, but not limited to: IDS/IPS, web content filtering, logical access controls, and data loss prevention
  • Performs or coordinates penetration testing of systems and networks
  • Performs architecture assessments of systems and networks
  • Serves as technical lead in responding to information security events and performance of initial diagnostics/forensics
  • Monitors outside intelligence sources to identify emerging threats and associated protections and determines how they apply to the enterprise environment
  • Bachelor (4-year College) degree in computer science and 5-10 years of experience or equivalent combination of education and experience
  • Strong technical background in security engineering, system and network security, authentication and security protocols
  • Strong technical knowledge of web application penetration testing process and methodologies
  • Experience with web access controls and data leakage protection
  • Strong knowledge of current Windows server and workstation operating systems
  • Team player with ability to work cooperatively with IT staff/ leadership and project managers
69

IT Security Specialist Resume Examples & Samples

  • Utilize internal guidelines for effective incident escalation to senior level resources
  • Provide daily operational monitoring and support for security platform tools and end user requests
  • Responsible for configuring vulnerability assessment tools, as well as performing scans, researching and analyzing vulnerabilities, identifying relevant threats, corrective action recommendations, summarizing and reporting results
  • Collaborate with Security Operations Manager to develop and monitor progress on information systems against IT and business strategy
  • Participate in knowledge sharing with other analysts and develop solutions efficiently
  • Participate on interconnecting the SIEM tool with sources of security incidents – e.g. logs from servers, network and security devices, Vulnerability Management system, Antivirus system, etc
  • Able to work 24/7 on-call shift rotation schedule
  • Bachelor’s degree in a computer related field highly desired (computer science, engineering, MIS, etc.)
  • Knowledge of IT Security principles, techniques and technologies (including IDS/IPS, Firewalls, Vulnerability Management, Pen Testing
  • Experience with Windows (desktop/server) and Linux operating systems
  • Understand a variety of network protocols including TCP/IP, UDP, DHCP, FTP, SFTP, ATM, SNMP, SMTP, SSH, SSL, VPN, RDP, HTTP and HTTPS
  • Theoretical knowledge of information systems security standards and practices (e.g., access control and system hardening, system audit and log file monitoring, security policies, and incident handling)
  • Good interpersonal, and organizational skills, as well as phone and customer service skills
  • Ability to multi-task, prioritize, and manage time effectively
  • 3-5 years of experience or equivalent combination of education and experience
70

IT Security Specialist Resume Examples & Samples

  • Leverage your In-depth knowledge and proven proficiency in Managing ( Device and Policy Mgmt ) of Guardium Solutions to support / manage GDE and GDAM for multiple commercial clients
  • Demonstrated knowledge and skills in Support of Guardium GDE & GDAM device and policy management
  • Analyze and implement complex policies on Guardium
  • Engage in daily/weekly/monthly cadence with client and provide value add by means of recommendations to drive efficiency and value while minimizing vulnerabilities
  • Handle incidnet tickets and work on resolving
  • Demonstrate your proven hands-on experience with Guardium in order to resolve Client’s
  • At least 5 years experience in a Security Operations Role
  • At least 3 years experience in managing policies for Guardium GDAM & GDE
  • Ability to troubleshoot policy and device/agent related issues as it pertains to Guardium GDE & GDAM solution
  • Good Knowledge and understanding of Databases
  • Thorough understanding of IT Security principles and practices, with at least 5 years experience in the IT Security field
  • At least 5 years experience managing various security technologies such as
  • Firewalls, IDPS, Vulnerability Management Systems (VMS), Security Information and Event Management (SIEM), Content Filtering, Advanced Persistent Threat (APT) / Data Leakage Protection (DLP), etc
  • Sound understanding of Industry Leading security Solutions & networking concepts
  • Industry recognized security certifications This can include security methodology (Eg. CISSP, CISA, ITIL, etc.) or vendor specific (product) certifications (Eg. CCNP, JNCIS-SEC, etc.)
71

Senior IT Security Specialist Resume Examples & Samples

  • Perform detailed security risk assessments of current security technology and authentications systems and evaluate against HIPAA, Federal and State Information Protection and Privacy regulations, HPHC Security Policies, and other relevant regulations pertaining to the protection of Enterprise information assets with respect to information security
  • Perform the assessment and review of new and existing technology infrastructure to identify key risk areas
  • Work directly with HPHC’s privacy team regarding the security and privacy of internal and external technology initiatives
  • Participate and advise personnel in the Office of Information Security (OIS) to support security risk assessment activities
  • Update skills as necessary to support OIS and security risk assessment activities and remain knowledgeable of industry standards and advancements
  • Participates in key or major projects across technology that have a high inherent security risk profile to assist in establishing security risk controls to mitigate the residual risk to an acceptable level
  • Recommend improvements to the tracking of risk mitigation activities and measuring residual risk over time
  • Manage security risk software vendor relationship to improve use of automated security risk assessment tools
  • Manage the security policy process within OIS, the Privacy and Security Committee, and the Security Steering Committee
  • Collaborate with all OIS and Privacy Leaders in conducting security risk assessments
  • Build relationships with corporate wide business unit personnel, third parties providing support to HPHC, and information operations personnel
  • Work with OIS leadership to establish and document security risk assessments
  • Demonstrates a commitment to service, HPHC values and professionalism through appropriate conduct and demeanor at all times. Adheres to and exhibits our core values
  • Maintains confidentiality and protects sensitive data always
  • Supports HPHC’s Innovation and Inclusion projects
  • Adheres to organizational and department specific safety standards and guidelines
72

IT Security Specialist Resume Examples & Samples

  • Leverage your In-depth knowledge and proven proficiency in Managing ( Device and Policy Mgmt ) of F/W , IDS / IPS , SIEM, eMail Security, DLP & SIEM Solutions to support / manage the Security Perimeter for multiple commercial clients
  • Support of firewall technologies including Checkpoint,Cisco,Fortinet,PaloAlto
  • Administration, configuration and troubleshooting of Network Devices
  • Analyze and implement complex firewall rules on Fortinet & Cisco firewalls security devices
  • Demonstrate your proven hands-on experience with firewalls and a comprehensive knowledge of IP networking and network security including Intrusion Detection, DMZ, encryption, IPSec, PKI, VPNs, Site to Site VPN tunnels, SSL, proxy services, Malware, and Email security
  • English Fluent (verbal and written)
  • At least 5 years experience managing various security technologies such as Firewalls, IDPS, Vulnerability Management Systems (VMS),
  • Ability to troubleshoot and fine tune Firewall policies
  • At least 5 years Managed Security Services experience in industry leading Security solutions such as Fortinet,Checkpoint , Cisco , Juniper , Tripwire, Websense , Symantec , F5 & PaloAlto
  • At least 3 years experience in managing Network devices such as switches and routers from vendors such as Cisco and Juniper
  • Solid Understanding of Network Access Control solutiosn such as Cisco ISE and ForeScout CounterACT
  • Experience with Symantec (end point and server) suite of products
73

IT Security Specialist Resume Examples & Samples

  • Leverage your In-depth knowledge and proven proficiency in Managing Linux OS and Servers
  • Leverage your In-depth knowledge and proven proficiency in Managing storage and backup solutions
  • You will be expected to engage, analyze and rectify aforementioned application related issues / problems efficiently and quickly
  • Leverage your In-depth knowledge and proven proficiency in Managing current Linux deployments in support of a crucial infrastructure backbone
  • You will be expected to engage, analyze and rectify Linux related issues / problems efficiently and quickly
  • You will establish a process to automate ,track and implement system solutions
  • You will be expected to modify system(s) to meet new security and compliance requirements
  • You will be expected to provide strategic direction for future deployment(s)
  • You will be expected to modify applications and application systems to meet current security standards
  • You will be expected to use various tools to monitor, maintain and trouble shoot aforementioned application configurations end-to-end
  • In-depth knowledge and proven proficiency in Managing Physical and virtual servers, network and storage virtualization in support of Security Operations Center infrastructure backbone
  • Knowledge of vCenter Servers to monitor virtual machine resource usage
  • Experience in deployment, management and support of Virtual Machines and vSphere components
  • Solid experience in the Administration, configuration and troubleshooting of the aforementioned components
  • Knowledge of Windows Server , AD and Citrix platforms to support our current deployment
  • Experience in providing metrics on overall capacity, health and performance of the aforementioned infrastructure
  • Strong technical ability to troubleshoot problems in a large enterprise involving complex network application flows between multiple hosts spanning multiple firewalls/security zones and different geographic locations
  • Familiarity with IT comliance and Audit
74

IT Security Specialist Resume Examples & Samples

  • Administration, configuration and troubleshooting of SIEM products such as QRadar
  • Good knowledge of SIEM Platforms such as ArcSight, splunk or QRadar
  • Solid understanding of QRadar architecture and ability to implement and manage QRadar products
  • Ability to develop use cases in QRadar based on client requirements
  • At least 3 years experience is managing QRadar solutoin
  • Ability to fine tune rules in QRadar and remove false-positives
75

Cyber / IT Security Specialist Resume Examples & Samples

  • Collects business requirements/business processes in collaboration with business divisions and document/implement
  • Ensure alignment of processes across the organization and performance management of the workflows
  • Create dashboards and reports for all relevant activities and KPI using the canned reports and dashboard
  • Participates in the creation of supporting documentation e.g. Key Operational Procedures
  • Supports obtaining sign-off of business requirements/processes
  • Liaises with program / project managers, clients, functional analysts and developers as appropriate to ensure business processes are understood and then document, create workflow for all processes
  • Supports and co-ordinates UAT, defining testing requirements together with the QA & Testing Team as well as the clients
  • Performs data analysis to support tasks as required
  • Assist in the development of an operational roadmap for the sustained success of the team - includes measuring the team's performance against Service Level Objectives (SLOs) and continuous improvement for their team
  • 10+ years of experience working in an information security or IT operations related field in an enterprise environment with extensive experience as a developer
  • Experience with EMC Archer Platform in developing workflows is a must
  • Experience in conceptualization and solution definition for workflows and operational procedure
  • Experience in designing and building applications
  • Ability to program in at least one programming language such as C#, Java (J2EE) etc
  • In-depth knowledge of programming for diverse operating systems and platforms using development tools
  • Excellent understanding of software design and programming principles
  • Collaboration with global staff
  • Proven leadership skills including: effective oral and written communication, performance management, issue resolution, negotiation, motivating others, forecasting, and planning
  • Self-motivated with ability to work with minimal supervision
  • Good analytical and problem solving experience
  • Awareness of Quality Management techniques to improve existing processes
  • Ability to identify and interpret stakeholders needs and requirements
  • Ability to work in virtual teams and matrixed organizations
  • Ability to commit and prioritize work duties and tasks
  • Ability to share information, transfer knowledge and expertise to team members
  • Degree from a four-year university or major course work in computer science, networking, engineering or other computer-related field of study
  • JavaScript, JQuery, HTML, HTML5, CSS, CSS3, Web Programming Skills, Verbal Communication, cross-browser compatibility, Web User Interface Design (UI), Security Principles, Object-Oriented Design, Web Services (REST/SOAP), Multimedia Content Development, API's
76

IT Security Specialist Resume Examples & Samples

  • Develop and test scripts using Unix Shell, Yaml, Groovy etc
  • Configure Automation tools like Ansible and/ or Bladelogic
  • Experience supporting n-tier JEE applications deployed in Linux environments, Java Web/Application servers
  • Integration knowledge : REST API, Orchestration, Web services