Lead-information Security Resume Samples

4.9 (100 votes) for Lead-information Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the lead-information security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
FJ
F Johns
Filiberto
Johns
28409 Susie Hill
San Francisco
CA
+1 (555) 824 7419
28409 Susie Hill
San Francisco
CA
Phone
p +1 (555) 824 7419
Experience Experience
Phoenix, AZ
Lead-information Security
Phoenix, AZ
Streich LLC
Phoenix, AZ
Lead-information Security
  • Manage own time and work with minimal supervision
  • Knowledge on Incident management and provide inputs on root cause analysis
  • Work closely with Enterprise Infrastructure, ECS and Risk Management teams on info sec aspects
  • Develop an internal assessment strategy for conducting ongoing evaluations against security frameworks and perform cloud security assessments, architecture reviews etc
  • Develop security frameworks aligned to enterprise policies, global best practices while having a focus on regulatory compliance as well
  • Use tools to develop, monitor and assess individual performance and provide timely feedback to promote team effectiveness
  • To explore new ways of working to maximize performance through implementation of new initiatives and best practices
New York, NY
Lead Information Security Analyst
New York, NY
Nicolas-Tillman
New York, NY
Lead Information Security Analyst
  • Assist with development of incident response processes and systems
  • Determine potential impact of detected gaps and translate that into risk within the established framework
  • Manage various incident response tools to ensure continued security and performance
  • Provide response for information security events, including threat analysis, root cause analysis, and remediation
  • Execute and support cyber security risk assessments on BNYM affiliates or third-parties
  • Develop situational awareness and stay informed of current technology and vulnerabilities
  • Produce and maintain metrics based on the assessment framework
present
New York, NY
Lead Information Security Engineer
New York, NY
Abshire Group
present
New York, NY
Lead Information Security Engineer
present
  • Assist network engineers maintain network management system workstations
  • Work with the Network Chief Engineer (NCE) to develop and implement strategic direction and planning for network services
  • Technical and management support providing oversight and guidance
  • Realize strategic security initiatives to improve the team capabilities through automation development, processes enhancements, and infrastructure expansion
  • Network Intrusion Prevention Systems
  • Acts in a multi-discipline project leadership role working towards the development of new solutions, processes, tools, systems for customers
  • Develop, facilitate, and present information security awareness and security training on various customer and corporate security policies
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Johnson & Wales University
Bachelor’s Degree in Computer Science
Skills Skills
  • Strong OS and networks knowledge
  • Knowledge of Information Security tools for endpoint security and vulnerability management etc
  • Knowledge of IPS/IDS
  • Strong interpersonal, relationship management and facilitation skills
  • Ability to work effectively with both business customers and project team members
  • Enable the workforce: Support and maintain technological and security infrastructures
  • Knowledge of Information Security domain
  • Knowledge of ITIL Process and Tools
  • Knowledge of Change Management
  • Working knowledge of Database and db queries
Create a Resume in Minutes

15 Lead-information Security resume templates

1

Lead Information Security Engineer Resume Examples & Samples

  • Support projects through security research and technical evaluations, reviews and design creation
  • Excellent practical & theoretical understanding of security strategies and technologies including secure global network design, remote computing, desktop and server hardening, Compliance Auditing, Secure Software Development, Software Auditing, Penetration Testing and Security Monitoring
  • Strong understanding of the security mechanisms associated with Windows or Unix operating systems, mobile platforms, switched networks, applications and databases
  • Extensive experience creating innovative solutions and responding to information security incidents a strong plus
  • Strong understanding of vendor and contract management. Understanding of BITS FISAP (Financial Institution Shared Assessments Program) highly desirable
2

Lead Information Security Solutions & Engineering Resume Examples & Samples

  • Have an expert understanding of the organisations security policies and associated standards
  • Manage and co-ordinate GIS (and sub-contractor) resources to ensure delivery of GIS operational and security assessment services as part of both BTB and RTB engagements
  • Develop close working relationships with the RBB & CIBWM Demand and Design offices to manage clients' expectations and demands proactively while maintaining good client relationships
  • 7+ years experience in the financial service industry
  • 7+ years proven experience with securing information for cross-functional, cross-platform applications
  • 7+ years experience with broad IT Security expertise
  • Detailed understanding of the principles, practices, and techniques related to IT Security
3

Business Engagement Lead-information Security Resume Examples & Samples

  • 8-10+ years of combined experience in the following areas: Data Protection, Information Security, Technology Risk Management or Business Enablement
  • Experience with Risk Management systems analysis and methodology
  • Broad Technology background with through knowledge across multiple domains
  • 5+ years of overall Technology operations experience with the ability to articulate and document infrastructure support and operational processes, tools and monitoring agents
  • Working knowledge of information lifecycle management and data loss prevention implementation methods
  • Experience with infrastructure threats and risks, impact assessments and incident response tactics, as well as security assessments
  • Ability to support cyber and data protection programs and evolve with the ever-changing threat landscapes
  • Must demonstrate efficiency and speed in analyzing, assimilating and synthesizing information, while under pressure
  • Excellent written and verbal communications and organizational skills
  • Knowledge of the following regulations / regulatory bodies: Swiss PI, MAS, HKMA, FIA, Bahamas Banking Authority
  • Experience within the Brokerage, Investment Management and Banking
  • Proficient in Microsoft Word, Excel and PowerPoint along with SharePoint and other documentation management systems
4

Lead Information Security Analyst Resume Examples & Samples

  • Seven plus years related experience or equivalent combination of education and experience
  • Experience leading and responding to security incidents
  • General knowledge of Cloud Computing environments and security issues related to those environments
5

Lead Information Security Analyst Resume Examples & Samples

  • Conducting high level security threat risk assessments of Information Technology (IT) controls across all areas of technology – for example- Desktop security, Server security, application development security
  • Acting as a central point of reference and core competency for Information Security staff to assess business lines' compliance with information security standards
  • Providing guidance to Information Security ' clients in implementing sound risk management controls in accordance with the Bank’s security standards
  • Pursuing security and control process improvements for projects and steady state processes
  • Executing and delivering Information Security ' operational services
  • Supporting Information Security 's relationship with external and internal auditors
  • Provide guidance on the Bank’s information security standards, policies and processes, and information security best practices
  • Perform Information Security operational services such as Active Directory system administration, firewall port assessment reviews, privileged user password management
  • Drive the operation of reliable security controls over logical protection, vulnerability management, and perimeter security. Identify opportunities to adopt enterprise security processes and technology that can be cost effectively deployed to the GWT ( Global Wholesale Technology) environment
  • Design, develop and report on various Information Security metrics and escalate high risk issues accordingly
  • Lead security related projects that pertain to compliance with the Bank’s IT security controls and guidelines. Oversee and co-ordinate project activities with participating teams
  • Serve as the Information Security point of contact for audit reviews of Information Security ' operational processes. Facilitate and co-ordinate auditor examinations and walkthroughs of internal control design and operating effectiveness. Lead initiatives to address Information Security audit issues by their committed timeframes
  • Minimum 2 years of work experience leading the information security component of projects
  • Minimum 5 years of work experience in an information security related field
  • Strong background with information security key controls and risk assessment concepts
  • Solid leadership and facilitation skills, ability to influence senior management at the Director level
  • Experience in the design and/ or implementation of Information Security technology in a mid-large heterogeneous environment
  • Experience in network security and Active Directory system administration
  • Experience with facilitating audit examinations
6

Lead Information Security Event Analyst Resume Examples & Samples

  • Perform daily response operations, with a schedule that may involve nontraditional working hours
  • Specialize in network and host centric analysis (Network Security Monitoring, Live Response, Malware Examination, Reverse Engineering
  • Ability to identify compromised computers using logs, live response, and related computer centric evidence sources
  • Lead small to medium size projects as directed by management
  • Demonstrate proficiency in event analysis and tool utilization (identification, response & escalation)
  • Exhibit necessary skills, expertise, and creativity required to succeed in technical duties (containment & remediation
  • Exercise attention to detail and due care in regard to work-related communication and documentation
  • Exhibit willingness to learn, a desire to collaborate with others, and the drive to take on additional responsibilities when called upon
  • Maintain awareness of changing processes, procedures, and standards critical to job performance
  • Promote organized, structured work environment that fosters a culture of collaboration, thoroughness, and pride in a job well done
  • Serve as technical escalation point and ensure performance of effective shift turnover
  • Assign roles and prioritize duties for shift analysts on a daily basis and verify their completion
  • Manage training activities and supplementary projects as approved by leadership
  • Identify operational issues and create/propose solutions to reoccurring problems
  • Experience handling incidents
  • Experience with Network Security Monitoring, SIEM and/or other log aggregation and correlation tools
  • Proven experience with host-centric detection and response skills
  • Degree in Computer Science or a related technical degree, or equivalent IT experience
  • Detailed understanding of APT, Cyber Crime and associated tactics
  • CISSP, CISM or related SANs certifications preferred
  • Experience with malware and reverse engineering
  • Experience with host-centric detection and response skills
  • Working knowledge of secure communication methods, including Secure Shell, SILC, and PGP/GPG
7

Lead-information Security Resume Examples & Samples

  • 5+ Years’ experience in quality and information security activities, desired Skills and experience
  • Overall accountable for information security activities at DSTIS India
  • Strong fundamentals in Information Security by conducting assessments (Facilitation) & Internal Audits
  • Knowledge on Vulnerability assessment
  • Knowledge and hands-on experience on Business Continuity and Disaster Recovery
  • Knowledge on conducting Business Continuity test strategies & post-testing analysis
  • Ability to conduct Security awareness sessions, designing training modules if required
  • Experience on Risk assessment and analysis, should be able to perceive information risks at organizational level
  • Knowledge on Incident management and provide inputs on root cause analysis
  • Knowledge on Business Impact Analysis, capable to evaluate potential effects
  • Preferable knowledge on HIPAA
  • Relevant Experience in an IT organization with comprehensive experience in Information Security and Quality
  • Active involvement in interacting with seniors management, lead to understand the business requirements thereby providing timely solutions
  • Adequate knowledge on control objectives of ISO 27001:2013 standard
  • Knowledge on HIPAA controls, suggested
  • Excellent communication skills, being assertive, great attitude and team player
  • Should be Proactive
  • Any graduate or Post graduate from a reputed institute
8

Lead Information Security Analyst Resume Examples & Samples

  • Execute and support cyber security risk assessments on BNYM affiliates or third-parties
  • Validate effectiveness of current controls and identify potential gaps
  • Document results of assessments and verification activities
  • Perform engineering review of security control modification proposals and determine the effectiveness of the proposals while determining their ability to meet BNYM standards
  • Ability to speak and understand terminology, especially those related to cybersecurity assurance
  • Produce and maintain metrics based on the assessment framework
  • Perform any tasks to ensure that the Cyber Assessment Team meets its commitments
  • Working knowledge of security domains, auditing standards and frameworks, and risk analysis frameworks including ISO 27001, NIST Cyber Security Framework, IT-CMF, etc
  • Knowledge of domestic and international regulatory requirements as a plus
  • One or more of the following certifications required; CISSP, CRISC, CISA
  • Any other security related certification considered a plus (CEH, Security+, etc.)
  • A broad and diverse security skill-set with advanced understanding of both technical and non-technical controls and the ability to effectively apply this knowledge when performing assessments
  • A minimum base knowledge of networking components and various operating systems and cloud environments
  • Ability to identify, assesses and document the severity and potential impact of risks and communicate risk assessment findings to risk owners in a way that consistently drives objective, fact-based decisions
  • Ability to understand and communicate the business needs and a commitment to delivering high-quality, prompt, and efficient service to the business
9

Lead Information Security Engineer Resume Examples & Samples

  • Minimum of 5 and preferably 10 or more years supporting Certification and Accreditation at all levels of classification
  • Ability to apply professional judgment in critical thinking and problem solving
  • Ability to independently communicate and work with customer personnel, from technical staff to leadership
  • Team orientated
  • Associate or Bachelor’s Degree in MIS
10

Lead Information Security Engineer Resume Examples & Samples

  • Write System Security Plans, POA&Ms (Plan Of Actions and Milestones), Risk Assessments, PIAs (Privacy Impact Analyses), and supporting documentation for systems subject to NIST SP 800-53
  • Develop, implement, and evaluate security CONOPS (Concept of Operations), System Security Plans and/or System Security Authorization Agreements to satisfy Certification and Accreditation requirements in accordance with NIST 800-53, FISMA, FedRAMP, Risk Management Framework (RMF) and other government guidelines, as required
  • Negotiates Information Security-related contracts and contract language with business partners and customers. Responds to RFPs (Requests For Proposals) and RFIs (Request For Information) from government entities
  • Experience with Nessus, dbProtect and AppScan or similar security tools. Perform scans, review the results, and write necessary reports and plans
  • Ensure systems are operated, maintained and disposed of in accordance with applicable governing policies and procedures
  • Develop, facilitate, and present information security awareness and security training on various customer and corporate security policies
  • Undergraduate degree in Computer Science Engineering, Management Information Systems, related field, or equivalent experience
  • 10 years of relevant experience with Certification and Accreditation (C&A) or Assessment and Authorization (A&A)
  • Considered expert in one (or more) of the following areas: Networking, Operating System (MS/Unix/Linux), Database, or programming skills
  • Strong work ethic, demonstrated self starter, ability to work in a fast paced, team oriented environment with excellent verbal and written and communication skills
  • Professional/technical certifications, such as Certified Information Systems Security Professional (CISSP), CISSP/MCSE/MCSA/CCNA/A+/Network+ Certifications
  • EMass / RMF training and experience
  • Experience with large enterprise data centers and/or networks
11

Lead-information Security Resume Examples & Samples

  • Expertise in Automation/Scripting – Perl,Phython, JS (D3)
  • Strong Windows and Unix OS knowledge
  • Knowledge of networks
  • Knowledge of Information Security domain
  • Knowledge of ITIL Process and Tools
  • Database/SQL knowledge
  • Knowledge of Information Security tools for endpoint security, server compliance, database compliance, vulnerability management etc
  • System analysis and problem solving skills
  • Three/Four year college degree or equivalent work experience
  • B.Tech / MCA / B.Sc.(Computer Sc.) / M.Sc.(Computer Sc.) preferred
  • 6+ years of experience with application and system support
12

Lead Information Security Engineer Resume Examples & Samples

  • Recommend security best practices and system configuration standards
  • Consult with internal clients on security topics and policy interpretation
  • Lead security authorization processes and procedures
  • Contributor in a collaborative cross-functional team environment
  • 8+ years experience in performing security risk assessments and application, system and network security
  • 2+ years experience with Certification and Accreditation (C&A) or Assessment and Authorization (A&A)
  • 6+ years of dedicated system administration, virtualization, configuration, and support work experience
13

Lead Information Security Engineer Resume Examples & Samples

  • Provide security engineering support from the proof of concept phase to deployment and sustained engineering for multiple security detection and alerting tools, including
  • Network Intrusion Prevention Systems
  • Wireless Intrusion Prevention Systems
  • Dynamic Malware Detection
  • Web Proxy and Reverse Proxy
  • Web Application Firewall
  • Netflow Collection
  • Enterprise Logging and Search
  • Collaborate with threat vulnerability management and risk management teams to achieve global information security program objectives
  • Implement performance metrics that enables executive leaders, line managers, and operational staff to quickly take action on identified risks
  • Collaborate with all internal security teams and vendors to implement security controls that will protect the Navy Federal brand from confirmed or potential security breaches
  • Effectively manage reported system application vulnerabilities and through remediation and maintenance in adherence with incident response procedures
  • Solid hands on experience with one or more of the aforementioned technologies
  • Extensive hands-on experience and knowledge of IT operations and change management
  • Familiarity with security operations and cyber-attack methods
  • Demonstrated ability to work effectively with all levels of an organization from executives to technology specialists
  • Information security certifications (such as CISSP, CISA, GIAC, CCNA)
  • Desired - Integrity and high standards of personal and professional
  • Desired - Prior work with a variety of cyber architectures
  • Desired - Systems performance tuning and debugging
14

Lead Information Security Engineer Resume Examples & Samples

  • 8+ years of relevant experience working US Government Accreditation in compliance with ICD 503, CNSSI 1253, RMF, NIST 800.53 rev3/4
  • Applicable professional/technical certifications should be in place, or candidate must be willing to pursue such as CISSP, CISM or GSLC
  • Excellent oral and written communication skills and experience in presenting security issues to all levels of management, as well as non-technical staff
15

Data Protection Architect Lead-information Security Resume Examples & Samples

  • 10+ years of progressive experience in the development, architecture, design and implementation of enterprise IT security solutions, with a focus on data protection, data lifecycle management, data loss prevention or the supporting of these security solutions
  • Ability to design end-to-end network security solutions across large enterprise IT ecosystems
  • Ability to translate business requirements to technology architecture plans
  • Strong understanding of the data protection ecosystem including strong knowledge and domain expertise in two or more of the following domains
16

Lead Information Security Engineer Resume Examples & Samples

  • Engineer SIEM system design for review and approval that meet security and compliance requirements while minimizing system and data requirements
  • Create and support SIEM rules, use cases, dashboards, etc that leverage available SIEM event feeds and improve threat identification and management capabilities
  • Perform system and application administration for Corporate Security infrastructure to ensure the availability, capability, and stability required to support incident response functions
  • Create and analyze utilization statistics of Corporate Security owned infrastructure systems to identify causes for system degradations as well as recommend required system enhancements for business case and budget approval
  • Collaborate with various CenturyLink organizations and teams to gather hardware and software requirements to engineer Information Security solutions which support and enhance Corporate Security capabilities
  • Assist with routine compliance and audit functions to ensure monitoring requirements of specified CenturyLink assets are satisfied
  • Design and support web applications for Corporate Security within the GRC framework
  • Develop, modify and follow associated corporate and workgroup processes applicable to the role (e.g. change and outage management)
  • Undergraduate degree in Computer Science, Engineering, related field, or equivalent experience
  • 8+ years of relevant system administration, virtualization, configuration, and support experience
  • 3+ years experience administering and supporting a SIEM
  • Excellent understanding of common computing platforms, including Windows Servers, RedHat & Ubuntu Linux Servers, and vendor specific appliance support
  • Experience in all areas of networking, database, and programming skills
  • Experience in analyzing general system processing throughput, utilization, and capacity
  • Understanding of firewall policy configurations in order to submit change requests as needed
  • Experience in application development utilizing C/C++, C#, VB.NET, ASP, PHP, PERL, Python, or Java
  • Strong work ethic, demonstrated self starter, ability to work in a fast paced, team oriented environment with excellent verbal and written communication skills
  • 8+ years of dedicated system administration, virtualization, configuration, and support experience
  • 3+ years experience administering and supporting a major SIEM
  • Application development utilizing C/C++, C#, VB.NET, ASP, PHP, PERL, Python, or Java
  • Proficient in all areas of networking, database, and programming skills as well as considered expert in one (or more) of those same areas
  • Hands on experience using commercial information security tools such as Archer, Intrusion Detection Systems, Advanced Threat identification systems, and Web Application Firewalls
17

Lead Information Security Engineer Active Directory Resume Examples & Samples

  • Design, manage, and support Active Directory in a multi – domain/ forest environment
  • Design, manage, and support server infrastructure and software supporting Privileged Identity Management system
  • Build, install, configure, and maintain Windows 2008/2012 servers in a multi – Domain / Forest environment
  • Manage and support of server infrastructure and software supporting Endpoint Security
  • Monitor, troubleshoot and problem resolution of all services listed above
  • Interface with other IT disciplines including the networking engineering, storage, monitoring, and platform support teams to provide resolution of service issues
  • Information Technology degree preferred
  • 5+ years of Active Directory-related experience including
18

Lead Information Security Engineer Resume Examples & Samples

  • Oversee the response to critical industry-wide vulnerabilities which impact CenturyLink systems by analyzing the vulnerability, engaging the system owners in the business, identifying systems impacted, prioritizing remediation, ensuring remediation plans are established
  • Provide routine penetration testing on CenturyLink systems as required for compliance of Payment Card Industry Data Security Standard (PCI DSS), Federal Information Security Management Act (FISMA), Health Insurance Portability and Accountability Act (HIPAA), and other industry compliance standards as necessary
  • Assist with operating system, web application, database, and network vulnerability scanning as needed to support industry compliance obligations
  • Realize strategic security initiatives to improve the team capabilities through automation development, processes enhancements, and infrastructure expansion
  • Represent the Cyber Defense team within Corporate Security as a Subject Matter Expert (SME) regarding current and emerging cyber threats, vulnerabilities, technologies, intrusion techniques, and exploit methodologies
  • Collaborate with CenturyLink business units to define engagement parameters for penetration testing and vulnerability assessments
  • Create penetration testing results reports, industry-wide vulnerability analysis reports, and similar vulnerability assessment documentation intended for risk awareness to business units and multiple levels of management
  • 3+ years dedicated experience performing cybersecurity functions
  • Experience performing penetration testing full time for medium to large enterprises
  • Candidate must possess one or more professional certifications in the domain of vulnerability assessments or penetration testing such as CEH, GPEN, GWEB or OSCP
  • Broad technical knowledge regarding current and emerging cyber threats, vulnerabilities, technologies, intrusion techniques, and exploit methodologies
  • Development experience in utilizing C/C++, C#, VB.NET, ASP, PHP, PERL, Python, Java, Assembly, UNIX Shell, Microsoft PowerShell, or other programming language
  • Firm grasp of common networking protocols
  • Solid understanding and experience of UNIX derivative operating system distributions as well as various Windows operating systems
  • Flexible and able to adapt to a rapidly changing environment
  • Desire to continually expand technical and personal skills
  • Self-motivated individual who can drive goals independently to reach completion as well as collaborate in a team environment
  • Masters degree in Computer Science, Engineering, related field, or equivalent experience
  • 2+ years of experience performing penetration testing full time in a large enterprise environment encompassing network elements/protocols, operating systems, databases, and applications
  • Possess one or more advanced professional certifications in the domain of vulnerability assessments or penetration testing such as GXPN, GWAPT, OSCE, or OSWE
  • Experience performing assessments on mobile devices and applications
  • Certified or considered an expert in utilizing C/C++, C#, VB.NET, ASP, PHP, PERL, Python, Java, Assembly, UNIX Shell, Microsoft PowerShell, or other programming language
  • Dedicated experience as a network/firewall engineer, administrator, designer, implementer, or support technician
  • Produced professional training material, presented at professional security conference, or taught a subject in a formal class setting
  • Possesses a US Government Secret (or higher) security clearance
19

Lead Information Security Engineer Resume Examples & Samples

  • Ability to conduct research into a wide range of computing issues as required
  • Ability to absorb and retain information quickly
  • Exceptional customer service orientation
  • Have a strong desire to learn continually and grow professionally
20

Lead-information Security Resume Examples & Samples

  • Strong OS and networks knowledge
  • Knowledge of Change Management
  • Working knowledge of Database and db queries
  • Working knowledge of Microsoft Office (Word, Excel and PowerPoint)
  • Knowledge of IPS/IDS
  • Knowledge of malware, it’s behaviour and analytical skills
  • Knowledge of Spam, Phishing and email filtering technologies (Microsoft Exchange Online Protection would be an added advantage)
  • Knowledge of CISCO Sourcefire
  • Knowledge of Web Application Firewall technology (AKAMAI would be an added advantage)
  • Knowledge on any SIEM tool (splunk, qradar etc)
  • Knowledge of McAfee ePO and creating and implementing HIPS and VSE policies
  • Knowledge of Proxies and Firewalls(BlueCoat proxy would be an added advantage)
  • Knowledge of Information Security tools for endpoint security and vulnerability management etc
  • Knowledge of cloud security
  • Knowledge of automation tools and scripting languages like Perl, Python, PowerShell etc
  • Skills to enhance user experience in the existing process
  • 6+ years of experience with people management skills, handling critical issues related to cyber incidence, severity 2/3 incidence handling, application and systems support
21

Lead, Information Security Operations Resume Examples & Samples

  • Lead the operations of the information security platform through regular prevent, detect, respond and recover practices
  • Develop, operationalize and utilize data systems to inform fact based analysis in support of incident response as well as trending events and organization performance
  • Participate in the development of a strategic 3 year roadmap of both technical capabilities as well as threat projections. Roadmap includes a corresponding financial plan including operation budget as well 3 year investment proposal
  • Facilitate and participate a cross functional operating group focused on the broad aspects of information protection. Present key decision choices and critical updates quarterly to the Information Protection Governance Team
  • Establish personal and team talent development expectations aligned with both technical skills development as well as leadership development
  • Experience in a regulated environment that drove specific considerations in IT systems design and operations
  • Information security credentials and/or certifications
  • Depth of understanding specific to the rapidly evolving information security challenges
  • Education and/or development in leadership models and skills
  • Operating budget or other financial management experience
22

Lead Information Security Analyst Resume Examples & Samples

  • Internal Security Risk
  • 3rd Party Supplier Security Risk
  • Boutique Security Risk
  • Sub-Adviser Security Risk
  • Understanding of Corporate Information Security Programs and the ability to apply them to our business unit. This includes awareness and support of
  • CISSP, CISA or CISM preferred but not required
  • Strong informal leadership & decision making ability
  • Good understanding of business principles and business language
  • Ability to effectively communicate Information Security principles and strategies with all levels of employees
  • Ability to align security strategy with business strategy
  • Strong understanding of secure software development lifecycle practices, including static code analysis, application vulnerability assessments, and PEN testing
  • Bachelor's degree in computer related field or equivalent experience
23

Senior Lead Information Security Engineer Resume Examples & Samples

  • Works to standardize superset of essential customer log sources and logging levels
  • Provides technical expertise to configure and tune log source collectors or applications from various security platforms
  • Guides Syslog-ng appliance and main site engineering, configuration, and enhancement implementation for SIEM analysis
  • Provides expertise to collect, parse, normalize, and ingest Syslog message into SIEMs, Elastic Nodes, and Mongo databases and create event rules from the logs
  • Develops technical approaches to craft custom ingest of Syslog and JSON formats from Windows, Syslog and rsyslog, and mainstream security devices logs
  • Provides thought leadership on improvement to source logging configuration and event tuning approaches
  • Works with customers to configure log collection agents and device logging settings
  • BS or BA Degree in Business or Technical discipline
  • 10+ years’ experience log source configuration experience with background in IT infrastructure, hosting, networking, and application services
  • 2+ years’ experience in Coordination/Project Management of complex IT solutions
  • Strong Linux or BSD operating system background
  • Syslog and SIEM hands on experience in a SOC or NOSC environment
  • Strong interpersonal communication and team relationship skills
  • Background in configuring and managing security technologies devices
24

Lead Information Security Analyst Resume Examples & Samples

  • Minimum 4 years of IT security experience such as penetration testing, vulnerability scanning, security audits, configuring and managing security systems, etc.
  • Knowledge of OWASP Top Ten project
  • The following certifications are not mandatory but considered an asset: GIAC (GPEN, GSEC, GXPN), CEH, RHCT, RHCE, OSCP, CISSP
25

Lead-information Security Resume Examples & Samples

  • Building collaborative relationship within FMR- India and global teams for seamless integration
  • Work closely with Enterprise Infrastructure, ECS and Risk Management teams on info sec aspects
  • Develop security frameworks aligned to enterprise policies, global best practices while having a focus on regulatory compliance as well
  • Develop an internal assessment strategy for conducting ongoing evaluations against security frameworks and perform cloud security assessments, architecture reviews etc
  • Lead adoption of Cloud security architecture, , SSDLC and application security advisory in FMR-India
  • Identify business issues pertaining to information security requirements and work towards bringing business efficiencies
  • Understanding business processes and supporting infrastructure so as to share security consulting on new strategies and product development
  • Skill development within organization for optimizing delivery opportunities in strategic domains such as Cloud, mobility, API platforms and Application Security
  • Graduate with 7- 9 years of experience in the field of information security, data protection and infrastructure security
  • Minimum BE/B.Tech
26

Lead-information Security Resume Examples & Samples

  • To explore new ways of working to maximize performance through implementation of new initiatives and best practices
  • Responsible for the overall productivity, Quality and customer compliant handling of the team
  • Contact with onshore to resolve issues, discuss performance
  • Assist in recruitment and hiring employees
  • Use tools to develop, monitor and assess individual performance and provide timely feedback to promote team effectiveness
  • Collaborate with other team members as necessary to ensure customer service levels are met
  • Lead team meetings and direct team activities to achieve the business objective
  • Identify suitable team members for rewards and recognition, for certification and participation in any activity organized by the process or company
  • Escalation handling
  • Provide 24/7 On Call support for Access related issues, Immediate terms and suspensions
  • Incident Management – Access related, Certificate renewal, drive issues, password resets
  • PPMs related to Folder restriction; Folder lockdown; creating jobroles etc
  • Run audits related to directory file shares using tools like Varonis, Dumpsec
  • Certificates handling – Entrust certificates for individuals, Server certificate
  • RSA Token handling – assigning tokens; tracking expiring tokens; ordering new tokens
  • Liaison with other teams ( File and print; Active Directory, WSTS, Exchange; BISD; FITG)
  • Strong communication, analytical and problem solving skills
  • Have a knowledge of NT and Active Directory background
  • Manage own time and work with minimal supervision
  • Ability to work effectively in a team environment with both technical and non-technical people
  • Communicate with peers and management
  • College degree in computer systems related discipline, or similar work experience preferred
  • Prior people Management required
  • Prior Security administration experience would be ideal
  • Prior knowledge remote services and Public Key Infrastructure is a PLUS
  • Basic understanding of NT infrastructure and Active Directory domain's a PLUS
  • Database and reporting experience would be a PLUS
  • 7 – 10 Years
  • 3 to 4 years of people management should do
27

Lead Information Security Engineer Resume Examples & Samples

  • Provide technical leadership and guidance to Information Security Engineers and Associate Engineers
  • Oversee training and onboarding of new coworkers in the department
  • Maintain open communication to all stakeholders keeping them current on status
  • Continuously research cybersecurity trends and emerging security technologies
  • Determine operating requirements, costs, as well as resource needs for assigned projects
  • Provide level 3 support for Information Security
  • Participate in weeklong 24/7 on-call support rotation and off hours or weekends as needed
  • Build and maintain strong relationships with internal and external stakeholders and vendors
  • 10 of information technology experience
  • 6 years of cumulative information security experience which should encompass three or more of the following domains
  • Advanced knowledge of TCP/IP applications and protocols, Microsoft Windows and Linux platforms
  • Web Filtering, Malware Analysis, Data Loss Prevention, IDS/IPS, Firewall, Digital Forensics
28

Lead, Information Security Resume Examples & Samples

  • Responsible for the creation and maintenance of Information Security policies, standards, guidelines and procedures
  • BS or MS - preferably in Computer Science with a concentration in Information Security
  • Security and risk management certification (e.g. CRISC, CGEIT, CISSP, CISM, CRMA, CISO Certification – from an accredited institution)
  • 5+ years working with IT risk and/or security; prior information security and risk management experience in a financial services company
  • Experience working in information security and demonstrable understanding of the concepts of information security. Experience with information security risk assessments and audit. Knowledgeable with Information Security laws and regulations. Knowledgeable with Information Security control frameworks and standards
  • Experience with NIST 800-53 Rev. 4; ISO 27001/2/5 and OWASP are a plus
  • Experience working with various financial regulatory entities (SEC, ESMA, FSA, MAS, et al) – a plus
  • Excellent communication skills. Ability to communicate with various levels of the organization including technical as well as non-technical audiences. Great customer service and relationship management skills. Skilled in executive level presentations and briefings. Experience managing communication to internal customers
  • Demonstrated ability to think creatively while accounting for multiple perspectives in any given scenario. Flexibility to adjust to multiple demands, shifting priorities, ambiguity, and rapid change
  • Focused on how to best convey procedures and information clearly and concisely
  • Project Management experience is a plus
  • Excellent time management, organizational, and decision-making skills
29

Lead Information Security Analyst Resume Examples & Samples

  • At least (6) years of experience directly related to IT controls audits and/or being responsible for ensuring regulatory matters are addressed for Information Technology and Information Security in support of SOX, MICS and PCI compliance is required
  • Bachelor’s degree in Computer Science, Information Systems Management or a related field is highly preferred
  • Demonstrated knowledge of regulatory requirements within the hospitality/gaming industry is highly preferred
  • Ability to work independently with minimal supervision is required
  • Proven ability to work in a fast paced, high volume and dynamic environment is required
  • Experience with ISO, NIST, COBIT or other compliance frameworks is highly preferred
  • Ability to work in and support a 24x7 environment is required
30

Lead Information Security Risk Consultant Resume Examples & Samples

  • Serve as a trusted cybersecurity advisor for the business through demonstration of a strategic understanding of the partner’s business, mission and goals, and support business initiatives in a complex and evolving risk landscape
  • Ability to fully understand the business strategy and environment and align appropriate solutions to enable secure business practices and maintain competitive advantage
  • Identify and recommend appropriate measures to manage and mitigate risks and reduce potential impacts on information resources to a level acceptable to the senior management of the company
  • Conduct business impact and/or risk assessment analysis and assist with recommendations and/or mitigation strategies to management through information security risk assessments and consultation with the business
  • Assist the Policy & Standards team in the development, implementation, and enforcement of standards and procedures to secure and protect Allstate assets
  • Research and evaluate emerging trends, threats and technologies both internal and external
  • Provide support to stakeholders on requirements for new and existing business / technology solutions to assure compliance to standards and governing policies and procedures
  • Reporting and communication of security compliance issues and recommendations
  • Champion the integration of security risk management activities into Allstate day to day processes
  • Assist in integrating information security services into the ATSV work intake and project management processes
  • Partner with all areas of the business, including internal auditors, legal, IT and business partners
  • Develop and improve KPIs, metrics, and trending for the risk management and consulting function
  • Respond to and assist with audits, assessments and compliance requests
  • Serve as client liaison as needed on matters pertaining to Risk Management
  • Promote and consult on the positions that help strengthen and secure the organization by either following standards or helping direct others on technology positions
  • Act as a subject matter expert for the organization's information asset protection policies and procedures, and information technology best practices
  • Develop and refine procedures and techniques used by the team
31

Tech Lead-information Security Resume Examples & Samples

  • Build and maintain strong relationships with divisions in order to identify issues and drive Information Security compliance
  • Develop a thorough understanding of Business, systems and processes in order to provide tailored Information Security solutions and services whilst minimising impact or disruption to divisions
  • Identify current risk position for divisions, identifying potential exposures and drive actions to address or mitigate Information Security risk
  • Perform security risk assessments or provide specialist Information Security input to support major change programmes
  • Should hold a batchlors or masters degree in Information Technology; in-depth IT and Information Security knowledge and experience; posses at least one Information Security certification (e.g. CISSP, CISM, CISA etc.)
  • Experience and proven track record of delivery within IS, IT Security or Audit departments within financial institutions
  • Broad specialist level knowledge of information security technology and IT infrastructure such as, UNIX, Windows, databases, network infrastructure, firewalls, Information security management tools, logging and monitoring tools, emergency envelope tools, Public Key Infrastructures, Cryptography
  • Working within and understanding a broad range of Banking business units; knowledge and experience of the legal and regulatory environments across locations in India
32

Lead Information Security Engineer Fed Resume Examples & Samples

  • Lead security authorization processes and procedures. Recommend security best practices and system configuration standards
  • Assesses emerging network system and enterprise-level risks and vulnerabilities. Advises leadership on cyber security risk management, security strategy, security project planning, and security architecture
  • Perform IS security briefings, report all security incidents to the ISSM (Information Systems Security Manager), and investigate, document and report, as well as provide protective and corrective measures in response to such incidents
  • Coordinate and participate in special projects concerning information security, including testing and implementation of security software enhancements
  • Interface with appropriate government agencies, company management and employees, customers, vendors, and suppliers to ensure understanding of and compliance with security requirements
  • 8 years of relevant experience with Certification and Accreditation (C&A) or Assessment and Authorization (A&A)
  • Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor specific appliance support
  • Strong work ethic, demonstrated self starter, ability to work in a fast paced, team oriented environment with excellent verbal and written and communication skills. Professional/technical certifications, such as Certified Information Systems Security Professional (CISSP), CISSP/MCSE/MCSA/CCNA/A+/Network+ Certifications
  • 8+ years of dedicated system administration, virtualization, configuration, and support work experience
  • Current Public Trust Adjudication
33

Senior Lead Information Security Resume Examples & Samples

  • Implement processes to identify and mitigate information risks
  • Be a member of the Security Incident Response Team and participate in troubleshooting efforts on all IT security related problems
  • Provide consultation on any internal investigation that may require forensic analysis
  • Assess system and network vulnerabilities and work with responsible groups to address them
  • Respond to audit findings
  • Review, analyze and monitor security system reports and logs for suspicious activities, trends and patterns. This includes but is not limited to web filters, firewalls, encryption systems, anti-malware systems, IDS/IPS
  • Evaluate and recommend commercial security vendors and products
  • Some travel and off hours/weekend work as required
34

Lead Information Security Engineer Resume Examples & Samples

  • Five to seven years of experience in Information Security, application security or development preferred
  • Three to five years of experience working in and performing risk/architecture assessments on applications, network, mobile and SaaS solutions preferred
  • Experience performing penetration testing and web application security assessments
  • Experience performing vendor risk assessments strongly desired
  • Experience in using penetration testing tools (Canvas, Nessus, Burp Suite, Metasploit) preferred, but not required
  • Experience in working with and deploying vulnerability management solutions (Qualys, Rapid 7) preferred but not required
  • Experience with static and dynamic analysis tools preferred
  • Experience with IAST and RASP tools preferred
  • Strong understanding of OWASP Top 10 and CWE 25; as well as experience in implementing and integrating remediation strategies
  • Strong understanding of agile development processes and integrating secure development practices into the model
  • Strong interpersonal skills with the ability to effectively collaborate with cross-organizational teams
  • Self-starter with the ability to work independently as well as the ability to negotiate and bring consensus to diverse priorities of product development and solution delivery teams
  • Excellent verbal and written communication skills including the ability to describe or explain complex processes and issues in a concise manner
  • Ability to understand complex information systems, prioritize tasks, and meet deadlines with minimal supervision
  • Hands on experience with one or more of the following programming languages: C#, C++, JavaScript preferred but not required
  • One or more of the following certifications (preferred, but not required): CISSP, CISM, GPEN, GWAPT, or CEH