Manager, Information Security Resume Samples

4.8 (104 votes) for Manager, Information Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the manager, information security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
TD
T Denesik
Trent
Denesik
62316 Franz Street
Chicago
IL
+1 (555) 524 6569
62316 Franz Street
Chicago
IL
Phone
p +1 (555) 524 6569
Experience Experience
Los Angeles, CA
Manager Information Security
Los Angeles, CA
McCullough-Marks
Los Angeles, CA
Manager Information Security
  • Operate Identity Management and Access Management programs including leadership of a team to fulfill access requests
  • Develop and implement strategic plans related to 3rd party risk management (includes security components in contract negotiations)
  • Provides operations analysis and consults to internal clients on business process improvement
  • Manage the use and reporting of a large-scale SIEM and Data Analytics implementation in a dynamic cloud service provider environment
  • Manages and provides technical and business direction that affects capacity planning, new applications, data security, and LAN systems, among others
  • Prepare and deliver training and awareness on 3rd party risks and management
  • Implement and operate a data classification protocol including encryption strategies and other scanning protection strategies for data loss prevention
Phoenix, AZ
Manager, Information Security
Phoenix, AZ
Dicki LLC
Phoenix, AZ
Manager, Information Security
  • Manage relationships with 3rd party providers of security monitoring and tools to ensure assets are being protected
  • Perform project management
  • Develop information security strategy and framework
  • Provides leadership to managers and or professional staff
  • Direct and/or perform audits of security and assist with corporate audit process
  • Establish, manage, and track security objectives for the organization
  • Mentors and coaches team members to ensure high levels of performance including mid-year and annual performance reviews
present
Philadelphia, PA
Senior Group Manager, Information Security
Philadelphia, PA
Jakubowski, Corkery and Cruickshank
present
Philadelphia, PA
Senior Group Manager, Information Security
present
  • Build and deliver effective threat detection capabilities using firm’s monitoring platforms
  • Participate in resolving problems with security violations
  • Facilitate and participate in continuous training exercises to keep team’s knowledge level at highest caliber
  • Assist with selection, design and firm wide deployment of state of the art security threat detection technologies working with various technology groups
  • Lead the execution and delivery of any local/regional ISD projects
  • Point of contact for local business lines, partners and regulators for the Cybersecurity Services Program
  • Partner with Risk Management and Compliance to understand and communicate any new/emerging regulations impacting cyber security strategy, processes and procedures
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Chapman University
Bachelor’s Degree in Computer Science
Skills Skills
  • Vulnerability scanning and remediation
  • Ability to effectively manage annual budgets and forecasting
  • Ability to manage vendor/supplier relationships, including contract negotiation, ongoing maintenance & support and problem-resolution
  • Strong verbal and written communication, facilitation, and interpersonal skills
  • Ability to translate complex IT Security problems and issues into simple business terms
  • Balance of strong technical knowledge and strong leadership competencies
  • Financial industry or highly regulated industry background (pharmaceuticals, etc.)
  • Ability to clearly and confidently explain complex technical issues in simple and understandable terms
  • Strong written and verbal communication skills
  • Multiple years of experience in managing and/or a leadership role in security, compliance, audit or risk covering a wide area of technologies and security domains including those previously mentioned
Create a Resume in Minutes

15 Manager, Information Security resume templates

1

Manager Information Security Resume Examples & Samples

  • 40% 1. Investigate and identify patterns of continued technical security issues and weaknesses and design solutions to prevent future re-occurrences. Conduct technical security training where appropriate to different lines of business and IT. This may involve transference of skills to others where a new information security process has been established. Advise internal lines of business, IT partners, and 3rd parties on how to remediate technical security issues and verify remediation activities
  • 30% 2. Responsible for in-depth technical security testing of company websites, infrastructure, and applications using a combination of automated & manual commercial/ open-source tools. Analyze malware, reverse engineer code when necessary to understand the impact of the malware, and root causes of the malware. Responsible for Technical and Executive level reports on technical security issues
  • 20% 3. Design, document, and implement technical information security processes, procedures, guidelines, and solutions
  • 10% 4. Function as primary regional incident response handler directing IT and other departments during security incidents, including evidence preservation, corrective action, and preventive actions
  • GIAC/ GSEC (Global Information Assurance Certification – Security Expert)
  • GIAC/ GCIA (Global Information Assurance Certification – Certified Intrusion Analyst)
  • GIAC/ GCIH (Global Information Assurance Certification – Certified Incident Handler)
  • 1-2 years of hands on application and infrastructure security
2

Project Manager, Information Security Resume Examples & Samples

  • Participate as a member of the Information Security leadership team to assist in the governance of processes of the organization’s Information Security strategies and initiatives
  • Develop schedules and project plans to ensure timely completion to the project deadlines, including identification of scope changes, critical path items, dependencies, etc
  • Establish project timelines and milestones/deliverables using the appropriate tools
  • Define project success criteria and disseminate them to the involved parties throughout the project lifecycle
  • Ensure that the appropriate standards (e.g. compliance requirements), processes and documentation are followed for all projects
  • Proactively identify project issues and risks, and work with the project team for timely resolutions
  • Prepare project communications and documentation including executive briefings, project milestone deliverables, weekly status reports, etc
  • Effectively manage project teams’ time and allocate resources to ensure deliverables are completed
  • Work closely with information security specialists to understand and prioritize the remediation of identified vulnerabilities, as well as track the status of these activities
  • Leverage best practices, techniques, and tools for project planning, execution, project management, ongoing milestone/deliverable tracking, communication, and key performance metrics
  • Coordinate with appropriate stakeholder to identify process improvement opportunities
  • Help build, develop, and grow business relationships vital to the success of the projects
  • Bachelors Degree in Computer Science or equivalent field of study
  • 5 years of project management work experience in Information Technology field
  • PMP Certification is preferred, but not required
  • General knowledge of IT environments, information security, privacy, and threat and vulnerability management
  • Prior experience working on regulatory compliance initiatives such as PCI, SOX, Privacy or HIPAA is a plus
  • Excellent verbal, written, and interpersonal skills are a must
  • Exceptionally self-motivated, directed, and detail-oriented
  • Ability to work independently with minimum direction
3

Advisory Manager Information Security Power & Utilites Resume Examples & Samples

  • A bachelor's degree and approximately 5 years of related work experience; or a graduate degree and approximately 4 years of related work experience
  • Application Control and Security Implementation, program and project delivery design, architecture and solution design, information management, implementation, operations, and management of IT infrastructure
  • Understanding of and/or implementation experience with a variety of GRC tools (i.e. SAP GRC, Oracle ICM, Archer, BWise, Paisley etc.)
  • Strong understanding of a variety of regulatory compliance models (i.e. HIPAA, SOX, FDA, FERC/NERC etc.)
  • Familiarity with security and risk standards including ISO 2701-2, PCI DSS, NIST, ITIL, COBIT
  • Application controls and security experiences involving ERPs
  • Industry related certification required (e.g. CPA/CA, CISA, RICS)
4

Advisory Manager Information Security Vulnerability Management Resume Examples & Samples

  • GRC technology enablement, integrating/automating risk capabilities, risk assessment and compliance transformation, continuous controls monitoring and controls optimization
  • Supplemental tools to enable data analysis, security and privacy information systems security assessment, design, architecture, implementation, management and reporting
  • Sensitive access and SoD testing
  • Strong skills in project management and engagement closure
  • Track record with a blue chip consulting firm and/or experience in a senior management role
5

Business Program Manager Information Security Resume Examples & Samples

  • Work closely with Program Sponsors to manage one or more programs, consisting of a related set of projects
  • Collaborate with stakeholders to create vision and strategy
  • Produce high quality planning documentation needed for funding approvals
  • Work with business and technology subject matter experts to define program and project scope, objectives, goals, success criteria, risks, assumptions, and dependencies, all documented from the business perspective
  • Define and document metrics to measure program achievement against objectives
  • Gather and document business requirements at the program and project level
  • Maintain program financials and manage program budget
  • Gather and consolidate project level status to develop and publish executive level program status reports
  • Conduct program and project reviews; communicate status to various levels of management
  • Bachelor’s degree (preferably in project management, information security, information technology, or business)
  • Minimum 5 years of experience in IT Information Security
  • Ability to translate technical goals into business language that can be understood by executive management
  • Ability to manage through influence, without direct management authority
  • Capability to influence stakeholders and manage expectations
  • Outstanding verbal, written, and presentation skills
  • Superior problem solving skills
  • Detail-oriented to ensure accuracy and high quality of output
  • Team player with strong collaboration skills
  • Ability to manage multiple assignments within tight timelines
  • Adept at the use of reminders and follow ups to ensure others meet their deliverable due dates
  • Excellent attention to detail, strong organizational and time management capabilities
  • Self-motivated; able to work independently while coordinating activities with cross-functional teams
  • Exercises independent judgment and mature decision making to manage programs with enterprise-wide impact and significant financial and compliance implications
  • Proficient in MS Office tools (Word, Excel, PowerPoint, SharePoint, Visio)
  • 10 years or more of project management experience
  • Experience with MS Access, Project
  • ISACA certification(s)
6

Manager, Information Security Resume Examples & Samples

  • BS degree in Computer Science or related field preferred. MBA or MS degree a plus
  • 10+ years IT experience
  • 5+ years security experience
  • Information Security requirements and laws with regards to retail operations
  • IT governance protocols and cyber security
  • Industry standard risk, governance, and security best practices
  • In-depth knowledge of Information Security and ability to develop and implement an information security strategy
  • Detail-oriented, well organized, and able to assume responsibility for specific project deliverables with limited supervision
  • Deliver results in a fast-paced, deadline-driven environment that requires ability to handle multiple tasks simultaneously
  • Strong interpersonal skills and a demonstrated ability to work effectively both independently as well as in a team environment
  • Strong presentation skills and demonstrated ability to communicate effectively with management and the Board of Directors
7

Manager Information Security / IT Security Resume Examples & Samples

  • Cyber Threat Management/Penetration Tests
  • IT Security/Risk Assessments
  • Information Protection & Privacy
  • Process, Procedures and Standards Reviews
  • Information system Audits
  • IT Security Audits
8

Manager, Information Security Resume Examples & Samples

  • Subject Matter Expert (SME) to lead Application Security, Security Operations and Incident Response
  • Manage cross functional information technology teams and other lines of business within AEO, vendors, and with other systems professionals to identify innovative security solutions and actively apply these solutions to advance AEO’s products and profits
  • Develop and implement action plans to address security issues and enhance the security architecture
  • Direct and/or perform audits of security and assist with corporate audit process
  • Ensure adequate and timely resolutions to all audit/review issues relating to security
  • Provide technical guidance on security/privacy policies and standard development
  • Firewall engineering, intrusion detection systems, host based and network based vulnerability assessment tools (Vontu/Symantec DLP, Tripwire, ArcSight , ISS tools, etc.), sniffers, TCP/IP protocol stack and the OSI layer, content management and filtering systems, SSL accelerators, VPN, web servers (IIS, Apache, WebSphere, etc.)
  • Experience in application development methodologies in various languages, experience with project management life cycle and application architecture
  • Experience in cryptographic technology (Protocols, API, Toolkit, Appliance, Hardware device, biometric, PKI) and their applications in secure e-mail, general message and content security (for file and database protection), PGP, SSL, digital encryption, code signing, digital signature and digital rights management
  • Experience with data and meta-data management issues surrounding data definition, classification, modeling, integration, quality and usage
  • Experience creating role-based authorizations and access profiling
  • B.S. Degree required in Computer Science, Information Technology, or related field
  • Advanced degree (Master’s, MBA) preferred
  • 7+ years relevant experience
  • CISSP, CISA, SANS GIAC, or relevant security certification(s) desired. Additional certifications such as MCSE, CCNA/CCNP, etc. preferred
  • Hands-on experience with 2 or more varieties of Unix/AIX/Solaris, Windows, network services, ethical hacking and vulnerability scanning, firewall and intrusion detection technologies, hands-on experience with policy compliance tools and control processes
  • Other complimentary skills include: application development background and strong working knowledge of security code review processes
  • Some travel is required, including the potential for international travel
  • Strong analytical, prioritizing, interpersonal, problem-solving, and presentation, budgeting, project management (from conception to completion) & planning skills
  • Strong matrix management and negotiation/mediation skills
  • Demonstrated leadership and collaborative skills and ability to work well within a team
9

Manager, Information Security Resume Examples & Samples

  • Drive high-quality work products within expected timeframes and on budget
  • Stay abreast of current business and industry trends relevant to the client's business
  • Possess in depth business acumen and demonstrate ability to quickly assimilate to new knowledge
10

Program Manager, Information Security Resume Examples & Samples

  • Lead a vulnerability detection and management function, seeking opportunities to optimize remediation
  • Manage the remediation process, including reporting and dashboards
  • Respond to customer service requests per prescribed Service Level Agreements
  • Contribute to the creation and maintenance of an evolving threat model
  • Serve as an escalation point for complex and sensitive information security issues
  • Manage activities necessary to bring issues to a timely close
  • Provide impeccable customer service while working throughout the enterprise, including IT, Legal, Finance, Internal Audit, and others
11

Manager, Information Security Resume Examples & Samples

  • Develop information security strategy and framework
  • Design and maintain information security policies, including but not limited to data classification policy, network resource use policy, information protection policy and mobile device use policy
  • Manage information security budget and vendor relationships
  • Conduct sophisticated security reviews of new and existing infrastructure
  • Assess the impact of current security advisories and publications
  • Willingness to take ownership and set direction in gray areas
12

Manager Information Security Resume Examples & Samples

  • Ensuring the continuous protection and reliability of logical access security over GWT’s global delivery channels, alternate platform systems and associated telecommunication links, while meeting defined service objectives
  • Managing and/or defining and conducting detailed, risk based evaluations of the design and operating effectiveness of Information Technology (IT) controls
  • Supporting GWT's relationship with external and internal auditors
  • Reporting to management on the status of the system of internal controls with recommendations for remediation of risks
  • Manage and provide oversight over the execution and delivery of Global Wholesale Technology Technical Security Services (GWTTSS)
  • Co-ordinate auditor examinations and walkthroughs of internal control design and operating effectiveness of GWTTSS owned processes. Coordinate auditor requests for information for GWTTSS owned processes
  • Manage the process to investigate, escalate and track control deficiencies, security review action items and security breaches ensuring action items and remediation plans are regularly statused and tracked to closure
  • Create and administer management reporting. Reporting includes, but is not limited to: compliance reporting and work papers, executive summaries, condition status reporting, operational metrics / statistics and action item tracking
  • Provide counsel on information security controls to clients within GWT, Scotiabank subsidiaries, affiliates and strategic alliance partners
  • The ability to analyze security risks, threats and potential exposures and to take immediate action and/or provide recommendations to senior management on how to effectively address these risks
  • Continually improve GWTTSS processes which include: overseeing the development and implementation of system and process enhancements, managing and maintaining software and support tools, and creating and documenting new programs and internal procedures
  • People management experience is highly desired
  • Must have at least 5+ years of progressive technical hands-on working experience in information security
  • Must have 5+ years of working knowledge of industry security standards, policies and best practices (data loss prevention, endpoint hardening, access controls, logical access, sensitive data collection, etc.)
  • Must have advanced presentation and communication skills
  • Must also possess and exercise above average operational capabilities, security risk avoidance capabilities and a strong awareness of associated business risks
  • Must have a high degree of organizational skills, analytical capability and flexibility to effectively work on multiple tasks and to meet a variety of demands, sometimes with short notice and stringent time lines
  • Must have the ability to maintain a technical management perspective
  • 2 or more years of hands on technical working experience with privileged user password management systems and accompanying processes is highly desired
  • 2 or more years of progressive management and/or administration of logical access security for Windows (Active Directory), UNIX (Solaris, Linux), and database (Oracle/SQL/Sybase) platforms is highly desired
  • 2 or more years of Network security, including knowledge of firewalls, network design, proxies, access controls, monitoring tools and logging is highly desired
  • At least 2+ years of hands-on working knowledge of audit practices and methodologies (like COBIT, ITILv3, ASQ) is highly desired
  • Server hardening and verification processes for Windows and Unix (Solaris/Linux) platforms is an asset
  • 2 or more years of security event monitoring (ArcSight, QRadar or other SIEM) and accompanying processes (logging, reports, reviews, and OS security processes) is an asset
  • Working inside a business & technical environment of a large global company, with complex and dynamic application, infrastructure and security requirements is an asset
13

Manager Information Security Architecture & Engineering Resume Examples & Samples

  • Provide line management and leadership of staff within the Information Security Architecture and Engineering function
  • Lead the development, communication and implementation of a security architecture framework (based on the NIST Cybersecurity framework, Payment Card Industry Data Security Standard (PCI DSS) and ISO 27002 International Security Standard)
  • Embed HBI information security policies and standards into IT services methodologies
  • Proactively work to ensure all security components are appropriate/integrated into the overall architecture strategy
  • Provide guidance to the IT and business community on the appropriate implementation of information security policies and standards
  • Provide guidance on mandatory and recommended controls, to ensure they are appropriately implemented
  • Collaborate with project teams to interpret any vulnerabilities found during certification processes; help define mitigating controls and design plans for remediation, or alternatively assist with the exception process
  • Help educate IT employees and the community at large on the requirements within the information security governance framework
  • Provide strategic direction for the function, including planning and budgeting
  • Maintain continuity and consistency between all business unit level information protection programs
  • Develop the security product strategy and roadmaps for the various security components within the organizations infrastructure and application environment
  • Develop minimum security baseline standards for security devices within the technology environment (IDS/IPS, firewalls, VPN, operating systems)
  • Participate as the A&E representative to the Information Security Working Group (ISWG)
  • Bachelors degree in Computer Science, Information Systems, Engineering or related major
  • Minimum 8 years experience in a security or related IT function
  • Excellent written and verbal communications skills; demonstrated ability to communicate highly technical concepts to non-technical audiences
  • Experience with a wide variety of information security processes and principles, such as
14

Manager Information Security Operations Resume Examples & Samples

  • Recruit, retain, develop and maintain a qualified team of security engineers/technicians, analysts, and vendors who safeguard the company's assets, intellectual property and information systems
  • Direct and oversee performance of risk assessments and network vulnerability assessments. Document, prioritize and manage all remediation recommendations and document and manage exceptions
  • Direct and oversee performance of application assessments to include both application risk and technical vulnerability assessments. Document, prioritize and manage all remediation recommendations and document and manage exceptions
  • Manage the information security risk identification, mitigation, acceptance, monitoring and reporting processes. Collaborate with Governance, Risk and Performance team on metrics and reporting
  • Oversee incident response planning as well as the investigation of security breaches, and assist with disciplinary and legal matters associated with such breaches as necessary
  • Serve as an internal information security consultant to the organization. Support System Operations and Systems Development, as required, to ensure information security policy, standards and controls are planned for and effectively implemented
  • Implement and manage a security event management program (e.g., Security Operations Center) to collect, store, and correlate, analyze and respond to security data derived from sensors (e.g., IDS/IPS), logs and incident reports
  • Actively participate is strategy and budget planning activities and monitor performance relative to established goals and objectives
  • Conduct root cause analysis of real or suspected security incidents and identify cause and recommended corrective actions
  • Collaborate with Governance, Risk and Performance on the definition and execution of security training and awareness initiatives with a focus on identifying and correcting behaviors that contribute to poor security practices or increase the risk to information and systems
  • Provide and or contribute to the development of annual and ad-hoc information security evaluations and performance reports to be shared with the Information Security Working Group and other executive leadership, as required
  • Produce, collect and report on relevant existing and emerging information security threats in coordination with the threat and vulnerability management project
  • Incident Response Operations
  • Bachelor’s degree in computer science, information systems, engineering, business administration or a related field is required
  • Masters degree in computer science, information systems, engineering, business administration or a related field is preferred, but not required
  • Must have at least one of the following active certifications: CISA, CISM, CISSP
  • Other related certifications such as ITIL, PMP, SANS/GSEC, CIPP, CRISC, CFE, CGEIT, CPA/CA are preferred, but not required
  • Minimum of 5 years leadership in information security policy, standards, architecture, technology and programs
  • Minimum of 2 years of experience in the consumer products or retail industries is preferred
  • Good understanding of risk-based decision-making (i.e. risk analysis, mitigation, resolution, acceptance, etc.)
  • Possess a good understanding of appropriate leading-edge operations-enabling processes and technologies
15

Senior Project Manager Information Security Resume Examples & Samples

  • Efficiently manage overall Information Security budget, for programs (multi-year), projects and KSR
  • Manage demand for Information Security department
  • Extensive knowledge and experiences on technologies used for securing IT infrastructure, including but not limited to
  • Four-year college or university degree with focus on Business Administration, or IT or related areas, or equivalent combination of education and experience
  • Minimum of 6-8 years of progressive work experience in mid to large-scale project or program management
  • Ideally PMI certified
  • 1–2 years of experience in managing a team
16

Manager, Information Security Resume Examples & Samples

  • Investigate and identify technical security issues and weaknesses and design solutions to prevent future re-occurrences
  • Conduct technical security training where appropriate to different lines of business and IT. This may involve transference of skills to others where a new information security process has been established
  • Advise internal lines of business, IT partners, and 3rd parties on how to remediate technical security issues and verify remediation activities
  • Responsible for in-depth technical security testing of company websites, network infrastructure, and applications using a combination of automated & manual commercial/open-source tools. Responsible for technical and executive level reports on technical security issues
  • Design, document, and implement technical information security processes, procedures, guidelines, and solutions
  • Support technical assessments of 3rd party vendors and mergers/acquisitions
  • 3 years of security testing
  • 2 years of secure development
17

Senior Project Manager Information Security Resume Examples & Samples

  • Network Security (SDN)
  • Critical Asset/Intellectual Property Protection Program
  • Virtualization Security
  • WiFi Security
  • IT Consumerization (i.e. BYOD)
  • General knowledge of information security, including infrastructure security, application security, identity and access management, compliance frameworks, and other regulatory requirements such as PCI and SOX
  • Pro-active (engaging & impact-oriented) mindset, ability to think end-to-end
  • Business mindset: strong numerical and analytical skills, experience in finance
  • Strong experience to manage complex projects on a global level
  • Strong experience to work on several projects simultaneously
  • Fluent English skills (verbal and written)
  • Strong MS-Office skills (Word, Excel, PowerPoint),
18

Manager, Information Security Resume Examples & Samples

  • 50% Program Management
  • Plan, manage and create a positive information security awareness program that effectively engages employees, including changing the security behaviors of employees
  • Ensure that the SPE information security awareness program meets Sony compliance requirements and relevant industry regulations and standards
  • Coordinate and administer mandatory information security and privacy training through online Learning Management systems as well as other methods
  • Prepare and deliver targeted awareness campaigns (phishing, cyber security month, privacy, DLP, etc.)
  • In coordination with Information Security functional owners, identify gaps and develop training plans for internal staff
  • In coordination with Information Security regional leads, develop or modify awareness plans for different cultures, nationalities and languages
  • 20% Operations Management
  • Develop project and program budgets
  • Perform project management
  • Develop and maintain metrics that effectively measure the program’s impact
  • Develop and maintain reporting in conjunction with Information Security Assurance team
  • Maintain departmental SharePoint site(s)
  • 20% Risk Management
  • Participate in risk assessments and business impact assessments
  • 10% Strategic Planning
19

Manager, Information Security Policy Resume Examples & Samples

  • 3+ years working experience in information security
  • 5+ years working experience across IT and information security
  • Proficient high-level understanding of all of the disciplines in a standard information security policy program, such as: asset and inventory management, data classification and labeling, software development and testing, change and release management, incident response, security awareness and training, physical security, vulnerability configuration and patch management, data loss prevention, identity and access management, application and system security, and business continuity / disaster recovery
  • Demonstrated significant experience working in or with IT dev, engineering, ops, or combination thereof
  • Demonstrated prior experience writing and maintaining technical policies for a large organization
  • Demonstrated significant prior experience managing teams, projects, and/or programs
  • Effective communicator spoken, written, and visual media. Can readily distill and convey important concepts to less- (or non-) subject matter expert stakeholders
  • BS or MS in Computer Science, Computer Engineering, Electrical Engineering, or related field; or BBA, BA, or MIS; and/or demonstrated significant experience in technical writing
  • Previous experience as a top-tier consultant or auditor, particularly IT / information security audit
  • Technical competence in one or more areas of information security and/or IT
  • Previous experience working with Comcast central information security department (IIS)
20

Manager, Information Security Resume Examples & Samples

  • 7+ years of professional experience in information security
  • 3+ years of experience managing projects and initiatives
  • CISSP certification preferred. CISM and CISA certifications also considered
  • Familiarity with regulatory and compliance initiatives including GLBA, PCI-DSS, SSAE16, FFIEC, etc
  • 3 plus years experience working on PCI audits
  • Must be a team player also able to work independently
  • Vulnerability scanning and remediation
  • Log event monitoring
  • Security policies and standards
  • Security controls design and assessment
  • PCI certification
21

Manager, Information Security Resume Examples & Samples

  • Five years of applicable/related experience, including people and process management
  • Security standards and program development experience
  • Business continuity and disaster recovery program experience, including examples of responsibility for developing, executing and testing similar/like programs
  • Demonstrated experience in the creation, improvement and implementation of security standards, policies, processes and procedures; as well as supporting systems to validate the effectiveness of related business systems
  • Proven ability to manage and lead teams of personnel – often matrixed across an organization – toward common, strategic goals is critical
  • Experience directly managing and evaluating personnel
  • Willingness to embrace mundane tasks with as much enthusiasm and attention as high-level strategic tasks
  • The ability to work in an environment that is sometimes high-pressure, and to embrace and harness change
  • Honest, with integrity: You don’t cut corners ethically. You earn trust and maintain confidences, do what is right (not just what is expedient) and speak plainly and truthfully with tact and skill
  • Customer centric: Fiserv’s customers are some of the largest and highest-profile financial institutions on the planet. We focus on being professional, responsive, and a great partner for these firms
  • Innovative: You generate new and creative approaches to solving all sorts of problems
22

Manager, Information Security Resume Examples & Samples

  • Performs risk assessments which identify threats to security of information, systems, and computing assets throughout the Company
  • Directs and coordinates the development and implementation of security awareness programs and education
  • Coordinates and implements software upgrades, software conversions, and new technologies rolled out in the markets
  • Serves as an internal auditor to ensure that appropriate precautions over information are granted high visibility and are considered in the design of new and existing systems
  • Reviews and recommends cost-effective controls to eliminate or minimize risk
  • Enforce Compliance with Network Security Zone Model
  • Perform security tests and remediate vulnerabilities pre and post production deployments
  • Define and incorporate security requirements into overall SDLC
  • Prepares written plan and reports on contingency planning and data security for each critical system
  • Mentors and coaches team members to ensure high levels of performance including mid-year and annual performance reviews
  • Provides day-to-day leadership and guidance in resolving complex technical operational situations
  • Participates in the administrative processes for Human Resources including hiring and promotions
23

Senior Program Manager, Information Security Resume Examples & Samples

  • Understands the scope of Lean Practice and process reengineering programs as defined by the business requirements and budget process. Participates in key planning milestones through IIS business engagement
  • Identifies, confirms, and obtains participation from required cross-functional teams
  • Ensures team clearly understands roles and responsibilities for the duration of the program
  • Works with various IIS groups, IT, and applications teams to define needs and requirements for process intake and Lean governance programs
  • Creates and builds program plans. Facilitates and drives the core team to identify and schedule all the work for end-to-end deployment required to fulfill program scope based on Lean practice for asset, data and access governance
  • Performs management of upstream and downstream dependencies for all IIS business engagement processes
  • Identifies goals and successes criteria, drives the development and implementation of key goals, objectives, and successes criteria for the program with key stakeholders and core team. Raises conflicts and resolves with the appropriate level of management
  • Analyzes areas of risk to avoid risky activities by identifying and managing critical paths and risk areas within IIS functional groups and their related porcocesses as well as business engagement with the rest of the BU's. Establishes contingency plans and identifies trigger events and assumes responsibility for initiation corrective actions
  • Identifies and helps the team make program tradeoffs to balance scope, time, and costs. Ensures proper documentation
  • Communicates updates on major milestones and keeps all stakeholders informed of progress and issues. Identifies and manages proposed changes to program parameters and works with Enterprise Program Management and Program Managers to ensure appropriate priorities
24

Technical Manager, Information Security Resume Examples & Samples

  • Understands industry standard Information Security process and technology
  • Works independently applying in-depth knowledge of multiple Information Security technologies (IDS/Firewalls/Anomaly Detection etc.), as appropriate
  • Acts as a consultant to IT professionals and business partners in their area Information and Cyber Security risks and controls
  • Performs sophisticated analysis of Information Security related logs and log data to surface potential Information Security risk and concerns for resolution. Escalate findings and recommendations to management
  • Proactively makes risk reducing recommendations to appropriate business units regarding the development of new or existing services
  • Maintain broad experience in Information Security and has the ability to identify and leverage technical experts in different specialized fields across other departments
  • Typical candidates will possess 7+ years in IT related field and 5+ years of full time Information Security Technical Program management experience
  • Strong understanding of the following
  • BA/BS degree or equivalent preferred
  • Goal driven individual with strong technical, interpersonal, communication and organizational skills
  • Embraces and fosters “innovation” by working on new things in new ways every day
  • Develop a global perspective with consideration for local business needs
  • Acts as an Information Security subject matter expert and is comfortable interacting with employees at all levels and roles
  • Resource management skills, capable of managing contract employees
  • Has strong logical, analytical, methodical, investigative and auditing skills
  • Knows when to make practical rational decisions that reduce risk to Viacom information and Information systems
  • Must be reliable and available 24/7 if required
25

Manager Information Security Resume Examples & Samples

  • Lead and coach staff in decision-making and facilitate their understanding of decisions
  • Create and maintain program procedures providing guidance and reports on incident findings to appropriate constituencies
  • Subject matter expert (SME) in one or multiple areas such as Windows, Unix, Firewalls, Intrusion Detection, Threat Detection Analysis, or Information Risk Management including hands on experience
  • Strong Communication and Organizational Skills
  • Ability to report malware analysis output
  • 5 years Network Security Experience
  • 5 years working with Log Aggregation and Analysis Tools
26

Manager Information Security Resume Examples & Samples

  • Provide expert counsel on IT controls and audit objectives to clients within IS&C, IT&S, subsidiaries, affiliates and strategic alliance partners
  • Manage the process to assess, review and document IT controls to certify compliance to bank standards, industry best practices and regulatory requirements (e.g. SOX, Interac, Visa, Office of the Superintendent of Financial Institutions Canada (OSFI)), and 3rd party outsourcer contractual agreements both domestically and globally
  • Continually improve processes which include overseeing the development and implementation of system and process enhancements in both existing and new tools. Managing and maintaining SA software and support tools. Creating and documenting new programs and internal procedures
  • Support auditor access to and reviews of Bank management’s self-assessment working paper files. Co-ordinate auditor examinations and walkthroughs of internal control design and operating effectiveness of IS&C owned processes. Coordinate auditor requests for information for IS&C owned processes
  • Create and administer management reporting. Reporting includes, but is not limited to: compliance reporting and workpapers, executive summaries, condition status reporting, statistics and action item tracking
  • Expertise in IT key controls and risk assessment concepts
  • CISA accreditation or equivalent
  • University degree in Computer Science, Information Technology/Security is preferred
  • Thorough knowledge of audit practices and methodologies
  • Thorough knowledge of banking application and infrastructure environment
  • Previous experience as a team lead is preferred
  • The incumbent will oversee and/or conduct reviews of IT application and supporting IT pervasive controls
  • The incumbent will maintain documentation supporting SOX Application Processes and SOX IT Pervasive areas
  • Day to day decisions regarding approaches to security and control reviews are handled independently by the incumbent using a high degree of discretion and judgment
  • The incumbent will be provided with strategic direction and line management approval, but is expected to manage assignments with limited supervision. The direct involvement of executive management can be expected in high risk/urgent situations
  • The incumbent is expected to manage their direct reports; ensuring assignments are completed within agreed targets and completion criterion
  • The incumbent will analyze operational/security risks, threats and potential exposures, to take immediate action in potential security breach situations and to effectively report on the condition under review
  • As a people leader, the incumbent is expected to manage the human resources component for their direct reports. Further, as an Officer in Charge (OIC) on review assignments, the incumbent may be expected to provide feedback of the performance of their peers during the review
27

Manager, Information Security Resume Examples & Samples

  • University degree
  • Information security certification / accreditation an asset
  • Understanding of IAM concepts including Identity Life Cycle Management, Web Access Management, Single Sign On, Federation (OAuth and OpenID), RBAC, ABAC, Access Governance, Privileged Access Management, etc
  • Advanced knowledge of organization, technology controls, security and risk issues
  • Ability to serve as a lead expert resource in technology controls and information security for project teams, the business, organization and outside vendors
  • Understanding of APIs. Working experience with RESTful services and integration with other data providers, JSON or XML is an asset
  • Working knowledge of security and cryptography - distributed ledger technologies are a nice to have
  • Working knowledge and/or experience with one or more of the following - GO, Node.js, Angular.js, HTML5/CSS, Java, Blockchain (Ethereum, Bitcoin, Ripple, etc),
28

Manager, Information Security Risk Resume Examples & Samples

  • Develop and execute the vision, strategy, and direction of the information security risk program and team against the risk program goals, objectives, and tactics
  • Manage a small team of Information Security Risk professionals
  • Sustain and improve the enterprise information security risk management framework, policy, processes, and tools
  • Enable risk-based strategic planning efforts across Lending Club, and ensure that risk mitigation strategies are identified, resourced and tracked
  • Manage the risk reporting process within the Information Security Team
  • Coordinate with Lending Club’s ERM function relevant to information security risk and its overlap with product security and data privacy
  • Work proactively with the IT compliance function regarding key information security risk considerations
  • 7+ years of combined risk management, risk consulting, and information security work experience
  • 5+ years of experience directly leading and managing a team of risk and / or information security/IT professionals
  • Expert knowledge of risk management approaches and processes required, including proven implementation experience
  • BS degree or equivalent work experience in risk management, business management, information systems or other relevant field
  • Professional certifications such as CISSP, CISM, or CRISC a plus
  • Financial Services or Technology experience desirable, prior Big Four or other consulting experience a plus
29

Manager Information Security Resume Examples & Samples

  • Builds relationship with key user and store operation groups to identify and resolve business issues
  • Manages and provides technical and business direction that affects capacity planning, new applications, data security, and LAN systems, among others
  • Manages and tracks the progress of multiple projects. Project management and administration that include work plans, projtrac, resource planning and control, writing status reports, and preparing annual budgets. Conduct regular project reviews
  • Resolves information services problems by analyzing issues, discerning the most appropriate courses of action, providing tactical direction and, when necessary, reallocating resources
  • Provides operations analysis and consults to internal clients on business process improvement
  • Conducts financial analyses to support strategic planning on system purchases, upgrades and reclamation. Negotiates favorable prices with vendors on hardware and software
  • Communicates status of activities with the team, peers, management, and end-users
  • Selects, develops and motivates assigned staff
  • Must be eighteen years of age or older
  • Must pass the Drug Test
  • Must successfully complete any required training or orientation courses
  • Knowledge of Single Sign On Federation products using SAML 2.0 and Oauth technology. Products such as (PING Federate, Microsoft ADFS, etc.)
  • Working knowledge of Identity and Access Management package solutions - Oracle, IBM, CyberArk
  • Knowledge of Dell/Quest toolset (ARS, RMAD, etc.). Experience integrating directories for access management and SSO. Experience in troubleshooting of complex enterprise-architected systems on multiple platforms
  • Ability to deploy Highly Available and Robust infrastructure
  • Knowledge of evaluating performance and tuning LDAP environments
  • Experience utilizing security best-practices to tighten access to LDAP resources and Identity and Access Management Solutions. Strong Windows system administration and deep understanding of Windows security. Information Security experience particularly with Identity and Access Management
  • Extensive knowledge of Active Directory and LDAP protocol
  • Working knowledge of Identity and Access Management technologies – SSO, Web Access Management, Entitlement/Certification Management, Federation, Directory Services, Password Management, Provisioning and Job Role Management
  • BS - Computer Science, IS or Math or Bachelor's Degree in a related subject
  • 7-10 years of experience in Systems and Information Security administration with at least 3-5 years professional experience designing, implementing and managing enterprise Identity and Access Management programs; at least 3 years at the Manager level or higher
  • Detailed knowledge of directory server and protocol technologies (Oracle, TDS, and AD)
  • Deep experience in designing and implementing access management solutions – WAM/SSO, PAM, Entitlement Mgmt., Federation - & Identity Management solutions – Directory services, Password Mgmt., Recertification, Provisioning and Job Role Mgmt
  • Technical understanding of password management capabilities and procedures to implement/manage password requirements
  • In depth understanding of authorization/access control models. Practical/business understanding of role and rule based access control models (how, why and when to use)
  • Strong leadership and interpersonal skills in areas such as teamwork, facilitation and negotiation
  • Excellent written and verbal communication skills
  • Thorough understanding of Information Security frameworks and best practices (e.g. PCI, ISO, NIST)
  • Certified Information Systems Security Professional (CISSP) or Certified Information Systems Auditor (CISA) rating is desired
30

IT Project Manager Information Security Resume Examples & Samples

  • Experience delivering projects using the Waterfall methodology
  • 7+ years Project Management Experience (Sr. Level PM)
  • Information Security Experience
31

Senior Audit Manager, Information Security Resume Examples & Samples

  • Directs complex audit activities for a component of a product line, function, or legal entity at the regional or country level including a portion of the audit annual plan
  • Applies comprehensive expertise in one or more of the corporation's businesses and leverages this knowledge into a leadership role in one or more teams
  • Proactively advances integrated auditing concepts and use of technology. Closely follows latest trends in own field and adapts them for application within own job and the business
  • Manages a complex and critical unit within Internal Audit, including a medium sized team of Internal Audit professionals. Recruits staff, develops talent, builds effective teams, and manages a budget. Possesses a broad and comprehensive understanding of different Internal Audit standards, policies and local regulations; applies a broad and comprehensive knowledge of high risk areas including: Consumer or Investment Banking, technology management; project/program management; regulatory compliance or supplier management
  • Leads the professional development of Internal Audit staff
  • Develops effective senior line management relationships and has a strong understanding of the businesses
  • Uses excellent communication skills in order to influence a wide range of internal audiences including respective product, function, or regional executive management partners. May negotiate internally often at higher levels on matters which will have a major impact on the area managed
  • Possesses strong project management and interpersonal skills, makes sound decisions, exhibiting initiative and intuitive thinking. Consulted often by others for advice and opinions and recognized as a leadership role model
  • Frequently involved in matters that require complex judgments and solutions based on sophisticated analytical thought such as identifying solutions for a variety of complex and novel audit control issues. Analyzes reporting findings; Recommends appropriate interventions where needed. Proposes creative and pragmatic solutions for risk and control problems. Partners with Directors and Managing Directors to develop approaches for addressing broader corporate emerging issues
  • Serves as lead reviewer for all types of reviews, including the most complex
  • Reviews and approves Business Monitoring Quarterly Summaries
  • Senior level experience in a related role with experience in business, functional and people management, with proven abilities in taking responsibility for executing concurrently on a portfolio of high quality deliverables to stakeholders according to strict timetables
  • Specific subject matter expertise regarding information security/cybersecurity, technology application control disciplines and technology infrastructure knowledge, with a sound understanding of the financial services provided by Citi
  • Effective negotiation skills, a proactive and 'no surprises' approach in communicating issues and strength in sustaining independent views. This individual must be an articulate and effective communicator, both orally and in writing, with an energetic, charismatic and approachable style
32

Manager, Information Security Resume Examples & Samples

  • Managing a small team of one to three individual contributors
  • Identification of information security risks and requirements in business partner and third party agreements
  • Documenting, tracking and facilitating risk acceptances across the company to ensure alignment to corporate risk appetite
  • Managing the enterprise risk assessments and ensuring that regulatory requirements are addressed (e.g. GLBA, FFIEC)
  • Identification of critical areas of potential information security risks and opportunities
  • Working in conjunction with management to establish goals and strategies that challenge the organization to raise the bar on the management of information security risk
  • Building constructive and collaborative relationships across the Company
33

Executive Manager, Information Security Resume Examples & Samples

  • Must have 15+ years’ Information Security Technologies and Management experience in a financial services environment demonstrating progressive levels of responsibility in Operational roles
  • The successful candidate requires a strong proven ability to develop and manage cost and capacity models, with strong functional skills in information security and risk management, efficient process design and solution development leading to customer focused outcomes
  • Experience with Technology Program Management that includes a diverse and multi-location staff including offshore / vendor resources
  • Experience in managing large projects and programs including Audit, Regulatory and Risk compliance, Client Briefings and large scale technology migrations
  • Ability to visualize and present a concept for a total solution, defining key milestones, providing steering and executive level updates and briefings and working with all key stakeholders to deliver operational, tactical and strategic cyber security products and services
  • Previous experience managing large scale system and infrastructure programs and budgets. Experience in both Security and Infrastructure Management is highly desirable
  • Strong executive presence and relationship management skills; Experience interfacing with executive leadership and making case for strategic change/improvements
  • Familiarity with the development and management of near-/off-shore resources; including the effective integration of follow-the-sun models to drive operational efficiency and cost management
  • Ability to effectively manage business relationships and individuals across functions, including those with direct and indirect reporting relationships
  • Ability to lead and manage in a cross-functional environment driving to a win/win for risk management and clients
  • Proven leadership experience with large teams in an operational delivery environment
  • Drives results and champions Innovation and Change
  • Excellent Communication Skills
  • Strong sense of urgency and accountability for organizational outcomes
34

Manager, Information Security Resume Examples & Samples

  • This position is responsible for implementation of the security function within the Governance, Risk and Compliance program
  • Perform formal risk analysis and security design review ensuring appropriate policies and standards are applied to projects consistent with Guardian’s risk appetite and regulatory/legal requirements for various Business and Information Technology systems and processes
  • Using technical skills, industry and security knowledge, identify risks, mitigations, and (working with Director IT Security Governance and IT Compliance) prepare relevant information to present residual risks to IT Risk Council. This is primarily part of the Plan function within Plan/Build/Run model
  • Create process flows and applying aspects of Six Sigma to better define, measure, improve, analyze and control security and privacy processes
  • Review Vendor software/hardware and Third Party information security controls/risks and document gaps and issues for action
  • Assist other Security teams in response to information security events
  • Conduct security research in keeping abreast of latest security issues
  • Contribute to the IT Security Governance vision and strategy
  • Perform security and risk engagement on projects – driving requirements, control design, risk assessments and mitigations
  • Conduct projects to evaluate new capabilities at direction of Director IT Security Governance
  • Help ensure compliance with HIPAA, GLBA, PCI, MAR and other regulatory requirements
  • Maintain an active awareness of security technologies, best practices and regulatory activities – through industry events and networking
  • Skill in reviewing vulnerability scans and recognizing vulnerabilities in security systems
  • Knowledge of information technology (IT) security principles and methods (e.g. firewalls, Demilitarized Zones, encryption)
  • Experience working with network access, identity (SailPoint knowledge a plus), and access management (e.g. Active Directory, access federation, multifactor authentication, PKI)
  • Experience working with operating systems (Microsoft Windows, Linux, UNIX, MacOS X)
  • Knowledge of various database (SQL, Oracle) platforms
  • Knowledge of how traffic flows across the network (e.g. TCP & TCP/IP, OSI, etc.)
  • Knowledge of software engineering
  • Skill in designing security controls based on NIST principles and tenets
  • Skill in determining how a security system should work (including its resilience and dependability capabilities)
  • Skill in developing and applying security system access controls
  • Knowledge of HIPAA/HITECH, Personally Identifiable Information (PII) and Payment Card Industry (PCI) data security standards
  • Multiple years of experience in managing and/or a leadership role in security, compliance, audit or risk covering a wide area of technologies and security domains including those previously mentioned
  • Project work experience with a recognized security, audit, or risk consulting firm a plus
35

Lead Manager, Information Security Resume Examples & Samples

  • Manage and mitigate existing known security and risk issues on a monthly basis collaborating with Senior Information Risk Officers with both the technology and business teams
  • Participates in RFP process to review proposed new applications and/or services evaluating risks and security is meeting or exceeds internal requirements
  • Works closely with Internal Risk, Vendor Risks, Cybersecurity and HR Compliance and Risk team to assure proper governance and adherence to corporate procedures and policies
  • Advises and executes data protection initiatives for HR PII and/or confidential data within both on premise and cloud-based systems and services
  • Oversees compliance of HR data risks programs to assure compliance of both production and lower environment instances
  • Collaborates with internal Risk, Compliance, Cybersecurity
  • Leads projects in monitoring the utilization and effectiveness of security resources. Develops and implements monitoring and metrics approaches. Provides direction and guidance on reports and analyses and ensures recommendations are aligned with customer/business needs and capabilities. Monitors budgets and schedules for projects managed by the team and ensures they are completed in a timely manner. Participates in the recruiting process, instructs, assigns, directs and reviews the work of other information security analysts, prepares performance reviews and provides ongoing feedback. Contributes to the achievement of team objectives
  • Highly prefer experience in the Human Resources domain for managing Confidential and Personally Identifiable Information
36

Senior Program Manager Information Security Vulnerability Management Resume Examples & Samples

  • Ensure the seamless delivery of all Vulnerability Management services
  • Lead cross-functional program teams in security remediation planning and execution of security programs by planning and tracking of tasks, schedules, resources and dependencies- facilitate & drive project meetings
  • Drive definition and closure of remediation project requirements, project plans/schedules, and resource needs with stakeholders and within team resources
  • Actively manage programs and/or project portfolio, provide consistent program status and progress against objectives
  • Manage projects/portfolios that involve significant business complexity and communication, with organized collaboration and conflict resolution across diverse organization
  • Analyze security services offerings and program portfolio to define cost models and success metrics
  • Participate and lead internal projects as required
  • Assist in building out and maturing the Security Vulnerability Management program
  • Raise accountability; escalate issues in a timely manner and create and maintain detailed Project Plans
  • Resolve issues, dependencies and conflicts; make certain that all team members are involved and engaged
  • Demonstrate the ability to assess a situation and recommend changes to achieve goals, even if it means major mid-course changes to the project plan -Work to ensure projects are successfully implemented while taking into consideration a complex security and development environment, resource constraints, accelerated timelines, and/or reprioritization of projects
  • Champion & contribute to project management best practices and innovate & champion processes/methodologies at project level
  • BA/BS degree or higher
  • Certifications, training, or other business continuity management related education preferred
  • Certifications, training, or other third-party security risk management education preferred
  • Typical Range of Experience: Describe the level of experience typically required
  • 10+ years of progressive experience managing initiatives in technology environment
  • 6+ years of leadership experience with executive level presence
  • CISO
  • Senior level experience with Infrastructure and security technologies and concepts
  • Demonstrated ability to manage complex projects and portfolios
  • Advanced proficiency in: automated project management tools such as Microsoft Project; analytical, organizational, project management, interpersonal and communication skills (verbal and written)
  • Customer and relationship-focused, process-driven, metric-focused, results-oriented, organized and self-directed
  • Ability to manage and prioritize multiple tasks and projects and assist/advise support engineers in establishing appropriate priorities
  • Senior level experience with network technologies and concepts
  • Working knowledge/experience of networking, security and applications preferred
37

Manager, Information Security Resume Examples & Samples

  • Lead governance of the ISMS to ensure organizational compliance among employees, contractors, clients and other third parties with security policies, contractual and regulatory information security and privacy requirements, and maintain ISO 27001 certification
  • Establish, manage, and track security objectives for the organization
  • Conduct security threat and risk assessments; recommend and deploy appropriate mitigation measures and controls to manage identified security risks to information security
  • Implement, maintain, and periodically review effective security policies, procedures, systems and practices to ensure the security and protection of personnel, assets and information appropriate to the threat environment and business risk profile
  • Monitor the security environment and take proactive measures to minimize the impact of assessed or increased risks
  • Ensure that information security assets are maintained, inventoried and/or disposed appropriately
  • Coordinate and facilitate the implementation of effective access control and security processes
  • Provide security research, analysis and project support to key stakeholders
  • Manage information security incidents and plan and conduct security investigations and review security breaches as required. Act as first point of contact for all RE&WS security related issues
  • Create awareness and methods supporting compliance with the Information Security Management System and its Policies/Procedures and Incident Management Program and provide direct information security training to staff
  • Manage all Internal and External Audits, inquiries, observations and findings related to information security and represent the organization’s information security function to auditors and third parties
  • Manage periodic and ad-hoc penetration testing and client security audits
  • Follow up and coordinate remedial action required following incidents, DR tests, and audits
  • Manage third party and vendor risks
  • Manage contracted security services and resources and review, evaluate and monitor performance and effectiveness
  • Engage closely with functions and entities in the organization and provide timely advice to ensure ISO 27001 compliance and coordinate and facilitate the completion and testing of Business Impact Analysis (BIA) and effective Business Continuity Plans (BCP) and Disaster Recovery (DR) Plans
  • Support the Hosting and Software Development groups with technical security advice related to risk mitigation, new projects, and other business initiatives
  • Coordinate the information security efforts of all internal groups that have one or more information security-related responsibilities, to ensure that information security efforts are consistent across the organization, and that duplication of effort is avoided
  • Assist with tracking the Security Budget
  • Ensure that security personnel are appropriately trained for their assigned responsibilities and are in possession of relevant licensing and qualifications as required
38

Senior Group Manager, Information Security Resume Examples & Samples

  • Point of contact for local business lines, partners and regulators for the Cybersecurity Services Program
  • Point of contact for ISD services for local co-ordination, implementation and escalation
  • Provide oversight of Information Security services to the local legal entities for the purposes of Senior Managers Regime and SYSC handbook and the ongoing evaluation of the effectiveness and applicability of information security services
  • Provide feedback into the ISD Cybersecurity strategy and services to ensure local and regional requirements are met including the definition of tailored products and services
  • Communicating with executive management to ensure support for the Cybersecurity strategy and provide updates to relevant boards and committees where required
  • Serve in a primary interface and support role in concert with TRC colleagues for Cybersecurity discussions with external stakeholders such as regulators and clients on behalf of the global CISO and regional CIO
  • Provide a local point of contact to the information security incident management process
  • Oversee the establishment and implementation of any necessary local policies and standards in addition to providing feedback on global policies and standards which may conflict with local regulations
  • Participate in resolving problems with security violations
  • Partner with Risk Management and Compliance to understand and communicate any new/emerging regulations impacting cyber security strategy, processes and procedures
  • Lead the execution and delivery of any local/regional ISD projects
  • Contributes to the achievement of division objectives
  • Bachelor's degree in computer science or a related discipline, or equivalent work experience required, advanced degree preferred
  • Extensive experience in information security or related technology experience required, experience in the securities or financial services industry is a plus
  • Financial Services background highly desirable
  • Security certification is beneficial, such as CISM, CISSP, CRISC, CISA
39

Manager, Information Security Resume Examples & Samples

  • Managing a team of security employees and overseeing/building relationships with key managed security services firms, security solution providers, and audit firms
  • Leading cross functional teams through auditing and compliance activities including Sarbanes Oxley (SOX), Payment Card Industry (PCI), customer audits, Internal Audit, etc
  • Responsible for establishing, maintaining, socializing, measuring and auditing a policies, standards, and governance framework aligned with domestic and international business goals/ objectives
  • Monitoring of all security operations including SIEM platform, AV, Firewalls, Identity Management Platform, access request processing, digital loss prevention, etc
  • Maintaining all security tools and technology and helping to select new tools as needs or opportunities arise
  • Establishes and manages the capability to prevent, detect, contain, mitigate and recover from information incidents to minimize business impact. Analyzes and provides assessments of IT Security Incidents & trends and their impact on business to Senior Management
  • Establishes, monitors, evaluates and reports key performance and key risk indicators (KPIs and KRIs) to provide leadership with accurate information regarding the effectiveness of the information risk & security strategy
  • Responsible for all phases of Business Continuity
  • Collaborates with all levels of business and IT management, conducting training and education programs to raise security and IT risk awareness
  • Provides Information Security, IT Risk and Business Continuity input to strategy and planning efforts
  • Ensures new development, major changes and improvements to applications and systems continue to provide necessary and appropriate security, IT risk and continuity, within all applicable environments
  • Advises Contract and Legal Teams to ensure terms and conditions protect Lands’ End and comply with the organization’s risk profile
  • Bachelor’s degree in electrical engineering, systems engineering, computer science, computer engineering, information technology, management information systems or equivalent
  • Minimum three years of successful experience in an Information Security or related field
  • Structured project management experience and broad experience in computer and network systems, application development security, desktop environments, etc
  • Security certification strongly preferred (CISSP, GSEDC, CISM, CEH)
  • Minimum two years of successful experience directly managing technical individual contributors, project managers, and vendor relationships
  • Balance of strong technical knowledge and strong leadership competencies
  • Ability to translate complex IT Security problems and issues into simple business terms
  • Demonstrated ability to motivate, mentor, coach and lead technical teams; must be able to work directly with individuals at all levels of the Company
  • Strong verbal and written communication, facilitation, and interpersonal skills
  • Ability to manage vendor/supplier relationships, including contract negotiation, ongoing maintenance & support and problem-resolution
  • Ability to effectively manage annual budgets and forecasting
  • Experience with one or more of the following preferred: PCI-DSS (Payment Card Industry), PII (Personally Identifiable Information), and/or Sarbanes Oxley (SOX)
  • Knowledgeable of the impacts on cloud based applications on an organization’s security needs and capabilities
40

Senior Group Manager, Information Security Resume Examples & Samples

  • Build and mentor Cyber Threat Analytics team collocated globally with Security operations
  • Assist with selection, design and firm wide deployment of state of the art security threat detection technologies working with various technology groups
  • Build and deliver effective threat detection capabilities using firm’s monitoring platforms
  • Facilitate and participate in continuous training exercises to keep team’s knowledge level at highest caliber
  • Train customers to effectively develop and use security detection methods
  • Leverage on user and entity behavior analytics to develop proactive defense capabilities
  • Encourage innovation within the group to continuously improve capabilities
  • 12+ years of experience in information security or related technology experience required, experience in the securities or financial services industry is a plus
  • 10+ year experience in network security, threat detection, malware detection engineering and packet capture technologies
  • Experienced in ethical hacking with sound knowledge of all technology stacks from hosts to egress points
  • Good experience in Security Logging and Monitoring technologies including Network technology Analytics, Fraud and Data Leak Analytics and User Entity Behavior Analytics
  • Working experience in leading engineering of security technologies from end point to perimeter is required
  • Bachelor of Science, Preferably in Computer Science, Computer/Electrical Engineering, or equivalent
  • Cyber Security engineering experience in financial industry
41

Manager, Information Security Architecture Resume Examples & Samples

  • Provide IT security technical and project leadership for fine grained solutions including developing robust security reference architectures
  • Work within the framework of established operating procedures to implement security measures for the business information assets
  • Estimate costs and schedules and recommend resource required and solutions to problems
  • Proactively collaborate with management in developing strategic direction, setting objectives, and setting realistic and challenging goals
  • Act as a technical advisor and subject matter expert to internal stakeholders and partners
  • Strong written skills
  • Readiness to travel up to 20% if needed
  • Fundamental understanding of PKI, virtualization, and cloud
  • Proven analytical and problem resolution skills
  • Demonstrated initiative to stay abreast of technology advancements
  • The Open Group Architecture Framework (TOGAF) & ITIL
  • 3 - 5+ years recent experience in large enterprise environment
  • Ability to pass a detailed security background screening
  • Professional Certification – CISSP or equivalent
  • Bachelor's Degree in Information Systems, Information Technology (IT), Computer Science, or Engineering degree with a minimum of 4 years of Information Systems Design, Implementation, or Integration
  • Exceptional organizational, interpersonal and team skills
  • Ownership orientation to solving problems
  • Information security and data protection skills are required
42

Manager, Information Security Engineer Resume Examples & Samples

  • Support the implementation of new tools and migrations, ensuring alignment with relevant Standard Operating Procedures (SoP). Communicate progress and escalate issues
  • Maintain eco-system of ALM tools, resolve integration issues and strive for a seamless user experience
  • Work with IT to provide superior uptime, fast resolution of service interruptions and prevention of repeat issues
  • Work with users to understands tool requirements, gaps and opportunities for improvement
  • Design and implement metrics into ALM tools to monitor and report on performance of tools and teams
  • BS/MS in Computer Science, Mathematics, Information Security, Engineering or equivalent experience
  • 5-7+ years’ experience supporting ALM or IT tools and systems
  • Experience with product development methodologies and SDLC
  • Experience working in cross-functional teams
  • Experience working in an Agile environment
  • Experience working in a DevOps environment a plus
  • Experience working with teams developing complex Enterprise software a plus
43

Lead Manager, Information Security Resume Examples & Samples

  • Hands on experience in implementation of SIEM tools like Arcsight, IBM QRadar, Splunk etc
  • Experience implementing Splunk and Splunk Enterprise Security required
  • Exposure to geography specific Data protections & Privacy regulations and its impact in SIEM implementations is preferred
  • Experience in implementing multiple SIEM instances in different geographies and their inter-connections in a “tiered SIEM/SOC” architecture is preferred
  • Experience with developing solutions for Security Operations Center, fusion center and supporting SOC operations
  • Experienced in acquisition, analysis and correlation of data from various security event sources such as proxy, firewall, IDS/IPS, DLP tools etc
44

Manager Information Security Resume Examples & Samples

  • Lead in the continual development and implementation of an innovative and progressive 3rd Party Risk program
  • Plan and execute an efficient and effective roll-out of the 3rd Party Risk program. The program will span the Sabre environment where 3rd parties are engaged/leveraged
  • Develop and implement strategic plans related to 3rd party risk management (includes security components in contract negotiations)
  • Prepare and deliver training and awareness on 3rd party risks and management
  • Monitor trends (within Sabre and industry) to proactively improve the program
  • Prepare and communicate with executive management regarding implementation progress; key risks; mitigation factors; and future plans to manage significant risks
  • Ensure proper communication of identified risks as input into the overall Sabre risk assessment program
  • Lead and/or participate in the development of the ongoing ERM analysis
  • 5+ years in risk management
  • Ability to establish priorities and meet targets
  • Ability to work closely with business/process partners
  • Mature understanding of ERM
  • Certificates, Licenses, and/or Registrations
  • This position requires one or any combination of the following
  • Advanced degree in accounting, finance or business-related alternative
  • RSA Archer development/use
  • Ten (10) years experience in audit/compliance/risk
  • Ability and willingness to move with purpose and a strong sense of urgency
  • Accuracy and attention to detail
  • Ability to organize and prioritize a variety of tasks/projects
  • Familiarity with industry/technical terms and processes
  • Ability to work within strict time frames and resolute deadlines
45

Audit Manager, Information Security Resume Examples & Samples

  • Maintain a complete, comprehensive and accurate auditable universe for the assigned areas of responsibility within the technology audit to manage and support local product and functional auditing
  • Develops and executes a robust Audit Plan, by reviewable entity, for assigned businesses in accordance with Internal Audit standards, relevant government statutes and regulations and Citigroup and Citibank policies
  • Delivers on time high quality audit reports, Internal Audit and Regulatory issue validation and (where appropriate, branch examinations, as well as business monitoring and governance committee reporting
  • Manages audit activities for a component of a product line, function, or legal entity at the regional or country level including a portion of the audit annual plan
  • Applies in-depth level of expertise in one or more of the corporation's businesses and leverages this knowledge into a leadership role in one or more teams
  • Proactively advances integrated auditing concepts and use of technology
  • Manages a complex and critical unit within Internal Audit, including a small to medium sized team of Internal Audit professionals. Recruits staff, develops talent, builds effective teams, and manages a budget. Possesses a broad and comprehensive understanding of different Internal Audit standards, policies and local regulations; applies a broad and comprehensive knowledge of high risk areas including: Consumer or Investment Banking, technology management; project/program management; regulatory compliance or supplier management
  • Applies an in-depth understanding of the inter-relationships of business and support units throughout the corporation and how they impact the overall control environment and the audit approach
  • Demonstrates strong judgment, political astuteness, and sensitivity to cultural diversity
  • Participates in major business initiatives and pro-actively advises and assists the business on change initiatives
  • Serves as lead reviewer for all types of reviews
  • Performs Business Monitoring Quarterly Summaries
  • Work collaboratively on assignments with Internal Audit teams in Citi and keep abreast of evolving Information Security / Cybersecurity regulations on risk management and ensure that these are appropriately addressed in Internal Audit’s risk assessment and audit planning processes
  • BA/BS or equivalent. Related certifications (CPA, ACA, CFA, CIA, CISA or similar) are a plus. Additional security certifications (CISSP, CISM, CEH or similar) are desired
  • Specific subject matter expertise regarding technology application control disciplines and a solid business understanding of technology infrastructure products, especially those associated with the banking and financial business
  • Demonstrates experience in managing teams and managing integrated internal audit and assurance delivery within a matrix reporting environment
  • Strong interpersonal skills for interfacing with all levels of internal and external audit and management
46

Manager, Information Security Resume Examples & Samples

  • Bachelor’s degree in Computer Sciences or related field or equivalent experience/certification
  • 3+ years of information technology leadership experience
  • 2+ years of experience in Identity and Access Management, user/system authentication/authorization including Enterprise Directory Services, Federated Identity Management, Single Sign-on, Public Key Infrastructure, and/or Two-Factor authentication
47

Risk Manager, Information Security Resume Examples & Samples

  • Establishes credibility and maintains strong working relationships with groups involved with information security matters
  • Responsible for building information security as a core competency throughout our relationships across Amazon.com
  • Provides support for corporate security projects
  • Evaluates complex business requirements, and communicates inherent security risks and solutions to business owners
  • Delivers findings, recommendations and remediation steps for all activities
48

Manager Information Security Resume Examples & Samples

  • Refines and implements a defense-in-depth strategy for Republic Services
  • Defines, develops and implements the following
  • Master’s degree in Computer Science, Information Systems, Information Security or related field
  • Bachelor's degree in Computer Science, Information Systems, Information Security or related field
  • Professional certifications: CISSP, CISM, GSEC, GIAC; or similar certifications
  • Minimum of 5 years of experience in managing Information Security teams for large enterprises
  • Technical proficiency in at least one of the following domains: application security, database security and administration, network infrastructure architecture and security, Secure SDLC, and incident response
  • Strong technical, analytical and problem solving skills
  • Strong foundation in information security engineering and operations
  • Ability to interact with IT personnel on all levels to resolve issues and provide solutions in a timely manner
  • Understands the need for, and consistently practices, effective teamwork with others
  • Capable of prioritizing and managing assignments, tasks and projects to completion with minimal supervision
  • Ability to maintain a detail oriented approach while multitasking in a fast paced environment
  • Proficient in all currently supported application development standards in use at Republic Services
49

Manager Information Security Resume Examples & Samples

  • Develop, implement and oversee a comprehensive information security strategy and program in line with company goals and risk tolerances
  • Review and approve security policies, controls and cyber incident response planning
  • Ensure the company meets all mandated security and compliance standards
  • Direct and approve the design and implementation of all security systems and programs
  • Review investigations after breaches or incidents, including impact analysis and recommendations for avoiding similar vulnerabilities
  • Ensure compliance with the changing laws and applicable regulations
  • Perform ongoing security risk assessments and develop mitigation plans to reduce risks to acceptable levels
  • Schedule periodic security audits and assessments
  • Oversee identity and access management
  • Ensure that cyber security policies and procedures are communicated to all personnel and that compliance is enforced
  • Provide training and mentoring to information security team members
  • Communicate best practices and risks to all parts of the business helping develop a strong cybersecurity awareness culture
50

Group Manager, Information Security Resume Examples & Samples

  • At least 3 years as a manager/supervisor, experience in hiring right candidates to build team; skilled at delegation to and empowerment of team members
  • Vendor management experience a plus
  • Strong technical background in Unix, Windows, SOA, Java, Apache, FOSS technologies
  • Solid understanding of cybersecurity concepts such as cyber kill chain, APT, Threat Intelligence etc
  • Strong experience with enterprise application security threat detection and monitoring
  • Information Security certifications such CISSP, SANS, Ethical Hack preferred
51

Senior Project Manager, Information Security Resume Examples & Samples

  • Must be able to mitigate the business risk by designing and implementing security solutions at applications, perimeter and endpoint devices
  • Work with the IT applications team to audit application platforms throughout the development cycle, identify security risks and mitigate the risks by suggesting and implementing the remediation actions
  • Enable rapid, predictable, transparent delivery of high-quality IT security solutions/projects. Manage key complex, cross-functional IT programs & projects with regard to scope, schedule, resources and budget. Establish and manage project schedules and work breakdown structures to ensure project objectives are met. Create and drive project plans to optimize resources
  • Engage, promote and improve the Tesla Motors IT Project Life Cycle methodology and use of Tesla’s Daptiv Portfolio & Project Management (PPM) tool for rapid, high-quality IT execution
  • Organization Maturity: Accelerate IT maturity re portfolio & project management for increased success. Lead, guide & advise business & IT resources for increased adoption of streamlined processes & tools. Define and implement change acceptance & training plans as needed
  • Operational excellence: accurate and timely information, accountability, meet commitments & timelines, efficient use of Tesla resources
  • Experience with SOX & information technology controls to ensure compliance
  • Communication: Maintain timely, clear lines of communications with co-workers, management & executives in all areas to ensure that all are continually updated and not surprised
  • Exercise broad expertise, knowledge & skills to develop objectives & achieve goals in creative and effective ways. Analyze situations & data and evaluate intangibles
  • Exercise independent judgment in methods, techniques and evaluation criteria for obtaining high-quality results
  • Build strong relationships; create informal networks and coordinate among groups
  • Act independently to determine effective methods and procedures
  • Serve in an advisory/coach capacity to others as needed
  • Continually seeks ways to streamline & improve process effectiveness & efficiency, and to anticipate and prevent problems
  • Promote & enhance teamwork
52

Manager, Information Security Resume Examples & Samples

  • Provide strategic direction to related governance functions (such as Risk Management, IT Audit, Legal and Compliance)
  • Collaborates with the Security Committee and leads the design, implementation, operation and maintenance of the Information Security Management System based on the ISO/IEC 27000 series standards, including certification against ISO/IEC 27001 where applicable
  • Leads or commissions the preparation, and authorizes the implementation, of necessary information security policies, standards, procedures and guidelines
  • Communicates audit findings and coordinates their resolution by preparing reports, status updates and discussing findings with stakeholders
  • Forms a “centre of excellence” for information security management, for example offering internal management consultancy advice and practical assistance on information security risk and control matters throughout the organization
  • Develop and manage controls to ensure compliance with the wide variety and ever changing requirements resulting from laws, standards and regulations, including PCI, SOX and others
  • Liaise with senior and middle managers throughout the organization as necessary, on information security matters such as routine security activities plus emerging security risks and control technologies
53

Senior Program Manager Information Security Risk Management Resume Examples & Samples

  • Design, develop and consistently administer a disciplined, data driven program that measures, quantifies, presents and manages information security risk AND helps determine where investments should be made in order to relentlessly move the security needle
  • Partner with research divisions, compliance and operations to establish and evangelize the risk management framework, which includes the mapping of key controls, assessment and remediation; perform deep dives as required on key security related processes and systems
  • Collaborate closely with peers on the Information Security Governance team to conduct and/or coordinate risk assessments for technology, compliance, and security frameworks to address Policy & Standards gaps
  • Develop and provide data driven BI views into complex risk and control states; effectively communicate these states, trends, emerging issues, progress and impacts across broad audiences and different levels
  • Develop “metrics that matter” and strong BI driven insight that effectively displays progress against security risks; collaborate closely with the Security Remediation function to help tell a data driven story about recurring security risks and remediation efforts
  • Facilitate multiple stakeholders to agree on appropriate solutions and verify that risks are mitigated appropriately
  • Help drive a security conscious engineering and operational culture by consistently holding yourself and others accountable in a positive and integrity rich manner
  • Develop innovative solutions to complex problems and work efficiently and independently with minimum supervision; identify system and process limitations that could lead to security risks in new and established systems and services, and provide guidance for resolution and risk mitigation
  • Stay abreast of innovative business and technology trends in governance, risk, and compliance and advise leadership on technology initiatives in research and healthcare
  • Proven expertise in developing and administering data driven, disciplined Information Security Risk Management Programs in complex environments
  • Expert level skill in the development of technical and executive level data centric presentations, BI views, analytics and dashboards
  • 5+ years’ experience in IT audit, information security, and/or privacy roles
  • Knowledge and experience with HIPAA, HiTrust, NIST and ISO compliance frameworks
  • Creative self-starter with a willingness to learn and adapt with pace of work environment
  • Excellent communication skills and ability to influence across all levels (verbal and written)
  • Customer centric ability to collaborate with division partners in setting risk management goals and objectives
  • Knowledge of risk assessment methodologies, information security policies and standards, compliance frameworks
  • Super positive and high-energy personality – the team likes to do great security work and have fun doing it. A great sense of humor is a definite plus!
  • CISSP, CIRSC, CISM or other associated certifications
  • Understanding the landscape for federally funded research organization environments is a plus
  • Strong working knowledge of information security fundamentals, domains and frameworks, engineering concepts, service deployment operations, access control, secure coding and software development, penetration testing, network and identity isolation fundamentals and incident response
54

Manager Information Security Resume Examples & Samples

  • Provide councel on IT risk through collaboration with key stakeholders such as VP/CIO, IT Management, Director of Risk Management, Internal Control Services, and the Audit Committee of the Board of Directors
  • Ensure that all IT and information security programs and policies are in alignment/compliance with applicable privacy and identity theft laws and other regulations such as SOX, HIPAA, and PCI. Coordinate internal self audit programs to ensure compliance. Coordinate IT activities for ICS and external audits. Coordinate ISS response to audit findings, including remediation activity
  • Coordinate ISS self-testing activities, including regular penetration testing, to ensure compliance with policies
  • Operate Identity Management and Access Management programs including leadership of a team to fulfill access requests
  • Operate an effective information security awareness training program for the entire enterprise
  • Operate threat protection strategy to include a wide range of strategies such as firewalls, patching, anti-virus, log monitoring, data backup, disaster recovery, etc
  • Implement and operate a data classification protocol including encryption strategies and other scanning protection strategies for data loss prevention
  • Establish intrusion detection and incident response processes for proactive reaction to significant information security breaches
  • Ensure that strategic information security and risk guidance is provided to third-party suppliers in accordance with internal frameworks, and ensure compliance with required controls
  • Create process to identify and communicate application risk with business partners so that informed decisions can be made
  • Perform special projects and other duties as assigned
55

Manager, Information Security Resume Examples & Samples

  • Direct Business Information Security Office staff in the development, implementation, communication, monitoring and maintenance of the information security policies and procedures which promote a secure and uninterrupted operation of all data processing systems
  • Prepare activity and progress reports
  • Responsible for the review and implementation of security standards, procedures, and guidelines to prevent the unauthorized use, release, modification, or destruction of data across multiple platforms and environments e.g., corporate, mainframe, distributed and client server systems
  • Participate in the establishment of the corporation’s information security policy and standards
  • Manage security due diligence efforts over GBTS owned tools and service offerings to ensure appropriate security controls are in place
  • Provide state of the art technical expertise and support in security/risk assessment and the implementation of appropriate data security procedures and products
  • Manage the reporting, investigation and resolution of data security incidents
  • Maintain contact with industry security standard setting groups, and an awareness of State and Federal legislation and regulations pertaining to information security
  • Perform related duties as assigned or requested
  • Understand the SDLC methodologies and instructs teams on how to incorporate security controls in compliance with Enterprise standards into each phase
  • Provide leadership to managers and or professional staff
  • Accountable for the performance and results of a team or multiple related teams
  • Decisions are guided by resource availability and departmental business plans
  • Bachelor degree in Information Technology or related field
  • Five to Seven years of professional experience working in Information Security teams
  • Demonstrated experience leading project teams
  • Information Technology or Risk Management certification (CISSP, CISA, CISM, CRISC) or progress in achieving certification
  • Strong communications, talent mindset, consulting ability, and project management skills
  • Strong ability to build relationships and influence others
56

Manager, Information Security Resume Examples & Samples

  • Information Security Risk Management - Manages and matures information security risk management processes, program and strategy. Aligns information security activities with PCI, SOX, and GLBA regulatory requirements and internal governing enterprise risk management policies. Identifies security gaps and deficiencies by conducting risk assessments; recommend corrective action of identified vulnerabilities and weaknesses. Leads the planning, testing, tracking, remediation, and risk acceptance for identified security risks. Manages the creation and publication of internal controls. Ensures requisite compliance monitoring is in place to identify control weaknesses, compliance breaches and operational loss events. Ensures adequate compliance resources and training, fostering a risk and compliance focused culture and optimizing relations with corporate compliance members and regulators
  • Staff Management –Directs the activities of staff in accomplishing corporate business objectives. Set priorities, provides guidance, secures resources, interfaces with peers and senior leadership, communicates at all levels. Fosters the development of less experienced Information Security team members
  • Strategy & Architecture - Creates and directs security strategy, architecture and tools in accordance with company standards, policies, procedures and other formal guidance, ensuring security technology standards and best practices are maintained across the organization
  • Process Improvement - Promotes implementation of new technology, solutions and methods to improve business processes, efficiency, effectiveness and value delivered to customers. Manages operational, architectural and design documentation including procedures, task lists, and architecture blue prints
  • Project Oversight - Assesses project risk and complexity. Oversees project handoffs including preparing documentation, educating and supporting to ensure smooth transitions. Manages the selection and design of tools that allow reuse of design components and patterns between projects
  • Due Diligence –Ensures enterprise due-diligence activities including security monitoring and security metrics to evaluate effectiveness of the enterprise security program and established controls
  • Incident Response - Manages security incident response activities and post-event reviews of security incidents. Ensures the clear and professional documentation of root cause and risk analysis of all findings. Reviews and manages action plans for issue resolution. Oversees investigation and reports contribution of security threats and incidents
  • Subject Matter Expertise - Provides oversight as information security subject matter expert to business areas, project teams and vendors to apply and execute appropriate use of technology solutions and leads efforts to examine technology vision, opportunities and challenges with regard to security standards and the impact of the technology
  • Vendor/Tool Selection – Directs the research, evaluation, proof-of-concept, selection and implementation of technology solutions. Negotiates with vendors. Provides detailed analysis of pros and cons and build vs buy options. This includes interaction with vendors, IT and business area contacts to facilitate flexible, and scalable solutions. Ensures that the technical design considers security controls, performance, confidentiality, integrity, availability, access and total cost. Oversees working solutions or prototypes and resolves any issues that arise
  • Security Trends - Continually works to enhance breadth and depth of knowledge and experience. Benchmarks technology strategies and architectures. Monitors and anticipates trends and investigates organizational objectives and needs. Provides guidance on security solutions and prepares benchmarking reports and presentations
  • Secure Application Development - Manages highly technical/analytical security assessments of custom web applications, mid-tier application services and backend mainframe applications, including manual penetration testing, source code and configuration review using a risk-based intelligence-led methodology. Identifies potential misuse scenarios. Advises on secure development practices
  • Secure Testing - Oversees security testing projects according to a structured process, including writing test plans, test cases and test reports. This may include oversight of the configuration and deployment of security testing software and application of results to security analysis. Oversees basic proof-of-concept exploits of vulnerabilities
  • Strong working knowledge of
  • Advanced knowledge of common web technologies, enterprise and network architecture
  • Strong understanding of
  • Minimal travel required (<15%), Domestic
57

Manager, Information Security Resume Examples & Samples

  • Manage team of security engineers and technical program managers. Manage and develop the team, including hiring, retention, performance management, mentoring and capability/skill development. Manage toward company, product, and personal objectives
  • Act as point of contact with multiple Amazon businesses for communications dealing with information security, including vulnerabilities, controls, technologies, human factors and management issues
  • Establish credibility and maintain strong working relationships with groups involved with information security matters (Legal, Internal Audit, Fraud, Physical Security, Developer Community, Networking, Systems, etc.)
  • Review, suggest, and implement improvements for security practices, especially as they pertain to our external party relationships
  • Lead the architecture, design, implementation, support, and evaluation of security-focused tools and services
  • Develop and deliver general security awareness and specific security technology presentations, talks and training related to our external relationships
  • Translate security and technical requirements into business requirements and present to Information Security leadership
  • Stay current on emerging security threats, vulnerabilities and controls
  • Highly technical and hands-on is a must
  • Extensive project leadership experience
  • Strong knowledge in current security threats, trends and mitigations
  • Experience conducting acquisition and partner due diligence, including delivery of risk analysis reports of findings is desirable
  • Experience with client side security and mobile platform security
  • Executive-level written and verbal communication skills
  • Master's Degree in CS, Mathematics or related discipline
58

Manager, Information Security Policy Resume Examples & Samples

  • Risk Governance for the “Crown Jewel” asset program
  • Risk Governance for key regulatory programs such as GDPR
  • Remediation and reporting
  • Outsource engagements risk assessments
  • Manage the development of the Thomson Reuters Security Policy set (including its alignment to security controls framework)
  • Publish monthly/quarterly/annual updates to Key Stakeholders and SME’s
  • Manage multiple projects through to completion, ranging from reviewing security/privacy obligations to performing security gap analyses
  • Ensure adherence to security policies in planned or assigned propositions and projects
  • Assists in the maintenance of the GRC methodology processes/tools
  • Work with Senior Management in driving awareness of identified risks, as well as status reporting and governance
  • Experience in Information Security Policy development and risk management in a global organization, ideally within a regulated industry
  • Experience monitoring data protection & cyber security obligations (contracts, regulations & legislation); and managing those requirements in Information Security policy development
  • Experience working with External Auditors to ensure effectiveness of security policy, strategy and governance
  • Experience managing people or processes in a global/matrix environment
  • Demonstrated leadership skills with ability to work and communicate effectively at executive levels
  • Extensive experience in information security, privacy or risk management in a financial services or internet driven environment
59

Manager Information Security & Risk Management Resume Examples & Samples

  • Performs management responsibilities to include, but are not limited to: involved in hiring and termination decisions; coaching and development; rewards and recognition; performance management and staff productivity
  • Plans, organizes, staffs, directs and controls the day-to-day operations of the department; develops and implements policies and programs as necessary; may have budgetary responsibility and authority
  • Provides oversight of all aspects of project management to ensure continuous improvement of processes: negotiates and collaborates with leadership and staff to develop security solutions and options; develops and adheres to internal standards and strategies; ensures adherence to approved methodologies; coordinates resources, time, contingency plans and risk management
  • Provides Leadership to the department: leads and champions organizational change; encourages participation in activities that support relationship development; champions information security innovation; encourages and enforces proper training in regards to security issues
  • Communicates effectively with all levels of the organization: facilitates meetings; plans, designs and provides presentations; represents HM Health Solutions with outside entities; prepares divisional procedures, policies, reports and correspondence; spreads awareness of new and existing security threats; provides oversight regarding metrics, funding, budgets and resources
  • 1-3 years' experience in developing and executing strategic plans to realize business objectives
  • 1-3 years' experience in staff management
  • 7-10 years' experience in Information Security and/or Information Risk Management and/or Information Technology
  • 7-10 years’ experience in developing, communicating and presenting Information Security and Risk Management concepts to varying audiences
  • Knowledge of regulatory requirements such as Health Insurance Portability and Accountability Act (HIPPA), Payment Card Industry Data Security Standards (PCI DSS), and FIPS-140
  • Experience in leading process improvement initiatives
  • Demonstrated competency in project execution
  • Demonstrated abilities in relationship management
60

Manager, Information Security Resume Examples & Samples

  • Manages security due diligence efforts over GBTS owned tools and service offerings to ensure appropriate security controls are in place
  • Provides state of the art technical expertise and support in security/risk assessment and the implementation of appropriate data security procedures and products
  • Manages the reporting, investigation and resolution of data security incidents
  • Maintains contact with industry security standard setting groups, and an awareness of State and Federal legislation and regulations pertaining to information security
  • Performs related duties as assigned or requested
  • Understand SDLC methodologies and instruct teams on how to incorporate security controls in compliance with Enterprise standards into each phase
  • Provides leadership to managers and or professional staff
  • Bachelor's degree in Information Technology, related field or equivalent work experience required