Security Analyst, Senior Resume Samples

4.5 (84 votes) for Security Analyst, Senior Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security analyst, senior job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
SK
S Kuhic
Stephen
Kuhic
2953 Macie Port
Phoenix
AZ
+1 (555) 591 4525
2953 Macie Port
Phoenix
AZ
Phone
p +1 (555) 591 4525
Experience Experience
Los Angeles, CA
Security Analyst, Senior
Los Angeles, CA
Lehner-Schinner
Los Angeles, CA
Security Analyst, Senior
  • Configure, administer, and document the network and firewall infrastructure, working with Checkpoint, Cisco and Juniper firewalls including Firewall OS configurations, policy management and coordinating with customers to implement B2B VPN connectivity solutions
  • System Administration of the RSA Authentication Manager (SecurID) and the responsibility for managing the distributed RSA infrastructure, firewall integration and token distribution processes
  • Troubleshoot network related anomalies in network and security systems to resolve operational issues and restore services
  • Manage and actively monitor Intrusion Detection and Prevention Systems (IDS/IPS) for active alerts and determine priority of response
  • Develop and maintain detailed configuration documentation that can be used by team members as well as for a variety of regulatory audits
  • Perform other duties as assigned
  • Manage the distributed Blue Coat ProxySG and ProxyAV web content filter appliances
San Francisco, CA
IT Security Analyst Senior
San Francisco, CA
Schuppe, Gleichner and Bogisich
San Francisco, CA
IT Security Analyst Senior
  • Performs log analysis and define security filters and rules for implementation within the Security Information and Event Management (SIEM)
  • Develop and implement controls in support of system security acceptance processes in support of government-defined security management programs
  • Provides status reports on security matters to develop security risk analysis scenarios and response procedures
  • Provides BigFix maintenance to include updates/upgrades, negative performance issues, and failed agent connectivity
  • Maintain compliance with established security and compliance controls through execution, tracking, gap identification, and constant process improvement
  • Responds to information security-related questions and inquiries using established information security tools and procedures
  • Executes security controls to prevent hackers from infiltrating company information or jeopardizing programs
present
Dallas, TX
Security Analyst / Senior Expert
Dallas, TX
Kautzer Inc
present
Dallas, TX
Security Analyst / Senior Expert
present
  • You work closely with architects, developers, and managers from Siemens divisions at all levels
  • High proficiency in software development and network administration
  • You design, develop or extend exploits, tools, and frameworks for automated security
  • You are responsible for technical analyses and evaluation of remediation measures for security incidents and vulnerabilities
  • You represent Siemens ProductCERT at international IT-security conferences and maintain close relationships with external partners
  • It is your responsibility to coordinate and drive Siemens-wide task forces regarding product security incidents
  • Successfully graduated with major in computer science and a focus on IT-Security
Education Education
Bachelor’s Degree in Information Security
Bachelor’s Degree in Information Security
Duke University
Bachelor’s Degree in Information Security
Skills Skills
  • Good understanding of ITIL/Service Management processes
  • Strong team skills, communication and drive to ensure constant improvement in service, capabilities and results
  • In-depth knowledge of networking technologies (i.e. routers, switches, load balancers, firewalls, network and routing protocols)
  • Proven hands on experience with provisioning network connectivity using IPSEC VPN tunnels
  • Proven hands on experience designing and managing connectivity solutions using Checkpoint Firewall-1, Cisco PIX/ASA and Juniper appliances
  • Experience managing and maintaining a two-factor authentication (SecurID) environment using RSA Authentication Manager
  • Experience with multiple operating systems including Unix/Linux command line
  • Comprehensive understanding of TCP/IP and its subordinate protocols
  • 5 + years of related work equivalent (Checkpoint, Cisco and Juniper firewall solutions) experience in large enterprise environments
Create a Resume in Minutes

15 Security Analyst, Senior resume templates

1

Security Analyst, Senior Resume Examples & Samples

  • 5 years of experience in the field of information technology
  • Experience with the incident response process, including with advanced adversaries and log analysis using Splunk or similar tools
  • Experience with Malware analysis and Netflow and PCAP analysis
  • Experience with scripting or programming, including Perl, Python, C, C++, C#, Java, Bash, Shell, or Batch
  • Knowledge of how common protocols and applications work at the network level, including DNS, HTTP, and SMB and how the Windows file system and registry function
  • Knowledge of UNIX and command line tools
  • BA or BS degree or 8 years of additional experience in the field of information technology in lieu of a degree
  • Experience with digital forensics focusing on Windows systems from a malware perspective
  • Experience with analysis using a SIEM, including Arcsight or Trustwave
  • Security+, CISSP, CEH, or other security Certification
2

Security Analyst Senior Resume Examples & Samples

  • Highly self-motivated and directed. Primary Duties
  • Support incident management processes and security monitoring alerts in preventing internal / external hackers from compromising Fiserv's data and assets
  • Support new and existing security solutions and partner with the security engineering team for the implementation and integration of any new enhancements made to existing security solutions in support of improving overall enterprise security
  • Develop and maintain operating guidelines and procedures in support of Fiserv's policies, standards and guidelines
  • Understand the latest hacker techniques and propose appropriate countermeasures, configurations and awareness
  • Work with members of all BU and ETG staff to support the enterprise approach to security
  • Perform ticket queue monitoring, resolution and prioritization, maintain diagrams and documentation as appropriate and support firewall rule set reviews, auditing and maintenance activities
  • Cisco ASA experience / Juniper Firewall experience a plus
3

Security Analyst, Senior Resume Examples & Samples

  • Configure, administer, and document the network and firewall infrastructure, working with Checkpoint, Cisco and Juniper firewalls including Firewall OS configurations, policy management and coordinating with customers to implement B2B VPN connectivity solutions
  • System Administration of the RSA Authentication Manager (SecurID) and the responsibility for managing the distributed RSA infrastructure, firewall integration and token distribution processes
  • Manage the distributed Blue Coat ProxySG and ProxyAV web content filter appliances
  • Manage and actively monitor Intrusion Detection and Prevention Systems (IDS/IPS) for active alerts and determine priority of response
  • Monitor the availability of the Data Network environment. Responsibilities include issue isolation and remediation to ensure minimal mean downtime to repair
  • Troubleshoot network related anomalies in network and security systems to resolve operational issues and restore services
  • Conduct OS-level and firewall application patch planning, coordination and execution to promptly remediate security flaws as they are discovered
  • Develop and maintain detailed configuration documentation that can be used by team members as well as for a variety of regulatory audits
  • On-call duty rotation and periodic after-hours work will be required and is shared throughout the group
  • 5 + years of related work equivalent (Checkpoint, Cisco and Juniper firewall solutions) experience in large enterprise environments
  • Comprehensive understanding of TCP/IP and its subordinate protocols
  • Proven hands on experience designing and managing connectivity solutions using Checkpoint Firewall-1, Cisco PIX/ASA and Juniper appliances
  • Proven hands on experience with provisioning network connectivity using IPSEC VPN tunnels
  • Experience managing and maintaining a two-factor authentication (SecurID) environment using RSA Authentication Manager
  • Experience with multiple operating systems including Unix/Linux command line
  • Strong team skills, communication and drive to ensure constant improvement in service, capabilities and results
  • Applicant must have excellent troubleshooting and problem solving skills
4

Cyber Security Analyst Senior Resume Examples & Samples

  • Privileged Account Management Program, Security Policy & Procedure, Technology, Vendor and Software Risk Assessment Program, ISSM/ISSO Program, Vulnerability Management Program, etc
  • Selectee must be able to work in a highly matrixed delivery model through quality communications and influence
  • Selectee must analyze processes, technology, services and software and prepare Risk Assessment deliverables for ITO Leadership and CISO approval
  • Selectee will be responsible for collaboration with all aspects of security ITO risk management within his/her directorate and across other ITO Directorates
  • Selectee must be able to communicate and support ITO POMs with risk assessments and review, evaluate and communicate Service Line / CG service request
  • This role is both internal and externally facing within the corporate matrix. Selectee must be able to be successful interfacing with key officials throughout the company such as but not limited to: Chief Security Officer, General Counsel, Internal Audit, Contract Officer, Chief Information Security Officer, Chief Information Officer and their respective teams
  • Bachelor’s Degree and 7+ years of experience
  • 4 + years in IT Security / IA related work
  • Experience with IT security and other legislative controls as well as systems development life-cycle project management principles
  • Experience evaluating and assessing IT SLDC
  • MBA or Master’s Degree
  • 5+ years in increasingly complex security / IT positions working a multi-functional IT Security team/organization
  • Previous work in Security /Information Assurance Risk Assessment Team for comparable organization
5

IT Security Analyst Senior Resume Examples & Samples

  • Performs log analysis and define security filters and rules for implementation within the Security Information and Event Management (SIEM)
  • Gathers and distributes technical information pertaining to new security threats and vulnerability trends
  • Confirms that all monitoring and activity reports scheduled to run, have successfully completed
  • Executes daily operational checklists and tasks such as
  • Log analysis and review
  • Vulnerability management activities
  • Alert analysis
  • Adding, modify and deleting filters
  • Verifying that escalation follow-up activities have been accomplished
  • Investigating suspicious security event activity
  • Maintaining and enforcing adherence to standards, policies and procedures
  • Verifies correct security feed settings
  • Understands the latest security information in order to validate the security analysis and identification capabilities of the monitoring technologies
  • Understands security device outputs and functions; primarily firewall, IDS/IPS, router, switch, etc. for device vulnerabilities or security issues
  • Researches and understands the currently published vulnerabilities of enterprise hardware, operating systems, and applications
  • Acts a lead for Information Security assessments and recommends appropriate and cost effective controls to address identified security-related risks
  • Serves as a lead in the development and implementation of application and infrastructure security programs
  • Serves as a lead in the development and implementation of user account security
  • Guides and mentors junior members of the team
  • An industry recognized information security certification, such as a CISSP (or Associate), SSCP, CEH, or equivalent
  • At least one technical certification related to a major platform (IBM, Microsoft or Cisco)
  • Minimum five years Information Technology and/or network experience
  • Minimum three years Information Security related experience
  • Ability to work outside of regular business hours as required which can include evenings, weekends and holidays
  • Working knowledge of information systems security standards and practices (e.g., access control and system hardening, system audit and log file monitoring, security policies, and incident handling)
  • “Hands on” security knowledge of one or more of the following platforms: Windows/Unix/Linux
  • Strong analytical, technical, and problem solving skills
  • Experience with DNS, NTP and Citrix, TACACS, IDS, IPS and various SIEMS
  • Working knowledge of HTML, CSS, JavaScript and WML
  • Excellent interpersonal, organizational and technical writing skills
  • Ability to work in a large, dynamic and complex organization, requiring creativity and flexibility
  • Possess the personal characteristics of professionalism, credibility, commitment to high standards, innovation, discriminating judgment and accountability
6

Security Analyst, Senior Resume Examples & Samples

  • 5 years of experience in the IT field
  • Experience with Netflow and PCAP analysis, Windows file system and registry functions, Scripting or programming, including Perl, Python, C, C++, C#, Java, Bash, Shell, and Batch, and *NIX operating systems and command line tools
  • Knowledge of how common protocols and applications work at the network level, including DNS, HTTP, and SMB
  • BA or BS degree or 8 years of experience with IT in lieu of degree
  • Certified Ethical Hacker (CEH), Certified Information Systems Auditor (CISA), GIAC Systems and Network Auditor (GSNA), GIAC Certified Incident Handler (GCIH), Certified Computer Security Incident Handler (CSIH), Splunk Certified Knowledge Manager, Splunk Certified Admin, Splunk Certified Architect Certification, or ability to obtain within 90 days of hire
  • Experience with digital forensics, focusing on Windows systems from a malware perspective
7

Security Analyst, Senior Resume Examples & Samples

  • 5 years of experience with relevant C&A
  • 4 years of experience with IT
  • Experience with a DoD agency
  • DoD 8570.01 IAM Level III Certification
8

Security Analyst, Senior Resume Examples & Samples

  • At least 10 years of experience
  • Conduct internal inquiries and performs audits of information security controls in accordance with PCI, SOC and vendor contractual requirements
  • Quarterly auditing of PCI compliance, including external and internal vulnerability scans
  • Assist in system, network and software architecture and design to ensure that company assets are appropriately secure at all times
9

Cyber Security Analyst Senior Resume Examples & Samples

  • Forensic analysis (analysis of compromised machines)
  • Documentation and technical writing requirements (performing research to compile and validate data)
  • Unix/Linux background & work experience
  • Experience with and knowledge of APT intrusion sets
  • Demonstrated experience with information security tools (SIM, FPC, signature development)
  • Demonstrated experience writing formal reports
  • Effective communication skills (both written and verbal)
  • Experience researching and tracking APT campaigns
  • Conceptual understanding of the Cyber Kill Chain and Intelligence Driven Defense
  • Experience Mentoring junior analysts
  • Programming/scripting experience
  • Current active DoD clearance
  • Advanced proficiency in network analysis and using network security tools
  • Experience with architectures and security elements
  • Proven accountable, dependable and reliable work ethic
  • SANS GIAC GGCIH/GCFA, CISSP
10

IT Security Analyst Senior Resume Examples & Samples

  • Primary security liaison to multiple clients in a managed security services organization
  • Ensures contract language is appropriate and adheres to standard security controls
  • Understanding of critical security controls and oversight of deployment and effectiveness
  • Ensures deployment of security controls to new and existing clients through project management
  • Coordinates communication between corporate administration and client requirements
  • Creates, modifies and incorporates information security documentation related to work area and completes requests in accordance with client requirements
  • Provides status reports on matters affecting client security
  • Background in project management, coordinating complex
  • Experience establishing and maintaining effective working relationships with employees and/or clients
11

RSA Archer IT Security Analyst Senior Resume Examples & Samples

  • Architect, Design & Implement GRC Solutions in RSA Archer
  • Team with user representatives to define program objectives and design processes such as compliance assessment, risk identification, and remediation management
  • Develop process flow diagrams, reports and presentations as needed
  • Perform Risk and Gap Assessments against technology environments and systems, communicate potential gaps and draft remediation plans
  • Work closely with other members of the group in advising clients and creating client deliverables
  • Knowledge of Reporting, Technical Management, Strategic Planning
  • Proficiency in time management, communications, decision making, analyzing Information
  • Experience establishing and maintaining effective working relationships with employees and/or clients; teamwork
12

Information System Security Analyst, Senior Resume Examples & Samples

  • Ensure users access only that data, control information, software, hardware and firmware for which they are authorized access and have a need-to-know, and assume only those roles and privileges for which they are authorized
  • Immediately report all IA-related events and potential threats and vulnerabilities involving a DoD information system to the appropriate IAO
  • Protect authenticators commensurate with the classification or sensitivity of the information accessed and share authenticators or accounts only with authorized personnel. Report any compromise or suspected compromise of an authenticator to the appropriate ISSM/IAO
  • Ensure that system media and output are properly marked, controlled, stored, transported and destroyed based on classification or sensitivity and need-to-know
  • Protect terminals or workstations from unauthorized access
  • Inform the IAO when access to a particular DoD information system is no longer required (e.g., completion of project, transfer, retirement, resignation)
  • Observe policies and procedures governing the secure operation and authorized use of a DoD information system
  • Use the DoD information system only for authorized purposes
  • Not unilaterally bypass, strain, or test IA mechanisms. If IA mechanisms must be bypassed, users shall coordinate the procedure with the IAO and receive written approval from the IAM
  • Not introduce or use unauthorized software, firmware, or hardware on the DoD information system
  • Not relocate or change DoD information system equipment or the network connectivity of equipment without proper IA authorization
  • Configure and operate IA and IA-enabled technology according to DoD information system IA policies and procedures and notify the IAO of any changes that might adversely impact IA
  • Establish and manage authorized user accounts for DoD information systems, including configuring access controls to enable access to authorized information and removing authorizations when access is no longer needed
  • Maintaining proper password change management practices per applicable DoD guidance
  • Assist MCESS support technicians with Microsoft Windows and MS SQL server issues
  • Create images for system restoration purposes
13

Cmptr Sys Security Analyst Senior Resume Examples & Samples

  • Detail oriented and a team player
  • Identifies and manages network and system vulnerabilities and security events
  • Receives, acknowledges, disseminates, tracks, reports (daily/weekly, and updates vulnerability management (VM) alerts, vulnerability assessments, red/blue team events, security incidents, and the VM common operating picture (VM COP)
  • Provides inspection services across the enterprise on behalf of the organization’s Special Enclave (SE) program manager
  • Supports or performs global DoD inspections of GENSER and SE (e.g., JWICS) services to ensure compliance to DoDI 8530 standards
14

Security Analyst, Senior Resume Examples & Samples

  • BA or BS degree in IT, Engineering, Science, Technology, Engineering, or Mathematics or 8 years of experience with IT may be substituted for a Bachelor’s degree
  • Certified Ethical Hacker (CEH), Certified Information Systems Auditor (CISA), GIAC Systems and Network Auditor (GSNA), GIAC Certified Incident Handler (GCIH), Certified Computer Security Incident Handler (CSIH), Splunk Certified Knowledge Manager, Splunk Certified Admin, or Splunk Certified Architect Certification or obtain within 90 days of hire
  • Experience with using a SIEM, including ArcSight or Trustwave
  • Ability to self-motivate, prioritize tasks effectively, and solve complex problems
15

IT Security Analyst Senior Resume Examples & Samples

  • Design Cyber Security and compliance solutions to address known gaps, generating basic required implementation work steps and executing/delegating execution to complete implementation
  • Manage Cyber Security and Compliance through identification of known problems, development and/or selection of optimal processes and tools for resolution, and execution with delegation
  • Provide management and oversight for all Cyber Security compliance activities related to SOX, DCAA, DFARS, ISO, and NIST.Support the Information Security governance strategy and framework implementation, execution, and monitoring
  • Perform Information Security self-assessments to validate the effectiveness of IT’s governance model and organizational processes
  • Utilize existing information security and compliance tools and the supporting toolsets that enable Cyber Security and compliance
  • Identify and resolve gaps in capabilities by developing custom and/or automation tools to meet security/compliance needs
  • Utilize Risk as a means of defining and prioritizing problems for resolution, performing system and process risk assessments
  • Develop and implement controls in support of system security acceptance processes in support of government-defined security management programs
  • Maintain compliance with established security and compliance controls through execution, tracking, gap identification, and constant process improvement
  • Provide weekly status reports documenting workload with key metrics, and assigned tasks with status, working projects and initiatives with status and associated staff
  • Escalation of security or compliance problems on an as-needed, as required basis
  • Identify and track targets of opportunity for evaluation, review and/or improvement within Information Security, Compliance and Information Technology
  • Investigate and evaluate new technologies to address current and future Cyber Security and compliance needs; perform requirements capture; perform solution review and comparison
  • Participate and lead design, planning, implementation and support of security services and systems
  • Actively engage with Information Security staff and senior leadership as lead and lead support on strategic and implementation initiative
  • Consult with management on security objectives, primary concerns and areas of specific action
  • Full understanding as to the capabilities and requirements of core functional areas as they relate to Information Security and Compliance
  • Capable of delivering solution designs to meet specific security or compliance needs
  • Capable of adapting knowledge in specific functional areas to other areas for staff and process integration and support
  • Ability to optimize and execute task-based processes within a set of given functional areas
  • Ability to perform advanced work on supporting services and functions such as requirements planning, task planning, process optimization, process certification, automation
  • Understanding of Risk and the elements that define risk, ability to identify and assess risk elements for processes and services
  • Ability to utilize Risk as a means to set design and implementation requirements; and for security and compliance operational process and requirement execution
  • Understanding of functional areas enabling interpretation of solution requirements
  • Mid-level certifications from organizations such as CompTIA (Security+), Microsoft (MCTS), Cisco (Professional) or equivalent education or training required
  • Senior-level certifications from organizations such as ISC2 (CISSP), ISACA (CISA, CISM), GIAC, or equivalent education preferred
  • 6+ years of experience in Information Technology or Compliance and Audit; with at least 3 years of direct responsibilities for Information Security or Information Audit/Compliance
16

Security Analyst, Senior Resume Examples & Samples

  • 6+ years of experience with planning, analyzing, evaluating, coordinating, and completing project tasks related to DoD facility and personnel security
  • Experience with Microsoft Office, including PowerPoint, Excel, and Word
  • BA or BS degree or 10+ years of experience in a professional work environment
  • Ability to multi-task in a fast-paced complex environment
17

Security Analyst Senior Racf Resume Examples & Samples

  • Provides trouble resolution on complex problems and leads implementations for system and network security technologies
  • Develops testing plans to ensure quality of implementation
  • Coordinates and prepares the reporting of data security events and incidents
  • Provides system and network architecture support for information and network security technologies
  • Provides technical support to business and technology associates in risk assessments and implementation of appropriate information security procedures, standards and technologies
  • Represents major upgrades and reconfigurations in change control; design & analyze mix of vendor services meeting business and information security requirements
  • Maintains relationship with key vendors
  • Leads lights on initiatives to consolidate equipment and/or implement business relocations
  • Determine and perform complex configuration changes to meet business and information security requirements
  • Perform capacity analysis; recommend and implement capacity increases
  • Serve as the technical escalation for results of preventative maintenance routines
  • Supervise preventative maintenance
  • Represents infrastructure security support in significant projects and performs the most complex operations and administration tasks
  • Respond to level 3 & 4 change and problem requests without supervision
  • Lead level 1 & 2 incident recoveries and root cause analysis
  • Requires 3 - 6 years experience in a support & operations or design & engineering role in any of the following areas: access management or network security technologies, servers, networks, telecommunications, operating systems, middleware, disaster recovery, collaboration technologies, hardware/software support or other infrastructure services role, or any combination of education and experience, which would provide an equivalent background
  • Must be capable of providing top-tier support for 3 or more of the information security technology common body of knowledge skill sets: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security
  • Requires BS/BA in Information Technology
  • Knowledge and understanding of industry-accepted data processing controls and concepts as applied to hardware, software, data, network communications, and people
  • Security Certifications: Technical security certifications (e.g. Systems Security Certified Practitioner) preferred
18

Security Analyst, Senior Resume Examples & Samples

  • 5+ years of experience with performing security threat analysis and risk and vulnerability assessments
  • Experience with conducting internal security reviews and audits of responsible government systems
  • Ability to work with technical subject matter experts, including hardware and software designers, operations personnel, and test engineers and communicate potential security risks and mitigations
  • Ability to develop and present briefings to technical and senior management audiences and communicate assessment results, risk analyses, mitigation strategies, and forward plans
  • CISSP Certification a plus
  • CSEP Certification a plus
  • CEH, GPEN, or CPTC Certification a plus
  • CISM Certification a plus
19

IT Security Analyst Senior Resume Examples & Samples

  • Responsible for administrative tasks to ensure functionality of IBM BigFix infrastructure
  • Provides BigFix maintenance to include updates/upgrades, negative performance issues, and failed agent connectivity
  • Create and maintain Fixlets, Tasks, Baselines, and Actions
  • Recommend improvements to processes and technology
20

IT Forensic Security Analyst Senior Resume Examples & Samples

  • Perform cyber forensics investigation
  • Knowledge of networks technologies (protocols, design concepts, access control)
  • Basic to intermediate verbal and written communication skills to technical and non-technical audiences of various levels in the organization
21

Security Analyst / Senior Expert Resume Examples & Samples

  • You self-reliantly work in the central Incident and Vulnerability Handling Team (PSIRT) for Siemens products and solutions, mainly in the area of critical infrastructures
  • It is your responsibility to coordinate and drive Siemens-wide task forces regarding product security incidents
  • You work closely with architects, developers, and managers from Siemens divisions at all levels
  • You are responsible for technical analyses and evaluation of remediation measures for security incidents and vulnerabilities
  • You design, develop or extend exploits, tools, and frameworks for automated security
  • You represent Siemens ProductCERT at international IT-security conferences and maintain close relationships with external partners
  • Through specialized trainings and daily challenges you continuously update your world-class expert knowledge
  • Successfully graduated with major in computer science and a focus on IT-Security
  • Long-term experience in the area of IT-Security, ideally in a PSIRT
  • High proficiency in software development and network administration
  • Tested and certified skills in hacker techniques, penetration testing, and security tools
  • Excellent command of German and English
22

IT Security Analyst Senior Resume Examples & Samples

  • Knowledge of IDS, IPS, TCP/IP, computer networking, computer security, machine learning and machine reasoning as evidenced by research publications required
  • Commercial/startup experience in computer/network security technology required
  • Experience working with Ph.D. students, including writing peer-reviewed articles, required
  • Native-level command of English required, US Citizenship preferred
23

Forensic IT Security Analyst Senior Resume Examples & Samples

  • Report findings to management
  • Creates information security documentation related to work area and completes requests in accordance with company requirements
  • Provides status reports on security matters to develop security risk analysis scenarios and response procedures
  • Knowledge of security technologies (encryption, data protection, design, privilege access, etc)
24

Security Analyst Senior Resume Examples & Samples

  • Minimum 10 years experience
  • Must have experience managing a security analysis team. Must have thorough knowledge of security principles, concepts, policies, and regulations
  • Must have an understanding of, and experience with, obtaining approvals to operate under the DoD Risk Management Framework. Must have experience in program management and leadership and a background in Risk Management Framework (RMF), DoD Information Assurance Certification and Accreditation Process (DIACAP), DOD Information Technology Security Certification and Accreditation Process (DITSCAP), National Information Assurance Certification and Accreditation Process (NIACAP) (or National Information Technology Security Certification and Accreditation Process (NITSCAP))
  • Must have experience in assessing system compliance with DISA Security Technical Implementation Guides (STIGs). Must be capable of developing security accreditation/certification documentation, and creating and security certification engineering analysis, vulnerability assessments, and risk assessments
  • Must have experience supporting major Army programs of record as part of an information assurance/information security/ cyber security team; strong knowledge of NSA certification requirements, requirements analysis, NSA certification documentation
  • Must have a background in cross domain solutions (CDS) implementations. Must have experience conducting CDS Risk Assessments
25

Security Analyst Senior Resume Examples & Samples

  • Microsoft IIS
  • Microsoft PKI
  • Venafi Trust Protection Platform
  • IKeyMan / OpenSSL
  • SafeNet HSM
  • SafeNet KeySecure
  • CipherCloud
  • Apache
  • IBM HTTP Server
  • Network Routers and Switches
  • Legal, Regulations, Investigations and Compliance
26

Cisa Security Analyst, Senior Resume Examples & Samples

  • Assists with risk assessments on business and operational processes, procedures, and policies; interprets audit results and makes conclusions on the adequacy and reliability of controls; prepares and presents reports as necessary
  • Prioritizes and controls projects based on severity of risk and non-compliance; communicates control strengths and weaknesses to internal audit and compliance and collaborates with internal audit to develop migration plans
  • Designs and enhances for internal controls such as segregation of duties, production change management, software management, security, incident handling, and transmission integrity; assists internal audit team and serves as a liaison with external auditors to facilitate auditing process
  • Designs audit/compliance programs to ensure ongoing evaluation and validation of ITGC control effectiveness; performs other duties as assigned
  • Ensures that processes and reviews are managed within the GRC Tool
  • Knowledge of process improvement and project management methodologies
  • Knowledge of various applications and uses of health information technology
  • Strong analytical and decision making skills
  • Excellent verbal, written, and diplomacy skills
  • Effectively influences and guides others across various organizational structures using strong interpersonal skills
  • Ability to manage and collaborate with multidisciplinary teams
  • Ability to effectively prioritize and execute tasks in a high-pressure environment is crucial
  • Ability to decipher and apply knowledge of regulatory/accreditation requirements
  • Ability to prioritize and work on multiple projects under time constraints
  • Ability to adapt to shifting priorities, demands, and timelines through analytical and problem-solving capabilities
  • Ability to work independently as well as in a team environment including multi-level staff and external partners
  • Strong orientation toward high standards for customer service
27

RSA Security Analyst, / Senior Family Resume Examples & Samples

  • Must have a Bachelor’s degree or foreign equivalent in Information Systems, Computer Science, Engineering (any), or a related field plus 3 or more years of progressively responsible experience in the job offered or as a Security Engineer, Systems Analyst or a related position. In the alternative, the employer will accept a Master’s degree or foreign equivalent in a related field plus 1 year of experience. Any suitable combination of education, training, or experience is acceptable
  • Experience with RSA Authentication Manager (7.x/8.x) Administration Security and Operation Consoles and their functions
  • Experience with configuring RSA Authentication Agents
  • Experience with RADIUS authentication
  • Experience with RSA hard (key-fob) and software tokens (PC, Mac, iPhone, iPads), assignment, testing, results logging, and troubleshooting
  • Experience or familiarity with Linux administrative essential commands to check system loads and performance, disk usage, directory navigation, permissions/ownership, and file copying
  • Experience or familiarity Microsoft Active Directory attributes and LDAP
  • Experience in multiple Authentication Methods
  • Windows Authentication, Kerberos, TLS/SSL and DTLS, NTLM, Smart Cards, Virtual Smart Card, Biometrics, Federation SSO – SAML, OAuth, Windows Authentication
  • Experience with communication and coordinating with IT resource teams for interactive support, project, and troubleshooting
  • Experience engaging vendor support in communicating design, troubleshooting, software and firmware upgrades, and performance elements
  • Ability to research, distinguish, and understand actual technical concepts
  • Understanding essentials of DNS
  • Understanding of failover and Disaster Recovery concepts
  • Familiarity with Security practices, resources, and risks
  • Experience or familiarity with backup procedures, retention, and best practices
  • Experience with Windows and Maccomputers, smartphones
  • Ability to use MS Excel with some advanced function capability and filtering. Capable of producing user-friendly reporting outputs
  • Ability to use MS Access for combined report creation desired
  • Experience with Microsoft PowerShell would be beneficial
  • Bash or Shell scripting experience preferred
  • Experience or familiarity with essential networking tools such as Ping, Nslookup, and Trace Route
28

Cyber Security Analyst, Senior ITC Resume Examples & Samples

  • CISSP or CISM required
  • BS or equivalent required, or MS + 3 yrs related experience
  • 5+ years of practical experience with FISMA, NIST 800 series (Civil Government) required
29

Security Analyst Senior Resume Examples & Samples

  • No agencies at this time please
  • Works with compliance and regulatory programs including exposure to internal and external audit functions
  • Completes creation, maintenance and enforcement of IT Security policies and standards
  • Creates and develops Information Security training and awareness programs
  • Supports the management of Information Security key metrics and multi-tiered reporting
  • Supports with IT and IS governance programs and their administration
  • Maintains knowledge of, and complies with, all relevant laws, regulations, policies, procedures and standards
  • Actively participates in creating and implementing improvements
  • Performs other responsibilities as needed/assigned
  • Bachelor's degree in MIS, CIS, or related field
  • Certified Information Systems Security Professional (CISSP) through the Information Systems Security Certification Consortium or equivalent required
  • Minimum of 5+ years’ experience working with IT or Information Security/GRC, legal, audit, compliance
  • Knowledge of the complexities of managing an Information Security Governance, Risk, and Compliance (GRC) program, may include conducting Vendor assessments, assisting with and responding to regulatory inquiries and compliance reviews, supporting internal and external audit requests, driving aspects of security awareness and education programs, and establishing a key security metrics and reporting program. Knowledge of Information Security GRC platforms
  • Computer Skills Advanced: Skilled in specialized computer software. Ability to use more advanced functions, formulas and other special elements of the specific program or application
30

Cyber Security Analyst Senior Resume Examples & Samples

  • BS in Engineering, Computer Science, or other comparable technical degree from an accredited college/university and Five (5) years related experience; or
  • BA/BS from an accredited college/university and ten (10) years related experience
  • Waiver of degree requirement for specific known technical expertise in national level intelligence, tactical and/or strategic communications systems, Command and Control applications and architectures, and documented experience serving in senior level positions
  • Must possess 5 to 10 years’ experience with an understanding of multiple C4 systems; System development or design experience in computers, communications, and wireless technology programs; cost-benefit analysis to support decision making of alternative designs or architectures and risk assessment associated with approach; experience in requirements development, product definition and design, C2, and test planning and execution
  • Experience with Requirements Analysis
  • Demonstrated knowledge and understanding of multiple C4 and Cyber systems
  • Demonstrated experience with computer and communications-related programs
  • Experience in cost-benefit analysis to support decision making of alternative designs or architectures and risk assessment associated with approach
  • Demonstrated knowledge and experience in requirements development, product definition and design, and test planning and execution
  • Demonstrated knowledge and experience in Information Assurance, Risk Management Framework, and FISMA; Understanding of NIST requirements
  • Demonstrated knowledge and experience in JCIDS, requirements management, and Service and Joint military operations
  • Additional knowledge
  • Knowledge of and Experience with Cyber Security Endorsements
  • Experience with Cross Domain Solutions
  • Knowledge or and Experience with Cyber Strategic Engagements
  • Experience with Capabilities Requirements
  • Experience with Forces and Strategy
31

National Security Analyst Senior Resume Examples & Samples

  • Conducts complex analyses tests, exercises, and assessments of the management, research, development, deployment, transportation, safety, security, storage and/or training for the stewardship and use of existing or future weapons systems such as nuclear, chemical, biological and radiological. Makes recommendations to management as appropriate
  • Conducts complex system analysis, systems engineering, vulnerability analysis, planning, and program and budget analysis of weapons systems. Reports findings and makes recommendations to management as appropriate
  • Develops complex briefings, reports and short notice position papers; collaborates and supports broader security project teams to support national security decision making
  • Researches environmental factors which affect the weapons system operations or dispersion of given agents, the expected effect on population and remedial actions to be recommended to command and staff. Provides support by conducting background research on topics addressing information associated with strategic, tactical nuclear, chemical, biological and/or radiological weapons systems
  • Bachelor's degree in engineering, physics, chemistry, mathematics, or related field preferred
  • Five or more years of national security experience
  • Experience working with various weapons systems
  • Experience working with U.S. and North Atlantic Treaty Organization (NATO) nuclear weapons infrastructure, as appropriate
  • Possesses Top Secret/SCI Clearance