Security Consultant Resume Samples

4.6 (118 votes) for Security Consultant Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security consultant job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
MM
M Maggio
Marcellus
Maggio
4676 Torey Flat
Dallas
TX
+1 (555) 389 5651
4676 Torey Flat
Dallas
TX
Phone
p +1 (555) 389 5651
Experience Experience
Houston, TX
Security Consultant
Houston, TX
Abshire Group
Houston, TX
Security Consultant
  • Direct the daily progress of project work assigned to staff members, report status to management, and manage staff performance
  • Develop financial justifications, prepare proposals/booking packets, make presentations, and perform necessary follow-up for successful closing of the sale
  • Develop training materials and provides on-the-job and classroom instruction to Loss Prevention and other employees
  • Effectively manage time, quality and performance of projects with established quality, budget and project expectations
  • Assist in the development and analysis of key metrics to identify trends across E/// cybersecurity practice to be used in company created industry reports
  • Provide control design, framework, health and automation guidance to support client ISMS and risk management objectives
  • Will assist the team lead in business development internal and external to Atkins to further develop the security business
Chicago, IL
Cyber Security Consultant
Chicago, IL
Sporer-Emmerich
Chicago, IL
Cyber Security Consultant
  • Assist with training and development of cyber security program
  • Escalating to management all engagement completion risks and issues
  • Providing escalation management
  • Monitoring engagements for scope creep and for problem management
  • Network intrusions
  • Contributing to business development
  • Providing ongoing engagement direction to consultants and subcontractors
present
New York, NY
Senior Security Consultant
New York, NY
Stracke-Marquardt
present
New York, NY
Senior Security Consultant
present
  • Work with business leaders to develop the cyber threat management and execute go-to-market plans
  • Perform other client work related to SecureWorks professional services offerings
  • Provide user support and assist with troubleshooting and design, configuration and escalated problem management
  • Provide knowledge sharing and technical assistance to other team members in the area of cloud security
  • Work closely with other peers at TELUS to enhance our network, system, and application security posture
  • Work with developers. Have a direct impact on projects and applications. Identify issues and enhance security
  • Scope engagements and support the development of proposals and statements of work
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Belmont University
Bachelor’s Degree in Computer Science
Skills Skills
  • Strong understanding and knowledge of risk assessment, risk procedures, security assessment, vulnerability management, penetration testing
  • Strong communication and presentation skills Ability to guide groups and be a primary facilitator Strong writing skills
  • Recent experience performing vulnerability scans, log analysis, security monitoring with Tenable (e.g., Nessus, SecurityCenter) or other industry solutions
  • Good knowledge of information security and control frameworks such as COBIT and ISF
  • Excellent ability to influence internal and external stakeholders and build consensus – build and drive “virtual” cross-functional teams
  • Membership of relevant professional institutions/professional peer bodies or significant credit towards eligibility for membership
  • Excellent verbal and written communication skills and good at developing relationships across diverse teams
  • Ability to display data visually and create powerful presentations which effectively demonstrate the value of audit deliverables
  • Excellent working knowledge of EnCase, as well as open source alternatives
  • Certifications such as CREST AU certification is highly desirable
Create a Resume in Minutes

15 Security Consultant resume templates

1

Senior Security Consultant Analytics Resume Examples & Samples

  • Ability to team well with others to facilitate and enhance the understanding & compliance to security policies
  • Excellent interpersonal, communication, organizational, and project management skills
  • Working experience with Cloud solutions, Business Intelligence and Data Analytics and Visualization platforms
  • Experience providing and validating security requirements related to information system design and implementation
  • Experience in the use of tools and methods to identify security exposures and business risks
  • Working experience with the design and engineering of web-based multi-tier information systems and architecture design
2

Lead Security Consultant Resume Examples & Samples

  • Perform risk assessments of information systems and infrastructure
  • Responsible for the selection and performance management of staff members
  • Strategic skills to assist with the development of a long-term vision for the firms risk management security framework & approach
  • High degree of tolerance for ambiguity
  • Experience with security architecture, design and assessment of messaging, ERP, CRM and or data analytics solutions
  • Five or more years of experience in the management of a significant Information Security risk management function
3

Security Consultant Resume Examples & Samples

  • Drive Information Security requirements and solutions into Barclays change programmes and improve the consolidated security risk profiles for business areas
  • Be aware of the components and mechanisms making up the organisations IT security Architecture and the controls that they provide. Is experienced in the concepts of corporate governance within an IT environment
  • Provide suggestions to improve tools and processes related to GIS deliverables throughout the IT lifecycle
4

Cyber Security Consultant Bristol Resume Examples & Samples

  • Working as part of a dynamic and progressive team to develop and operationalise the IT and Cyber Security solutions strategy and supporting propositions
  • Develop and provide pragmatic, risk based solutions and services which are business focussed and provide value to a varied sector of clients
  • Work in cross functional teams to design, develop and assure the effectiveness of cyber security proposals using our diagnostic, benchmarking tools and through the use of key performance indicators
  • Willingness to work across the region and nationally on the promotion of cyber security to our clients
  • Demonstrate Risk Assessment Analysis and Business Impact Analysis
  • Strong experience in the management of information and technology risks associated with the latest technologies (eg Cloud services, BYOD, Internet of Things, Advanced Persistent Threats)
  • Working experience of regulations such as Data Protection Act, ISO27001/2
  • Experience of the Cyber Essentials Scheme
  • Strong experience in Information Security
  • Strong analytical and problem solving capabilities
  • Information Security certification such as CISSP, CISA or CISM that establishes credibility and capability in the Information Security market
  • The ability to manage a number of projects, meet deadlines and manage stakeholder expectations
  • Clear, articulate and confident written and verbal communication skills
  • Desire to work in a constantly changing environment as part of a team of IT Security Advisors
  • Ability to gain a UK Government Security Clearance
  • Knowledge of risk and regulatory frameworks (i.e. ITIL, CobIT, ISO 27001/2, PCI-DSS, OWASP etc)
  • Risk Based Information Assurance, Internal Audit scoping and planning for security configuration and controls assessments over OS/Database/Networks/Infrastructure, processes and organisations
  • Good understanding of security organisational design, including information and technology security governance, risk management and reporting
  • Good understanding of security benchmarking and future state modelling
  • Email job
5

Cyber Security Consultant, Lead Resume Examples & Samples

  • 7+ years of experience with leading project delivery teams with private sector clients in a fast-paced environment with travel requirements
  • Experience as a technology consultant
  • Experience with IT security strategy
  • Experience with multiple market verticals, including financial services, healthcare, energy, consumer products, high-technology, and pharmaceuticals
  • Knowledge of security principles, approaches, and technologies
  • Experience with Microsoft Office suite, including Outlook, Word, Excel, and PowerPoint
  • Ability to be a self-starter and thrive in a fast-paced consulting environment with a willingness to travel 50-100% of time
  • Ability to synthesize and analyze multiple views and data sets and client facilitation skill sets
  • Ability to work with senior leaders to foster positive client relationships, identify new business opportunities with existing clients, and develop new intellectual capital
  • Ability to coach and mentor junior staff on functional skills, consulting tradecraft, and client relationship management
  • Possession of excellent critical thinking skills
6

Cyber Security Consultant Lead Resume Examples & Samples

  • 7+ years of experience as a technology consultant leading project delivery teams with private sector clients in a fast-paced environment with travel requirements
  • Experience with multiple market verticals, including financial services, healthcare, energy, consumer products, high-technology, and pharmaceuticals-Knowledge of security principles, approaches, and technologies
  • Knowledge of one or more functional disciplines, including strategy, organizational and governance design, high-level technical architecture design, change management, and policy development
  • Ability to write high-quality client deliverables and briefings for a senior-level audience and provide a writing sample
  • Experience with the Big 4 consulting firms preferred
  • Experience with Microsoft Office Suite, including Outlook, Word, Excel, and PowerPoint
  • Ability to quickly ascertain existing Booz Allen methodologies and intellectual capital to customize for the client situation, develop approach to drive work efforts, and frame potential deliverables
  • Ability to work with senior leaders to foster positive client relationships, identify new business opportunities with existing clients, and develop new intellectual capital-Ability to coach and mentor junior staff on functional skills, consulting tradecraft, and client relationship management
  • ­Possession of excellent oral and written communication skills
7

Senior Security Consultant Resume Examples & Samples

  • Growing the region footprint in regards to security
  • Mentoring and coaching security staff in the delivery of new technologies and consultation mandates
  • Strong business acumen and ability to work with product management to develop new security offerings
  • Experience in providing detailed technical architecture and integration expertise with major Vendor solutions i.e. Cisco, HP, McAfee, RSA, Juniper, Fortinet, Citrix, CA, Oracle, VMware, etc
  • Professional designation such as CISSP, CISM, etc
  • Technical certification with major vendors i.e. Cisco, HP, McAfee, RSA, Juniper, Fortinet, Citrix, CA, Oracle, VMware, etc
8

Cyber Security Consultant Resume Examples & Samples

  • Advising on Cyber Security Policy Planning and Implementation
  • Cyber Security Performance Management
  • Cyber Security Education Awareness
  • IT Cyber Security Investment Management
  • Establishing and applying procedures to protect hardware, software, networks, and information
  • Cyber Security Operations Support
  • Cyber Security Risk Management
  • Developing and implementing cyber security programs
  • Support the IT Certification and Accreditation (C&A) process
  • 5+ years of professional experience and a Bachelor of Arts/Science or equivalent degree in computer science or related area of study; without a degree, three additional years of relevant professional experience (8+ years in total)
  • Has sufficient depth and breadth of technical knowledge to be individually responsible for the design and scope of deliverables within a field of expertise. Has led small team in delivery of a specific deliverable
  • Has mastered at least one technical discipline with strong knowledge in at least three major technology areas. Possesses advanced level of business, technical, or functional knowledge
  • Has ability to perform/drive resolution of problems on combinations and interactions of products. Ability to apply technology and consulting to solve a client business problem
  • Able to communicate and present complex issues with assurance and confidence. Demonstrates the use of consulting skills including: questioning, listening, ideas development, permission and rapport, and influencing
  • Owns and produces customer documentation. Ability to translate technical details into concise and easy to understand written form. Ability to write relevant components of a proposal document (e.g. answer specific RFP questions). Ability to translate verbal requirements from face to face client meetings into requirements documents, statements of work, and proposals
  • Able to discuss (within own area of expertise) requirements with a customer, and to challenge and clarify when appropriate. From the requirements, able to develop a high level design or plan, and then estimate the amount of effort required to deliver. Able to advise the engagement owner about the risks associated with this work package
  • Ability to work with a team to provide written responses to technical proposals and /or reports/documentation for delivery
9

Software Security Consultant Resume Examples & Samples

  • Installing and configuring HP Fortify products onsite for customers
  • Training customer staff on application security and HP Fortify products
  • Contributing to project planning and project deliverables
  • Customising the implementation of HP Fortify's production and test products
  • Representing HP Fortify's technical, business, and professional values to customers, partners, and peers
  • 5+ years’ experience in software or security consulting
  • 5+ years’ experience in software development using Java, Microsoft .NET, or C/C++
  • Experience using build tools (e.g. ant, make, maven, MS build, nant, etc.)
  • Experience in developing and/or deploying Web applications
  • CSSLP, CISSP, CISA, CCP MCP/MCSE or SANS certifications
  • Highly motivated, competitive, entrepreneurial and attracted to challenging opportunities
  • Demonstrates the ability to work in a fast-paced environment where organisational skills are essential
  • Strong problem solving, analytical, interpersonal, and ownership skills
  • Sound collaboration skills with a wide variety of internal team members
  • Intelligent, self-starting, self-confident individual with integrity and accountability
  • Polished with excellent presentation skills
  • Qualifies for an Australian government security clearance
  • Willingness and ability to travel up to 75% of the time – mainly within Australian capital cities
10

Senior Cyber Security Consultant Resume Examples & Samples

  • Play a leading role in developing and driving large and complex Cyber consulting engagements together with sales and presales
  • Promote the HP Portfolio of Cyber Security Services with the customer, positioning best fit solutions that meet/enhance their Cyber Security Strategy including analysis and operational security
  • Design and implement Cyber Security solutions
  • Conduct workshops, analysis, assessments and audits in the sphere of Cyber Security and IT-Security
  • Continually supports WW Cyber Security domain within HP to enhance solution and advisory portfolio
  • Provide strong 'soft' consultancy skills and a proactive approach to gain trust of our HP customers on C-Level
  • 10+ years of relevant professional experience
  • A recognized expert in multiple Cyber Security engagements within own technical community and also at regional level
  • Has fundamental knowledge of all key areas of Cyber Security and Security Solutions. Be able to demonstrate a broad understanding of market dynamics, an industry area, commercial issues, and technical concerns whilst maintaining depth in core focus area
  • Understanding of Threat and Risk analysis methodologies/techniques and the interpretation/application of their output in the definition of Cyber and IT-Security Solutions
  • Consultant experience performing Audits, Cyber Security Assessments, Business Continuity Planning, or internal controls design and implementation and reporting of findings to appropriate management levels
  • Has sufficient depth and breadth of technical knowledge to design and scope multiple deliverables across a number of security technologies
  • Possesses an understanding, at a detailed level, of architectural dependencies of technologies in use in the customer's Information Technology (IT) environment
  • Ability to analyze and develop solutions that protect and secure of a particular customer's enterprise
  • Has demonstrated ability to lead others in the delivery of multiple deliverables across multiple technologies
  • Has demonstrated ability to lead others in the gathering of requirements, designs, plans and estimates
  • Professional demeanors with superior oral and written communication skills are essential
  • Able to produce complete complex proposals together with sales and presales
  • Car drivers license
  • Willingness to travel ~ 75% of the working time
  • Fluency in German and in English language
  • CCISO – Certified CISO
  • CISSP, CISM , CISA
  • Security Architectural and/or Enterprise Architectural Frameworks (e.g. SABSA, TOGAF)
  • CEH – Certified Ethical Hacker
  • CHFI – Computer Hacking Forensics Investigator
11

Senior Security Consultant Resume Examples & Samples

  • Manage the day-to-day interactions with various business groups, executive management, and other key business stake-holders
  • Manage or lead the day-to-day operations of a cyber-defense capability on behalf of the client
  • Develop solution processes, procedures, and information workflows
  • Assist the client and consultant team as needed to ensure all aspects of the project are completed on-time
  • Establish and manage project plans for SIOC engagements
  • Communicate on a regular basis with the client and with HP leadership team regarding the overall progress of the project, current challenges, risks, and other information that may impact the project
  • Manage engagement risk and define deliverable content
  • Assist with team selection (recruiting, interviewing, etc)
  • Manage skill development, training, and career progression of client solution staff
  • Develop client solution staffing schedules and training plans
  • Serve as the primary HP approver for solution processes, procedures, and information workflows for the engagement
  • Engages in peer-to-peer dialogue with clients about their industry and their situation
  • Opens new discussions and builds new opportunities with clients
  • Builds strong rapport with clients creating respect and trust
  • Opens new relationship opportunities within the client environment
  • Understands how to construct and gain agreement for business cases
  • Selects appropriate tools available to develop and validate business cases
  • Shapes and influences client attitudes to outcomes and key benefits for both the client and HP
  • Plan and lead delivery of workshops and facilitated client events
  • 7+ years working within the information security field, with emphasis on security operations, incident management, intrusion detection and analysis, firewall deployment, compliance efforts, and security event analysis
  • 4+ years’ experience leading a security operations center team to quickly and completely solve business problems
  • Working knowledge of SIEM technology
  • Ability to train level 1 and level 2 security operations center analysts/engineers
  • Strong analytical skill
  • 3+ years of security consulting
  • Professional certifications to include CISSP, SANS GCIA, PMP
  • ArcSight certifications (ACSA/ACIA)
  • Experience in designing and building security or network operations centers
12

Security Consultant Resume Examples & Samples

  • Performs physical security site surveys at various enterprise locations, determines project scope and develops tailored security solutions
  • Facilitates multidisciplinary working groups to determine security solutions and mitigate risks
  • Conducts field testing and evaluates new and specialized security equipment for health care facilities and prepares RFPs for competitive purchasing processes
  • Designs integrated CCTV, intrusion, and access control systems for clinical and employer health care centers and their business offices
  • Represents the Physical Security Division to the Health & Wellness business units and other Company departments, and collaborates with other professionals on projects
  • 3 plus years of experience in retail loss prevention strategies, fraud identification and value migration preferred
  • Possesses minimum 5 years of experience in project management, design and/or maintaining physical security systems
  • Knowledge of IT network infrastructure including basic hardware and network functionality
  • Has proven leadership and project management skills
  • Has strong written and oral communication skills
  • MBA preferred
  • PSP or CPP preferred
13

Clas Security Consultant Resume Examples & Samples

  • Registered CLAS Consultant
  • Awareness of architectural frameworks and experience in applying these security architecture principles to integration projects
  • Experience monitoring security policy compliance and ISO27001
  • Ability to support the development of Information Security Management Systems, with support from other security and service management personnel and work to support customers achieve ISO27001 certification
  • Experience of risk assessment up to HMG standards
  • Experience of evaluation, certification and accreditation of systems to HMG security requirements
14

Security Consultant Resume Examples & Samples

  • Proven ability to produce clear, concise, accurate written communication
  • In-depth knowledge of a specific competency and/or industry, as required
  • Solid experience in Professionalism and ability to work independently with minimal supervision
  • English/Spanish fluent
  • At least 6 months experience in Information Security consulting experience
  • Portuguese: Fluent
15

Application Security Consultant Resume Examples & Samples

  • Database query language e.g. T-SQL, PL/SQL
  • Communication protocols & markup languages e.g. HTTP,SOAP, XML, HTML5
  • Hacking techniques
  • 14% - 3 days/month
  • 45% - 10 days/month
  • 23% - 5 days/month
16

Security Consultant for Customer Deliveries Resume Examples & Samples

  • At minimum of 5 years’ experience in IT or telecom
  • Excellent presentation and communication skills in English
  • Telecom networks, IP networks, Operating Systems and Databases
  • Capability to analyze customer security requirements and outline proposal meeting the requirements and explain the business value
  • Cloud Architecture and Cloud Security
  • ITIL and CPBIT frameworks, auditing standard SAS70 or similar
  • Some of the following certifications: ISO.27001 Lead Auditor, ISO.27001 Lead Implementer, CBCP, MBCI, CISSP, CISM, CISA and BS25999
17

Ethical Hacker / Security Consultant Resume Examples & Samples

  • Passion to be among the best and continuously drive new ideas, learn and adapt
  • Flexibility and willingness to travel
  • Proven track record and hands-on experience on different security testing tools; open source, commercial and proprietary
  • Experience on translating tool provided results into meaningful findings and rule out false positives
  • Track record of being able to scope and plan for security testing in both individual node and network level, ability to drive and execute the plans
  • Experience on threat modeling and vulnerability management
  • Experience on vulnerability research, possibly own CVE's as reference
  • Ability to explain and elaborate on e.g. SANS 25 Most Dangerous SW Errors and OWASP Top Ten List
  • IP networks, Operating Systems and Databases
  • Telecom networks, nodes and architecture
  • IS/IT networks, routers, firewalls
  • Experience on web application development and (secure) coding in general is a plus
  • Experience on conducting security code reviews
  • Mobile Applications testing (iOS, Android)
  • Security testing methodologies and tools
18

Infrastructure & Endpoint Security Consultant Resume Examples & Samples

  • At least 5 years experience in demonstrated experience in providing detailed technical expertise on security solutions within large corporate environments with a focus on solution implementation
  • At least 5 years experience in of proven effective communication at different levels within and outside the organization - leadership/management, business stakeholders, security vendors and sourcing suppliers
  • At least 5 years experience in providing detailed technical architecture and integration expertise with major Vendor solutions i.e. Cisco, HP, McAfee, RSA, Juniper, Fortinet, Palo Alto, Symantec Checkpoint etc
  • At least 3 years experience in professional services delivery focused on network security projects
  • At least 5 years experience in concentrated in security engineering and architecture or security engineering consulting
  • At least 5 years experience in physical and virtual network products and technologies
19

Principal Security Consultant Resume Examples & Samples

  • Participate in all aspects of security consulting activities including pre-sales support, risk assessments, planning, data collection, testing, evaluation, report creation, and project documentation
  • Establish deep trust relationships with customer’s key security leaders and related IT/controls and business operations personnel. Become the trusted advisor to customer senior security leaders (e.g., CISO and similar roles)
  • Provide project technical and business leadership for engagements with global TV & Media content delivery providers
  • Assist in the development and analysis of key metrics to identify trends across E/// cybersecurity practice to be used in company created industry reports
  • Partner with regional colleagues, other business unit stakeholders and customers to evaluate, test and report on the adequacy and effectiveness of controls in relation to associated cybersecurity risks. This may be achieved through specific audit reviews or direct participation in key cybersecurity projects
  • Up to approximately 50% international travel required
  • 10 or more years of total work experience, with at least 8 years IT security, network security, data security, applications security and/or audits with significant prior experience working in multimeida content delivery. TV & Media industry (MSO, digital TV, broadcast media, etc.) experience preferred
  • Knowledge of TV & Media specific adversary tactics, techniques, and procedures
  • Experience with investigating large data compromise events, online fraud
  • Expert knowledge of networking protocols and packet analysis (e.g., PCAP) and familiar with common cryptography algorithms
  • Experience defeating anti-reversing tools and techniques (packers, obfuscation, encryption, etc.) and familiarity with standard software used in reverse engineering (e.g. IDA, WinDbg, VMWare)
  • Experience leading large-scale IR incident engagements
  • Effective verbal and written communication skills with comfort presenting within all company levels; including C-level executives
  • Ability to build strong partnerships across the technology and customer account teams
  • Familiarity with TV & Media broadcast industry and experience meeting with CISO level contact in the TV & Media industry
  • Industry standard information security technology certifications (GCIH, GREM, etc) are a plus
20

Security Consultant Resume Examples & Samples

  • Experience working on projects and providing security assurance testing services
  • Track record of implementing successful risk management & security control programs
  • Be able to "think outside the box" and provide both scenarios and solutions to the business to enhance the IT Risk & Security function
  • Coding Experience along with Qualifications including Certified Ethical Hacking (CEH), Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), PCI DSS QSA, PCI DSS QSA, Global Information Assurance Certification (GIAC), GIAC Web Application Penetration Tester (GWAPT) and GIAC penetration testing certification (GPEN) would also be highly regarded
  • Certified in possess/maintain at least 1 of following security certifications: CISSP, CISA or CISM
  • At least 5 years experience in professional services (providing consulting for end clients)
  • At least 5 years experience in information security consulting
  • At least 5 years experience in technology Risk, IT and/or Information Security and Risk and IT Security Architecture
  • At least 5 years experience in performing PCI Assessments (DSS and PA-DSS) for end clients. At least Certification as a Qualified Security Assessor (QSA) by the Payment Card Industry Security Standards Council (PCI SSC)
  • At least 2 years experience in demonstrated knowledge in security industry regulations/standards (PCI DSS, Privacy Act and PIPEDA, NIST, SCADA, NERC) and com specializing in product-based consulting, architecture and implementation
21

Security Consultant Resume Examples & Samples

  • Define security architectures and provide pragmatic security guidance that balance business benefit and risks
  • Provide knowledge sharing and technical assistance to other team members
  • Evaluate, counsel, mentor and provide feedback on performance of others
  • Direct the daily progress of project work assigned to staff members, report status to management, and manage staff performance
  • Ability to facilitate compromise to incrementally advance security strategy and objectives
  • An overall understanding of the business objectives of EY with an ability to build relationships across EY IT
  • Five or more years Working experience with the architecture, design and engineering of web-based multi-tier information systems or network infrastructures
  • 10 or more years of experience in an Information Security or Information Technology discipline
  • Ability to understand and integrate cultural differences and motives and to lead cross cultural teams
  • Strong English language skills are required
22

AP Data Protection Security Consultant Resume Examples & Samples

  • Create and retain an expert level of knowledge on one or more of the IBM Security products in the Data Protection Security area. Individuals within the ANZ ADL Services team are recognized throughout the company as experts on one or more products
  • Assist clients to become self-sufficient in the use and administration of IBM software via on-site mentoring and knowledge transfer
  • Develop High Level Solution Architecture and Detail Design in the Data Protection Security area; Deliver Technical Assessments, Formal Training, Health Checks, Implementations and Performance Tuning services
  • Gain and maintain a working level of knowledge on other IBM products (particularly Security products – work with other technical leaders to verify and validate overall solution architectures incorporating multiple security product areas)
  • Create and present educational information to groups of customers and/or internal audiences
  • Support the rest of the regional team in building their knowledge and capabilities to a high level with IBM Security Data Protection Security products
  • Perform Quality Assurance checks on IBM Security related opportunities
  • Contribute to the on-going development of services related to IBM software products
  • Provide technical feedback and input regarding IBM software products to our development laboratories
  • Travel will be expected, as this is a consultancy role for the AP/J/G/MEA regions, but travel commitment can be managed
  • At least 3 years experience in Data Security Product Knowledge (Guardium)
  • InfoSphere Guardium - Database Vulnerability Assessment Solution – Level 4 or 5
  • InfoSphere Guardium Data Encryption – Level 4 or 5
  • InfoSphere Guardium Data Redaction - Level 4 or 5
  • InfoSphere Guardium Database Activity Monitor - Level 4 or 5
  • InfoSphere Guardium Database Activity Monitoring & Vulnerability Assessment Family - Level 4 or 5
  • InfoSphere Guardium for Apps - Level 4 or 5
23

Application Security Consultant Resume Examples & Samples

  • Professional with 8 years’ experience on consulting, designing and delivering large information security projects/programs and 3 years of application development
  • IT Methodologies – ITIL, TOGAF
  • Business line(s)’ business strategy, needs and technology
  • Talent management process (recruitment/selection, performance management, performance development/coaching, reward/ recognition)
  • 14%
  • 45%
  • 23%
24

Security Consultant Resume Examples & Samples

  • Depth of knowledge in one or more of the core security domains: Security Strategy Risk and Compliance; Identity Management; SOC Enablement & Operations; SIEM, Application and Data; Infrastructure Endpoint and Mobile Security
  • Understanding contemporary and legacy security technologies used within a particular domain (e.g. Firewalls, IDS, Firewalls, IAM, SIEM)
  • At least 1 year experience in working with security consulting teams
25

DLP Security Consultant Resume Examples & Samples

  • Responsible for the identification, assessment and resolution of DLP events and recurring procedures
  • Ability to self-direct and work independently when necessary and clearly articulate technical concepts / issues to both technical and non-technical peers and management
  • Demonstration of abilities in a large corporate environment as well as a strong comprehension of data security tools at various levels within the environment will be critical to success
  • Work with Human Resources for documenting and reporting DLP violations
  • Strong written, verbal, analytical and organizational skills
  • Process oriented, capable of documenting guidelines, policies and procedures within work area
  • Ability to clearly articulate technical concepts / Issues to both technical and non-technical peers and management
  • Bachelor's Degree in Computer Science
  • Experience with both host-centric and network-centric DLP software and techniques. VONTU experience preferred
  • Ability to identify risk areas for potential DLP exposures
  • Knowledge and expertise on a vast array of hardware and software platforms including but not limited to
26

Technical Security Consultant Resume Examples & Samples

  • Providing the Business and their service partners with relevant ISR information to enhance their awareness - ensuring that they can manage their risks within appetite
  • Monitoring to ensure that identified risks are mitigated within agreed timescales
  • Management and governance of the GBM Application Security and controls
  • Experience of working in Investment Banking environment
  • Experience (minimal of 5 years) of working in / with Information security
  • Knowledge and experience of Database Security principles and techniques as related to Business Applications
  • Excellent knowledge and experience of Payment & Trading platforms
  • Third party vendor application experience and knowledge
  • Development Life Cycle and testing regime
  • Detailed Risk Assessment experience
  • Security training and awareness
  • Solid communication skills, both verbal and written and interpersonal skills
  • Extensive Experience in Information Security principles and techniques especially in relation to Infrastructure
  • Knowledge of Investment Banking systems and the Business life cycle
27

Senior Cyber Security Consultant Resume Examples & Samples

  • Software vulnerability and threat analysis
  • Computer, network and mobile operating systems / applications development
  • Industrial control systems; SCADA, PLCs, DCs (gathering and analysis of data)
28

Cyber Security Consultant Resume Examples & Samples

  • System architecture and development
  • Cyber defence techniques
  • Security testing and penetration techniques & tools
  • Embedded systems
29

Security Consultant Resume Examples & Samples

  • Ability to lead large groups and be a primary facilitator
  • Ability to shape client expectations
  • Drive client pursuits and engage in complex deals
  • Ability to work with global and diverse teams in a dynamic environment
  • Depth of knowledge in one or more of the core security domains: Security Strategy Risk and Compliance; Identity Management; SOC Operations; Application and Data; Infrastructure Endpoint and Mobile Security
  • At least 5 years experience in Management consulting and systems integration or Managed Security Services in a top tier professional services firm
  • At least 3 years experience in Working in projects related to the core domain
  • At least 3 years experience in Experience working across diverse teams to facilitate solutions; Experience working with Security practitioners
30

Security Consultant Resume Examples & Samples

  • Escalate to senior analysts/investigators and external support teams to assist in analysis and event resolution
  • Inform higher-level priorities, improvements and problem resolutions
  • Constructively challenge and improve existing tools, processes and procedures
  • Network administration, TCP/IP knowledge and application in securing systems, investigating security incidents
  • Demonstrate clear experience with UNIX/Windows operating systems
  • IT security with a focus on computer incident response, malicious code/exploits, anti-virus, etc
  • Knowledge of SIEM tools with proven work experience on Splunk
  • Scripting skills (BASH, Python, PERL)
  • Demonstrate good customer service, communications using English, and troubleshooting skills
  • At least 5 years experience in Enterprise Security Architecture, experience working with at least one of the Security Architecture Framework such as TOGAF or SABSA
  • English: Basic knowledge
31

Security Consultant Resume Examples & Samples

  • At least 4 years experience in Professional services experience (providing consulting for end clients) performing engagement
  • At least 4 years experience in Information security consulting experience (professional services consulting for end clients)
  • At least 4 years experience in Technical specialization in at least two of the following: Windows, Linux, Solaris, AIX, OS400, Apple, Databases, Routers/Firewalls
  • At least 2 years experience in Knowledge in security industry regulations/standards (PCI DSS, HIPAA, GLBA) and compliance frameworks (ISO 27002, CobiT)
32

Technical Security Consultant Resume Examples & Samples

  • Deliver authoritative, practical and responsive consulting services on all aspects of enterprise information security risks to COG Technology
  • Participate in 3rd party security and due diligence assessment activities and provide recommendations to management
  • Detailed knowledge of technical security concepts and their practical application. This knowledge is required across the application, operating system and network layers
  • Experienced in technical security risk assessment – across enterprise infrastructure, web technology and applications platforms. Note this is not a general technology risk management role, rather a technical information security based role
  • Experienced in security architecture design and review – across enterprise infrastructure, web technology and applications platforms
  • Understanding of current and emerging security technologies, security threats and trends
  • Knowledge of industry security risk assessment methodologies and standards and applying them in a large enterprise environment – eg. ISO 2700x, AS4360
  • Knowledge and understanding of legislative and regulatory requirements relating to banking and finance IT
  • Significant experience in technical security risk assessment in a consulting capacity
  • Proven ability to deliver end to end security / risk assessment services
  • Technical security certifications including platform/infrastructure-specific certifications, eg. CISSP, GIAC, CCNA
  • Risk management certifications (preferred, not mandatory), eg. PCI-DSS, CISA, CISM, SABSA
33

Security Consultant Resume Examples & Samples

  • ISEC Security consultant
  • Submit Control Implementation Events within 60 days of creation
  • Submit Remediation Events within 30 days of creation
  • Track open issues and actions and drive issues and actions to closure
  • At least 5 years experience in Security,Governance and Controls,Internal / External Audit, IS 27001
34

Senior Security Consultant Resume Examples & Samples

  • Define and provide pragmatic security guidance that balance business benefit and risks
  • Maintain and enhance the Information Security risk assessment methodology
  • Experience conducting risk assessments, architecture reviews, vulnerability assessments, vendor and third party risk assessments and recommending risk remediation strategies
  • Working experience with web technologies, application firewalls and programming languages
  • Working experience with Cloud solutions
35

Security Consultant Resume Examples & Samples

  • Expand existing DLP support capabilities
  • Collaborate with Security Tools team for tuning technical rule sets and policies and ensuring consistency across DLP platforms
  • Proactively assess DLP safeguards across the DLP tool suite to identify potential risks and perform trend analysis
  • Contribute to overall DLP process improvements and documentation
  • Represent and contribute to the overall DLP solutions and methodologies
  • Work collaboratively with FSI team members and HR for monitoring and enforcement of AUP violations
  • Strong organizational and observational skills
  • Strong oral and written communication skills to effectively communicate with management, Human Resources, and other Humana employees
  • Strong interpersonal skills required to establish and maintain positive relationships with other associates, and the ability to work independently and/or collaboratively
  • Basic understanding and experience using Microsoft Windows, Email, Instant Messaging, etc
  • Bachelor's Degree in Computer Science or Master’s Degree
  • Hold or be able to obtain a US-DOD Secret-level security clearance or equivalent
36

Cyber Security Consultant Resume Examples & Samples

  • Delivering cyber security assessment and consulting engagements
  • Perform infrastructure and application penetrations tests (e.g. Computer networks, web applications, mobile applications, mobile devices etc.) as well as physical security review and social engineering tests
  • Perform security / gap analysis reviews in line with leading industry standards
  • Help clients respond in case of a security incident. Incident response may vary from a major to minor incidents
  • Participate in engagements related to BCP / DR / PCI-DSS
  • Policies / procedures / security architecture review and design in line with leading practices
  • Preparing scope of work at start of engagements; formal reports at the end of each engagement and presentation of reports to clients
  • Be a technical specialist that can demonstrate flexibility. The roles are varied, and offer the ability to work across functional and technical areas where desired
  • Contribute to team knowledge and development of new service offerings
  • Be innovative and identify smart ways of working, without compromising on quality; and contributing to identifying opportunities and winning new business by creating proposals, social networking etc
  • Candidates should have strong academic or professional qualifications with a focus to work in their chosen field
  • CISA/CISSP/SSCP/OSCP/CEH/SANS/Cisco/MSFT etc., any of which are desirable, but not essential
  • Ideally 2 years of relevant professional experience in the field of Information Security
  • Client facing experience is desirable
  • Should be able to prioritise and manage multiple tasks. Strong focus on quality
  • Excellent report writing, presentation and customer interaction skills; and
  • Strong analytical/problem solving skills
37

Security Consultant Resume Examples & Samples

  • Engage with the identified projects as SE for the agreed upon duration
  • Design and Implement DS&P controls in accordance with the current DS&P framework
  • Identify and communicate applicable legal / regulatory / client requirements
  • Maintain DS&P applicable controls for the projects
  • Ensure quality and timely completion of engagements
  • Experience Level:4+Years
  • An awareness of Security architecture is preferred
  • Certified in CISSP, SSCP, CISA or CISM will be added advantage
38

Security Consultant Resume Examples & Samples

  • Perform business development (to grow Ericsson business and Consulting Services)
  • Deep knowledge of the specific solution, able to provide detailed solutions and reliable estimations
  • Knowledge of alternate specific solutions in the same domain to assess migration complexity and to integrate with existing customer solutions
  • Knowledge of web-based systems architecture, service-based architecture, enterprise application architecture as well as experience managing expectations when balancing alternatives against business and financial constraints
  • Demonstrates good judgment and pragmatic approach to delivering a solution that optimizes architecture activities across company needs, business constraints and technological realities
  • Proven experience selling consulting engagements which includes estimating, scoping, and writing effective statements of work that clearly set expectations and limit risk
  • Liaise with the product team for the development of new features
  • Knowledge of full application life cycle design tools and methodologies
  • Ability to work in team and to lead a team of 15+, key enabler for junior architects
39

Security Consultant Resume Examples & Samples

  • At least 3 years experience in programming languages such as Java, ASP .Net, PHP, or C/C++
  • At least 5 year experience in reviewing application code and programming languages and conducting security related analysis, both manually and using opensource and commercial tools to identify vulnerabilities and security flaws
  • At least 5 year experience in in a technical specialization in at least two of the following: Windows, Linux, Solaris, AIX, OS400, Apple, Databases, Routers/Firewalls
  • Existing Canadian Security Clearance or the ability to obtain it
  • At least 5 years experience in Windows, Linux, Solaris, AIX, OS400, Apple, Databases, Routers/Firewalls
40

Security Consultant Resume Examples & Samples

  • At least 5 years experience in working in projects related to the core domain
  • At least 3 years experience in managing large-scale technology deployment projects
  • At least 1 year experience in designing and implementing data security (data loss prevention) including any of the following: Verdasys, Symantec DLP, Fidelis, Guardium
  • Basic knowledge in security industry regulations/standards (PCI DSS, HIPAA, GLBA) and compliance frameworks (ISO 27002, CobiT)
41

Security Consultant Resume Examples & Samples

  • At least 6 months experience in IBM Security Systems (Tivoli) Identity Manager - IBM Security Systems (Tivoli) Access Manager – IBM Security Systems (Tivoli) Access Manager for Ebusiness - IBM Security Systems (Tivoli) Federated Id
  • At least 3 years experience in non-IBM Identity products
  • Basic knowledge in Statement of Work and PCR development
  • At least 1 year experience in designing \ architecting enterprise security solutions
  • Basic knowledge in Project Management, project sizing and scoping
  • French: Basic knowledge
42

Security Consultant Resume Examples & Samples

  • Basic understanding of compliance issues (ISO 27001, SSAE 16, COBIT)The successful consultant will be an internal advisor to other IBM consultants and to clients. The consultant will assist in pre-sales, sales, deal closure, and the delivery of security consulting services
  • At least 5 years’ experience in management consulting and systems integration or Managed Security Services in a top tier professional services firm
  • At least 1 years’ experience in working in international deployment roles
43

Global Security Consultant Resume Examples & Samples

  • Basic understanding of compliance issues (ISO 27001, SSAE 16, COBIT)The successful consultant will be an internal advisor to other IBM consultants and to clients. The consultant will assist in pre-sales, sales, deal closure, and organizing the delivery of security consulting services with local teams
  • At least 3 years’ experience working in projects related to the core domain*Experience working across diverse teams to facilitate solutions*Experience working with Security practitioners
  • Readiness to travel 50-75%
  • At least 3 years’ experience in working with security consulting teams
  • At least 8 years’ experience in management consulting
44

Lead Security Consultant Resume Examples & Samples

  • Identify, plan, coordinate and supervise the delivery of security assessments and other security services required
  • Manage a virtual team/other resources on a project by project basis as required
  • Provide security consultancy to ensure new projects and services are deployed in a manner that ensures adoption of the relevant security strategy, designs, standards, controls and tools
  • Accountable for representing GIS in cross-functional change programmes and business area meetings to ensure that information security considerations are included and considered and informed decisions are made to achieve agreed outcomes
  • A high contributor in designing IT security solutions according to business and architectural requirements and standards
  • Assist Risk Owners to accurately assess the likelihood and impact of technical vulnerabilities
  • Collaborate with senior and Executive peers across all global IT functions to ensure build and maintenance of effective IT Security solutions and controls
  • Manage congruent relationships among the different development teams; work in partnership with business stakeholders to agree mutual priorities (between business and technology teams), and improvement opportunities which will deliver value
  • To provide technical advice and guidance on IT security related queries to both project and run areas as and when required
  • To produce due diligence reports to be used in the creation of action plans to guide any remedial actions needed
  • Leading in the negotiation phases of contract development with 3rd parties in relation to identifying and agreeing security requirements
  • To lead, from an IT security perspective, the supplier assessment process used in order to ensure that a suppliers capability to support services to an agreed level/standard is accurately assessed and reported
  • Broad IT Security management expertise coupled with good understanding of financial services
  • Knowledge in multiple information security technologies and their strengths and shortcomings
  • Proven experience with securing information for cross-functional, cross-platform applications
  • Deliver results which add value to the business stakeholders through strategic decision-making and improving Security Solutions profiles through processes or technology
  • Experienced at implementing or managing risk management processes and tools
  • Understands security controls from a people, process and technology perspective
  • Familiar with integration and implementation issues and their security implications
  • Ability to influence outcomes and strategy amongst stakeholders, including senior Executives
45

Security Consultant Resume Examples & Samples

  • Strong communication and presentation skills in both English andone of the Nordic languages
  • Lead and shape client expectations
  • Engage in complex deals and match outcomes to client expectations
  • Ability to work with diverse teams in a dynamic environment
46

Senior Security Consultant Resume Examples & Samples

  • Support and lead billable client activities ensuring that the engagement delivers to client expectations on time and within budget, as well as delivering planned profit to IBM
  • Select, tailor and apply formal methodologies, approaches, frameworks, tools and techniques to analyze client requirements, develop hypotheses, and draws conclusions/recommend solutions
  • Participate in solution design for proposals and statements of work that align to the client needs
47

Senior Security Consultant Resume Examples & Samples

  • Exposure to Service organization controls audits (SAS 70/ SSAE 16/ ISAE 3402)
  • Proficiency in preparing and reviewing process documents: Security Policies and procedures
  • Experience in conducting Configuration Audits
  • Able to assess, develop, and implement information security programs, including organizational design and key processes
  • Knowledge of industry standards and industry frameworks (e.g., COBIT, COSO, CMMi, PCI/DSS, NIST)
48

Application Security Consultant Resume Examples & Samples

  • Experience with dynamic and source code application security scanning tools
  • Application Security Domain knowledge including security vulnerabilities, remediation techniques, and industry standards/best practices
  • Development experience in C/C++/Objective C, Java, .NET for both web and mobile development platforms
49

Technical Security Consultant Resume Examples & Samples

  • Own and drive the Security Principles, Target Architecture, Best Practices and Roadmaps
  • Develop security architecture roadmaps to continually improve the security of systems and our customers' data
  • Assess emerging technologies against security architecture to determine where they fill gaps, overlap with existing solutions or extend capabilities
  • Review existing and proposed architectures, identify security design gaps, and recommend changes or enhancements
  • Maintain knowledge of compliance requirements/standards (e.g. ISO27k, PCI-DSS, EU Data Privacy Requirements) and other international security regulations and communicate to the team and wider department
  • Perform business development (to grow Ericsson business and Information Security Consulting Services)
  • Deep knowledge of Security solution, able to provide security solution assessment and design detailed solutions together with reliable estimations
  • Knowledge of specific security solutions in the same domain to assess migration complexity and to integrate with existing customer solutions
  • Knowledge of Information Security solutions (IDM, SSO, Log Management, Biometrics technologies, …) as well as experience managing expectations when balancing alternatives against business and financial constraints
  • At least 4 years experiences on information security, during the latest 7 years, in the same role required for complex projects/programs about information security and specially on technology aspects
  • Ability to work in team and to lead a team of 5+
50

Security Consultant Resume Examples & Samples

  • 2) The individual should have an understanding of the contemporary security landscape and technologies which are used as security solutions for protecting enterprise against the evolving threats. The candidate should have Solutions like Networks, Cloud Architecture and Layers Defense frameworks together with services best practices. This includes active industry trend like Content Delivery Networks, DDoS mitigation, Denial of Service protection of network and application layers, Load Balancing, Global Server Load Balancing, DNS Application Firewall DAF, Web Application Firewall WAF, PCI Compliance, Next Generation Fire-wall NGFW, WAP Optimization, SDN / NFV, Virtualization, Databases Protection, Data Leakage Prevention, SIEM, Security Monitoring, Malware, Advanced Persistent Threat APT, Legal Interception, SSL Interception, DPI, IPS/IDS, VPN, Content Filtering, Web Acceleration and others Web Application Strategy across FSI, Public Sector and largest organizations across ASEAN and APAC
  • 7) Communicate security risk through documentation, conversation, and presentations with an objective of driving awareness and informed decision making
  • 9) Understand client's business initiatives and requirements and map these business needs into technical and security architecture
  • 11) Provide assessment services, compliance audits, security consulting and advisory services
  • 12) Design and provide "data centric" security architecture and defense in depth solutions encompassing layers of controls to protect confidentiality, integrity and availability (CIA) of the data
  • 14) Design and demonstrate security solution that is scalable and easy to adapt with changing business requirements
  • 15) Build and customize client solutions" that are a market differentiation
  • 5-7 years of experience in a pre-sales and business development environment in the design, development and implementation of complex security solutions
  • Strong experience and ability to prepare RFP/RFI response, proposals and solutions
  • At least 5 years’ experience in management consulting and systems integration or Managed Security Services in a top tier professional services firm
51

Security Consultant Resume Examples & Samples

  • Experience in development, implementation, design and architecture of the identity and access management solutions
  • Experience in managing end-to-end implementation lifecycles of Identity/Access Management projects
  • Excellent hands-on knowledge on the best-practices of deploying the security solution
  • Design and deliver high quality security architecture and infrastructure setups and/or sub-systems to agreed deadlines
  • Assist customers in developing a secured Identity/Access management infrastructure and also to define security policies to protect their applications from unauthorized access
  • Lead and own the security solution implementation
  • Actively participate in decision making with solution architect and seek to understand the broader impact of current decisions
  • Understand clients' business environment and basic risk management approaches
52

Security Consultant Resume Examples & Samples

  • Individual Contributor and technical ownership of application security engagements
  • Define and Implement security bug fixes, custom security controls in applications
  • Provide fix and tests approach and estimates
  • Static Code analysis with industry know tools and fix the identified vulnerabilities
  • Implement Secure programming principles in projects
  • Security Architecture, Compliance Consulting
  • Expected to keep track of vulnerability updates and control measures
  • Excellent programming skills (on multiple languages) - Java/J2EE and/or .Net technologies, html5, Javascript
  • Extensive understanding of secure coding is a must
  • Fair understanding of SQL/PLSQL
  • Exposure to UNIX Shell scripts, Python, Perl, Ruby is an advantage
  • Understating static code analysis (using tools like HP Fortify, IBM Rational Appscan etc) is desirable
  • Exposure to any Cryptographic APIs such as Java Cryptography Extension (and providers like BouncyCastle, IAIK etc), MS CryptoAPI etc is an advantange
53

Application Security Consultant Resume Examples & Samples

  • Assuring security coding practices
  • Recommending improvements in procedures, processes, operations and systems across Humana’s secure SDLC
  • Bachelors Degree in Computer Science or a Related Technical Field is required
  • Broad IT, Information Security and Application Development experience, preferably in a large corporate environment
  • One or more of the following certifications: CISSP, CISA, CSSLP
54

Security Consultant Resume Examples & Samples

  • Has demonstrated Consulting skills and uses formal methodologies to achieve outcomes
  • Has a good understanding of all key security domains, including Identity and Access Management, Threat Management, Data Protection, Network and Infrastructure Security, Cyber Security Operations and Intelligence
  • The senior role needs to have demonstrated team leadership and the junior role demonstrate practical implementation of security solutions
  • Strong communications (written and oral),
  • Organisational and interpersonal skills
  • Detail oriented,
  • Ability to multi-task and good time-management skills
  • Senior role 10+ years and the Junior role 5+years of experience in Information Security Consulting, preferably managing a security practice
  • BS degree in Computer Science, MIS, Engineering or Business discipline
55

Security Consultant Resume Examples & Samples

  • Facilitates multidisciplinary working groups to determine security solutions and
  • Bachelor degree, in an area of study relevant to criminal justice and/or business management/finance
  • Proven leadership and project management skills
  • Ability to prioritize and handle multiple tasks, pay close attention to detail, be well organized, and work successfully in a fast paced environment
  • Possesses minimum 3 years of experience in law enforcement and/or experience in retail loss prevention strategies, fraud identification and value migration preferred
  • Experience with a major corporation and/or law enforcement or intelligence preferred
56

Security Consultant Resume Examples & Samples

  • Solid balance of strategic thinking and ability to get things done
  • Network Security, telecom networks and network architecture
  • Capability to analyze customer security requirements and outline proposals meeting the requirements and explain the business value
  • Readiness to travel internationally, including high-risk locations; meet customers, represent Ericsson Network Security in conferences and seminars
  • Knowledge / experience in the following is of advantage
  • Track record on security pre-sales and customer deliveries
  • Vulnerability assessment tools and hands-on testing experience
  • Understanding of e.g. Security Analytics, Cloud Architecture and Cloud Security, Internet of Things security
  • Some of the following certifications: ISO 27001 Lead Auditor, ISO 27001 Lead Implementer, Offensive security certifications, SANS certifications, CISA, CISM, IAPP certifications
57

Application Security Consultant Resume Examples & Samples

  • 1 year software programming experience
  • 2 years experience applying security concepts and tools to test applications for security issues
  • 2 years experience in software development including development, build, and test cycles
58

Security Consultant Resume Examples & Samples

  • Ensure attainment of 95% or greater for all assigned task Operational Level Objectives (OLO) and Client-facing Service Level Objectives (SLO) across the products supported and managed through the CSC
  • Aid in the on-going centralization of Request Fulfillment responsibilities into the CSC by capturing and documenting existing processes and procedures, and transforming them into KnowledgeBase content for region-wide use by the team
  • Contribute to operational optimization efforts by making recommendations and implementing changes that achieve maximum productivity through the use of consistent tools, processes, and practices
  • Aid in the documenting and updating of operational procedures in order to manage/maintain an appropriate Audit, Risk and Compliance posture
  • Service Desk Experience
  • Proficiency in troubleshooting desktop software installations
  • Familiarity with W2K, XP VISTA, CITRIX
  • Familiarity with VMWare
  • Working knowledge of business and technical environments
  • Understanding of Active Directory, DNS, and basic scripting
  • Service desk experience
  • ITIL Foundations certification preferred
  • MCSE certification preferred
59

Senior Security Consultant Resume Examples & Samples

  • Provides hands-on consulting services to clients offering appropriate levels of information security within the Australian Government environment. Able to understand client requirements and define the appropriate cyber security solution
  • Good understanding and experience in Cyber Security Governance, Risk and Compliance. Conducts risk assessments and information security program assessments. Interprets information security policies, standards, and other requirements
  • The senior role needs to have demonstrated team leadership and demonstrate practical implementation of security solutions
  • Senior role 10+ years in Information Security Consulting, preferably managing a security practice
60

Senior Security Consultant Resume Examples & Samples

  • Experience with Big Four Consulting
  • Solid experience in professional services experience (providing consulting for end clients) performing engagement
  • Solid experience in communications written and verbal
61

Senior Security Consultant Resume Examples & Samples

  • Have responsibility for delivering cyber engagements to our clients. This includes deliverables, budgets and timeframes are align to the quality standards of EY
  • Be a trusted member of our well established and industry respected Cyber Security team
  • Project Management across multiple concurrent technical Cyber Security engagements
  • Work effectively as a self-managed team member; develop, coach and supervise team members, share responsibility, provide support, maintain communication and update senior Cyber management on engagement progress
  • Evolve your skills to match cutting edge Cyber Threat Management trends
  • Manage and develop client stakeholder relationships
  • Manage and drive Cyber security staff recruitment, retention and development activities
  • Work with business leaders to develop the cyber threat management and execute go-to-market plans
62

Security Consultant Resume Examples & Samples

  • Relevant experience of 3+ years Security Consultant
  • Excellent Communication, people management and leadership skills
  • Ability to pick up new areas and work on a Consultant Profile as well
  • Able to guide a team of lesser experienced professionals
  • 3+ years of leading and mentoring teams
  • At least 3 years experience in Security Product -Firewall,LAN/WAN
63

Application Security Consultant Resume Examples & Samples

  • 2 years + software programming experience
  • 1 year + development experience in C/C++/Objective C, Java, .NET for both web and mobile development platforms
  • 1 year+ experience with dynamic and source code application security scanning tools
  • 1 year+ client facing/consulting experience
64

Security Consultant Resume Examples & Samples

  • Determine security design issues and drive attack surface analysis and most "at-risk" components
  • Ability to gather written and verbal information from multiple sources, assess and consolidate risks, provide appropriate recommendations
  • Ability to handle multiple tasks, prioritise effectively, remain calm under pressure and when faced with adversity or urgent issues
  • Focused on business enablement whilst being able to reach balanced judgements vs. security
  • Ability to influence and educate stakeholders and management regarding appropriate security and IT risk management
  • Excellent analytical and problem-solving skills
  • Financial services experience preferred
65

Application Security Consultant Resume Examples & Samples

  • Provides web application firewall (WAF) implementation oversight, analysis and design
  • Evaluates and recommends effective WAF policies and architectures
  • Evaluates and recommends applications to be placed behind the WAF
  • Coordinates various engineering, development, and business teams to deliver WAF implementations
  • Develops and maintains WAF security design documentation
  • Develops and maintains WAF reports and dashboards
  • Ability to plan and perform application penetration testing and application source code reviews independently (there is no code development)
  • Provides subject matter expertise to other team members and the organization
  • Evaluates application procurement, development and implementation activities for possible vulnerabilities
  • Interacts with the client as required throughout WAF implementation and application security review engagements
  • Communicates timely and accurate results of all activities to appropriate technical and client representatives in written and verbal formats
  • Works autonomously; guides work of other team members
  • Holistic risk and control analysis including strategic mitigation planning and execution
  • Demonstrated presentation development; tailors message as needed; comfortable presenting to all levels; strong writing skills; demonstrates creativity in articulating messages that support recommendations
  • Proven relationship building skills working with mid to senior level management and cross-functional teams; strong understanding of risks; additional focus on leadership; strong interpersonal skills; delivers precise, accurate results to meet commitments; mentors other team members
  • Will act as senior resource for incident response related activities. Collaborate with technical teams for security incident remediation and communication
  • Create documentation of processes and ongoing associated enhancements
  • Provide direction and act as an escalation point on projects and issues to other team members
  • 4+ years web application firewall experience
  • 2+ years application development experience a plus
  • 2+ years’ experience in development technologies such as .Net framework and Java a plus
  • 2+ years of web application development experience a plus
  • Ability to perform thorough application testing (this is not a code development position)
  • Previous experience performing application security source code assessments a plus
  • Experience with tools like Veracode, Fortify, WebInspect or AppScan a plus
  • Understanding of application security concepts such as Strong Authentication, Encryption and Access Controls a plus
  • Thorough understanding of networking and web application network protocols
  • Strong research and writing skills
  • Act as influencer of peers and management
66

Security Consultant Resume Examples & Samples

  • 2 year experience in general Information Security practices
  • 3 years of experience in TCP/IP networking and routing fundamentals
  • 2 year experience in Unix/Linux system administration
  • 2 year experience in network troubleshooting
  • 2 year experience in firewall / security gateway administration
67

Security Consultant Resume Examples & Samples

  • Information Security Management (i.e. CISSP, CISM, CISA, CRISC, AWS-CSA). Advise and define organisations Security Strategy and Transformation
  • Information Security Management Systems (i.e. ISO27001/ISO27002)
  • Programme and Project Governance/Management (i.e. Prince)o Audit and Compliance Assessments (i.e. SOX, PCI-DSS, SCADA)
  • CLAS Consultant / CESG Certified Professional (CCP)
  • The ability to provide HMG advice & guidance, and undertake IA activities covering SIRA, IA and Audit roles at all levels
  • Data Privacy Specialists. The ability to advise on Security and Privacy, with an understanding of the impact of UK and EU privacy laws
  • Required Non-Technical Skills: Teamwork, Adaptability, High Integrity & work ethic, good Communication skills, Positive demeanour, Projects are based across the UK and Ireland, often on client premises, so the ability and willingness to travel is an essential requirement
  • All applicants must be able to pass Pre-employment screening and criminal record checks
68

Security Consultant Resume Examples & Samples

  • IBM Security Access Manager (Skill level 5)
  • IBM Security Identity Manager (Skill level 5)
  • IBM Security Directory Server (Skill level 4)
  • Tivoli Federated Identity Manager (Skill level 3)
  • WebSphere Application Server (Skill level 3)
  • QRadar SIEM (Skill level 2)
  • Guardium (Skill level 2)
  • Customer relationship management skills, solid verbal and written communications skills
  • Candidate must have the ability to work creatively and analytically in a problem-solving environment, be a strong team player with ability to take charge of their area of expertise
69

Security Consultant Resume Examples & Samples

  • Design, integration and operation of security products such as Network and WAF, network or host (NIDS, NIPS), APT, SIEM
  • Strong networking (both LAN/WAN) knowledge is required
  • Ability to provide security consulting services after understanding the customer network architecture and setup
  • Ability to advise the relevant Security solutions or services based on the finding or customer requirement
  • Experience in managing and deploying WAF, NIDS/NIPS, APT, SIEM, etc would be an advantage
  • Relevant working experience in Managed Security Service Provider (MSSP) would be an advantage
70

Security Consultant Resume Examples & Samples

  • Teamwork, Adaptability, Listening, High Integrity & work ethic, Communication, Positive demeanor
  • IT Systems - A fundamental understanding of IT Systems and Services covering Virtualisation, Mainframes, Cloud Services, Hosting Services, Desktop
  • Systems Development - A fundamental understanding of IT Systems Development
  • Networking Technologies - An understanding of the fundamentals of IT networking technologies, the basic building blocks used and how they support a secure architecture
  • Advise and define organizations Security Strategy and Transformation
  • Programme and Project Governance/Management (i.e. Prince)
  • Audit and Compliance Assessments (i.e. SOX, PCI-DSS, SCADA)
  • Data Privacy
  • The ability to advise on Security and Privacy, with an understanding of the impact of Local and EU privacy laws
  • Financial systems / payment systems
71

Senior Security Consultant Resume Examples & Samples

  • Build and maintain productive, collaborative relationships with stakeholders in COG Technology and the business
  • Strong and self-confident, adaptable and flexible – capable dealing effectively with colleagues and business users in a constantly evolving environment
  • Ability to handle multiple tasks ,prioritise effectively, remain calm under pressure and when faced with adversity or urgent issues
  • Comfortable working as part of global team across geographies, cultures and time-zones
  • Enthusiastic and creative, an inquisitive nature with an attention to detail, yet able to think outside the box and consider the big picture
  • Proven ability to deliver end to end Information security / risk assessment services
  • University degree in computer science or engineering, or equivalent
  • Technical security certifications including platform/infrastructure-specific certifications, e.g. CISSP, GIAC, CCNA
  • Risk management certifications (preferred, not mandatory), e.g. PCI-DSS, CISA, CISM, SABSA
72

Cyber Security Consultant Resume Examples & Samples

  • Transparent and objective information security risk assessment
  • Ability to work at pace within a team of highly skilled and competent peers
  • Verbose in all relevant legislation and regulation; in particular, UK DPA, GDPR, PCI
  • Verbose in at least one internationally recognised technical risk assessment standard e.g. IRAM2
  • MSc in Information Security or equivalent and demonstrable industry experience
  • Verbose in industry best practice for project security assurance, risk assessment and SDLC
  • Confident thought leader
73

Security Consultant Resume Examples & Samples

  • Act as Subject Matter Expert (SME) in responsible technologies and have deep technical understanding Exchange, SharePoint and Office 365
  • Strong judgment and analytical ability
  • Knowledge of common information security standards, such as: ISO 27001/27002, NIST, PCI DSS, ITIL, COBIT
74

Security Consultant Resume Examples & Samples

  • Act as the Operational Risk expert within the business unit, implement and reinforce controls to meet all regulatory and internal requirements
  • Act as technology risk team focal point to support technology reporting requirements and information security promotion & communication activities
  • Ensure proper management of technology risks and timely resolution of issues to mitigate impacts
  • Understand GOR and compliance requirements and drive country technology team fulfillment
  • Support implementation of group and country OR initiatives and projects to reinforce IT operational risk control and management
  • Ensure IT risks and issues identified are tracked and resolved in an appropriate and timely manner
  • Proactively communicate with business units on IT operational risk issues, escalate significant events to business unit heads and key stakeholders as appropriate
  • Undertake and coordinate regular and ad hoc IT operation risk internal and external regulatory reporting activities
  • Undertake and coordinate information security promotion and communication activities
  • Ensure IT risks and issues identified are tracked and resolved in an appropriate and timely manner with minimized impact to business
  • Achieve good results on regulatory and internal audits & compliance reviews
  • Work closely with country technology teams to support and coordinate IT operational business continuity activities
  • Completes Key Control Self Assessments (KCSA), risk tracking (Phoenix, Riskwise) as per Group’s OR Framework
  • Bachelor's degree or higher in Computer Science, Information Systems or related field. Equivalent combination of education and experience is acceptable
  • 2 years above experience in technology operational support or technology risk management, with a clear understanding of bank’s approach to the management of operational risk
  • CISA, CISM, CISSP, ITIL certificate holder is highly expected
  • Experience developing and delivering presentations to various levels within an organization, including executive management
  • Effective change management, having good communication and interpersonal skills
  • Ability to work independently and manage multiple competing priorities
  • Strong analytical & planning skills and problem solving capability
75

Cyber Security Consultant Resume Examples & Samples

  • Ability to drive action to achieve results with minimal direction
  • Keen attention to detail, grammar, and formatting
  • Advanced Project, Excel, Word, and Power Point experience
  • Ability to work in a cross-functional team
  • Ability to write clearly, often about complex topics (e.g., process workflows, technology assessments, policy guidance)
76

Security Consultant Resume Examples & Samples

  • Performs vulnerability assessments and penetration tests using such tools as NMAP, Nessus, BurpSuite, Metasploit and other toolsets as applicable. Requires the ability to evaluate the specifics of the client’s network and appropriately configure each tool to effectively test the network
  • Analyzes and reconciles results of scans performed. Will interpret the output from the scanning tools and determine further analysis to be performed. Further actions may include manual testing procedures, use of publicly available software tools or scripts, and other methods to accurately determine the existence of a security vulnerability
  • Performs verification procedures by identifying the specific indicators of each vulnerability and deciding on methods to best document the existence of the vulnerability for the client so that they can independently verify the security vulnerability. Will also evaluate and, if necessary, research the specific instance of each vulnerability to determine the best course of action for addressing it. Will formulate recommended actions for the client to consider
  • Researches vulnerabilities and steps to resolve them; updates findings in the master findings database
  • Researches latest threats and vulnerabilities and works with the assessment team to revise and improve assessment service offerings
  • Helps maintain testing tools and assessment platforms
  • Participate in the Continuing Professional Education program, essential to competence and continued professional growth
  • Participate actively in community activities to develop and maintain positive business relationships with community leaders and individuals
  • Participate actively in firm sponsored events for financial institution clients and prospects
  • Other duties as assigned to perform the responsibilities of the position and meet client expectations
  • Bachelor’s degree in Information Security, Information Technology or related discipline
  • 3-5 years related experience and/or training; or equivalent combination of education and experience in similar role
  • A high level of initiative, strong written and verbal communication skills and business acumen oriented around small to middle market companies
  • Strong organizational skills in coordinating multiple projects/tasks simultaneously, and meeting deadlines
  • Great attention to detail and problem solving skills
  • OSCP and CISSP certifications are desired
  • Prior experience as a consultant is desired
  • Experience with port scanning, vulnerability assessment and penetration testing tools (e.g., Nmap, Nessus, Metasploit), and manual security testing processes
  • Strong knowledge of Windows Server and Linux systems
  • Strong knowledge of networking and security technologies including routers, switches, firewalls, IDS, anti-virus, protocol analyzers
  • Knowledge of scripting and/or application development
  • Knowledge of database systems
  • Proficient in Word, Excel, Outlook, and Adobe
77

Security Consultant Resume Examples & Samples

  • Coordinate and oversee technical security testing activities (e.g. pen testing, vulnerability assessment, social engineering, NIST Cyber Assessment)
  • Interpret and communicate findings and recommendations with non-technical management team
  • Coordinate, track and communicate progress on remediation activities
  • Facilitate the development of a cross-functional Cybersecurity team with clients
  • Develop and coordinate the delivery of formal cybersecurity training and ongoing cyber awareness campaigns
  • Create policies for Cybersecurity Team to review and ratify
  • Prioritize, plan, coordinate and assist with local security efforts (e.g. findings from testing / audits)
  • Communication progress (e.g. maturity levels) with clients management team
  • 5-7 years related experience and/or training; or equivalent combination of education and experience in similar role
  • Certifications in either CISSP, CISM, CRISM are desired
78

Cyber Security Consultant Resume Examples & Samples

  • Assume leadership role in assigned projects insuring project delivered as designed, on time and within budget and to the satisfaction of the customer
  • Act as primary customer interface to ensure proposed solutions meet their business needs
  • Maintain technical competency with the HPS security and networking product/systems portfolio, while maintaining expert knowledge on specific designated security/network disciplines
  • Assist Sales/Business Development by defining potential Honeywell cyber security solutions including customer presentations and proposal development
  • Maintain industrial safety awareness through the completion of pertinent safety certifications
  • CISCO Certified Network/Design/Security Professional (at least one) – must currently be certified or in the process of certification
  • Linux/Windows Security Basics
  • TCP/IP protocols – SMTP, SNMP, FTP, HTTP, SSH, SSL
  • Microsoft – Active Directory, DNS, WSUS, Terminal Server
79

Senior Security Consultant Resume Examples & Samples

  • Conduct web application security assessments and penetration tests. These are very systematic assessments which are done using the Foundstone proprietary methodology. The assessments involve manual testing and analysis as well as the use of Foundstone proprietary & commercial automated web application vulnerability scanning/testing tools
  • Assess applications for issues surrounding Authentication, Authorization, User management, Session management, Data validation, including all common attacks such as SQL injection, Cross-site scripting, Command injection, Error handling, Auditing and logging
  • Assess the security aspects of Web Services design and implementation, including confidentiality, integrity, trust relationships, and authentication using security standards like XML signatures, XML encryption, SAML, and WS-Security
  • Knowledge of tools such as Fiddler, Paros, Burp, Sqlmap, Nikto, Nmap, Openssl, Mallory, Echomirage, Wireshark etc
  • Mobile application development, assessment (iOS, Android, Blackberry) experience
  • Thick client assessment or Binary analysis experience
  • Write formal security assessment reports for each application, using the Foundstone standard reporting format
  • Participate in conference calls with clients to perform initial data gathering and a follow-up advisory for technical issues
  • Publish whitepapers, tools and deliver presentations
  • Bachelor’s or Master’s degree in Computer Science or equivalent
  • Web application development experience in any of the major languages such as C#, Java, PHP, ASP.NET etc. is a plus
  • Knowledge of scripting languages such as Python, JavaScript, Ruby, Perl, SQL etc. is desired
  • Experience reviewing code in C, C++, Java, PHP, C#, ASP etc
  • Familiarity with automated source code analysis tools such as Fortify, Appscan etc
  • Knowledge in Web services, Cloud Security
  • Certifications such as CISSP, GSEC or CEH is a plus
80

Security Consultant Resume Examples & Samples

  • Client identification through final invoicing for engagements
  • Problem identification
  • System architecture definition
  • Hardware/software specification and/or design, implementation, testing, client training, and solution deployment. Performance is typically evaluated based on utilization, (i.e., billable hours)
  • Project management activities include interaction with company and client managers and cost/schedule monitoring
  • You may have some financial responsibilities including project cost estimating, proposal generation, and invoicing
  • You may participate in sales and proposal presentations in addition to completing ongoing team account activities. You may identify additional product/services opportunities in customer organization
  • Bachelor degree or higher in a relevant field
  • Experience on Intel Security technologies (2+ years)
  • Experience in Security Domain (5+ years)
81

Security Consultant Resume Examples & Samples

  • Deliver billable consulting and training to customers and partners on Intel Security products
  • Ensure projects are completed on-time, to-budget with the highest technical expertise and professionalism, and maximise customer satisfaction
  • Development of professional and personal skills akin to major job functions, products, related technologies and career advancement
  • Produce technical Scope/Estimate documents and Project Proposals
  • Coach and lead partner consultants to deliver projects
  • Maintain technical expertise and product knowledge in Security Risk Management and NIPS (Network Intrusion Prevention Systems)
  • On occasion you will be working with our SE's (Pre-Sales) and Sales teams to demonstrate our products and solutions
  • Responsibilities will include technical engagement scoping/estimating and proposal preparation in addition to successful delivery of the work proposed
  • Complete associated Statements of Work / Engagement Activity Reports
  • Experience with Intel Security Advanced Threat and Threat Intelligence and preferable Endpoint solutions as well
  • Strong integration background and expertise in IT Security Solutions
  • Experience managing security implementation projects
  • Experience in delivering technical training
  • Advantage is if the preferred applicant have relevant industry security certifications such as CISSP, CISM, CEH, GSEC
  • Strong personal presence, capable of engaging senior management
  • Self-starter who is pro-active, flexible, creative, with lots of initiative and a positive can-do attitude
  • Results-driven with strong goal-orientation
  • Experience working for a security vendor or system integrator
82

Security Consultant Resume Examples & Samples

  • Provide security governance within change projects and improve the consolidated security risk profiles for business areas
  • Detailed understanding of principles, practices, and techniques related to IT Security
  • Demonstrate a significant impact on the operating efficiency of the area. Manage deliverables and resources. Deliver results which add value
  • Security qualification (CISSP or CISM preferred but not essential)
  • Strong Written and Verbal language skills
83

Security Consultant Resume Examples & Samples

  • Design or implement CSIRT to customer organization
  • Plus 3 IR experience with forensics
  • Analysis of the logs or packet
  • Creation and revision of Security policies, rules and procedures documents
  • Design, deploy and operate security products and tools
  • Vulnerability security diagnosis (Network or Web)
  • Information security or system auditing
  • Security Operations Center creation or operations and monitoring
  • Pre-sales or consulting activities with cybersecurity knowledge
  • User education pertaining to information security
  • Software development and programming experience
  • Web application development experience
  • Security consulting for government agencies and financial industry experience
  • Troubleshooting software and hardware products
  • Business sales & pre-sales experience
  • Previous consulting service experience
  • Fluency in Japanese (Japanese skills are required to communicating with local customers, sales, support, etc.)
  • Fluency in English (English skills will be required to work with Intel internal systems and will be helpful obtaining information from foreign news websites, etc.)
  • Excellent communication skills often in negotiations and consultation with customers, and co-workers
84

Security Consultant Resume Examples & Samples

  • Performing industrial cyber security assessments, focusing on People, Process, and Systems
  • Creating security Policies and Procedures for Industrial and Automation Control Systems
  • Developing secure system and product architectures for critical infrastructure facilities
  • Developing security product architectures and processes for device manufacturers
  • Creating Risk Assessment Methodologies
  • Conducting Wurldtech training courses
  • Supporting the creation of new services and collateral
  • Supporting pre and post sales activities
  • Other responsibilities as defined in the course of activities
  • Minimum 2 years of experience as a Security Consultant
  • Minimum 2 years of experience as a Field Consultant in industrial security services
  • Location is flexible within the United States or Canada
  • Expert knowledge of risk assessment methodologies & risk management
  • Expert knowledge of Industrial Automation and Control Systems, including the real world implementation and operation of these systems
  • Knowledge of IACS network architectures, and the securing of those architectures
  • Security design & architecture experience Contacts in the critical infrastructure industry
  • Strong record of delivering quality technical documentation
  • Client focused history
  • Ability to lead and work within a team
  • Strong Pre & Post-sales experience
  • Bid management skills
  • Business consultancy skills
  • Security and industry certifications, such as GIAC, CISA, CISSP, etc
85

Cyber Security Consultant Resume Examples & Samples

  • Assume leadership role in assigned projects insuring project delivered on time and within budget and to the satisfaction of the customer
  • 5+ years working with IT Security
  • 2+ years performing audits/assessments
  • CWSP – Certified Wireless Security Professional or similar experience
86

Cyber Security Consultant Resume Examples & Samples

  • Author cyber threat reports and disseminate to global customers
  • Communicate complex technical details around cyber risk to C-suite audience
  • Project management of report writing cycle
87

Security Consultant Resume Examples & Samples

  • Collaborate with clients to design and implement security strategies & architectures across platforms and for a variety of solutions
  • Conduct requirements gathering, analysis, and develop security strategies for clients
  • Execute security program assessments, documenting gaps, and creating strategic implementation roadmaps Facilitate use of technology-based tools or methodologies to review, design and/or implement products and services
  • Understand business direction of companies and create optimized security organizations and architectures to meet business needs while increasing profits
  • Ability to translate technical requirements into business terms for stakeholders
  • Ability to streamline security operations, while maintaining relevant compliance with legal, best-practice, and regulatory requirements
  • 2+ years of Security Consulting / Advisory skills in areas such as
88

Security Consultant Resume Examples & Samples

  • Assist information security operations including governance, compliance, risk analysis, maintenance, awareness and training
  • Develop and enhance existing information security policies, procedures, aligned with Corporate Information Security program as well as with Client’s project requirements
  • Perform regular assessment of organizational security posture, improve, measure and report metrics to leadership
  • Plan and coordinate Incident response with IT management, legal, safety/security, and law enforcement agencies
  • Consult on multiple security related projects and technologies, interfacing with others within the IT organization as well as other internal business units and Clients/partners
  • Participate in and execute IT security projects and vulnerability management programs in close co-ordination with internal teams and vendors
89

Security Consultant Resume Examples & Samples

  • Assist in the review and analysis of Security Authorization Packages for completeness and compliance with FedRAMP and DoD requirements
  • Participate in client interviews to complete Security Authorization Packages and Security Assessments
  • Bachelors degree in Information Technology, Computer Science or relevevant discipline, or equivalent work experience
  • Familiarity with NIST 800 series guidelines (800-30, 800-37, 800-53 and 53A, 800-60, etc.)
  • Excellent communication skills, both written and verbal with strong presentation skills
  • Ability to translate technical materials and issues into non-technical/layman terms
  • Applies attention to detail, accuracy, and thoroughness in all work products
  • Ability to interact with clients and represent Kratos SecureInfo in a professional manner
  • Ability to successfully manage multiple tasks
  • Serve as mentor to Associate Security Consultants on best practices
  • Ability to travel 25%
  • 3 to 5 years of experience with the responsibilities and requirements listed above
90

Senior Security Consultant Resume Examples & Samples

  • Build a customer-focused relationship with client(s)
  • Collaborate across multiple internal teams to ensure successful delivery of results based on scope of work
  • Establish standards and procedures to minimize risks
  • Demonstrate proficiency in creating proposals and SOWs, responding to RFPs
  • Present proposals to clients
  • Drive working sessions with client to ensure expectations and direction are aligned and timelines are being met
  • Demonstrate ability to lead projects through the project lifecycle from initiation to project closure
  • Maintain one or more of the following certificates: CISSP, CEH, CAP, Security +, GSEC, or equivalent
  • Demonstrated familiarity with NIST 800 series guidelines (800-30, 800-37, 800-53 and 53A, 800-60, etc.)
  • Team player able to work well with others in a collaborative manner and is a self-starter who can work with minimum supervision
  • Serve as mentor to Associate Security Consultants and Security Consultants on best practices
  • 5 to 9 years of experience with the responsibilities and requirements listed above
91

Professional Services Security Consultant Resume Examples & Samples

  • Consult to Japanese customers about their business needs and how Verizon security services can help
  • Bachelors’ degree, majoring in Computer Science, Electrical, Computer, Communications, or System Engineering, or related fields
  • Certification in a vulnerability management solution (e.g Qualys)
92

Professional Services Security Consultant Resume Examples & Samples

  • Performing Vulnerability assessments and penetration testing
  • Firewall, Router, Switch technical configuration reviews
  • Application Security Configuration Reviews
  • Provide scoping support
  • Penetration testing certification (e.g. Certified Ethical Hacker (CEH))
  • Networking certification (e.g. Cisco Certified Network Associate (CCNA))
  • Firewall administration certification (e.g PaloAlto, Juniper, Fortinet, etc.)
93

Security Consultant Resume Examples & Samples

  • Provide broad technology & cyber security risk management advice to the firm
  • Create, review & update frameworks, policies, standards and procedures
  • Lead and/or contribute to the design & implementation of our cyber resilience and BCP initiatives
  • Assist in the development & delivery of security training and awareness initiatives
94

Security Consultant Resume Examples & Samples

  • Assisting Tenable partners who need assistance with Tenable API integration
  • Answering API questions on the Tenable Discussions Portal
  • Developing custom tools or scripts needed by sales, technical support, or as part of scoped professional services engagements for Tenable customers that leverage Tenable’s APIs
  • Ensuring the Tenable software API documents are accurate and up to date
  • Provide technical leadership to Support organization and serve as a point of escalation for API-related technical support issues with customers
  • Performing engagement tasks according to scoped statements of work by
  • 4+ years experience in IT, security, risk management or professional services
  • Recent experience performing vulnerability scans, log analysis, security monitoring with Tenable (e.g., Nessus, SecurityCenter) or other industry solutions
  • Experience in two or more of the following programming languages: Python, PHP, Ruby, PowerShell, or shell scripting
  • Knowledge of ISO 17799, PCI, GLBA and HIPAA
  • Experience with using, customizing and developing open source security tools
  • When developing code, have an understanding of cross-site scripting and SQL injection vulnerabilities and attacks so to produce secure code
95

Security Consultant Resume Examples & Samples

  • Assisting customer with installing, configuring, and operating Tenable solutions
  • Provide recommendations on architecture, deployment, configuration, and best practices use of Security Center and Nessus in customer environment
  • Analysis of Nessus and Security Center scan results and troubleshooting failed scans
  • Executing the engagement to exceed expectations based on strong understanding of the customer’s business and their unique needs
  • Provide product and best practices knowledge transfer to customer staff as needed
  • Thought leadership in terms of methods and best practices for deploying Tenable solutions
  • Conduct in-depth needs analysis (via phone, email or in person) with prospect technical staff to determine technical requirements and specifications of post-sales engagements in line with Tenable best practices
  • Support the development of Statements of Work
  • Willing and able to travel to client sites up to 50%
96

Senior Security Consultant Resume Examples & Samples

  • Define and provide pragmatic security guidance that balance business benefit and risks in both on premise and cloud based systems (applications and infrastructure)
  • Provide knowledge sharing and technical assistance to other team members in the area of cloud security
  • Experience with one or more of the cloud technologies - Microsoft Azure, Rackspace, AWS, or Softlayer
  • Experience with providing security controls for global deployments, preferably in cloud environments
  • Working experience of Exchange Server Roles and RBAC model
97

Security Consultant Resume Examples & Samples

  • Web application testing
  • Wireless penetration testing
  • Mobile application testing
  • Maintain working knowledge of advanced threat actor tactics, techniques and procedures, and emulate these TTP to assess vulnerability and risk
  • Conduct exploitation testing using off the shelf or self-developed exploitation tools and document findings for client remediation
  • Perform proactive research to identify and understand new threats, vulnerabilities, and exploits
  • Produce and deliver vulnerability and exploit information to clients in the form of briefings and reports
  • Document and present new testing techniques to internal and external teams
  • Excel as both a self-directed individual contributor and as a member of a larger team
  • Availability for travel locally within Australia and from time to time in Asia
  • Interface with Counter Threat Unit (CTU) and Incident Response (IR) teams
  • Strong time management skills, self-directed, with the ability to meet verbal and written deadlines
  • Ability to research and characterise security threats, and define appropriate countermeasures in client reports
  • Ability to explain technical security concepts to executive stakeholders in business language
  • OSCP
  • OSCE
  • GWAPT
  • GXPN
  • CREST Certified Simulated Attack Specialist (CCSAS)
  • CREST Certified Simulated Attack Manager (CCSAM)
  • Extensive professional experience in information security or related field
  • Proven experience performing or leading technical testing engagements/projects is required
  • Degree qualified in Computer Engineering, Electrical Engineering, or a related technical field; or equivalent professional experience
98

Senior Security Consultant Resume Examples & Samples

  • Perform Technical and Security Compliance and Risk Assessments against various standards and industry best practice
  • Create and recommend client’s remediation strategies for components of security policies, procedures, processes, and standards
  • Create detailed professional documentation to be delivered to customers both in written and verbal formats
  • Perform other client work related to SecureWorks professional services offerings
  • Be prepared to travel as part of the role
  • Risk Assessment and Risk Management, but must also possess a strong technical and security background
  • Knowledge and experience with technologies, processes, and methodologies such as
  • Must possess strong analytical capabilities and have a desire to learn new things
  • Experience working with clients with sometimes complex and sophisticated requirements and business models
  • Resourceful and well organised, able to work on multiple projects concurrently, manage time effectively, and require minimal supervision in the execution of a project
  • Strong networking and team-working skills
  • 5 to 10 years of Information Technology, Security and Compliance experience required
  • Bachelor's degree required, preferably in computer science or information systems
  • Technical or professional certifications such as CISSP, CISA, CISM would be a plus
  • ISO 27001/2
  • NIST 800-53 and related standards (preferred but not mandatory)
  • ASD Information Security Manual (ISM) and/or state-level security standards (preferred but not mandatory)
  • Privacy Act (federal) and/or state-level privacy regulations (preferred but not mandatory)
99

Senior Security Consultant Resume Examples & Samples

  • A minimum of 8-10 years of experience in an Information Security or Information Technology discipline
  • One or more years of experience with mobile device security: iOS, Android, mobile applications, mobile forensics analysis, mobile application security analysis, mobile device attack and penetration testing, and secure application development (native, hybrid or HTML5)
  • One or more years of experience with Enterprise Mobility Management (EMM): Mobile Device Management, (MDM), Mobile Application Management (MAM), Mobile Enterprise Application Platform (MEAP), Mobile Application Development Platform (MADP), Enterprise App Store (EAS), HTML5, and BYOD
  • Working experience in performing security assessments of applications or mobile applications
  • Experience in supporting acquisition related activities
  • Develop appropriate risk treatment and mitigation options to address security risks identified during security review or assessments
  • Knowledge of common information security standards and risk methodologies, such as: ISO 27001/27002, NIST, PCI DSS, ITIL, COBIT
  • Ability to document business and technical requirements, reports, MSB’s, and presentations
100

Cyber Security Consultant Resume Examples & Samples

  • BS in Computer Science/Information Systems/Engineering, or a strong grasp of Computer Science/Information Systems and relevant experience
  • Valid IA certification in accordance with DoD 8570 IAM II requirements
  • Strong communication skills, analytical ability, good judgment, and the ability to work effectively with clients and IT management and staffs
  • Ability to work independently and manage time efficiently to ensure all tasks assigned are accomplished by the required deadline
101

Principal Security Consultant Resume Examples & Samples

  • 3+ years of experience in Information Security, including: Incident Response and Remediation, Forensic Analysis, security tools such as security tools such as NMAP, Nessus, TCPDump, Wireshark, Netcat, Backtrack, Encase, Helix, FTK
  • Strong understanding of common categories and characteristics of malware
  • Strong understanding of SQL query syntax, structure, and optimization
  • Working knowledge of programming/scripting (e.g. Python, Java, Powershell, etc.) in order to automate tasks
  • Working knowledge of operating system platforms, routers, web proxies (BlueCoat), network protocols, and security architecture
  • Understanding of Static and Dynamic analytical techniques
  • Superb written and verbal communications skills in English
  • Willingness to work out of normal business hours without prior notice (upon customer demand)
  • Paterva Maltego
102

IS Risk & Security Consultant Resume Examples & Samples

  • Be the trusted senior advisor on IS topics to company IS and business community
  • Proactively engage with stakeholders from business in a dialog on InfoSec risk topics
  • Support project-based activities by providing advisory, consultancy and guidance
  • Perform analysis identifying security requirements for a specific business initiatives
  • Perform InfoSec risk assessments in compliance with ISMS guidelines and IRM framework
  • Review architectural designs, evaluate the adequacy of security controls, identify and provide recommendations on any discovered shortcomings
  • Perform security control analysis, assess security controls adequacy and effectiveness
  • Deliver bespoke consultancy helping IS teams or management to solve IT security problems of various scope and complexity
  • Perform identification of the asset threats, vulnerabilities, associated risks and risk mitigation controls
  • Interview risk owners, process owners, project owners, and asset owners in pursuit of data and information risk
103

Security Consultant Resume Examples & Samples

  • Expertise - Collaborate with AWS field sales, pre-sales, training and support teams to help partners and customers learn and use AWS services in key market verticals & regulated industries such as financial services, media, manufacturing, healthcare, life sciences, and energy
  • Significant experience building security reference architecture for all-in cloud deployments and hybrid scenarios
  • Notable customer experience and collaboration skills
  • BS level degree required, computer science, business or math background preferred
  • Experience leading the certification or accreditation of cloud workload(s) to meet industry standards such as PCI DSS, ISO 27001, HIPAA, and NIST/DoD frameworks
104

Security Consultant Resume Examples & Samples

  • Implementation experience with enterprise security packages identity management and federation systems
  • Experience implementing security controls around ERP packages including SAP, Oracle
  • AWS Certification, e.g. AWS Solutions Architect Associate
105

Senior Security Consultant Resume Examples & Samples

  • Development of Security Center scan policies, assets, scans, dashboards and reports to meet customer needs
  • Developing and maintaining positive relationships with clients
  • Creating additional value for clients through continual insights and consultative advice based on experience with the Tenable products, the customer, their industry, established standards and industry and company best practices
  • Research user needs and requirements and identify areas where changes can make maximum impact
  • Assisting client with upgrades and migration to new hardware or software versions
  • Delivering custom training for prospects/customers and partners on a as-needed basis to supplement other training staff
  • Help sales while on customers sites to identify further revenue by helping to promote the wider Tenable solution
  • Liaise with Customer Support on the rare occasion when dealing with an onsite customer escalation
  • Support the enablement of Tenable partners by training, mentoring, certifying, and inspecting
  • Documentation of methods and best practices for use internally and with customers
  • 6+ years experience in IT, security, risk management or professional services
  • Recent in-depth experience performing vulnerability scans, configuration audits, security monitoring with core Tenable products, Security Center and Nessus
  • In depth knowledge of networks, Linux/Unix and Windows administration, patch deployment and system configuration
  • Understanding of security principles, policies and industry best practices
106

Security Consultant Resume Examples & Samples

  • Ability to perform network designs
  • Ability to perform implementation and testing of Cisco ISR and ASA Firewalls using: IPSEC VPNs, Intrusion Prevention System and Server Load Balancing
  • Ability to perform design and implementation of Apache Server with mod_proxy, mod_security and mod_rewrite on Linux
  • A detailed understanding of the Linux Operating system; preferably Redhat/CentOS
  • Design and implementation of Transfer Gateways to a level commensurate with Common Criteria EAL4
  • Ability to design Security Enforcing Functions within and on top of the Redhat Operating System
  • Ability to write and modify security test scripts based on Common Criteria Protection Profiles and Security Targets
  • Ability to execute and document the outcomes of the tests scripts
  • Produce documentation for the Security Enforcing Functions to be included in the Security Certification documentation and Security Target
107

Global Security Consultant Resume Examples & Samples

  • Depth of knowledge in the core security domain: Data and Application Services
  • Basic understanding of risk and compliance issues (ISO 27001, SSAE 16, COBIT)
  • At least 3 years experience in working on projects related to the core security domain: Data and Application Services
  • Readiness to travel 75% travel annually, including international travel
  • At least 3 years experience in management consulting and systems integration
  • At least 5 years experience in working on projects related to the core security domain: Data and Application Services
  • At least 3 years experience in working across diverse teams to facilitate solutions
108

Security Consultant Resume Examples & Samples

  • Identify security issues and risks, and develop mitigation plans
  • Interpret security policies and procedures
  • Participate in ecurity compliance efforts Develop and deliver training materials and perform general security awareness and
  • Specific security technology training
  • Evangelize security within Company and be an advocate for customer trust manager etc
  • Penetration testing, product security assessment & validation
  • Ethical hacking
  • Self motivated and willing to "do what it takes" to get the job done
  • Demonstrate a logical and structured approach to time management and task prioritisation. Work within project timelines and budgets
  • Work independently and/or within a team as the work requires. Participate in team activities and team planning with the aim of improving team skills, awareness and quality of work
  • Security Test plan preparation and specification for various product lines
  • Execute security test plan and identify security loop holes in product
  • Ethical hacking into products
  • Analytic ability to find issues
109

Principal Security Consultant Resume Examples & Samples

  • Assist in the hands-on implementation of Symantec solutions
  • Provide Symantec subject matter expertise and thought leadership as an extended member of a customer team
  • Provide guidance, recommendations, best practices, etc. for Symantec solution operations
  • Stabilize and optimize Symantec solution system performance, including rules and reports
  • Assist with Symantec solution component upgrades, installs, testing and configuration
  • Liaise with Symantec Support, Engineering, Product Management, and others within Symantec on behalf of the customer
  • Provide single point of contact and hands-on escalation and remediation for critical issues
  • Respond rapidly to unplanned events, including after hours for Severity 1 issues
  • Proactively communicate relevant technical information and alerts on known issues, hot fixes, new releases, etc
  • Communicate professionally and effectively at all organizational levels
  • Keep the Account Team informed of major issues or new opportunities
  • Travel may be required to remote sites on an as-needed basis
  • 3+ years of experience administering, supporting, or consulting on security technologies in a large enterprise customer environment
  • 3+ years of experience administering, supporting, or consulting on Linux -based technologies in a large enterprise customer environment
  • 3+ years of experience writing and maintaining automation scripts (PowerShell, BASH, VBScript, Perl, AWK, Python, etc.)
  • Working knowledge of operating system platforms, network protocols, and security architecture
  • Working knowledge of Microsoft SQL
  • Linux variants: RHEL, CentOS
  • Scripting technologies: BASH, Python, AWK, PowerShell, VBScript
110

Security Consultant Resume Examples & Samples

  • Experience of working within the banking / financial sector with good understanding of regulatory requirements
  • Experience of working on a variety of platforms or Windows
  • Able to work independently or as part of a team
  • CISSP qualification or similar
  • Understanding of security procedures [eg. ISO 270001]
  • Experience of working with Microsoft packages
  • Working with both Internal and External Audit functions
111

Security Consultant Resume Examples & Samples

  • Help clients understand key security and privacy issues and develops programs to meet business needs
  • Use workshops and assessments to help client understand security and privacy issues, risks, exposures, and vulnerabilities
  • Architect secure solutions to address specific security and privacy requirements. Acronyms/Abbreviations/Alternate Spellings
  • At least 5years experience in Cybersecurity and Privacy
  • At least 5 years understanding Security and Privacy issues and developing programs to meet business needs
  • Experience using workshops and assessments to help client understand issues, risks, exposures and vulnerabilities
  • Experience architecting secure solutions to address specific security and privacy requirements
112

Security Consultant Resume Examples & Samples

  • Experience with ADMe, IT and PM
  • Excellent collaborator and communicator
  • Ability to follow processes
  • At least 2 years of previous similar experience
113

Security Consultant Resume Examples & Samples

  • To identify published vulnerabilities and perform reviews and assess risks of security vulnerabilities relevant to the infrastructure, operating platforms, networks, and applications
  • Work closely with system owners or representatives and technical staff to communicate security vulnerabilities, drive and track the security remediation progress
  • Capture requirements and provide high quality technical consultation. Engaged in client meetings to discuss technical aspects of the project and make recommendations to enhance the solution
  • To operate and manage vulnerability management toolkit to detect vulnerabilities and security risks across the IT assets
114

Women Peace & Security Consultant Resume Examples & Samples

  • In-depth knowledge on development and humanitarian issues
  • Capable of working in a high pressure work environment with frequent urgent deadlines
  • Ability to handle confidential and politically sensitive issues in a responsible and mature manner
  • High level logical and methodical organisational skills
  • Ability to lead strategic planning, results-based management and reporting
  • Excellent grasp of substantive women, peace and security issues both from a programming and a policy point of view
  • Demonstrable programmatic experience in women, peace and security issues in Arab States and Asia Pacific in relation to persistent and emerging thematic issues including conflict prevention and the promotion of a culture of peace and tolerance
  • Experience on supporting peace processes and peacebuilding efforts, particularly in the context of Arab States and Asia Pacific from a gender perspective is an asset
  • Experience coordinating processes involving UN Entities, Civil Society, and Member States
  • Fluency in English, and Arabic language is an advantage
  • Duly accomplished Letter of Confirmation of Interest and Availabilityusing the template provided by UNDP
  • Personal CV or P11, indicating all past experience from similar projects, as well as the contact details (email and telephone number) of the Candidate and at least three (3) professional references
  • Sample piece of work that demonstrates ability to conduct and draft research focusing on policy options, and quality of work
  • Financial Proposal that indicates the all-inclusive fixed total contract price, supported by a breakdown of costs, as per the table given in section D. template provided
  • Master’s Degree or equivalent in Development Studies, Public Administration, International Affairs, Economics, Political Sciences, Social Sciences or related field (as per mentioned above) Mandatory submission of CV or UNDP Personal History form (P11)
  • Brief description of why he/she considers him/herself as the most suitable for the assignment
  • Competences and qualifications based on the UNDP P11 form submitted by each candidate
  • Master’s Degree or equivalent in Development Studies, Public Administration, International Affairs, Economics, Political Sciences, Social Sciences or related field. 10%
  • At least 5 years of relevant work experience in International Development and gender programmes; 20%
  • At least 3 years experience working on women peace and security projects in Asia pacific and the Arab regions; 30%
  • At least 3 years experience in leading and coordinating researches and writing reports and policy papers; 20%
  • Highly familiar with the gender work across the UN agencies is strong advantage; 10%
  • Experience or in depth understanding of the women status in the Arab Region as well as Asia Pacific region. 10%
115

Security Consultant Resume Examples & Samples

  • Work as part of a local and national security consulting team on a diverse range of projects
  • Provide specialist electronic and physical security systems design and advice to existing and new clients across all market sectors
  • Actively assist with growth of the security team by positively engaging with new and existing clients
  • Manage time and cost control to ensure projects are delivered within budget
116

Cyber Security Consultant Resume Examples & Samples

  • Have an interest in developing organisations’ security and protecting their business
  • Be energised by the opportunity to work flexibly to deliver innovative security solutions utilising a range of capabilities
  • Be able to work effectively both individually and as part of a team
  • Have good communication skills (written and verbal) allowing them to communicate with both technical and non-technical audiences from the plant floor up to the boardroom
  • Have strong interpersonal and stakeholder management skills
  • Be able to demonstrate industrial control systems (PLC, HMI, SCADA & DCS) experience, both hands on and from a design perspective
  • Have a good knowledge of networking gained in a hands on environment
  • Ideally have knowledge of multiple operating systems including Windows and Linux/UNIX and have hands on experience of carrying out at least basic system administrator functions
  • Ideally have experience with one or more security practices and technologies such as risk or vulnerability assessments, antivirus software, firewalls, intrusion detection systems, centralised alert logging and monitoring etc
  • Ideally have experience and skills in safety-related control systems, including a working knowledge of IEC 61508 and IEC 61511 Functional Safety Standards
  • Ideally have a working knowledge of any of the following: IEC 62443/ISA 99, NIST SP 800-82, CPNI Secure ICS Guidance
  • Be expected to support client security assurance assignments, to expected quality and within commercial and security constraints
  • Contribute to the development of effective approaches to meet client needs, calling for originality and ingenuity in devising recommendations
  • Contribute a broad range of ICS and security skills, including hands on configuration and troubleshooting
  • Communicate security concepts to key clients and stakeholders developing their understanding of the value of, and enhancing the reputation of, Atkins Cybersecurity Consultancy Services, and
  • Take an active role in the improvement, growth and development of Atkins' Cybersecurity Consultancy Services
  • A consultant, project manager or ICS system engineer willing to take on challenges and to contribute towards the success and growth of the business
  • Passionate about delivering excellent service to client stakeholders through building and developing relationships
  • Comfortable with delivering under pressure
  • An individual who does not accept things at face value but is analytical with demonstrable problem-solving skills
  • A strong and diplomatic communicator, both in terms of verbal and written interactions
  • Collaborative within client or home business groups and adaptable to take on a team player or team lead role
  • Able to work on site at customer locations for significant periods of time (probably over 50%), primarily in the UK but potentially overseas
117

Senior Cyber Security Consultant Resume Examples & Samples

  • Provide pragmatic security advice and guidance for clients in ‘business as usual’, technical refresh and new project environments that balances business benefit with security requirements
  • Identify and establish good security governance to meet client business requirements and risk appetite and cascading this across the business through clear communication, training and ongoing support
  • Perform compliance activity on client systems and business processes to assess the levels of security control and identify gaps to address
  • Work in partnership with clients to implement security controls in pragmatic ways that deliver investment value and support business operations
  • Build successful working relationships with team members, key customers and stakeholders that improves the value of the security services being performed
118

Senior Security Consultant Resume Examples & Samples

  • Be involved in working directly with industry teams and leaders throughout Public Sector to implement security solutions for network infrastructure and Security Operation Centers (SOC)
  • You will work with security practitioners, architects, infrastructure engineers, applications developers, business partners & other stakeholders to design and deploy appropriate security solutions for IT infrastructure protection and SOC operation
  • Analyze technology industry & market trends to identify key partners and develop go-to-market approaches for infrastructure security solutions
  • Contribute to the technical direction. Function as a key contributor for pre-sales activities for infrastructure security and SOC related business opportunities
  • Support business captures and proposal writing
  • Experience with Resilient System is highly desired
119

IoT Security Consultant Resume Examples & Samples

  • Be involved in working directly with industry teams and leaders throughout Public Sector to market and implement security solutions for Internet of Things (IoT) systems
  • You will work with security practitioners, architects, infrastructure engineers, applications developers, business partners & other stakeholders to design and deploy appropriate IoT security solutions for different vertical markets
  • Analyze technology industry & market trends to identify key partners and develop go-to-market approaches for IoT security solutions
  • Function as a key contributor for pre-sales activities for IoT business opportunities
  • Support business captures and proposal writing. Lead solution engineering and project delivery to customers
  • Creating security concepts and demonstrations around connected devices to protect against relevant attacks
  • Leading technical conversations with partners to establish and maintain valuable relationships
  • Translate business issues/opportunities into technical solution/business requirements in collaboration with the business development and product management teams
  • Integrate market available solutions to develop effective solution packages for different use cases and vertical markets
  • Understand Critical Infrastructure Protection needs, design and implement effective security solutions
  • Planning and building proof of concepts and demonstrations for specific solutions
  • Participate and lead discussions dealing with ideas, architectures, specifications, requirements, testing and design reviews
  • Digital Rights Management and Device Identity Management
120

Biometrics Security Consultant Resume Examples & Samples

  • Be involved in working directly with industry teams and leaders throughout Public Sector to develop solutions supporting biometrics and identity management
  • Will work with security practitioners, architects, infrastructure engineers, applications developers, business partners & other stakeholders to develop innovative biometrics and identity solutions for the most complex environments
  • Analyze technology industry & market trends to identify key partners and develop go-to-market approaches for biometrics and identity solutions
  • Contribute to the technical direction on all areas of biometrics or identity for large complex system integration projects as well as be a key contributor for pre-sales activities for biometrics and identity management
  • Will require deep experience implementing biometrics technologies in the areas of physical security, border management, law enforcement, or identity and access control
  • Developing and deploying biometric capture and/or identification systems
  • Developing large-scale highly transactional systems
  • Developing complex data models
  • Leading complex enterprise implementation teams
  • Leading/Supporting pre-sales solution architecture
  • Designing and writing solutions for pre-sales/proposals
  • Deep Knowledge of Biometrics and Identity Management
  • Excellent organizational, writing and interpersonal skills
  • 7+ years of biometrics experience with subject matter expertise in designing identification systems
  • At least 6 years of Java/C#/.NET/C++/C software development
  • At least 5 years’ experience with Oracle/DB2/SQL Server
  • At least 5 years’ experience designing enterprise HW solutions (Servers, Blades, SAN, Load Balancers, etc)
  • At least 3 years’ experience with JMS (WebSphere MQ, TIBCO EMS, Oracle AQ, etc)
  • College degree in Mathematics, Statistics, Computer Science, Information Science or Engineering
  • Security clearance of Clearable to DoD Secret
  • Active Secret Security Clearance
  • At least 5 years experience with large-scale biometric identification systems (Morpho, NEC, Cogent)
  • At least 2 years experience with implementing biometric capture devices (fingerprint scanners, iris cameras, facial capture)
  • At least 2 years experience with scripting (Vbs, Ksh, Csh, Bash, Batch, Powershell)
  • At least 2 years experience with Cloud Computing architectures (AWS, Azure, OpenStack)
  • Skilled at leveraging new and existing software and technology within the security domain
  • In-depth knowledge in security trends; proficient in new and emerging technologies
  • Strong leadership, coaching and mentoring skills
121

Security Consultant Resume Examples & Samples

  • Help clients develop identity and access management (IAM) strategy and architecture to meet business needs
  • Lead design and deployment of identity and access management solutions to address specific security and privacy requirements for specific customer accounts
  • Research IAM technologies and industry trends
  • Author whitepapers, RFI responses, and proposals
  • Present in industry events to communicate solution capabilities and service offerings
  • At least 5 years of hands-on experience in architecting, implementing, and maintaining IAM solutions (IBM, Oracle, Ping Federal, or others)
  • At least 8 years overall information security engineering experience
  • In-depth knowledge and experience in Active Directory and other LDAP systems
  • In-depth knowledge and experience in PKI certificates and multi-factor authentication solutions, including PIV, CAC, etc
  • In-depth knowledge and experience in privileged access management
  • Hands-on experience in implementing application SSO
  • Experience with FICAM
  • Experience with implementing and maintaining Insider Threat defense solutions
122

Blockchain Security Consultant Resume Examples & Samples

  • Be involved in working directly with industry teams and leaders throughout Public Sector to market and implement Blockchain based security solutions
  • You will work with IBM Research, security practitioners, architects, business partners & other stakeholders to identify appropriate blockchain security use cases, design and develop blockchain security solutions for different vertical markets
  • Analyze technology industry & market trends to identify key partners and develop go-to- market approaches for blockchain security solutions
  • Contribute to the technical direction
  • Function as a key contributor for pre-sales activities for blockchain business opportunities. Support business captures and proposal writing
123

Privacy & Security Consultant Resume Examples & Samples

  • Previous experience in the area of information security
  • Knowledge of Information Security good practices
  • Ability to manage own workload
  • (IT) Audit experience is a plus
  • ITIL knowledge is a plus
  • Information security certifications would be considered a plus
  • Strong experience in the area of information security
  • (IT) Audit experience
  • Information security certifications
124

Senior Security Consultant Resume Examples & Samples

  • 1) Depth of knowledge in two or more of the core security domains: SSRC/GRC, IAM, SOC Operations, Application and Data, or Infrastructure Endpoint and Mobile Security
  • 4) Experience in data exfiltration techniques and detection and response tools and strategies
  • 5) Strong experience in Threat Modeling of complex security systems
  • 6) Experience in delivering comprehensive architecture specifications for complex security ​solutions
  • 8) Demonstrable knowledge of security best practices, principles and frameworks (OWASP, SANS, NIST, ISO etc.) with a proven experience in applying those to the management of threats, vulnerabilities and risks
  • 10) Provide technical thought leadership in overall security solutions development
  • 16) Continuously update the skills and knowledge to keep up with the changing market landscape and customer needs
  • Strong knowledge of security architectures and technologies including assessment, methodologies, compliance standards etc
  • Solid knowledge of security standards and compliance like PCI, HIPAA, Sarbanes Oxley, ISO 27001, NIST, CSF, COBIT, ITIL, SANS 20
  • Solid working knowledge of vendor programs and partner eco-system
  • Strong knowledge of cloud architecture and its security concerns
  • Solid knowledge of solutions from vendors like Cisco, Palo Alto, IBM, Fire Eye, Splunk, F5, RSA, Imperva, Vormetric, Safe Net, Symantec, Websense, CyberArk, Arbor, Varonis, Bit9, Sophos, SecureAuth MobileIron, ForeScout, LogRhythm, CloudPassage, NetSkope, Elastica, Skyhigh Networks, et al
  • Ability to sell both internally and externally to account managers, sales leadership and our customers
  • Strong People Management skills, Conflict management & resolution skills, negotiations skills
125

Software Security Consultant Resume Examples & Samples

  • You will help to ensure that the product meets security level required for successful market introduction
  • You will work closely with development teams to assist them in implementing secure software
  • You will come up with new and innovative solutions to meet today’s and future security challenges of secure operation of standard software on enterprise scale
  • University degree (Bachelor or Master) in computer science, physics, mathematics, economy, law or comparable
  • Customer orientation with a strong focus on quality
  • Willingness to continuously learn
  • Knowledge of security technology and security processes is an advantage
  • Database knowledge is an advantage
  • Knowledge of SAP environment and SAP development processes is an advantage
  • 1+ years work experience
126

Cyber Security Consultant Resume Examples & Samples

  • Demonstrate a thorough knowledge and understanding of vulnerabilities and threats
  • Threat and risk assessments followed up with mitigation options
  • Strategic planning for organisations
  • Develop network system architecture and design
  • Security mitigations for databases and applications
  • Auditing, site acceptance testing and compliance
  • Apply techniques for penetration testing and system hardening
  • Demonstrated ability to work in a close team; and
  • Ability to develop and coach team members’ skills in Cyber Security Consulting
127

Cyber Security Consultant Resume Examples & Samples

  • Offer second tier support for issues arising from the use of enterprise standard applications such as Microsoft Office and Project
  • Create the documentation necessary to distribute applications to the desktop and server platforms
  • Provide ongoing technical advice, assistance, and training to fellow associates and to customers
  • Background/Experience with one of the following
  • E-discovery
  • Corporate security breaches
  • Network intrusions
  • Unauthorized access or use of systems
  • Intellectual property theft
  • Threats and harassment
  • Possess two or more of the following certifications which demonstrates an objective measure of competence and a globally recognized standard of achievement in information systems security and computer forensics
  • EnCE
  • GCFA
  • GCIH
  • Other Security certifications will be considered
  • A successful candidate will have
  • In depth knowledge and expertise on a vast array of hardware and software platforms including but not limited to
  • Windows XP, Windows 7, 8, Mac OS X, Linux
  • Windows Server 2003, Windows 2008, Citrix
  • Domino, Exchange
  • IDS/IPS systems
  • Spam and Web Filter appliances
  • Strong understanding of file systems including: FAT, NTFS, EXT2/3, and HFS+
  • Ability to extract, analyze, and correlate data from multiple disparate systems and present an accurate representation of the facts related to an incident
  • Strong oral and written skills to effectively communicate with attorneys, management, law enforcement, and other Humana employees
  • Solid working knowledge of computer-related law
  • Strong working knowledge and skills in the following
  • Memory forensics
  • Mobile device forensics
  • E-Discovery
  • Data Recovery
  • Strong scripting / programming skills
128

Firewall Security Consultant Resume Examples & Samples

  • Some understanding of all firewall types
  • Some knowledge of the TCP/IP, networking protocols and Network Security
  • Some working knowledge of firewall and non-firewall routing and switching technologies
  • Some level of experience of Skybox with the ability to become an SME
  • Knowledge of well known ports and protocols and associated vulnerabilities. Able to communicate how these protocols should traverse a firewall and communicate the risks and vulnerabilities clearly to network engineers and project managers
  • Competent in discussing IT security technology solutions with engineers and senior stakeholders in other capability units
  • Can challenge Technical designs and the use of port, protocols and applications
  • Some knowledge of appropriate Principles, Practices and Standards that support
  • Knowledge of preferred risk assessment methodologies
  • Professional qualifications (CISSP, CISM, CISA, etc)
  • Experience of working in a wider business context, probably with exposure to other organisations
  • Can engage with Program/Project & Network Project Managers
  • Understand relationship between information security and business objectives and able communicate and clearly present security requirements to business users and management and projects
  • Demonstrates a good end to end understanding of the business/IT processes for the organisation area and relationships
  • Knows what information should be communicated, when, and to whom. Must be able to communicate difficult decisions in a clear and consistent manner to engineers and project managers
  • Identify the potential impact of changes on the business and suggest workarounds and alternative solutions. When a firewall request cannot be approved be able to apply experience and knowledge to suggest alternative methods for implementation that offer the same solution but do not pose risks to the business
129

Principal Security Consultant Resume Examples & Samples

  • Provide leadership to the organizations penetration testing team
  • Oversee projects to ensure expectations, timelines, and budgets are being met
  • Participate in proposal development for commercial penetration testing opportunities
  • Provide technical expertise and remain current on technology trends in the marketplace
  • Develop testing scripts and procedures
  • Develop Penetration Testing Reports that are compliant with FedRAMP and DoD requirements. Report components include the results of all testing, showing how each attack vector was tested and where vulnerabilities are discovered, providing detailed recommendations on how to remediate each vulnerability
  • Perform or direct the following types of penetration testing:, Corporate network to Cloud system (Insider Threat), External to Cloud system (Web Application and Network attacks), Tenant to Tenant, Spear Phishing E-mail campaigns, Physical attack vectors when applicable for data center locations, Privilege escalation (Web Application and Network attacks), Mobile application vulnerability discovery
  • Assist in the assessment of FedRAMP security controls when not engaged on penetration testing activities
  • Provide review and analysis on vulnerability scan results from tools such as Nessus, Qualys, AppDetective, WebInspect, IBM AppScan, Burp Suite, etc
  • Provide training on vulnerability scanning tools to other team members
  • Bachelors or Masters degree in Information Technology, Computer Science or relevant discipline, or relevant work experience
  • 5 or more in a technical role, with at least 2 years in a Technical management role aligned with the related responsibilities
  • Should be familiar and proficient in at least two programming or scripting languages such as Java, C#/C++, python, perl and PHP
  • Ability to conduct penetration testing activities on networks, web applications, mobile applications, and API based systems
  • Broad based IT background with a technical understanding of networks, protocols, security configurations, cryptography, identity and access management, and the systems development life cycle
  • Demonstrated skills in the entire Microsoft desktop suite (Word, Excel, Power Point, etc.)
  • Serve as mentor to penetration testing employees and contractors on best practices
130

Applications Security Consultant Resume Examples & Samples

  • Create and maintain security reports as needed for Board of Accounts and the auditor to insure compliance
  • Prepare and conducts system security audits
  • Test and debugs new and existing application software security rolls, permission lists and workflow
  • Monitor and maintain System Security for all PeopleSoft users which includes over 180 agencies plus external Bidders
  • Maintenance on user roles within PeopleSoft Financials – set up new employees, transfers, add/remove responsibilities. Will need to verify required training for role and verify there are no conflicts in user roles
  • Reset passwords for Bidder contacts. Work with vendors and bidders to restore system login access
  • Reassignments of workflow on requisitions due to agency approver’s absence. Will need to understand how to set up a basic profile in PeopleSoft Financials
  • Restore lost login access for an active employee by verifying job records and updating statuses accordingly
  • Modifications of agency workflow in PeopleSoft Financials. Adding new levels or approvers to workflow by changing the Approval Process Setup for the agency. Creating and running ad-hoc reports and queries
  • May function as Team and/or Project lead responsible for completion of project phase
  • Monitor application security to ensure proper execution and performance
  • Prepare detailed specifications from which application software may be written
  • PeopleSoft Financials (Intermediate) – 5 years
  • PeopleSoft Security (Intermediate) – 5 years
  • Windows PC (Intermediate) – 3 years
  • Oracle Systems Tools (Beginner) – 2 years
  • MS Office (Intermediate)
  • MS Excel (Intermediate) – 2 years
131

Security Consultant Cyberark Resume Examples & Samples

  • CyberArk integration with Microsoft Active Directory and Linux/Unix systems
  • Conduct strategic and tactical engineering focused on CyberArk software configuration, administration, policy settings, and application maintenance
  • Develop Security Plans, Security Assessment Plans, Security Assessment Reports, and executive level briefings
  • 4+ years of Computer and Information Systems experience required for salary grade E03
  • 6+ years of Computer and Information Systems experience required for salary grade E04
  • 3 years of experience in Cybersecurity and related technologies, including at least 1 year with CyberArk or similar privileged identity management (PIM) solutions
  • Technical understanding in the following areas: network communication usi.ng TCP/IP protocols, system administration, understanding of malware (malware communication, installation, malware types), knowledge of computer network defense operations (web/email proxy, firewall, IDS/IPS, router/switch)
  • Ability to script in Python or Perl
  • Willing and able to travel up to 25%
  • Willingness to provide on-call and off-hours support as a backup resource
  • Personality traits: Naturally curious and inquisitive nature; persistent and determined; loves solving problems and puzzles; analytically rigorous; uncompromising integrity
132

Security Consultant Resume Examples & Samples

  • Enabling sales of Cybersecurity services and solutions across an industry subsectors, security solution or region
  • Promote Capgemini in the market
  • Target prospective clients for Cybersecurity
  • Lead presentations to clients and prospective clients
  • Bridging gap in knowledge between Sales / account exec / SDM’s and the security questions / challenges of the client. Opening up the spotted opportunities
  • Build relationships with clients and IT Services Eco-system partners
  • Promoting the Capgemini brand and Capgemini Cyber Security
  • Emphasize new logo acquisition and demand generation
  • Driving account management security sales aspects
  • Advise the Head of Security Practice Infrastructure Service and bid managers
  • Taking ownership for the design and driving the solutions for new security deals
133

Security Consultant Resume Examples & Samples

  • Experience of building good relationships with stakeholders and analysing multiple solutions and environments to inform service development
  • Experience of contributing to the development of security architecture for new solutions
  • Capable of achieving security screening up to and including HMG Security Cleared
  • A self-starting individual with a strong work ethic capable of planning and managing own time effectively. Ability to perform under pressure and to work using own initiative as well as part of a team
  • Creative problem solving and analysis skills
  • Able to build relationships and network at all levels
  • Relevant professional qualifications including CESG Certified Professional (CCP) IA Architect at Practitioner level or above
  • TOGAF 9.1
  • SABSA
  • Knowledge of CNI and associated risks
  • Existing / established relationships with Ofgem and Industry representatives
  • Good knowledge of Smart Energy Code and DCC Licence Conditions
134

Security Consultant Resume Examples & Samples

  • Leads or participates on teams that perform technology risk assessments, FFIEC and NIST cybersecurity assessments, security program governance, and security assessment and testing services. Each engagement will result in deliverables and reports specific to the client engagement
  • Serves as an outsourced chief information security officer for clients and assists them in developing their information security program including policy development, security awareness training, vendor management and cyber security consultation
  • Assist in ongoing research and development, review and improvement of cybersecurity services and deliverables
  • Understand and provide product management and support for security assessment tools and technologies
  • Stays abreast of current cyber security trends and threats to ensure that solutions provided to clients are applicable. Mentor other team members on subject matter expertise
  • Participate actively in firm sponsored events for clients and prospects
  • Demonstrable hands on experience with IT risk management, cybersecurity assessment, security program governance, and security testing services
  • Demonstration of security knowledge through attainment of industry security certifications such as CISSP, CRISC, CISM, CISA, certifications desired
  • Experience working with regulatory frameworks including NIST and FFIEC
135

Lead Security Consultant GIS Africa Resume Examples & Samples

  • Determine which projects will require security engagement
  • Define explicit security deliverables to the project during early engagement
  • Undertake and facilitate risk and vulnerability assessments/workshops covering the more complex design solutions during various development phases to ensure technical vulnerabilities are identified and correctly managed, proposing solutions as required
  • Build an effective network of relationships with senior Barclays technology partners globally to ensure trust and credibility of team is developed
  • Provide technical advice, guidance, mentoring and support to the security consultants
  • Lead due diligence activities in relation to 3rd parties and partner organisations, including the identification of security controls and assessing their effectiveness
  • Undertake assessments of the Tech Office’s BAU environments and work with Tech Offices on articulating risk and remediation plans
  • Provide regular MI to senior management throughout the regular reporting cycles
136

Security Consultant Resume Examples & Samples

  • Demonstrable understanding and articulation of the various Security services and supporting infrastructure that the SIOPS team is responsible for
  • Project and Operational support and knowledge of any interdepartmental dependencies or processes required for
  • Rapid trouble resolution
  • Trouble analysis and repair
  • Upgrades and enhancements
  • Preventative maintenance routines
  • Identify and analyze the root causes of performance breakdowns and recommend solutions
  • Proactive performance analysis and repair required to eliminate the root causes of network failures
  • Pursue network availability through continuous improvement
  • LI-DS1
137

Security Consultant Resume Examples & Samples

  • Administer and support TELUS Managed security information and event management (SIEM) solution, including log collection platform and event correlation rule development
  • Advanced content development for the creation of use cases, including Active Channels, Rules, Filters, Trends, Dashboards, Alerts and Reports
  • Provide investigative assistance such as log evidence collection and report generation
  • Maintain the SIEM components (Collectors, Loggers/Log Managers, DB, ESM/Event management)
  • Create system performance metrics and trending for capacity planning
  • Meet availability and update requirements
  • Adhere to enterprise change management procedures
  • Maintain documentation for all systems and create user guides
  • Asset modeling provisioning
  • Provide Tier 3 customer support
  • Establish and maintain a close working relationship with TELUS Managed customers, as well as, with TELUS supporting team such as: Tier 1/Service Desk, Tier 2, SOC to ensure delivery of service
138

Security Consultant Resume Examples & Samples

  • 1) Experience with Security Implementation and the understanding of of how data works within privacy and encryption
  • 2) Experience advising business owners on best security practices and assisting in the successful integration of security with all business partners. This will include identifying the business requirements, creating a plan, and implementing that plan to create security awareness in a specific line of business
  • 3) Experience consulting the business for IT compliance, risk assessment and mitigation within an enterprise environment
  • Perform as the Information Security subject matter expert for business and IT projects, with the ability to translate security risks and controls to both technical and non-technical departments
  • Perform analysis of Cloud based projects and help IT develop secure implementation or transition procedures
  • Perform implementation duties for information security projects
  • Work with the business and IT to improve on securing current and new technology solutions
  • Responsibility for supporting and securing multiple applications in a global enterprise
  • Driving continuous Information Security improvement globally
  • Must have a minimum of 8 years working experience in IT with at least 4 of those years focused on information security
  • Experience with cloud security and securing cloud based migrations
  • Must have sound working knowledge of all areas of IT, including Identity and Access Management, networking, malware defense, threat intelligence, cryptographic controls, and incident response
  • Knowledge of network infrastructures including firewalls, VPN's, Intrusion Detection Systems, vulnerability assessment strategies, web application and device hardening
  • Must have excellent customer service skills and experience in a professional environment
  • IT project management experience preferred
  • Must have strong English verbal and written communication skills
  • Experience with compliance-related concerns across multiple geographies (SOX, FDA, EMA, HIPAA, etc.) in a global enterprise environment is recommended
139

Sap-grc Security Consultant Resume Examples & Samples

  • Configure security in SAP GRC to meet unique client security requirements
  • Assume responsibility for small components of engagements. May have greater role on small engagements
  • Contribute to engagement planning and ensuring that deliverables meet contract and work plan objectives
  • Deliver services that meet Accenture Project Manager Specifications
  • Recognize and communicate opportunities to sell "add-on" work to client
  • Strong understanding of information security management principles, SAP application security implementation methodologies, role based access controls, distributed systems administration, and distributed system recovery
  • Demonstrate experience 1) independently completing complex security related tasks; 2) making major contributions in assuring deliverables meet contract and work plan objectives and; 3) taking on tasks of increased complexity
  • Ability to independently create written deliverables and to participate in presentations
  • Minimum 2 year experience of GRC-Access Control v10 implementation skills and core SAP security design, analysis, configuration, compliance, and implementation (multiple projects is a plus)
  • Minimum 2 year experience with SAP Security Basics, SAP Authorization Concept, Roles/Activity Groups, and User Administration
  • Minimum 2 year experience with role based access controls, distributed systems administration, and distributed system recovery
  • Minimum 2 year experience with SOD conflict resolution
  • Minimum 2 year experience in SAP v4.6, ECC 5.0/6.0 environments
  • Minimum 2 year experience creating technical documentation
  • Minimum Bachelor's Degree
140

Security Consultant Resume Examples & Samples

  • Assist with IAM strategy, roadmap and vision definition
  • Lead IAM application architecture and technical design
  • Lead IAM work stream, phase, or release of IAM delivery project as functional lead or technical lead
  • Lead IAM plan, analyze, design, build, test, and deploy activities for enterprise and/or customer-facing deployments
  • Build working relationships with IAM vendor product development and engineering teams
  • Experience implementing packaged or custom IAM solutions using MS forefront Identity Manager or MS Azure Premium
  • Knowledge of IAM software vendors, including product capabilities, strategy and road map
141

Palo Alto-firewall Security Consultant Resume Examples & Samples

  • Implementation and integration of the corporate WAN, LAN and server architectures
  • Implementation of network security hardware and software
  • Perform analysis of security logs and events, document threat analysis reports
  • Create custom security policies and application signatures
  • Assist in identification and remediation of web based threats
  • Maintain firewall infrastructure and code upgrades
  • Performing analysis of network security needs that contribute to design, integration, and installation of hardware and software
  • Analyzing, troubleshooting and ability to develop and implement solutions to solve network problems
  • Ability to administer perimeter security systems such as firewalls and intrusion detection systems
  • Bachelor’s Degree (Preferred in Computer Science)
  • Minimum 2 years of Palo Alto and/or Firewall experience & Minimum 3 years of experience in network security design and operations specific to DMZ/perimeter, network segmentation and network administration
  • Minimum 3 years strong working technical knowledge of network security controls relating to IPS systems, SIEM, internet monitoring, vulnerability management, and firewall technologies
  • Strong knowledge of Internet protocols
  • 100% travel required
  • 3 years of network tools experience: element management, automation orchestration, and SEIM tools – Splunk, Panorama, NNMI, vSphere, Riverbed performance tools, Netscout performance tools
  • 3 years Network packet capture and interpretation experience
  • CCSP/CCIE Certification
  • ACE/PCNSE Certification
  • Scripting Experience Perl/VB
  • Juniper NCIE-Sec
  • Proven Ability to work independently and as a team member
  • Good Soft skills with the ability to work within large teams and complex client envirenments
  • Ability to successfully pass a client background screening
142

Digital Identity Security Consultant Resume Examples & Samples

  • Customising Accenture's knowledge assets to support designs that are appropriate for each client
  • Strong design and implementation experience of at least one identity and access management projects using any of the leading IAM vendor products – ForgeRock / Oracle / SailPoint IAM
  • Hands on Development experience using Core Java / J2EE, Groovy, JavaScript
  • Exposure to LDAP, Directory server concepts
  • Familiar with SQL and Database concepts, AWS, Jenkins, SVN
  • Familiar with DevOps methodology and tools
  • Knowledge Web Application security Architecture
  • Exposure to BPMN 2.0
  • Hands-on knowledge on DevOps methodologies and tools like SVN/GIT, Jenkins, JIRA, confluence, various monitoring/alerting tools
  • Release Planning
143

Architecture & Security Consultant Resume Examples & Samples

  • You will have some experience with one or more of the following
  • Experience of enterprise architecture
  • An ability to articulate and clearly communicate complex problems and solutions in a simple, logical and impactful manner
  • Experience eliciting high-level business requirements and creating detailed functional specs and other documentation, such as requirement traceability matrices, work-flow diagrams and use-cases
  • The ability to develop creative and breakthrough solutions
  • Strong interpersonal, team building, organizational and motivational skills
  • An ability to identify the root causes of issues by analyzing patterns and trends
  • An awareness of key methodologies, approaches and market trends in the industry
  • Self-motivating, adaptable, able to prioritize and also able to inspire and motivate others
144

Security Consultant Resume Examples & Samples

  • Minimally a completed technical Bachelor or Master’s degree
  • A minimum of 3 years of experience in Information Security
  • Knowledge of Identity & Access Management, Business Continuity Management, Risk Management of Compliance en/of PCD Security
  • Fluent in Dutch and English, written and verbal
  • Project and/or Consultancy experience is a plus
  • Creative, client focused and you have strong analytical skills
145

Application Security Consultant Resume Examples & Samples

  • Offer consultancy advice and practical assistance on secure software design and application security testing and remediation
  • Work on application security strategies, with special care on digital trust and data security
  • Deliver consultation on assessments, building, testing and deployment of software development factories life cycle
  • Conduct static and dynamic application assessments in order to assure application resilience over time
  • Design software delivery security processes and tools integration
  • Review and define requirements for information security solutions
  • Harness the power of big data analytics in order to improve response and software security remediation
  • Client delivery experience in Software Security Architecture, Risk and/or Privacy, or an industry role with equivalent exposure
  • Understanding of security landscape – Vulnerability Management, sSDLC, API Security, data protection, application security practices, code testing, etc
  • Cloud and DevOps knowledge
146

Database Protection Security Consultant Resume Examples & Samples

  • At least 6 years experience in DB protection and Encryption projects
  • Integration of Vormetric solution for Data-at-rest protection (transparent encryption, application-level encryption and tokenization)
  • Integration of encryption in applications both as SDK and REST API calls
  • Administration and Hardening of Databases, especially NoSQL (Couchbase) and Big Data (Cloudera)
  • Experience with ELK (ElasticSearch, Logstash, Kibana)
  • Design of an encryption stack based on Vormetric
  • Design of its integration both at OS level and application level (SDK, API REST)
  • DB Hardening templates development
147

Application Security Consultant Resume Examples & Samples

  • Capable of securing the application development lifecycle (S-SDLC), as well as other technologies acting as application filters for different purposes (on-line data masking, OWASP protection). Specific knowledge of HP Fortify (SAST, DAST) is required
  • Knowledge in areas such as Security Events Monitoring, End-user Protection, Malware Protection, Identity & Access Management and Network Security
  • Good understanding of frameworks and compliance such as ISO 27001, LOPD, PCI
148

Security Consultant for Financial Services Resume Examples & Samples

  • Deep Technical & Management Profile with Hands-On knowledge of security architecturesExperience in Banking/Insurance industry
  • Experience with common security requirements for web application / web programming and OWASP tools and methodologies
  • Experience with Infrastructure security
  • Experience of complex environments (e.g. multi-hosted, different type of platforms, etc.)
  • Knowledge in Cloud security
  • Thread and vulnerability scanning tools (e.g., Qualys Guard, Nessus, Nexpose, Saint, Retina, Foundstone)
  • Web application vulnerability scanning tools (e.g., IBM AppScan, HP Webinspect, Accunetix, NTO Spider, Burpsuite Pro)
  • Static analysis tools (e.g., IBM Appscan Source, HP Fortify)
  • Industry certifications (CISSP, CISM, CRISC, CCSE, CCSA, JNCIA, JNCIE, CCIE, CCNP, CCNA) is welcome
  • Good understanding of frameworks and compliance such as PSD2, ISO 27001, PCI, HIPAA, SOX, NERC, FISMA, FFIEC and GLBA and others that are required for Security Information and Event Management
  • Full professional proficiency in English and Spanish
149

Security Consultant Resume Examples & Samples

  • Bachelor's Degree in Computer Science or Information Security or a related technical degree
  • Experience with both host-centric and network-centric DLP software and techniques. Symantec experience preferred
  • Knowledge and expertise with IDS/IPS systems
150

Senior Security Consultant Resume Examples & Samples

  • Holds overall technical responsibility for a proposed technical Cisco, Palo Alto and additional security solutions
  • Works with LOB Manager and Managing Solution Architects to forecast resource needs and ensure appropriate staffing levels
  • Demonstrates ability to provide an overall high-level design of technical or service solutions for medium to complex business situations
  • Plays an active role in enhancing current solution concepts or creating new ones. The individual proactively provides experience in practically improving Dimension Data systems, services and operational processes
  • Represents Dimension Data on a business level at client meetings
  • Highly developed technical capability across Cisco ISE solutions, additional experience with Palo Alto, Splunk, Bluecoat, Checkpoint, Mcafee, Fortinet is a plus
  • Ability to map business needs to technology solutions
  • Interpersonal skills with the ability to develop strong client relationships
  • Analytical skills and proven ability to work with a client to understand requirements and define appropriate technical solutions
  • Well-developed consultancy skills and ability to coach junior consultants
  • 30-40% travel
  • Experience working with and deploying Cisco security solutions such as ASA Firewall, ACS, ISE, SourceFire/FirePower and Forescout
  • Excellent working knowledge of, and proficiency in industry standard security technologies (vendors technologies listed under certification requirements) and products: Firewalls, WAFs, IDS/IPS, Proxies
  • Experience in design, configuration and deployment of Palo Alto Firewalls and Panorama security technologies is a plus
  • Experience and understanding of VPN’s such as IPSEC, SSLVPN, DMVPN, etc
  • Working knowledge of networking principles and strong understanding of OSI layers 3-7
  • Experience designing, configuring and deploying SIEM technologies such as Splunk is a plus
  • Good UNIX/Linux skills
  • Experience in configuration and installation, troubleshooting; possess integrated product knowledge; ability to design medium to large systems. Excellent business ability, while maintaining a mix of both business and technical discipline
  • Ability to effectively manage the client relationship and escalate when appropriate
  • Ability to research and obtain new product and technical knowledge
  • Ability to work independently under limited supervision
  • Ability to work in a team environment and willingness to assist and effectively communicate with individuals across the organization
  • Proficiency in translating technical concepts into business solutions and clearly communicating to all levels and technical abilities within client organizations
151

Mobility Security Consultant Resume Examples & Samples

  • Working directly with clients and Accenture teams to design and implement security solutions around mobility and wireless technologies across platforms and vendors
  • Performing requirements analysis and developing mobile strategies for clients
  • Performing vulnerability analysis/assessments of mobile/wireless infrastructure and/or applications
  • Assisting client teams in implementing secure mobility for their existing applications/infrastructure
  • Developing secure mobile apps / mobile web apps and performing security source code review
  • Implementing mobile device management solutions
  • Minimum 3 years experience in IT field with hands-on experience implementing mobile and wireless security technologies (e.g. mobile device management, mobile app / mobile web app security, mobile malware analysis)
  • Minimum 3 years experience hands-on development experience in traditional (e.g. Java, C++, .NET) or mobile (e.g. Objective C for Apple mobile platforms) programming languages
  • Minimum 3 years experience with various mobile platforms (e.g. iOS, Android, Windows Mobile / Phone, RIM BlackBerry) and/or wireless technologies (e.g. cellular, Wi-Fi, Bluetooth, ZigBee, NFC, LMR)
  • Minimum 2 years vulnerability and penetration testing experience against mobile platforms and applications
  • Bachelor's degree (Preferred in Science, Engineering or associated field)
  • Ability to travel up to 100%
  • Expertise with security frameworks and standards such as ISO, SOX, PCI, and NIST
  • Strongly prefer industry-adopted security certification(s) (e.g. Security+, CISSP, CISA, CISM, CEH, CWSP, CWNA)
  • Knowledge of computer networking and standard protocols – TCP/IP
  • Desire to work in an information systems environment
152

Security Consultant Resume Examples & Samples

  • Strong communication skills, both verbal and written, including an ability to clearly communicate with both business and technical stakeholders
  • Ability to work in a fast paced, dynamic, and changing environment while managing multiple projects simultaneously
  • Strong analytical, organizational, process, and problem solving skills
  • High self-initiative; milestone and deadline driven with ability to maintain focus on strategic objectives and understand business need
  • Continuous improvement and desire to innovate
  • PMP (or other PMI certification)
  • Six Sigma / LEAN certification
  • Experience with large, enterprise level security initiatives, projects, or programs
  • Experience with project, program, and project portfolio management, as well as, strategic project alignment lifecycle processes
  • Previous experience with Identity & Access Management (IAM) and/or Data Leakage Protection (DLP) initiatives
153

Principal Security Consultant Resume Examples & Samples

  • Act as single point of contact and a liaison to all SecureWorks teams and groups
  • Ensure effective ownership, communication, coordination, and facilitation of support service activities between the customer and SecureWorks
  • Assisting the client with Security Architecture
  • Continuous support on SIEM d/or MSSP and Tuning
  • Where possible improve and streamline the processes
  • Be a local Subject Matter Expert for all SecureWorks MSS Services
  • Represent all SecureWorks services (including Security & Risk Consulting and Counter Threat Unit) to the client
  • Monthly Service Reporting with the client
  • Serving clients to the highest professional standards
154

Security Consultant IAM Resume Examples & Samples

  • Directory Services o Identity as a Service (IDaaS)
  • Experience implementing packaged or custom IAM solutions, including but not limited to Oracle, IBM, CA, SailPoint, RSA/Aveksa, ForgeRock, Okta, Dell/Quest, PingIdentity, Securonix
  • Experience with custom development or IAM solutions using
  • Java/JEE Development, JSON, SAML, XACML, SCIM CyberArk PAS skills (desired) PVWA – password vault web access, PSM – privilege session manager, PTA – privilege threat analytics, CPM – central policy manager, EPV – enterprise password vault, Understanding of PAM
  • Experience with PAM implementations, process designs
155

Security Consultant Resume Examples & Samples

  • Will be expected to take roles in client project delivery assignments
  • Responsible for commercial management of client assignments
  • Responsible for client relationships during projects
  • Responsible for developing effective approaches to client requirements, calling for originality and ingenuity in devising recommendations
  • Will assist the team lead in business development internal and external to Atkins to further develop the security business
156

Security Consultant Resume Examples & Samples

  • Responsible for maintaining and building relationships with stakeholders to minimise risks to BT
  • Responsible for implementing plans and budgets for monitoring, maintaining and improving the integrity of the organisation's security information processes and systems
  • Responsible for the development and delivery of communication programmes for primarily one IT Security service pan-BT, including the awareness of the cost of security failure and people's personal responsibilities. Implement and measure effectiveness of the IT and/or Network Security programmes, processes, operations and architectural solutions for BT that support the security strategy and policy and takes into account risks and appropriate legal, regulatory constraints
  • Investigate and resolve and where necessary report incidents involving potential or actual breaches of protective security compliance
  • Responsible for delivering the testing and validation of hardware, firmware and software for possible impacts on security
  • Responsible for the implementation of commercially viable security services to generate revenue and retain business
  • Extensive IT and data network experience with a proven track record in security
  • Extensive experience of stakeholder management and influencing skills, at a senior level
  • Excellent leader with a proven track record of building high performing, well motivated teams
157

Security Consultant Resume Examples & Samples

  • Supports the delivery of Accenture's security offerings related to information security, with a focus on data protection programs planning, policies and procedures development, data classification, data privacy, data security assessments, and implementation of programs and solutions Security generalist familiar with security and privacy frameworks, compliance (security and privacy) requirements and security and privacy department planning and operations
  • Uses considerable judgment to determine solution and seeks guidance on complex problems
  • Primary upward interaction is with direct supervisor. May interact with peers and/or management levels at a client and/or within Accentur
  • Minimum of one year DLP, DRM, Data Encryption/Masking experience with at least one of the following vendors - SecureData/Voltage, Vormetric, Informatics, Titus, CipherCloud, Symantec DLP, Websense DSS, RSA DLP, McAfee, Verdasys, and GigaTrust
  • Minimum of one year of data protection or information security technology experience
  • Minimum of one year experience related to at least two of the following: data security and/or risk assessments, data discovery, security and privacy policy development, data protection or security strategy, general IT, data privacy, and security controls development, compliance readiness (i.e PCI, GAPP, SOX, HIPAA, GLBA) or technical security architecture/design
  • Experience assessing or building a data protection program, data classification skills, and understanding of data privacy standards and regulations
  • Exposure to Data Protection solutions and technologies including - Data Loss Prevention (DLP), Data Encryption, Data Masking / Tokenization, Digital Rights Management, Data Classification, and Cloud based Data Protection Solutions
  • A Preference for at least one current recognized technical certification such as Symantec CSP in Data Protection, Certified McAfee Security Specialisit (CMSS - DLP Focus), Websense Data Security Suite (DSS) Professional, Informatica Certified Specialist or Expert, or RSA Certified
  • It is currently our objective to assign our people to work near where they live. However, given the nature of our business and our need to serve our clients our employees must be available to travel when needed
158

Application Security Consultant Resume Examples & Samples

  • Bachelor’s degree and 4+ years of IT security with experience in application security
  • 2+ years of hands on software development experience, or experience with development languages/frameworks
  • Capacity to communicate with Development team and create detailed specifications for technical requirements to drive business needs
  • Domain expertise in designing applications/architectures for enterprise grade applications to secure sensitive data and prevent data leakage
159

Security Consultant Resume Examples & Samples

  • Security committee
  • Control and progress reporting
  • Degree in Security and Risk Management or a related field from a recognized University
  • Minimum of Engineering Degree or formal training in electronic security systems or a related field
  • Minimum of 7 years’ experience of related security position
  • Minimum of 5 years’ experience of Conducting Security Risk Assessments and mitigation plans
  • Minimum of 5 years electronic security systems or security networks from an operational perspective
  • Planning organizational needs including the use of software tools such as Microsoft projects
  • Evaluating security related project plans /Identifying and Defining problems / Mitigating recognized issues before they happen
  • Sound understanding and knowledge of security in crowded places principles
  • Sound understanding and Knowledge of Crime Prevention Through Environmental Design (CPTED)
  • Knowledge of transport related security issues and potential impact to Dubai Metro and Tram
  • Negotiating/arbitrating conflicts
160

Business Security Consultant Cox Business Resume Examples & Samples

  • Forwards ROI assessments to appropriate manager when required
  • Delivers sales presentations to customers and prospects
  • Interacts with Sales Managers and Sales Director with regard to account forecasting
161

Security Consultant Resume Examples & Samples

  • A Bachelor's degree or equivalent experience
  • Six or more years of experience in a dedicated security position
  • Strong communication skills and demonstrated ability to engage with customers at both technical and executive levels
  • Clear and concise written and oral English, including the proven ability to product professional-level documentation
  • Strong problem-solving and security analytics skills; able to identify gaps in processes and recommend improvements for mitigation
  • Strong leadership skills and a proactive approach to customer issues
  • Demonstrated ability to excel in high pressure environments
  • ITIL Foundations training / certification
162

Security Consultant Resume Examples & Samples

  • Security Compliance and Risk Management to include
  • Hold relevant qualifications or certifications relevant to role and customer account CISSP, CLAS, CCP SIRA
  • Maintain awareness and understanding of security information risk management and assurance frameworks/approaches relevant to customer account
  • Conversant with security best practices (including ISO27001 and ISF) and relevant security legislation
163

Security Consultant Resume Examples & Samples

  • Develop a personal business plan to meet sales objectives and goals in assigned territory
  • Responsible for planning, forecasting and monitoring all subcontracting costs and negotiating subcontract agreements as required
  • Maintain customer relationship management system (SalesForce.com)
  • Other duties as assigned
  • One to seven years of sales experience with an understanding of system design and application, pricing, lead generation and time management
  • Proven ability to proactively “hunt” for sales and meet/exceed sales quotas
164

Security Consultant T Resume Examples & Samples

  • Conduct job surveys, specify the type of system required, provide a cost proposal and layout to be used for a basis for the contract
  • Accompany the Installation department to the initial job start to ensure the customer requirements are confirmed and are understood
  • High School Diploma or equivalent required
165

Senior Security Consultant Resume Examples & Samples

  • Ability to consistently and successfully lead engagements from a technical perspective, achieving customer satisfaction goals
  • Excellent verbal, and written communication skills
  • ISACA Control Objectives for Information and related Technology (COBIT)
166

Principal Security Consultant Resume Examples & Samples

  • 10 + years’ experience in IT security, compliance and risk management, including privacy, controls, etc
  • Familiarity with compliance & security standards across the enterprise IT landscape Deep understanding of enterprise risk management methods and techniques to drive successful outcomes in a multi-national environment
  • Demonstrated ability to think strategically about business, product, and technical challenges
  • Strong verbal and written communications skills and ability to lead effectively across organizations
  • Familiarity with compliance & security standards across the enterprise IT landscape
167

Security Consultant Resume Examples & Samples

  • Solution Design and implementation of IBM Identity and Governance solutions
  • Managing delivery of services as per scope specified in Statement of Work, Work with customer teams to control scope creep
  • Provide deep technical expertise to ensure IBM Identity and Governance solutions are deployed and operating to deliver the technical and business results required by the customer
  • To act as trusted client advisor
  • Design and architecture of IBM Security Identity Manager (SIM) and Identity Governance and Intelligence (IGI) environments
  • Expert knowledge of IBM Security Identity Manager
  • Knowledge of Appliance offerings for ISIM, IGI
  • Knowledge of extension points of ISIM solution
  • Advanced skills in Installation, configuration, customization, integration and troubleshooting of IBM Security Identity Manager
  • Knowledge of Identity Governance and Intelligence
  • 5+ years of relevant experience in Identity and Access Management area
  • Advanced knowledge of Security Directory Integrator
  • Installation, Configuration and administration of middleware of IBM DB2, IBM WebSphere Application Server
  • Linux/Unix administration skills
  • Representational State Transfer (REST)interfaces
  • ISIM Advance workflows and Custom Adapter development
  • Java/J2EE programming experience
168

Managing Security Consultant Resume Examples & Samples

  • At least 7 years experience in information security consulting (professional services consulting for end clients)
  • At least 5 years experience in interfacing at multiple levels of client management and building relationships
  • At least 3 years experience in supervising/managing and leading teams to success
  • At least 2 years experience in managing complex projects and using project management skills
  • Working knowledge of Archer GRC
  • Strong knowledge in security industry regulations/standards and compliance frameworks (e.g., ISO 27002, COBIT, PCI DSS, ITIL, etc.)
  • Solid experience in IT controls mapping, Sarbanes-Oxley (SOX) IT general controls (ITGC) testing / re-testing, test validation, and reporting
  • Ability to provide subject matter expertise in designing and enhancing the IT risk/security metrics program
  • At least 10 years experience in information security consulting (professional services consulting for end clients)
  • At least 5 years experience in managing complex projects and using project management skills
  • At least 1 year experience in a role as a senior Information Security Officer or Information Security Advisor
169

Peace & Security Consultant Resume Examples & Samples

  • Strategic Position on National Policies and Plans pertaining to peacebuilding processes
  • Programme development, management and implementation
  • Effective management and accountability of the Women, Peace and Security (WPS) portfolio
  • Creation of strategic partnerships and implementation for timely delivery of results
  • Resource mobilization
  • Develop results oriented work plans, undertake effective monitoring and supervision and providing technical assistance to their implementation and reporting on the project activities
  • Analyse reports from partners for quality control, undertake field missions, analysing key events and changes in context and provide substantive and appropriate advice and briefs and support, sharing experiences/reflections sessions of good practices, and dissemination of lessons learned
  • In collaboration with the M&E Programme Specialist, undertake financial and substantive monitoring and evaluation of the projects, identification of operational and financial problems and development of solutions
  • Organize training required for activities within the thematic areas and related work on gender indicators and gender statistics
  • Build capacity of at least 50 women peace mediators and gender experts in order they influence peace processes in Darfur, Kordofan and the Blue Nile
  • Carry out advocacy events at Federal and state level on women's participation in peace negotiations, targeting especially male champion, Local Administration authorities, traditional, cultural and religious authorities
  • Develop advocacy kit and key messages to enhance women's participation in peace negotiations and dialogues and conduct 40 community based consultations and dialogues with key stakeholders at state and local levels in Darfur
  • Develop and/or adapt manual for training of a critical mass of women mediators, women leaders and Networks on peace dialogues and related peace building processes
  • Organize social mobilization and advocacy events on peacebuilding leveraging of 16 days of activism, IWD, Peace Day, 1325 Open Day, etc
  • Support (in collaboration with Peace and Development Centres at universities) the development of a gender-focused and participatory training curriculum on conflict resolution for CBO/ native administration
  • Support NGOs, including women's organizations to create awareness within communities calling for the truth, justice and reconciliation processes and facilitate gender inclusive community dialogues
  • Strengthen Women Peace networks institutionally to develop strategic plans and women's agendas for engagement in formal and informal peace and recovery processes
  • Provide technical support for the establishment and/or strengthening of women’s networks at the community level to coordinate action on reconciliation and conflict resolution
  • Support exchange and learning tours to link Darfur women peace builders to good practices in other regions or countries and systematically deploy them in peace negotiations including grass root networks
  • Support study tours to countries that have successfully transitioned from conflict to sustainable peace through community-based dialogue processes
  • Support resource mobilization effort for at least 3 proposals on women, peace and security issues for Sudan
  • Demonstrates integrity and fairness by modelling the UN’s values and ethical standards, shows commitment to UN Women’s mission, vision, values and strategic goals of UN Women’s and displays cultural, gender, religion, race, and age sensitivity and adaptability
  • Ability to establish and maintain strategic partnerships with government institutions, donors, civil society partners and other UN agencies. Has proven expertise in resource mobilization and strong negotiation skills
  • Excellent personal and professional communication and presentation skills abilities; Has the ability to establish priorities and to plan, coordinate and monitor the progress of the projects and activities within the area of responsibility and achieve planned results
  • Strong teamwork spirit and interpersonal skills demonstrated by the ability to gain the assistance and cooperation of others in a team endeavour; ability to build trust through operating with transparency and creating an open, positive and enabling environment
  • Ability to work in a multi-cultural, multi-ethnic environment with sensitivity and respect for diversity
  • Sound judgment and decision-making skills, with the ability to make effective timely decisions
  • Results based programme development and management
  • Ability to work under minimal supervision and be proactive and initiative
  • Has the ability to establish priorities and to plan, coordinate and monitor the progress of the projects and activities within the area of responsibility and achieve planned results
  • Sound judgment and decision-making skills, with the ability to make effective timely decisions; Ability to lead effectively, mentoring as well as conflict resolution skills
  • Generate new ideas and approaches for communication and visibility of UN Women
  • At least 5 years’ experience in development work with specific emphasis on women’s equality focusing on women’s peace and security, especially in conflict and post conflict reconstruction, women in peace building
  • Demonstrated hands-on experience in development, monitoring the implementation and the evaluation of development projects and resource mobilization
  • Recognized experience in the field of gender and development
  • Experience in the usage of computers and office software packages, experience in handling of web based management systems
  • Demonstrated hands-on experience in development, monitoring the implementation and the evaluation of development projects and capacity building
170

Application Security Consultant Resume Examples & Samples

  • Working with truly global organisations and the related complexity of their cyber security requirements by delivering innovative world-leading solutions at scale
  • Collaborating with peers worldwide to develop Accenture’s knowledge assets to deliver the best solution for each client
  • Designing pragmatic but effective cyber security defences for our clients
  • Improvingandsupportingapplicationsecuritytool deployments
  • Improvingandmaintainingsecuredevelopmentstandards
  • SupportingVendorSecurityactivitiestoensure3rd‐party softwareanddevelopmentmeetsclientssecuritystandards
  • Providingsecurityrequirementsfortest‐drivendesign
  • Producingmetricsreportingthestateofapplicationsecurity programsandperformanceofdevelopmentteamsagainst requirements
  • Previous full-time work experience in information security management and/or related functions (penetration testing, vulnerability analysis, intrusion detection etc.)
  • Endpoint threat detection & data loss prevention
  • Experience in security engineering and encryption
  • Security Certifications and understanding of current industry best practices are highly desirable
171

Security Consultant Resume Examples & Samples

  • Has achieved some of the following vendor’s certifications: Cisco CCDP/CCDE, Cisco CCNP R/S, Cisco CCNP Data Center, Cisco CCIE R/S, Cisco CCNP Security, Cisco CCIE Security, Cisco CCNA/CCNP Wireless, Palo Alto PCNSE Certified or any Fortinet Security NSE certifications
  • Experience with the following is a plus: Cisco ACI, Cisco SDN, Cisco SD-WAN, Cisco iWAN, Cisco ISE, Riverbed WAN Optimizers, A10 Load Balancers and F5 Load Balancers
  • Minimum of 6-8 years of experience in a related field
  • Ability to provide documented prior success in the role of lead on at least three projects for existing clients or via reference from former clients or employers
172

Security Consultant Resume Examples & Samples

  • Lead large or complex Symantec Consulting Services engagements, including strategy development and solution design, IT, compliance and business process assessments, organizational analysis and design, and business process re-design
  • Recommend Consulting solutions and lead implementation of them as approved
  • May have engagement management responsibilities
  • Identify and resolve engagement issues. Develop and analyze alternative solutions
  • Identify, articulate, and develop follow-on sales opportunities
  • Function as a subject matter expert for business development and presales activities
  • Develop value-added, strategic solutions for service offerings and shares best practices throughout the organization
  • Is a community and thought leader for at least one Center of Excellence. Mentor other community members
  • Contribute to the identification of new Consulting Services offerings
  • Participate in the development and rollout of new offerings
  • Good knowledge of the solutions relevant to our security portfolio: DLP, CSP, Endpoint Protection etc
  • CISSP advantageous
  • Proven ability to lead teams and manage projects
  • Progressive technical and professional services experience in area of expertise
  • Strong demonstrated understanding of principles policies, and industry best practices in area of expertise
  • Ability to work with all levels of management and technical support to further the goals of the engagement
  • Experience working in high-pressure client-environments with aggressive deadlines
173

Security Consultant Resume Examples & Samples

  • Facilitate multidisciplinary working groups to determine security solutions and mitigate risks
  • Assist in the case management and organization of incidents involving alleged or suspected violations of laws and regulations concerning criminal and general investigations and fraud
  • Ensure services in response to criminal financial loss, crimes against persons, sabotage, threats, emergencies, illegal acts and property or environmental crimes
  • Assist in the development and standardization of investigative strategy, based on interviews of personnel / vendors, assists in the documentation of these investigations so criminal and/or civil procedures are facilitated
  • Assist to ensure the asset protection and fraud detection programs and strategies of the organization are effectively implemented and consistently maintained; programs include workplace violence, technical abuse, and organizational integrity, which encompass business and employee conduct, compliance, ethics and privacy
  • Develop training materials and provides on-the-job and classroom instruction to Loss Prevention and other employees
  • Bachelor's degree in an area of study relevant to criminal justice and/or business management/finance
  • Must possess a minimum 3 years of experience in law enforcement and/or experience in retail loss prevention strategies
  • Proficient computer skills including Microsoft Office
174

Senior Cyber Security Consultant Resume Examples & Samples

  • 7 years of IT experience with 2 years of firewall and network architecture experience
  • Experience with network analysis and penetration testing tools as; BackTrack, Metasploit, Rapid 7 Nexpose, NMAP and/or Wireshark
  • Experience with the development of technical design documentation and technical reports is required
  • Excellent oral and written communications, team-oriented work practices, strong data analysis skills, technical problem solving ability, organizational skills, multitasking ability and excellent computer skills
175

Cyber Security Consultant Resume Examples & Samples

  • Contributes as Solution Advisor on security technology prioritization as well as future utilization of security technology and process improvements to the Security team
  • Supports the evaluation and implementation for security products/ services
  • Manages validation and testing of security architecture and design solutions, and produces detailed engineering specifications with recommended vendor technologies
  • Provides management and supports the development, testing and operation of firewalls, intrusion detection systems, enterprise malware systems and software deployment tools
  • Contributes to complex high-security zone architecture analysis and implementations
  • Performs vulnerability assessments, interpreting results and developing recommended plans for issue resolution
  • Provides ongoing monitoring of security threats with recommendations for threat remediation
  • Offers subject matter expertise and guidance to Desktop Support Technicians specific to the endpoint protection technologies as well as malware remediation
  • Routinely provides after-hours on-call support for critical systems and emergency response and support to computer and network incidents
  • Develops, implements and maintains change control and testing processes for modifications or changes to security systems and software
  • Monitors server and endpoint compliance with security patching SLAs reporting on compliance
  • Contributes to information security processes for improvement, documents existing processes, identifies and analyzes gaps and designs new processes, develops process performance measures and plans the transition to a new process
  • Reviews the change control and testing processes for modifications or changes to security systems and software
  • Executes change management tasks in systems projects including communication to key user communities, providing subject matter expertise and providing training and documentation where appropriate
  • Assists with the installation and configuration of relevant network components to ensure timely deployment of hardware and software
  • Works with vendors to address and resolve process issues as needed in a professional manner
  • Develops and deploys end-user practices and documentation for endpoint protection technologies
  • Develop and maintains training in support of the deployment and maintenance of endpoint encryption
  • Maintains data classification policies/standards
176

Security Consultant Resume Examples & Samples

  • Mentors and coaches team members on emerging security technologies
  • Guides stakeholders, ensures alignment with security strategies, roadmap development, and establishes architectures patterns to best practices
  • Collaborate and contribute to the development of Slalom best practices and security knowledge assets
  • Bachelor’s degree in Management of Information Systems (MIS), computer science, computer engineering, or closely related field, or equivalent technical experience
  • 7+ years of information systems experience, of which 5 or more years within information security
  • Expertise should include experience with NIST standards, including the Cybersecurity Framework and SP-800 publications, CoBIT or ISO27000 standards; technical skills including familiarity or direct technical experience with Identity and Access Management or Logical Access Control Systems are a plus
  • Demonstrate experience with AWS and Azure security design patterns and practices
  • Designing and implementing new technology proof of concepts
  • Strong understanding of DevOps principles, Identify and Access Management, and threat modeling (infrastructure and applications)
  • CISSP, CISA, CISM, and other security certifications preferred
  • Strong written, verbal, and presentation skills required
  • Must be a flexible self-starter with an entrepreneurial spirit
177

Pre-sales Security Consultant Resume Examples & Samples

  • Provide Security Pre Sales support to the “Deal Pursuit Team” within Sopra Steria
  • Provide security advice and direction and write the Security response documentation as part of the Sopra Steria major bids process
  • Respond to all PreSales Leads which include or may potentially include Security activities
  • Complete a Proposal which can be underwritten by the Security Service Line
  • Scope of responsibility includes all public and private sector bids
  • Responsible for pre-underwriting all bids before presenting to the Head of Pre-sales
  • Technical liaison for security related projects
  • Ensure Sopra Steria resources estimated to support the risk management activities in the Forecast section of the Forward Planner
  • Transition of resource estimates in line with Proposal to the Kevin Security sheet of the Forward Planner
  • Maintain Inventory of all Sales Documentation by client in the SSL/Business Development
  • Record all Answers and Feedback on all Bids
  • Maintain all Bid Collateral
  • Ability to work on multiple and/or jump from one project to another
  • Must be able to translate technical requirement into easy to understand language (both verbally & in writing)
  • Privacy and Compliance
  • Familiarisation with .approach to achieving Compliance / Certification
  • Preferred membership of the CESG Listed Advisor Scheme (CLAS)
  • Hold at least one Security certification (e.g. CISSP, CISA, CCP, CLA, CISM, ITPC)
178

Cyber Security Consultant Resume Examples & Samples

  • Assume lead role in continuous improvement of Cyber Security lab systems, procedures and service delivery as business requires
  • Regularly engage with account managers, business development managers, solution architects, and customers to develop and deliver technical presentation on Honeywell industrial cyber security products and services
  • Stay current on and maintain proficiency with current products and technologies in the cyber security domain
  • Provide industrial control system network design, virtualization network design, and network/information security design
  • Perform Application and System administration tasks required to keep the Cyber Lab operational at industry standard level
  • Conduct research in order to develop technical manuals
  • Conduct advanced training courses in cyber operations such as; Next Generation Firewalls, Intrusion detection and investigation, industrial control network and system exploitation, Honeywell developed security solutions and other relevant topics
  • Requires 5 – 10% travel
  • 3 years troubleshooting skills to resolve basic network and application or system integration issues
  • 3 years working with Microsoft technologies
  • 5 years working with networking devices (routers, switches)
  • 5 years working with server based operating systems
  • 5 years of experience with Cyber Security Technologies
  • CISCO Certified Network/Associate/Design/Security Professional (at least one)
  • Experience resolving network issues via remote tools
  • CISSP Certification or related security certification
  • Result oriented
  • Confident – ability to work with minimal supervision
  • Open minded- Integrative thinker
  • Effective communicator
  • Customer service orientated
  • Experience in LAN architectures & related diagnostic tools
  • TCP/IP protocols – SMTP, SNMP, SCP, SSL, HTTP, SSH, SSL
  • Experience in Network Security – Firewall, ACL, IDS, IPS
  • Specific experience configuring Cisco Routers or Switches
  • Experience with anti-virus systems, backup & restore solutions, system management, network / operating systems security hardening
  • Experience with network analysis tools such as What’s Up Gold, Solar Winds, etc
  • Experience with vulnerability scanner and penetration testing tools such as Nessus, Nmap, Metasploit, Rapid 7 Nexpose, Wireshark, etc
  • Experience with log collection, management, and reporting
179

Senior Security Consultant Resume Examples & Samples

  • Expertise - Collaborate with AWS field accounts, training and support teams to help partners and customers learn and use AWS services such as Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S3), Amazon SimpleDB/RDS databases, AWS Identity and Access Management (IAM), etc
  • Several years’ experience in IT security, compliance and risk management, including privacy, controls, etc
  • Familiarity with industry compliance and security standards including PCI DSS, ISO 27001, HIPAA, and NIST
  • Implementation of AWS services in a distributed environments with Microsoft, IBM, Oracle, HP, SAP etc
  • BS level degree, computer science, business or math background preferred
180

Security Consultant Resume Examples & Samples

  • Knowledge about Vulnerability Scanning tools such as Nexpose, VMS Enterprise, Nessus and McAfee
  • Basic knowledge and understanding about OWASP Top Ten
  • 1 year experience in Intrusion Detection/Prevention
  • Bachelor's Degree or equivalent
  • At least 2 years of experience in TCP/IP Networks
  • At least 2 years of experience in Intrusion Detection/Prevention
  • At least 3 years of experience in Operating System Skills
  • At least 2 years of experience with Unix/Linux system administration level knowledge
181

Security Consultant Resume Examples & Samples

  • Familiarity with Public Key Infrastructure (PKI) concepts and certificate application
  • Effective communication both written and verbal
  • CISSP, CISM, CISA
182

Consulting Security Consultant Resume Examples & Samples

  • Bachelor’s degree in computer science or information systems and/or equivalent work experience
  • Strong experience working with AWS and various security issues/solutions
  • Five years of experience in Unix security including system administration/architecture/engineering roles responsible for designing and deploying security solutions
  • Strong scripting/programming and data manipulation experience in multiple platforms. (i.e. Unix shells, Perl, Python, Regular Expressions)
  • Strong network understanding of major TCP/IP application protocols
  • Strong analytical skills and cross functional knowledge across multiple security, platform and other infrastructure disciplines
  • Be able to articulate vulnerabilities, defects, technical controls, risks, and other complex security matters with the business in a manner that can be easily understood
  • Strong understanding of public clouds a plus
183

Principal Security Consultant Resume Examples & Samples

  • Penetration Testing (main focus on Infrastructure)
  • Application Vulnerability Assessment
  • Wireless Vulnerability Assessment
  • Support of Red Team / Blue Team functions
  • Oversee the Verizon Red Team Security Consultant team and be responsible for identifying continued training requirements for the staff
  • Provide input to Customer to help drive the Red Team strategy
  • Be responsible for preparing executive and senior leadership presentations as and when required
  • Be responsible for ensuring Verizon’s practices and knowledge of penetration testing and Red Team activities is brought to the dedicated Verizon Red Team Security Consultant team to bolster capabilities
  • This position requires 7+ years of experience in performing penetration testing and/or Red Team activities in a consultative manner. Red Team Testing Services that will be performed by our Principal Security Consultant – Red Team role are
  • Threat Intelligence background would be considered an advantage
  • Industry certification(s) such as CEH, OCSP, GPEN, CEPT desirable
184

Security Consultant Resume Examples & Samples

  • 3+ years' experience probing and exploiting security vulnerabilities in web-based applications, networks and systems
  • 4+ years' experience identifying/deploying patches and educating stakeholders on required security measures
  • Experience leveraging SolarWinds (or competing tool) to gain visibility into performance of networks/systems, and giving expert advice for performance optimization and tuning
  • 7+ years' experience working in a IT Operations' focused role (Systems or Network)
  • Experience with Rapid7 (or competing tool) - strongly preferred
185

Security Consultant Resume Examples & Samples

  • 5+ years’ experience in end user computing, datacenter or Security space
  • Experience in the delivery of Infrastructure Protection Architecture solutions - encompassing but not limited to: anti-malware, patching, whitelisting, integrity monitoring, privileged account management, vulnerability management and configuration compliance
  • Knowledge of solution design and an understanding of relevant technologies and development life cycles. You will be designing how the product is deployed
  • Experience in large scale, complex system integration projects in a cross-domain, cross-partner, multi-application, multi-sourced technology environment
186

Senior Security Consultant Resume Examples & Samples

  • This pivotal role manages the relationship and acts as a technical interface between customers and BT
  • Dedicated to 3 key customers, the role will support the security practice in managing operations and will have ownership of the technical and design elements of security projects
  • The Client Security Lead will meet objectives, solve problems and contribute to success by applying industry, applications and technical knowledge through the definition of high level solutions
  • The successful candidate will take ownership and drive the effective execution of large projects, dealing with all relevant issues, and may be asked to provide input into the formulation of network, technology, systems and information strategy and evolution plans
  • Other key responsibilities include providing input to technical designers and guidance to internal presales and bid teams, as well as managing vendor relationships and contractual obligations
187

Senior Security Consultant Resume Examples & Samples

  • Source Code Analysis
  • Architecture Security Analysis
  • Database Security Analysis
  • Experience with C/C++, ASP.NET, Java, Java EE, multiple RDBMS
  • Experience conducting secure code review
  • Experience conducting reverse engineering
  • Experience performing web application penetration testing
  • Experience with other languages (e.g. JavaScript, Python, Ruby, PHP, Perl, COBOL, SQL, or Assembly)
  • Familiarity with software security weakness, vulnerability and secure code review
  • Familiarity with at least one software programming language and framework
  • Ability to undertake and complete tasks independently, meet schedules & delivery timelines, and to move swiftly from concepts and theory to action
  • Projects: You can demonstrate the ability to plan, execute and closeout multi-person projects
188

Senior Security Consultant Resume Examples & Samples

  • Senior/Lead level Identity & Access Management professional proficient in SailPoint
  • Experience in Java, J2EE related technologies, databases (Oracle, SQL Server), scripting (shell, perl), LDAP directories
  • Proven track record with 10+ years of experience in IT services and information security
  • Minimum of 8 years of experience working on identity and access management implementations
  • Prior consulting experience is highly desirable
  • “Take-charge”, positive attitude
  • Proven ability to work and contribute in a team oriented environment
  • Perform under pressure
  • Demonstrated multitasking skills in a fast-paced, unstructured environment
  • Strong communication (written and verbal) and interpersonal skills
  • Excellent customer-facing skills
189

Security Consultant Resume Examples & Samples

  • Expertise Aruba ClearpPass
  • Expertise with Cisco ISE
  • Ability to build relationships with and influence other functional areas
  • College degree, A.S. or higher
  • Strong relationships with security experts within the region
  • Knowledge of regulatory compliance: GLBA, SOX, PCI, HIPAA and Assessment Services a plus
190

Senior Security Consultant Resume Examples & Samples

  • Demonstrate advanced understanding and expertise on relevant facets of the security and IAM spaces
  • Act as the “strategic/tactical advisor” to the customer through IAM-related
  • Minimum three (3) years of Identity & Access Management (IAM) experience required, including deployment experience
  • Minimum two (2) years’ experience with one or more of the following technology
  • Bachelor’s Degree from four-year college or university in Computer Science,
  • Must have a strong understanding and supporting work and industry experience
  • Experience with various project management methodologies (waterfall, Agile, iterative, etc.) is preferred, but not required
  • Strong written and verbal communication skills required. Must be able to
  • Ability to clearly communicate verbally and in writing to all levels of an organization
  • Mathematical Skills
  • Strong problem solving aptitude with ability to think clearly under pressure and in hostile environments
  • Ability to identify and understand how system and tool concepts work in the absence of instructions or training
191

Senior Security Consultant Resume Examples & Samples

  • Perform confidently and authoritatively in the role of SailPoint Consultant on all SailPoint-related technologies from a deployment perspective
  • Provide SailPoint-related troubleshooting services as part of project or post-production support activities
  • Preform the following SailPoint deployment related activities on projects (including but not limited to)
  • Design SailPoint deployment architectures
  • Participate in capacity planning and HW specification recommendation efforts
  • Employee may live anywhere in the United States and telecommute. The position requires some domestic travel 2-3 times per month for a few days each week to client sites as assigned
192

Senior Security Consultant Resume Examples & Samples

  • Minimum four (4) years of hands-on experience with PKI technology, preferably Venafi
  • Minimum six (6) years of professional Information Security experience in a consulting, vendor or enterprise-level role
  • Expertise with one or more of our core Technology Areas: Venafi, Entrust, Microsoft, or VeriSign
  • Process-oriented individual with strong attention to detail, and strong organizational skills
  • This position requires 65% travel
193

Security Consultant Resume Examples & Samples

  • Strong expertise in deployment of Palo Alto Networks firewalls
  • Must have experience with VMWare ESX and NSX infrastructure
  • Understanding of Check Point and/or Cisco ASA firewalls preferred
  • Basic understanding of IDS/IPS appliances
194

Security Consultant Resume Examples & Samples

  • Working with a project manager to organize client and internal kick-off meetings
  • Taking detailed notes during meetings and identifying project risks
  • Deployment of CyberArk Suite of products that include
  • Strong LDAP experience
  • Familiarity with network devices and architecture
  • Understanding of user access, authentication, and authorization
  • Windows Server OS installation and deployment
  • Windows Remote Desktop
  • Understanding of Unix/Linux command line operating systems
  • Familiarity with diagnostic tools and analyzing data
  • Willingness to travel (60-75%). Work-from-home when not traveling
  • Comfortable presenting to upper management and C-level clients
  • Desire to learn the security methodology as it applies to Identity and Access Management (IAM)
195

Security Consultant Resume Examples & Samples

  • Train customers on how to use Optiv’s installed technology
  • Act as representative to identify opportunities as they relate to Optiv’s practice areas
  • Refer potential add-on sales opportunities to either account managers or solutions engineers
  • Complete administrative project tasks like time and expense entry, status reporting, and project completion reporting
  • Minimum four (4) years of hands-on experience with Imperva DAM technology
  • Minimum three (3) years of professional Information Security experience in a consulting, vendor or enterprise-level role
  • Expertise with one or more of our core Technology Areas would be great: IBM Guardium, F5, Check Point, Palo Alto, Cisco ASA, Splunk or McAfee, Sourcefire
  • This position requires 50% travel
196

Security Consultant Resume Examples & Samples

  • Must have previous professional experience providing consultative services as either an internal SME or as a third-party consultant
  • Strong professional expertise in information security, must have the ability to thoroughly understand complex principles and apply them practically
  • Must be willing to participate in relevant professional organizations like OWASP, InfraGard, and ISACA
  • Must have excellent written and verbal French Skills
  • MUST Possess current CISSP, CISA, CISM or Lead Auditor certification
197

Security Consultant Resume Examples & Samples

  • Basic knowledge of technical concepts such as application security, network segregation, access controls, IDS/IPS devices, cryptography, physical security, and information security risk management
  • Understanding of security testing tools, such as Metasploit, Nessus, HP WebInspect, Burp, Cenzic Hailstorm, or any tools included within the Kali Linux distribution
  • Knowledge in networking protocols, TCP/IP stack, HTTP and/or Mobile Applications, systems architecture, and operating systems
  • Understanding of popular security frameworks and industry-leading practices such as NIST, FFIEC, and OWASP
  • Demonstrates a basic understanding of traditional security operations, event monitoring, and SIEM tools
  • Knowledge of automated testing activities within a consulting environment, emphasizing manual penetration testing techniques
  • Demonstrates abilities and success with performing and supervising various work streams of client engagements that emphasize identifying and addressing client needs
  • Ability to create a positive environment by monitoring workloads of the team while meeting client expectations and respecting the work-life quality of team members
198

Senior Security Consultant Resume Examples & Samples

  • Defined professional experience in application security; preferably some of that experience will be in consulting environment
  • Strong software engineering background with extensive experience working in complex enterprise environments implementing software development lifecycles
  • Strong knowledge of application security throughout the software lifecycle
  • Knowledge of security in both Linux and Windows environments as it pertains to Web application hosting, middleware (Apache, Tomcat, PHP, ColdFusion, Ajax), and databases (Oracle, MySQL, MS SQL Servers)
199

Security Consultant Resume Examples & Samples

  • Solving interesting application security problems
  • Security testing, Break-fix, appsec guidance & advisory
  • Bringing great ideas to the table
  • Helping others develop their great ideas
  • Coaching and mentoring other members of the team
  • Delighting customers
200

Senior Security Consultant Resume Examples & Samples

  • Comfortably present security concepts or findings to both highly technical and entirely non-technical audiences
  • Strongly prefer candidates with payment card (PCI DSS, PA-DSS, P2PE, PFI), financial (GLBA, SOX, SSAE 16) or health care (HIPAA/HITECH) experience
  • Interested in learning more about forensic analysis or incident response, we have great teachers in our world-class SpiderLabs colleagues
  • Willingness and desire to travel – moderate to heavy regional travel is required, opportunities for international travel are available
  • Trustwave will provide time and training for you to take and maintain industry relevant certifications, we will also provide you success bonuses when you receive said certification
201

Senior Security Consultant Resume Examples & Samples

  • Solving interesting security challenges
  • Security testing, guidance and advisory
  • Focus on customer experience and service
  • Being part of something exciting
  • Exploit development and reversing
  • Conference speaking
  • Prior experience with routing, switching, and/or Microsoft Active Directory administration
202

IT Risk & Security Consultant Resume Examples & Samples

  • Data loss prevention (DLP)
  • Data discovery / classification
  • Strong record of success in leading business growth with significant P&L responsibility (within a given industry, e.g., Financial Services, Consumer Goods- -be specific about what this is/looks like)
  • 10-15 years of experience within a given function (e.g., Marketing, Finance, Credit/Risk)
  • Accomplished change management leader, able to operate effectively in a highly matrix environment
  • License requirement (e.g., Series 7)
  • Undergraduate degree required, MBA or other advanced degree preferred.)
  • 2-3 years’ experience with an information security organization
  • Strong record of success in supporting large scale programs, preferably in a global organization
  • Experience with DLP and cloud security technologies and processes
  • Strong ability to communicate to stakeholders with various levels of expertise
  • Industry recognized information security certification are preferred (CISSP, CISM, etc..)
203

Security Consultant Resume Examples & Samples

  • Lead customer engagements and be responsible for project execution by providing information security consultation and assessment services
  • Be main point of contact for client information security engagements including working co-ordination and project management (client interaction, deliverables, work plans, escalation's, etc.)
  • Grow the business by identify up-sells with existing and potential clients
  • Experience conducting application testing and source-code reviews
  • Experience performing web vulnerability assessments, performing application penetration testing, experience using penetration testing methodologies including the use of forensic forensic tools/methods
  • Experience creating source code per OWASP or other secure coding guidelines
  • Experience with exploiting OWASP vulnerabilities and executing arbitrary code to test processes
  • Experience with cryptographic techniques such as cryptographic algorithms, key management and rotation processes, and secure key storage
  • Current or former PA-DSS certification and/or P2PE-QSA
  • Extensive knowledge of PCI PA-DSS requirements and validation methodologies
  • Experience in a professional services environment
  • Experience working with financial institutions
  • Deliver consulting projects sold per Statement of Work or direction from management
  • CISSP or CISA certification preferred
  • Experience presenting to Senior / Executive Management
  • Deep understanding of IT infrastructure, information security, and PCI compliance
  • Experience with Level 1 Merchants
204

Cyber Security Consultant Resume Examples & Samples

  • Be the primary supporting delivery engagements for a wide variety of clients in different industry verticals
  • Assess challenges within an environment, identify key strategic issues and advise on best alternative course of action
  • Through the application of industry standards and security best practices, develop and recommend plans to structure secure architectures
  • Define and promote enterprise level architectures that can meet compliance and regulation requirements while improving the security posture of the organization
  • Apply expert level knowledge for technical security in the areas of big data, mobile computing, cloud computing, emerging IT trends and threats
  • Analyze and assess customer facing requirements and challenges, identify recommendations for solutions, and define a roadmap to successfully implement such solutions
  • Develop and deliver workshops in the areas of security operations, assessments, security processes, and solution definitions
  • Develop reports along with presentations for both client and internal discussions
  • 8 - 10 years of cyber security experience. The ideal candidate will have combined experience as a security practitioner and a security consultant
  • Minimum of a Bachelor’s Degree on Computer Science, Computer Information Systems, Information Assurance or related field
  • Required certifications: CISSP, CISM, CRISC (at least one or comparable skills and experience)
  • Extensive knowledge of current and upcoming security technologies and operations
  • Knowledge of the various industry and government strategies and standards in privacy and security
  • Technology Operational and Cyber Security Assessments in accordance with industry frameworks, such as COBIT 5, ISO 27001, ISO 27005, and NIST SP 800-30 and Cybersecurity Framework (HIPAA Security Rule and HITECH Act)
  • Extensive ability to perform concurrent tasks in complex environments and adjusting priorities
  • Ability to communicate and modify approach, language, and style to different audiences
  • Extensive experience in organizing resources, establishing priorities, and leading security initiatives
  • Must have excellent communication skills, writing skills, and the ability to work with team members at all levels
  • Must be a performance-driven team player with an excellent attitude
205

Cyber Security Consultant Resume Examples & Samples

  • Responsible for the operations and administration of the organization's Cyber Security / Information Security activities including systems and data security, disaster recovery, and archiving
  • Responsibilities include developing, implementing, and communicating Cyber Security / Information Security standards, policies, procedures, and tests
  • Provides technical and/or analytical support to solve a wide range of complex issues/problems. Periodically makes recommendations that aid in the successful completion of projects within a product or functional area; works with limited supervision; typically reports to Supervisor or on occasion Manager
  • Conduct Security verification & validation reviews to identify security risks and vulnerabilities and ensure the ongoing protection of Verizon assets and sensitive customer information – Perform phone, online, onsite, security logs and audio/video recordings analysis security verification & validation reviews to identify security risk and non-compliance areas
  • Work with peers, international counterparts, management and Legal to identify areas of risk relative to Global projects and operations, and provide recommendations for controls to the same - Create Security reports outlining identified "actual" Security risk areas and non-compliance with strategic recommendations to management where appropriate
  • Manage, coordinate and track mitigations to ensure appropriate progress within recommended time frame
  • Provide management periodic updates - as requested by Supervisor, give occasional presentations to senior management and/or Legal on varying topics of Security interest
206

Senior Security Consultant Resume Examples & Samples

  • Provide leadership within information security working groups and industry partnerships
  • Help ensure that our systems and network infrastructure are designed and implemented to the highest security standards
  • Perform security audits, risk analysis, network/system/application-level security reviews and when necessary hands on testing on a wide variety of TELUS services and product offerings
  • Work closely with other peers at TELUS to enhance our network, system, and application security posture
  • Understand how to apply standards and best practice and rigor to solving advanced information and network security problems; you have a very good understanding of all the primary security domains as found in various industry bodies of knowledge
  • Analyse network/system/application designs and implementations from a security perspective and will be recognized experts at discovering subtle security issues that appear under unexpected threat scenarios; they will also be equally apt and designing/developing innovative solutions to the security problems that are identified
  • Conduct security reviews, evaluations, and risk assessments
  • Design/implement risk driven information and network security solutions
  • Evaluate and design security and controls for new technologies to address such areas as infrastructure, security administration, user identification/authentication, data security, network/host intrusion prevention/detection/monitoring
  • Accountable for the development of information/system and network protection policies, procedures, strategies and architectures to define and support TELUS’ information and network security programs
  • Educate and coach peer groups of architects/engineers on how to better design security into their various projects
207

Industrial Control Systems Security Consultant Resume Examples & Samples

  • Works with customers to implement cybersecurity activities appropriate for control systems environments, evolve control systems architectures to a more defensible posture, and improve the ability to resist, detect, respond to, and contain attacks
  • Interfaces with clients to address concerns, issues or escalations; track and drive to closure any issues that impact the service and its value to clients
  • Oversees and manages implementation improvements to FireEye’s business processes, methodologies, and client communication methods
  • Evaluates customer needs, coordinates designs for solutions, and clearly communicates solutions
  • Uses formal project management skills in planning, tracking, and reporting on project progress
  • Bachelor’s degree in a technical discipline (or equivalent work experience)
  • Minimum of three years in industrial control systems or Operational Technology (OT)
  • Minimum of two years of cybersecurity experience
  • Professional Engineer (PE) license desired
  • Ability to travel up to 75%
208

Senior Security Consultant Resume Examples & Samples

  • Performing penetration tests and vulnerability assessments on Sky’s company assets and where necessary 3rd Parties
  • Performing application security penetration and vulnerability testing against Sky’s applications
  • Work with developers. Have a direct impact on projects and applications. Identify issues and enhance security
  • Respond to cutting edge threats facing the business
  • Demonstrable skills in common types of penetration testing such as web/application and infrastructure testing, wireless network testing, VoIP, firewall rule set review
  • Hands-on experience with software security testing and common testing tools
  • Experienced with tools such as Burp/Paros/Proxy tools, nmap, Nessus, Metasploit, Backtrack, Kali, SQL Ninja and various hacking tools
  • Strong understanding of open source, freeware, and commercial vulnerability assessment tools
  • Experience with penetration testing frameworks
  • Ability to do manual penetration testing/validation and not rely on automated scanners
  • 2+ years of experience performing network, web / application and wireless penetration testing including exploitation
  • Stake holder management, Scoping tests, raising change requests, deliver testing, create summary reports and advise on remediation
209

Security Consultant Resume Examples & Samples

  • Software Penetration Testing
  • Secure Software Design and Architecture
  • Application Reverse Engineering
  • Experience with C/C++, .NET, Java, multiple OS and RDBMS
  • Experience with other languages (e.g. JavaScript, Python, Ruby, PHP, Perl, COBOL, SQL, or Assembly) (Desired)
210

DLP Security Consultant Resume Examples & Samples

  • Ability to multi-task, demonstrate good judgment and independent decision-making
  • Ability to understand complex problems while formally presenting them simplistically
  • Ability to extract, analyze, and correlate data from multiple disparate systems and present an accurate representation of the facts related to an event
  • Bachelor's Degree in Computer Science or Information Security or 3+ years related experience
  • Diverse knowledge and experience in multiple Information Technology disciplines
  • Strong IT infrastructure and security background
  • Master’s Degree in Computer Science or Information Security
  • Possess one or more of the following certifications which demonstrates an objective measure of competence and a globally recognized standard of achievement in information systems security and computer forensics
211

Security Consultant Resume Examples & Samples

  • Security/risk/vulnerability/compliance assessments
  • Security operations, management, monitoring and remediation
  • Cloud and virtualization security
  • DDoS & perimeter protection
  • Data privacy assessment
  • Security advisory services
  • Network security architecture, design and optimization
  • 3rd party security product system integration
  • Deliver quality security consulting projects, managing risks and time within consultant assignments related to operational aspects and customer requirements
  • Develop security practice capabilities, share project learning and contribute to thought leadership activities
  • Contribute to business development efforts and continuously identify and qualify profitable business and add-on opportunities in the area of security consulting, system integration and advisory services
  • Analyze customer offerings, market scenarios and go to market strategies related to security technology and operations
  • Work seamlessly with customers, Ericsson security SME's, Product Managers and Project Managers to deliver quality projects and expand the Ericsson security business
  • At least 7 years of experience in Security Consulting, IT Security or Network Security industry, having proven experience in complex transformational projects and security consulting engagements
  • Experience working with large scale business processes, architectures and organizations (enterprise, service provider, critical infrastructure, etc)
  • Familiarity with security scanning tools (Nessus, CIS-CAT, OpenVAS, WebInspect, AppScan, etc)
  • Proficiency with multiple platforms including Windows, UNIX, Linux and experience in hardening, auditing and securing those platforms, especially with scripting and automation tools
  • Experience with open source and proprietary cloud and virtualization technologies (OpenStack, Docker, Azure, AWS, Helion, vCloud, etc.) preferred
  • Experience in security auditing and assessments of various types (vulnerability, network, process, policy, risk, etc)
  • Basic understanding of TCP/IP and L2/L3 LAN/WAN administration/concepts
  • Consultant is expected to hold one or more current security certifications commensurate with experience and area of focus (e.g. Security+, SSCP, CISSP, CEH, CISM, CISA, etc)
212

Security Consultant Resume Examples & Samples

  • ERPM Management Console
  • ERPM Web Console/Web Services
  • ERPM SQL DB
213

Security Consultant Resume Examples & Samples

  • As Synopsys engages with clients in the application of our software security improvement methodologies, the Security Consultant joins in the execution and delivery of planned project deliverables and milestones that assist clients in learning, understanding, and applying our secure software development methodologies
  • The Security Consultant typically has task responsibility within one project and develops the capability to perform tasks within one or more of our security practices
  • The Security Consultant continuously learns and expands his/her technical competence
  • Security Consultants do some work from the office, but often go on site to help customers exterminate the bugs and untangle the flaws that make their systems insecure
  • Our Security Consultants make themselves and their team indispensable advisors to our customers: they build the relationships that help create and identify follow-on assignments
  • Secure code Review
  • Software/Application Penetration Testing
  • Network Penetration Testing
  • Architecture Security Analysis and Threat Modeling
  • Secure Software Design, Architecture, and Engineering
  • Software/Application Reverse Engineering
  • Red Team Analysis (including network, wireless, physical, and social engineering techniques)
  • Database Security
  • Experience with web application penetration testing
  • Familiarity with software security weakness and vulnerabilities
  • Experience in performing source code review
  • Experience in network penetration testing
  • Working knowledge of one scripting language
  • Experience in reverse engineering is a plus
  • Familiarity with at least one software programming language and framework is a plus
  • Enthusiasm and commitment along with professional interpersonal skills and an entrepreneurial drive
  • Written communication skills for use in preparing formal documentation
  • Verbal skills that include the ability to clearly articulate thoughts and to deliver presentations
  • Willingness to travel 20-50%
  • Any relevant certifications such as CISSP, CEH etc. is a plus
  • The ideal candidate should have worked 5-7 years in a relevant role
214

Security Consultant Resume Examples & Samples

  • Strong communication and presentation skills in both English and Finnish (knowledge of other Nordic languages is a plus)
  • At least 1 year experience in working within Security and with Security practitioners
  • At least 1 year experience in working in projects related to the core domain
  • At least 1 year experience in working across teams to facilitate solutions
215

Senior Security Consultant Resume Examples & Samples

  • Windows Azure
  • Certificate of Cloud Security Knowledge (CCSK)
  • AWS Certified Solution Architect (ACSA)
  • VMWare Certified Professional (VCP) or
  • VMWare Certified Processional + Cloud (VCP+Cloud)
  • Microsoft Certified Solutions Developer - Azure Solutions Architecture (MCSD-ASA)
216

Senior Security Consultant Resume Examples & Samples

  • Information Security Management Systems (ISMS) and ISO 27000 family standards: implementation and/or audit, control and monitoring, documentation, project coordination,
  • Risk analysis and associated methodologies (EBIOS, MEHARI, ISO/IEC 27005, ISO 31000...),
  • Business continuity management systems (eg ISO 22301), including Business Impact Analysis (BIA) and design, monitoring, implementation and testing of the associated continuity plan,
  • Governance of information systems based on CobIT,
  • Organizational audit, gap assessment, assessment of the maturity level via CMMI / Capability Maturity Model Integration,
  • Experience in participating in audits
  • Laws and Regulations in force in the Grand Duchy of Luxembourg,
  • Knowledge of other standards related to information security (NIST, PCI, ...) will be considered as an asset,
  • Capacity to train and increase awareness of information security
  • 2 years minimum experience
  • Having CISSP, CISM, CISA, ITIL, ISO, GSEC is an advantage, as well membership and participation in professional associations in the field of information security (CLUSIL, ISACA , ...)
  • You have relational and editorial qualities and you like teamwork in an international environment
  • You are able to carry out complex consultancy services autonomously
  • French and English are compulsory, Luxembourgish and German are an advantage
217

Info Security Consultant Resume Examples & Samples

  • Investigate incidents generated from our data loss prevention tools
  • Analyze, escalate, and assist in remediation of critical information security incidents related to data loss prevention
  • Understand and follow the incident response process through event escalations
  • Maintain run books and topology / data flow drawings for solutions
  • Conduct functionality and quality testing of policies and associated rules in the data loss prevention tools
  • Assist with broader Information Security initiatives as needed
  • 3+ years of security, incident response and/or network related technologies experience
  • Strong research, analytic and writing skills
  • Experience reviewing, analyzing and correlating data/events
  • Ability to build strong relationships with business and technology stakeholders
  • Ability to clearly communicate any remediation activities and status to colleagues and/or senior management
  • Experience with commercial DLP systems - Forcepoint (Websense), Symantec, McAfee, etc
  • Experience or familiarity with content monitoring and user activity monitoring solutions
  • Strong understanding of incident response and data governance strategies
  • Ability to understand and analyze complex issues, then apply experience and judgment to develop recommendations related to data loss risks/threats
218

Security Consultant Resume Examples & Samples

  • Provide project technical and business leadership for engagements focused on cybersecurity forensics, incident response (IR) and investigation services
  • Share knowledge, techniques and toolsets with E/// colleagues to assist in addressing product security and building company-wide security proficiency
  • Supporting the implementation and development of Incident Response (IR) tools, development of IR and cyber security protocols, maintenance of a malware analysis laboratory, and information and intelligence sharing across cyber response practice
  • 10 or more years of total work experience, with at least 8 years IT security, network security, data security, applications security and/or audits with significant prior experience working in the computer forensics, cybercrime investigation and other related fields within a combination of public and private sector. Communications industry (services providers, mobile operators or their suppliers) experience preferred
  • Knowledge of Intrusion Detection System (IDS) tools and applications and common adversary tactics, techniques, and procedures
  • Ability to correlate and combine data to develop information about the capabilities, intent, and operations of criminal and/or adversary organizations
  • Knowledge of types of digital forensics data and how to recognize them plus skill in using binary analysis tools (e.g., Hexedit, command code xxd, hexdump), tuning sensors and detecting host and network-based intrusions via intrusion detection technologies (e.g.Snort)
  • Proven track records in live forensics, log-file analysis, network forensics, malware reverse engineering and data exfiltration; including investigations of malicious code to determine attack vector and payloads
  • Ability to automate tasks using a scripting language (e.g. Python, Perl, Ruby, etc.) and broad knowledge in a variety of programming languages (e.g. C/C++, Java, x86 Assembly, JavaScript)
  • Ability to multitask and execute activities with minimal supervision
  • BS/MS Computer Science or related technical degree
  • Industry standard digital forensics certifications (CCE, GCFE, GCFA, CFCE, etc) are a plus
  • LI-GP1
219

Cyber Security Consultant Resume Examples & Samples

  • Review of solutions to assess security compliance
  • Team work to deliver security change in complex organisations
  • Security analytics, security monitoring and SIEM
  • Contributing to business development
  • 2-5 years of relevant experience
  • Technical security implementation
  • Certifications and understanding of current industry best practices are highly desirable
  • 3rd level qualification
220

Cyber Security Consultant Resume Examples & Samples

  • Management of all IA/ Security related activities from project initiation through to final decommissioning
  • Working ISO27001 compliance knowledge
  • Excellent leadership, communication and client facing skills
  • Good technical understanding and aptitude to remain up to date with NHS Security policies and process, HMG information assurance standards, CESG good practice guidance
221

Security Consultant Resume Examples & Samples

  • Experience with multiple OS such as Linux, Mac OSX, iOS, Blackberry, Android, or Windows
  • Familiarity with software attack and exploitation techniques
  • Ability to lead multiple project teams; give directions and ensure that tasks are executed consistently
  • People: You can lead a team, give direction and ensure tasks are executed consistently
222

Senior Security Consultant Resume Examples & Samples

  • Support sale, provide information security, risk management, or compliance consulting services to enterprise clients
  • Lead consulting teams in one or more key service areas, mentor junior consultants as appropriate
  • Scope engagements and support the development of proposals and statements of work
  • In-depth information security experience with specific focus on one or more of the following
  • Experience in government consultancy
  • Understanding of ISO standards
  • CREST or Tiger Certified Team Leader
  • Certifications (preferred but not essential)
223

Cyber Security Consultant Resume Examples & Samples

  • Build and entrench credibility with clients on matters of cyber security
  • Assist clients in interpreting risk assessment results and validation of plans to address specific cyber risk issues
  • Provide expertise with clients and account managers on risk mitigation
  • Collaborate with the cyber team in the development, implementation and ongoing improvement of products and services, while gaining understanding of the company’s business
  • Support the assessment tool and business process
  • Assist with training and development of cyber security program
  • Responsible for staying abreast of industry standards and trends
  • Minimum of 8 years of experience working in information technology with at least 5 years specifically working in the information/cyber security field
  • Experience with one or more of the following; security risk assessments, development of security standards, cyber security risk consulting and incident management
  • Strong knowledge of operating systems and networks
  • Strong knowledge of computer vulnerabilities, hacker methodologies and other threats
  • Strong knowledge of widely recognized cybersecurity risk frameworks (ie; NIST, ISO etc) and how to apply them within enterprise organizations
  • Experience working with enterprise-level information security programs, including governance, risk assessment, policy/standards, technical controls, oversight and assurance, risk treatment, and security education/awareness
  • Ability to leverage various trusted sources of information (articles, webinars, internet, etc) to gain accurate and updated knowledge on cybersecurity and recommend appropriate solutions for FM Global
  • Excellent verbal, written and presentation skills. Exemplary consultative skills a must
  • Strong interpersonal and organizational skills; attention to detail
  • Strong collaboration and decision making skills
224

Security Consultant Resume Examples & Samples

  • Minimum 15 years overall experience in Information Security/ Cyber Security and/ or Technology Risk
  • Experience in workingon international deployment roles
  • Previously handled a revenue generation/ profit & loss responsible to maximise business profit
  • At least 5 years experience working in projects related to the core domain
225

Security Consultant Resume Examples & Samples

  • At least 1 year experience in management consulting and systems integration
  • At least 3 years experience in working on projects related to one of the core security domains: GRC, Data or Infrastructure
  • Basic knowledge in working across diverse teams to facilitate solutions
  • At least 5 years experience in working on projects related to one of the core security domains: GRC, IAM, Security Operations, Application, Data or Infrastructure, Mobile Security
  • At least 3 years experience in management consulting or Managed Security Services
  • At least 2 years experience in working with security consulting teams
226

Safety, Health & Security Consultant Resume Examples & Samples

  • Candidate will also be responsible for monitoring compliance with internal Ryder safety and health requirements, as well as external regulatory agencies
  • Candidate will support operational personnel to ensure that systems are in place to drive continuous improvement in employee safety programs, regulatory compliance, workers compensation and injury/collision experience
  • Extensive work will be required at the field location level working with and developing managers, trainers and CMV drivers
227

Security Consultant Resume Examples & Samples

  • Expertise on cloud, hybrid and on-premises security architectures and security tools and technologies
  • Expertise in development of documentation to support enterprise-wide information security and risk management systems
  • Proven track record developing information security policies and standards, control design and development, implementation and automation of controls to support auditing of overall security program and Information Systems Management Systems
  • Strong understanding and experience in information security risk assessment methodologies for the enterprise
  • Strong audit and assessment experience in diverse information technology environments
  • Has managed, scoped and completed information security audits for standards and regulatory requirements such as ISO 27001, FedRAMP, SOC 1 and 2
  • Proficiency in concepts, standards and tools related GRC (Governance, Risk and Compliance)
  • 5 to 8 years of experience in the areas identified above
  • Currently certified CISA, CISM, CISSP or related discipline
  • PRIOR MANAGEMENT CONSULTING EXPERIENCE IS A MUST
  • Technology industry experience with a focus on business, additional industry experience a plus
  • Strong documentation and presentation skills
  • High energy, collaboration/facilitation and communication skills to interact with internal and client stakeholders
  • Project management skills a must for managers
  • Years of experience: Consultants 2-7 Yrs
  • MBA strongly preferred
  • Demonstrated excellent team collaboration
  • Big picture thinking in global practice, global delivery, and technology
  • Ability to display data visually and create powerful presentations which effectively demonstrate the value of audit deliverables
228

PCI Security Consultant Resume Examples & Samples

  • Provide assessment and advice regarding PCI DSS standards requirements according to platform during design, implementation and operation phases
  • Document and present PCI Compliance related findings to Program and Project Managers and the client
  • Provide status reports for consistent findings and proposed solutions
  • Interact with customer Internal Security Assessor (ISA) and external QSA, PA-QSA and ASV security professionals to confirm findings and resolve misunderstandings resulting from the review
  • Evaluate reports performed by external QSA, QSA-PA and ASV whether as consultants or auditors including PCI DSS Reports on Compliance (ROC) or Self Asessment Questionaries (SAQ), Approved Scanning Vendor (ASV) Scan Reports
  • Work in a team environment to analyze the QA test process and help develop procedural strategies for reviewing reports and services
  • Help ensure relevant test coverage and appropriate sampling
  • Participate as an integral part of the team, exhibiting ownership, follow through, initiative, awareness and effective communication with peers and management
  • Continually learn, actively share knowledge and foster exchange of skills
  • Proactively identify opportunities to improve the quality of reporting and usability of that information
  • Be willing to participate in minimal travel (up to 35%)
  • Minimum of 3+ years of hands-on security assessment, quality assurance, or PCI DSS experience whether as QSA, QSA-PA, ASV or ISA
  • Industry certifications (such as CISSP, CISA, CISM)
  • Bachelor’s degree required
  • Understanding of information systems and networking diagrams
  • Experience evaluating the security infrastructure for large enterprise merchants or service providers
  • Working knowledge of the financial industry and the lifecycle of payment card transactions, specially on B2C ecommerce environments
  • Working experience with software development methodologies and practices
  • Working knowledge of audit methodologies and security assessment tools
  • Methodical and organized; able to manage multiple opportunities, projects, and partners concurrently
  • Excellent written and oral communication skills, can express thoughts clearly, knows how to listen and is able to contribute in a team environment
  • Flexible, proactive, quick to learn and possessing a can-do attitude
  • A blend of curiosity, creativity, persistence, commitment, passion and optimism
229

Security Consultant Resume Examples & Samples

  • Act as lead or supporting deployment engineer on SailPoint deployment projects
  • Ensure requirements gathered, processes defined, and use cases documented follow out of the box configuration vs. customization as much as possible
  • Participate in all SailPoint deployment activities, connector configuration, custom
  • This position is full time averaging 40 hours per week
  • A minimum of a Bachelor of Science degree in Computer Science or related field is required
  • A minimum of 48 months experience as an Information Security Consultant is required
230

Commercial Security Consultant Resume Examples & Samples

  • Adhere to current ADT policies, procedures, products, programs and services
  • ADT’s primary strategy is to increase annual recurring revenue by selling multiple products to each customer with an emphasis on installation revenue generation and a focus on high quality customer interactions during the sales process
  • Process sales orders and complete all necessary paperwork in accordance with the approved procedures
  • Develop, update and maintain customer accounts using Salesforce as CRM
  • The Business Account Executive is responsible for promoting and selling ADT services and technology to commercial customers within an assigned territory, leveraging relationships, and closing new business for ADT and ensuring customer retention
  • The Business Account Executive is responsible for securing profitable sales and upgrades to new, existing and discontinued ADT Commercial customers while maximizing customer satisfaction and retention by initiating post installation follow-ups
  • This rep will also have a commanding knowledge of our product line, as well as that of our services. It is the responsibility of the Business Account Executive to follow up with the customer post installation as well as initiating contact 24 hours prior to installation to address any potential discrepancies and to ensure 100% customer satisfaction
  • Assume account management responsibility including the provision and coordination of services (installation, customer training, etc.) to assure complete customer satisfaction
  • Bachelor's degree or, in lieu of degree minimum of 2 years experience as a successful commercial sales representative in the security, technology, or other related sales industries, show consistent abilities to achieve and exceed sales quota
  • Exceptional commercial sales presentation skills with demonstrated sales techniques
  • Strong work ethic, with ability to self-manage daily work schedule and performance, with limited supervision
  • Possess comprehensive knowledge of approved commercial products and services and have the ability to educated the customer on the appropriate solutions for their business
  • Price and quote fire alarm systems for takeover and retrofit
  • Work with customer throughout the entire sales process to answer questions and help work any issues that arise
  • Candidate must be able to explain product features and benefits
  • Customer focused
  • Demonstrated leadership and proven negotiation skills and sales achievements
  • Ability to calculate figures and amounts such as understanding margin DOA guidelines and creating cost + plus quotes
  • Proven track record of consistently exceeding quota
  • Ability to travel within sales territory
231

Security Consultant Resume Examples & Samples

  • Information Security Management (Better if Certified CISSP, CISM, CISA)
  • Advise and define organisations Security Strategy and Transformation
  • Risk Management and Technical Risk Assessment (knowledge of ISO27005 Tools and techniques)
  • The ability to advise on Security and Privacy, with an understanding of the impact of UK and EU privacy laws
232

Senior Security Consultant Resume Examples & Samples

  • At least 5 years of experience in information security consulting (professional services consulting for end clients)
  • At least 5 years of experience in interfacing at multiple levels of client management and building relationships
  • At least 3 years of experience in supervising/managing and leading teams to success
  • At least 2 years of experience in managing complex projects and using project management skills
  • Basic knowledge in security industry regulations/standards (PCI DSS, HIPAA) and compliance frameworks (ISO 27002, CobiT)
  • At least 7 years of experience in information security consulting (professional services consulting for end clients)
  • At least 5 years of experience in managing complex projects and using project management skills
  • At least 1 year of experience in a role as a Chief Information Security Officer
  • Certified in at least 1 of the following: PMP, CISSP, CISA and/or CISM
233

Security Consultant Resume Examples & Samples

  • 1) Depth of knowledge in two or more of the core security domains: SSRC/GRC, IAM, SOC Operations,
  • 7) Communicate security risk through documentation, conversation, and presentations with an objective of
  • 14) Design and demonstrate security solution that is scalable and easy to adapt with changing business
234

Senior Security Consultant Resume Examples & Samples

  • Create and deliver technical solutions to clients by engaging them in the planning and solution definition phase and defining the standards of work (SoW)
  • Provide user support and assist with troubleshooting and design, configuration and escalated problem management
  • Develop technical training materials, conduct training programs and educate engineers on basic technical details
  • Provide pre-sales support by identifying opportunities and contributing expertise around the design and configuration requirements in relation to RFP / RFI and proposals of low to medium complexity
  • Demonstrate a high level of technical ability and education (certificate, diploma or degree level) with respect to market, verticals, horizontals, business administration and business change
  • Possess the ability to work with clients and business teams to create client-orientated solutions and services
  • Demonstrate interpersonal skills with the ability to develop and maintain strong stakeholder relationships
  • Possess the ability to recognise opportunities for enhancement and continuous improvement
  • Possess the ability to work in high-pressure situations
  • Demonstrate the ability to establish and manage processes and practices through collaboration and the understanding of business
  • Possess the ability to manage urgent and complex tasks simultaneously
235

Application Security Consultant Resume Examples & Samples

  • Consulting for development, testing and infrastructure teams
  • Ensure compliance with security policies and other regulations
  • Support application teams when pen tests are performed
  • Security trainings and mentoring
  • Provide best practices
  • Strong understanding of security technologies
  • Strong expertise in securing sensitive data and prevent data leakage
  • Experience coordinating security testing projects with multiple consultants
  • Experience in
236

Senior Security Consultant Resume Examples & Samples

  • Master's degree in Computer Science, Engineering, or related field or equivalent work experience
  • Equivalent professional IT experience (with significant security experience)
  • Broad understanding of Security Incident Management, Identity and Access Management, Data Protection and Privacy
  • Effective presentation skills, including the ability to develop materials and then present to an executive level audience or at public events
  • Fluency in English and Swedish
  • Is willing to go through Government or Industry security clearance process when required
  • Professional Accreditations (CISSP, CISM, Vendor Certifications
  • Security Architectural and/or Enterprise Architectural Frameworks (e.g. TOGAF)
  • Drive, enthusiasm and ambition to contribute to profitable growth in a fast moving and dynamic security consulting practice
  • Strong interpersonal skills promoting customer confidence in the security consulting function and in DXC
237

Security Consultant Resume Examples & Samples

  • 8+ years of professional IT experience (with at least 5 years of professional experience on positions related to SIEM or similar security domains)
  • Specialist level, practical knowledge (including installation, configuration, troubleshooting and design) of ArcSight SIEM technologies (i.e. ESM, Logger, Express, flex-connector programming); work experience with other SIEM products will be additional advantage
  • Fluency in English and Dutch
  • Professional Accreditations (CISSP, CISM, HP ArcSight Certifications, other vendor certifications…)
238

Security Consultant Resume Examples & Samples

  • Sanctuary designs; including High Level and Detailed Designs and deployment of Sanctuary
  • Providing support and expertise to well-defined Core Applications in their interaction with AV / Sanctuary, and to less well-defined Migrated Applications
  • PKI design and deployment
  • Recommending solutions to enhance functionality, performance and simplifying deployment and management
  • Supports Protect Tools and proactively engages with Directories team
  • Works with project teams in the implementation of new/upgraded designs
  • Works closely with the Engineering/Programme Management to ensure timely delivery of solutions
  • Supports Build, Integration and Test teams to schedule testing and to ensure effective solution delivery
  • Understands and adheres to standards and procedures relating to change management, performance and security
  • Works effectively with the Defect, Configuration and Release team to ensure timely delivery of required solutions/fixes
239

INS Security Consultant Resume Examples & Samples

  • Provide technology consulting to external customers and internal project teams
  • Responsible for providing technical support and/or leadership in the creation and delivery of technology solutions designed to meet customers’ business needs and, consequently, for understanding customers’ businesses
  • Actively contribute to the solutions portfolio by providing information ranging from technical knowledge to methodologies based on experience gained from customer projects
  • 3-5 years proven track record of extensive experience in enabling installations and configurations products mapping to the ESS portfolio
240

Technical Security Consultant Resume Examples & Samples

  • A minimum of five years’ experience working in information security or relevant technical IT function
  • Application/Web development experience
  • Strong analytical skills and the ability to resolve complex security vulnerabilities and design compensating controls
  • Excellent time, resource and project management skills in order to manage multiple information security engagements and changing priorities
  • Focus on quality and attention to detail
  • Conversant with ISO 27001/2 information security standard
  • Excellent influencing and communication skills (both written and oral)
  • Excellent written and verbal communication skills; interpersonal and collaborative skills; and the ability to communicate information security and risk related concepts to technical and non-technical audiences
  • Ability to rapidly comprehend and interpret the functions and capabilities of new technologies
  • Ability to work across multiple geographical borders and timelines
  • Support the Regional Information Security Officer, Chief Security Architect and the Global Information Security Group Leadership Team in the development and execution of the Information Security Consultancy and Architecture programme as part of the overall Computershare Information Security Strategy
  • Contribute towards and, where required, manage the implementation of regional and global information security projects and initiatives
  • Provide technical and non-technical information security consultative support and guidance to the regional business units and technology teams ensuring compliance with relevant regulatory and legislative requirements
  • Provide technical information security advice to internal stakeholders with regard to technology projects in order to ensure that security is considered and applied prior to deployment in line with relevant SDLC processes
  • Maintain a forward looking perspective on emerging information security and technology developments and their relevance to Business and Technology Strategies
  • Contribute to managing and maintaining vendor relationships, evaluating usefulness and cost of products and making appropriate recommendations to assist in execution of the enterprise security architecture
  • Provide technical and process-based support to the other information security services delivered by the global functions of the Global Information Security Group, including Security Administration, Penetration Tests, Vulnerability Assessments, and Security Monitoring
  • Liaise with the Global Information Security Group Threat & Vulnerability Management team to deliver and interpret the results of the penetration tests, vulnerability scans, patch assessments and build compliance scans performed by the Threat & Vulnerability Management team
  • Develop effective, working relationships with CTS staff and leadership to increase the Global Information Security Group’s impact and strategic influence throughout the region
  • Actively champion the Global Information Security Group and raise awareness about its role, objectives and initiatives to regional Business Unit and CTS staff and management
  • Build and manage effective working relationships with other support and governance functions within the region, including Risk, Audit, Compliance, Legal, HR, Marketing and Finance
  • Attend regular team and project meetings and provide both verbal and written reports to the Regional Information Security Officer and Global Information Security Group Leadership Team, as required
241

Security Consultant Resume Examples & Samples

  • 5 year of experience in Security Consulting Projects
  • ISO 27000 certification
  • Computing Engineer Degree
242

Application Security Consultant Resume Examples & Samples

  • Providing coaching for the Development team to incorporate security in their SDLC
  • Providing application security training for the Development team
  • Supporting and maintaining an existing codebase of C# .Net components providing automation of application security activities (integration with static code analysis tools)
  • Good experience in security consulting
  • Good experience in application development in C# .Net or Java
  • Background in the financial services industry (beneficial)
  • Delivery focused and capable of meeting demanding deliverables
  • Adaptive and flexible in your approach to achieving a goal
  • Previous experience working in geographically dispersed teams
243

Cyber Security Consultant Resume Examples & Samples

  • The Cyber Security Consultant will partner with vendors to evaluate, implement, maintain, and monitor IT security measures, as well as work on existing IT systems while also supporting a variety of new initiatives
  • Maintain internal and/or external network and security solutions including: administer Global VPN, SSL VPN, site-to-site VPN Tunnels, Tunnel Interface with AWS, Routers and Switches, Dell Sonicwall NSA Firewalls
  • Test and evaluate network and security systems to eliminate problems and make improvement using tools such as Netwrix, Symantec, Logrhythm and Bit9
  • Work with the IT program groups and IT support vendors to evaluate and improve IT vendor security posture
  • Respond to inquiries and day-to-day IT operations and internal requirements requiring network and security assistance and support
  • Monitor network performance and hardware status daily, diagnostic programs to ensure 99.9% network availability
  • Interact with other IT Support staff and/or third party vendors to troubleshoot and repair network outages and service degradation, including performing research and gathering information
  • Troubleshoot malfunctions of network hardware and software applications to resolve operational issues and restore services
  • Validate remediation efforts of findings related to vulnerability and system configurations
  • Lead the incident response team, including guiding engineers and analysts in triaging security incidents and keeping management appraised of incident status
  • Assist in identifying security initiative gap assessments
  • Assist with updating and implementing the annual security awareness training, annual developer training, and annual administrator security training
  • Recommend upgrades, patches, and new applications and equipment
  • Stay current on new and emerging technologies and disseminate new information
  • A Bachelor's degree from an accredited college and/or university (Information Technology) or equivalent experience
  • Up to 5 years of experience completing similar duties as outlined above
  • Technical training, including Security certification
  • Experience assessing applications for security issues and creating solutions
  • Advanced knowledge of the Internet and it's workings (DNS, Security, IP Routing, HTTP, VPN, Email Routing, etc.)
244

Senior Security Consultant Resume Examples & Samples

  • Work as part of a large local and national security consulting team on a diverse range of projects
  • Provide specialist electronic and physical security designs and advice to existing and new clients across all market sectors
  • Accurately determine and document project scope when providing proposals to clients
245

Security Consultant Resume Examples & Samples

  • Analyze customer and user offerings, market scenarios, customer go to market strategy
  • Drive sales engagements
  • Perform up-selling and identify add-on sales opportunities
  • Deliver consulting projects, managing risks and time within consultant assignments
  • Develop consulting practice capabilities
  • Share project learning and contribute to Thought Leadership
  • Supporting the implementation and development of Incident Response plans and programs
  • Deep expertise in network security technology, ISO/IEC/ITIL-based assessments, industry best practices, and fixed and mobile broadband network architectures
  • Knowledge and experience in using key industry security standards ISO 2700x, COBIT, NIST-800 series, BIST, X.805, ANSI, IETF, ITU-T & 3GPP
  • Experience in providing security assessments for Service Providers e.g., IP networks including NGN and IMS architectures and provide clear recommendations for addressing security risks
  • Ability to lead end-to-end security vulnerability assessments/audits, risk analysis, security design, perform penetration tests when required, and be familiar with industry security tools
  • Experience in reviewing security configurations for network elements including security for data, management and control planes
  • Experience in leading assessments and analysis of Security Operations Centers including processes and procedures for securing networks, identifying, addressing and remediating security incidents. Experience in providing recommendations for improvements in security processes/procedures
  • Experience with cloud related security
  • Experience with and knowledge of OSS/IT security
  • Knowledge of an experience with security requirements and implications of Network Function Virtualization and Software Defined Networks
  • Ability to lead development of security offers, customer proposals and deliver them to the customer
  • Lead large engagements, interface with C-levels and provide thought leadership on security issues
  • BS, MS Preferred (Engineering, Math)
  • Extensive experience in security area with emphasis on delivering consulting projects to telecom service providers or experience working for a Service Provider in a network or operational security role
  • Willingness to travel at least 50% of the time
  • Deep knowledge of IP and IMS networks
  • Require deep expertise in analyzing and providing remedial actions to security attacks (e.g., viruses, worms, DDOS attacks, Spyware), Denial of service attacks, and other threats
  • Knowledge and experience with security aspects of network elements (e.g., routers, Session Border Controllers, Firewalls, IPS)
  • Thorough knowledge of TISPAN NGN security architecture, NGN X.805 security model
  • Consulting experience in OSS/IT and Cyber environments
  • Hands-on experience in penetration testing including use of industry tools and methodologies
  • Excellent communication skills (oral and written) including PowerPoint and Visio
  • Security certifications is a plus (e.g., CISSP, CCIE, CHFI)
  • Experience in security requirements and implementation in other vertical markets (particularly Energy or Transportation) is advantageous
246

Senior Security Consultant Resume Examples & Samples

  • Perform confidently and authoritatively in the role of Senior Consultant in the IAM Strategic Consulting team, as the IAM subject matter expert, providing IAM thought leadership, strategic and tactical contributions on all IAM-related assessments, and/or deployment engagements involving an IAM technology solution
  • Lead day-to-day billable operations within a client project – ability to act as both a senior delivery lead and as a senior consultant resource applying excellent leadership, communication and client relationship building skills
  • Act as the “strategic/tactical advisor” to the customer through IAM-related best practice and industry standard trends and recommendations
  • Create excellent, comprehensive documentation detailing requirements, use cases, diagrams, presentations, and more as required by the specific engagement
  • Contribute to internal team building, knowledge transfer, and training activities within the Strategic Consulting team
  • Identify opportunities for enhancement and growth to improve and enhance intra-team efficiency, effectiveness and assist in the development and roll-out of new Strategic Consulting methods and tools
  • Effectively provide subject matter expertise and lead the discovery and analysis phase of any project he/she is assigned to from a strategic business perspective standpoint
  • Perform work successfully with little supervisory oversight; candidate must be an independent leader able to perform all assessments, deployments, and advisory activities him/herself as well as be able to guide other resources and engage customer resources effectively
  • Remain current on IAM market related and emerging trends, tools, and methodologies
  • Assist the Strategic Consulting manager in validating and approving all sales-related level of effort and assumptions/dependencies for SOW creation, when necessary
  • Assist the Strategic Consulting manager with internal peer reviews for other Strategic Consulting team member’s deliverables, when necessary
  • Travel as needed to customer locations to lead and participate in IAM workshops, assessments and/or deployments (note, this position will require US and Canadian travel which may get up to or over 75%, depending on the engagement and client)
  • Adhere to policies, procedures, and security practices of the IAM practice
  • Resolve internal problems maturely and independently, and understand escalation procedures within the IAM practice
  • Demonstrate strong, proactive communication with all levels of the IAM practice
  • Perform public speaking and eminence related activities for the Strategic Consulting team and respective subject matter, as needed
  • Participate in advanced projects; including projects that require on-the-fly research and assessment process development and/or lie outside of core group of offerings
  • Minimum two (2) years’ experience with one or more of the following technology vendors: SailPoint, RSA, CyberArk, Microsoft, Ping, Oracle
  • Bachelor’s Degree from four-year college or university in Computer Science, Electrical Engineering, Computer Engineering, or Management Information Systems or a related area of study; or four or more years related experience and/or training; or equivalent combination of education and experience preferred
  • Must have a strong understanding and supporting work and industry experience with IAM implementations, including experience in one or more of the following: user lifecycle management, role management/governance, access governance, privileged access/identity management, access management (SSO, RSO, federation, cloud access management, etc.)
  • Must be able to travel to the US and Canada up to 50-75%, with occasional travel over 75% if required by the engagement/client
  • Technical development and deployment experience of core IAM technologies is a nice to have, but not required and not part of this position
  • Strong written and verbal communication skills required. Must be able to communicate details in a clear, understandable manner to multiple levels of an organization, and follow templates and other requirements, as applicable
  • Customer-oriented focus required, with a strong interest in client satisfaction
  • Solid understanding of information security in general
  • Demonstrated ability to learn new technology or concepts very quickly when required
  • Demonstrated outstanding time management, independent work, and organizational skills required
  • Self-starter, with a strong interest in technology and a desire to learn and grow in the IAM and security spectrum
  • Knowledge of key information security compliance-related government regulations (including SoX, PCI-DSS, GLBA, HIPAA) preferred
  • English language Skills
  • Ability to effectively present information in one-on-one, small, and large group situations to customers, clients, and other employees of the organization, including a range of audiences from technical, business, and C-level
  • Ability to distill advanced IAM and core IAM technology concepts down to principles that can be understood and applied by all audiences, and the ability to determine those audiences
247

Principal Security Consultant Resume Examples & Samples

  • 5-7 years industry experience
  • 3+ years consulting experience
  • Competency or expertise in at least three programming languages/platforms
  • 50,000+ KLoC code written & running or 600,000+ KLoC reviewed
  • 40+ hours of hands-on time with essential tools from each practice
  • 5 years AppSec experience
  • Deep background in Secure Code Review / Static Analysis preferred
  • Understanding of software architecture preferred
248

Incident Response Security Consultant Resume Examples & Samples

  • At least 3 years experience in strong technical and consulting skills with subject matter expertise in one or more of the following specialties: incident response, computer forensics and network security
  • At least 3 years experience in a high level of hands-on experience with hardware/software tools used in incident response, computer forensics, network security assessments, and/or application security
  • At least 3 years experience in Windows and Unix operating systems
  • At least 3 years experience in in a thorough understanding of network protocols, network devices, computer security devices, secure architecture & system administration in support of computer forensics & network security operations
  • Analyze and/or reverse-engineer the behavior of malware using both static and dynamic tools and techniques
  • Demonstrate and provide subject matter expertise in the detection, analysis, capabilities and mitigation of malware as well as trends in malware development
  • Proficiency in Windows, Linux, OSX OS Internals and API's
  • Complete familiarity with high, medium and low programming languages (Perl/Python, C/C++, Assembly)
  • Fluent in disassembly / debuggers such as IDA Pro, OllyDbg, WinDbg, etc
  • Able to construct and step through binary analysis with industry standard reversing tools (REMnux, PE Explorer, Malcode, etc)
  • Packer identification and entropy analysis skills
  • Proficient in writing a cohesive narrative around code disassembly and malware capabilities for a technical and non-technical audience
  • Bachelor's Degree in Technology, Computer Science, Engineering or equivalent
  • Certified in CISSP, ENCE, CCE, GCFA, GCIA, GCIH, CHFI, QSA or equivalent
249

Principal Security Consultant Resume Examples & Samples

  • A Principal Consultant is a highly experienced consultant recognized amongst their peers as an industry leader
  • Principal Consultants are expected to operate at least at the level of senior consultant in all respects, whilst also taking ownership of one center of excellence and manage SpiderLabs organizational knowledge around that topic
  • They are responsible for mentoring, training and supporting other consultants delivering work within that center of excellence. Principal Consultants are also expected to own and run key customer engagements as directed by their manager
  • As an industry leader, are also expected to maintain Trustwave's reputation within their center of excellence by participating in industry events and from time to time, supporting pre-­‐sales activities as required by their manager
  • Works on issues that impact design/selling success or address future concepts, products or technologies
  • Creates organizational knowledge about key technologies, tools and methodologies
  • Develops formal networks with key decision makers and serves as external spokesperson for the organization
  • Each Principal Consultant can be expected to own a Center of Excellence (a discipline or domain of knowledge)
  • Is a highly autonomous worker, able to operate with little to no supervision, providing the Managing Consultant with well structured, concise and regular status updates
  • Have approximately 8-10 years industry experience within their practice alignment in a consulting capacity
  • Recognized technical expert in more than one area of service delivery
  • Strong team player and technical innovator with an ability to build and leverage relationships on an inter and intra departmental basis
  • Candidates should be well versed in application security/penetration testing of web applications and thick clients as well as the softer side of consultancy
  • Intimate knowledge of at least one enterprise development framework a major plus
  • Code review skills desired but not necessary
250

Senior Security Consultant Resume Examples & Samples

  • Ensuring lowest cost through optimized, global process, uniformly implemented
  • Resource pool management; recruiting etc
  • Constantly reducing unit costs
  • Controlled innovation of the relevant technology offers
  • Application of standard Capgemini offers
  • Identification of opportunity to up-sell technology offers to the advantage of our clients and making those proposals via the SDM
  • Assistance to Principal Technician for providing solutions, resource (People, material, time & budget) management in their respective technology vertical SLA management
  • Building technical expertise in respective area of infrastructure & systems management
  • Provide 3rd level support in respective technology vertical (Systems, Network or Storage , Database)
  • Keeping abreast of changes in the technical sphere
  • Leading technology improvements in customer engagements
  • Qualification: Bachelor’s degree and/or required years of experience
  • 7-10 years of experience, College Degree
  • Should be proficient in Technical Process Expertise, Technology Application and Continuous (Service) Improvement
  • Should have progressing skills in Transition Management and Technical Solution Design