Security Consultant Senior Resume Samples

4.7 (100 votes) for Security Consultant Senior Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security consultant senior job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
CE
C Eichmann
Carolyne
Eichmann
155 Schmidt Trafficway
Dallas
TX
+1 (555) 734 4276
155 Schmidt Trafficway
Dallas
TX
Phone
p +1 (555) 734 4276
Experience Experience
Dallas, TX
Senior Consultant Cyber Security
Dallas, TX
Brown, Turcotte and Cartwright
Dallas, TX
Senior Consultant Cyber Security
  • Breach and incident management, design and implementation of breach and major incident management practices
  • Develop and maintain productive working relationships with client personnel
  • Where possible, you will identify opportunities for EY to assist our clients further and escalate these potential areas to the engagement manager
  • Work effectively as a team member, sharing responsibility, providing support, maintaining communication, and updating senior team members on progress
  • Participate and assist in preparing for meetings with target management teams
  • Security transformation programmes – design & management of security solution implementations and / or remediation programmes
  • Resilience, design and implementation of programmes to improve IT Disaster Recovery, Business Continuity
Los Angeles, CA
Senior Consultant, Cyber Security
Los Angeles, CA
Effertz, Kessler and Frami
Los Angeles, CA
Senior Consultant, Cyber Security
  • Establishing and building a network of contacts across EY and across peer level networks within our clients
  • Working with the engagement manager you will assist with the planning and delivery phases of engagements
  • Contributing to the creation of proposals and marketing material
  • Working with team members you will create high quality reports, ready for review by a Manager or Senior Manager
  • Security around emerging technology platforms – mobile device platforms (iOS, Android), cloud services (IaaS, PaaS, SaaS), Big Data, Social media
  • Security policies and procedures, in line with regulation and/or current standards, ISO27001 (Essential)
  • Working across a portfolio of cyber engagements with our clients, reporting to a Manager or Senior Manager, responsible for the day to day completion of security assessments or delivering elements of a security transformation programme
present
New York, NY
Senior Consultant Security Engineer
New York, NY
Runte LLC
present
New York, NY
Senior Consultant Security Engineer
present
  • Manage existing IAM infrastructure and provide Level 2/3 support. Work with help desk and other teams to troubleshoot and resolve/fix issues and bugs
  • Work with security and compliance teams to provide auditing and reporting facilities and processes
  • Work with Security and Compliance teams to provide auditing and reporting facilities and processes
  • Design and develop provisioning and de-provisioning processes/workflows for accounts across various internal and external systems
  • Execute training of operations and SME teams
  • Responsible for the development of tools, scripts for maintenance, provisioning and de-provisioning
  • Configure and develop adapters and connectors with various systems and databases for account provisioning, de-provisioning and updates to user accounts
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of North Texas
Bachelor’s Degree in Computer Science
Skills Skills
  • Experience administering Unix/Linux servers
  • Experience writing and debugging Unix/Linux shell and Perl scripts
  • Experience with one or more of the following IAM products: Oracle Access Manager, IBM TAM, OpenSSO, SailPoint, Oracle Identity Manager
  • Experience with some or most of the following web and application servers: WebSphere, JBoss, Tomcat, Apache, IHS, IIS
  • Experience managing complex directory service environments on a global scale
  • Experience writing and debugging interpretive web-based code
  • Experience working in PCI/SOX controlled environments
  • Use of ITIL methodologies for path-to-production
  • Responsible for the installation and administration of CA IdentityMinder for enterprise-wide global User Lifecycle Management
  • Design and develop provisioning and de-provisioning processes/workflows for accounts across various internal and external systems
Create a Resume in Minutes

15 Security Consultant Senior resume templates

1

Advisory Senior Consultant Information Security Resume Examples & Samples

  • Establish relationships with client personnel at appropriate levels
  • Possess good business acumen
  • Demonstrate and apply a thorough understanding of complex information systems. Use knowledge of the current IT environment and industry trends to identify engagement and client service issues, and communicate this information to the engagement team and client management through written correspondence and verbal presentations
  • A minimum of 1 year of related work experience with information security systems with hands-on Splunk technical infrastructure and implementation experience
  • The successful candidate must hold or be willing to pursue related professional certifications such as the CISSP, CISM, and/or CISA. Related certifications such as Splunk Certified Architect, Splunk Certified Admin, or Splunk Certified Knowledge Manager highly preferred
2

Advisory Senior Consultant IT Risk Transformation Information Security Resume Examples & Samples

  • Consistently deliver quality client services. Monitor progress, manage risk and ensure key stakeholders are kept informed about progress and expected outcomes. Stay abreast of current business and industry trends relevant to the client's business
  • Remain current on new developments in advisory services capabilities and industry knowledge
  • A bachelor's degree and a minimum of 2 years of related work experience; or a graduate degree and approximately 1-2 years of related work experience in the fields of Computer Science, Information Systems, Engineering, Business or related major
  • A minimum of 1 year of related work experience with information security systems with a strong understanding of information security regulatory requirements and compliance issues
  • The successful candidate must hold or be willing to pursue related professional certifications such as the CISSP, CISM, and/or CISA
3

Senior Solutions Consultant, Security Resume Examples & Samples

  • Perform internal and external vulnerability assessments
  • Develop and mature vulnerability management programs within large enterprise organizations
  • Develop and test exploits and scripts ( PERL/Python/Bash Scripting )
  • Perform log analysis, WASP, Secure SDLC , web application and security configuration reviews, code reviews
  • Perform IT infrastructure/ Application Security configuration reviews
  • On time delivery of solutions and consulting engagements in accordance with contract terms and conditions or statements of work and industry best practices
  • Management of client expectations and timely resolution of issues that may arise; and
  • Participation in ongoing development of tools and procedures required by the STIRT and the development of new or evolving practice offerings
  • Perform Incident Response Reviews for Bell’s client’s
  • Ability to accurately scope and provide associated effort levels for future opportunities
  • External Relationships: Clients, typically senior level managers
  • Senior Information Technology/Systems Executives, Corporate Information Officer (CIO)
  • IT Directors and Senior IT Security staff
  • Internal Relationships: Sales, Sales Support, Product Development and Marketing senior leader teams
  • Professional Services and other Line of Business (Managed Services, Infrastructure)
  • 5+ years project experience delivering Vulnerability Assessments and Penetration Testing Services for external clients
  • Ability to engage easily with multiple management levels and senior IT resources
  • Excellent communication skills in (spoken and written)
  • Comfortable with: TCP/IP Networking skills
  • Linux / Windows OS and Administration skills
  • SQL db experience
  • Cisco Routing
  • Firewall Administration
  • Scripting skills Perl and Python, programming skills with C
  • Ability to integrate and manage common network infrastructure
  • Working knowledge of
  • Network security tools (NMAP, Nessus, Nikto, Metasploit, BURP, HP Fortify, etc.)
  • Security Device Technologies: Firewalls, VPN, IDS/IPS
  • Online vulnerability
  • Strong administration skills with FOS software suites (apache, postfix, mailman, majordomo)
  • Experience with ESX virtualized environments
  • Experience with software distribution and packaging (i.e. RPM, .deb)
  • Experience with Configuration Management suites (i.e. CF Engine)
  • Ability to prioritize tasks and manage concurrent projects
  • Security certification such as CISSP and OPST
  • Application development background and security knowledge – example of languages include C, C#, C++, Java, J2EE
4

Senior Consultant Information Security Resume Examples & Samples

  • A Bachelor’s degree in Computer Science, Information Security, or equivalent experience. Strong background in application security design and risk assessment with some prior application development experience (multi-tier web application development preferred)
  • Demonstrated experience in architecting enterprise data security solutions for large enterprises
  • Experience with one or more of the following; XML, HTML, HTTP, SOA, and programming languages such as Java, COBOL, RPG, Perl and JavaScript
  • Good experience with integration of security services, including authentication, entitlements, encryption and audit capabilities as part of an overall system design
  • Demonstrated understanding of data security and privacy needs and requirements of financial services institutions (PCI, SOX and Basel II)
  • Proven track record of implementing and actively managing fundamental information architecture frameworks and methodologies
  • Demonstrated ability to lead or facilitate complex mission critical projects with multi-disciplinary teams
  • Related work experience
  • 10+ years of experience in an IT related field
  • 2+ years of software design and development experience
  • 5+ years of systems analysis and design experience
  • 2+ years of experience with governance, risk & compliance solutions and processes
  • 5+ years of demonstrated project management knowledge and problem solving skills
5

Senior Solutions Consultant, Security Resume Examples & Samples

  • Acting as a principal consultant in regards to developing and delivering strategic consultation engagements
  • Recruiting top security talent in the region to support security funnel and opportunities
  • 15+ years in IT with a minimum of 10 years of demonstrated experience in providing detailed technical architecture expertise on Security Solutions within large corporate environments with a focus on solution implementation
  • Experience in providing technical architecture and integration expertise on Security Solutions within large corporate environments with a focus on solution implementation
  • Experience in defining and implementing a Security Solutions roadmap
6

Senior Unix Security Consultant Resume Examples & Samples

  • Utilize strong security technical and analytical skills to further advance the security of the organization
  • Provide security insight and into review of project and initiatives ensure efforts are in line with existing policies and standards
  • Develop additional tools/scripts to further research, investigate, evaluate and respond to potential security items
  • Provide input into policy making decisions and assist in validating all policies are appropriately enforced
  • Preferred Certifications: One or more of the following certification, industry designations or equivalent
  • 5 years’ of experience in security or system architecture/engineering role responsible for designing and deploying security solutions
7

Advisory Senior Consultant Cybersecurity Advanced Security Center Resume Examples & Samples

  • Strong Unix, Windows, networking and wireless security skills
  • Strong technical skills related to a broad range of operating systems and databases
  • Experience with attack and penetration testing is a plus
  • Familiarity with Windows in an enterprise environment is a plus
8

Senior Consultant Information Security Resume Examples & Samples

  • Security Program Management (e.g. development of information security strategies, set-up of a security organization, security metrics and reporting…)
  • Threat and Vulnerability Management (e.g. attack and penetration / ethical hacking, incident response, secure development …)
  • Identity and Access Management (provisioning, roles and rules management, access management governance…)
  • Information Protection and Privacy (e.g. data protection strategy, privacy impact assessments …)
9

Senior Applications Security Consultant Resume Examples & Samples

  • Strong understanding of Software Development Life Cycle (SDLC) with a focus on application security
  • In depth understanding of Internet protocols, network architecture, and security technologies including encryption and authentication (e.g. SSL, PKI, IPSec, Single Sign-On, etc…)
  • Demonstrated experience in establishing data governance, data quality and other data management programs
  • Strong presentation, oral and written skills, and experience with facilitating and briefing
  • Professional certifications in Information Security desirable (CISSP / CISM)
  • 5+ years of IT security experience with focus on the “Software Development Security” domain of CISSP
10

EY Senior Consultant, Cyber Security, EAC Resume Examples & Samples

  • Bachelor's degree (in a relevant subject i.e Computer Science) and a minimum of 2 years of related work experience (essential)
  • A strong academic record
  • An understanding of web-based application vulnerabilities
  • Experience with programming languages such as Java, C, C++, C#, asp, and .NET (if Computer Science degree holder, this will have been covered)
  • Currently working in a Big 4 firm essential
11

Senior Consultant Cyber Security Resume Examples & Samples

  • Provide information and cyber security advisory services to major players in the banking, insurance and wealth management sectors
  • Perform technical cyber security assessments, IT risk assessments and ethical hacking missions (including network, web and mobile application penetration testing, social engineering, etc.)
  • Advise clients on how to efficiently remediate vulnerabilities, manage IT risks and improve the overall cyber security posture and resiliency of their organizations
  • Help clients better protect their data, as well as achieve compliance with Swiss financial industry regulations and leading practices in the cyber security space
  • From project to project, develop your expertise alongside senior team members and inspire teamwork with more junior team members
  • Collaborate with other team members to develop service proposals, project documentation and reports
  • Demonstrate a thorough understanding of complex information systems, cyber security concepts, cyber threats and market leading solutions
  • Be at the forefront of «Thought Leadership» in response to market changes and new challenges faced today
12

Senior Info Security Consultant Resume Examples & Samples

  • Plans the infrastructure Security strategy of the organization by working with management to ensure appropriate security coverage and mitigate risks to an acceptable level
  • Build and Maintain strong working relationships with peer groups and business clients for improving/providing services
  • Interact and work with Audit findings and helps provide an understanding of security frameworks within the organization
  • Lead the Security Tools support of SEIM, RSA, Symantec SEPM, DLP & NAS, E-mail Security Appliances, Web Security Appliances, CyberArk and new tools that are being built
13

Security Senior Consultant Resume Examples & Samples

  • Knowledge of security specific solutions in the same domain to assess migration complexity and to integrate with existing customer solutions
  • Ability to understand business requirements and provide security solution assessment and design detailed solutions together with reliable estimations. (IDM, SSO, Log Management, Biometrics technologies, …) as well as experience managing expectations when balancing alternatives against business and financial constraints
  • At least 7 years of experience Information Security Governance and Risk Management projects, with responsibilities to provide advisory for security strategy and security plan, perform assessment and risk analysis, define role and responsibility in terms of security, process re-engineering and preparation of policy, procedure, guidelines
  • Expert level acquired with 7+ years of systems integration with implementation experience at large enterprises in complex heterogeneous environments
  • Deep knowledge of security framework, standard and best practice (ISO 2700x, NIST, COBIT, PCI DSS, ...)
  • Maintain knowledge of compliance requirements/standards (e.g. ISO27k, BC ISO22301, PCI-DSS, EU Data Privacy Requirements) and other international security regulations and communicate to the team and wider department
  • Ability to understand business requirements and convert them into solution designs
  • Demonstrated excellence at presenting complex development topics to both executive and technical personnel
14

Senior Consultant, Virtualization Security Resume Examples & Samples

  • 5+ years of relevant information and networking security experience, ideally in a highly virtualized environment
  • Performed as Technical lead (Sr Engineer/Architect) for medium to large security projects
  • Troubleshooting expertise in the areas of Networking and Network Security solutions
15

Senior Consultant Cyber Security for Emeia Advisory Centre Resume Examples & Samples

  • Bachelor's degree (in a relevant subject i.e. Computer Science) and a minimum of 2 years of related work experience
  • Experience with programming languages such as Java, C, C++, C#, asp, and .NET
  • Experience with attack and penetration testing, application security source code assessments or security testing of web based applications is a plus
  • Previous experience of working in a Big 4 firm or Management Consultancy would be beneficial
  • Willingness and ability to travel domestically and internationally to meet client needs
  • CISSP (Certified Information Systems Security Professional) and SSCP (Systems Security Certified Practioner) certifications are a plus
16

Senior Consultant, Virtualization Security Resume Examples & Samples

  • Performed as Technical lead for medium to large security projects
  • Troubleshooting expertise in the areas of Network Securit and Systems Security
  • 71617BR
17

Senior Cyber Security Data Consultant Resume Examples & Samples

  • Work directly with security operations center and security sensor owner teams to implement procedures and systems for the protection, conservation and accountability of proprietary, personal or privileged electronic data
  • Make remediation orders, tactics, and suggestions to resolve and prevent further incidents
  • Analyze and develop baselines for all related risk from ArcSight and/or other log management tools
  • Develop rules that trigger response to malicious activity
  • Develop response procedures for addressing potential security threats
  • Undergraduate degree or equivalent work experience
  • 8+ years of IT security work experience
  • 3+ years of experience with HP Arcsight content development
  • At least one of the following certifications or equivalent experience: GCFA, GCIH, GCIA, GPEN, CEH, CISSP, or CISM/A
  • Familiarity with security analysis of security system logs and network protocols
18

Senior Consultant Cyber Security Resume Examples & Samples

  • Participate in IT Risk and information security type engagements
  • Work effectively as a team member, sharing responsibility, providing support, maintaining communication, and updating senior team members on progress
  • Participate and assist in preparing for meetings with target management teams
  • Build strong internal relationships within EY Advisory Services and with other services across the organization
  • Contribute to people-related initiatives, including recruiting and retaining IT Risk Services professionals
  • Maintain an educational program to continually develop personal skills of staff
  • Understand and follow workplace policies and procedures
  • Undergraduate or masters’ degree preferably in one of the following areas: Business Management, Information Systems, Computer Science, Engineering, and other related majors
  • Extensive IT controls and IT risk experience – cyber/penetration test experience is highly desired
  • Must have CISSP Certification
  • Experience working with ISO27000 is a must
  • Nice to have experience with or Knowledge of SCADA or DCS Systems
  • Experience working in the Power and Utilities or Financial industry would be an asset
  • Knowledge of Governance and Policy creation is an asset
  • Demonstrated leadership abilities
  • Involvement with extracurricular activities
  • Excellent interpersonal, written, verbal, communication, and presentation skills
  • Solid computer skills
19

Orlando IT Consulting Security Senior Consultant Resume Examples & Samples

  • Above-average written and verbal communication skills, including documentation of findings and recommendations in formal reports
  • Proficiency in utilization of information security tools such as Nmap, Nessus, Burp Suite, Metasploit and manual techniques to exploit vulnerabilities in networks and applications
  • Knowledge of the OWASP Top 10 and related exploitation techniques, including but not limited to cross-site scripting, SQL injection, session hijacking and buffer overflows to obtain controlled access to target systems
  • Ability to perform network traffic analysis, utilizing packet capturing software, to isolate malicious network behavior, inappropriate network use or identification of insecure network protocols
  • Knowledge of information system architecture and security controls (i.e. firewall and router configurations, operating system configurations, wireless architectures, databases, specialized appliances and information security policies and procedures)
  • 3+ years practical experience in TCP/IP networking
  • 3+ years hands on server administration experience is preferred
  • Knowledge of industry and regulatory frameworks (PCI-DSS, HIPAA, GLBA, ISO 27001) is strongly preferred
20

Senior Industrial Cyber Security Consultant Resume Examples & Samples

  • Bachelor’s Degree in Electrical Engineering, Industrial Engineering, Computer Science or Information Technology or related technology driven degree
  • Previous experience working as part of a large, multi-disciplinary team completing full project life-cycle implementations
  • Strong analytical, problem solving and interpersonal skills required
  • An ability to influence and guide team members when required
  • 2+ years Previous Field Experience Preferred
  • Minimum of 3+ years as Security Consultant or related positions
  • Requires strong interpersonal communications, organizational and written/verbal communication skills
  • Subject matter expertise experience configuring IT/OT equipment (Cisco, EMC, etc..)
  • Subject matter expertise experience configuring Security appliance (Firewall, IPS, IDS, etc)
  • Subject matter expertise around creation of security governance documentation
  • Network Certifications (CCNA Security, GICSP, CISSP or equivalent)
21

Security Consultant Senior Resume Examples & Samples

  • Develops and implements leading practice security processes, procedures, and controls across cross-functional teams throughout Technology and the Business
  • Owns work process / issues from inception through execution and implementation involving boundary partners wherever needed
  • Regularly communicates complex security issues, including root cause analysis, and champions ideas for change
  • Build consensus across cross-functional Technology teams and the Business in approaches to manage security risk
  • Nature of work requires increasing independence; receives guidance only on unusual complex problems or issues; Work review typically involves periodic review of output by supervisor and/or direct “customers” of the process
  • Conducts risk assessments and communicates both detailed and summarized results to key technology and business process stakeholder
  • Actively engages with other project teams and ensures that project activities achieve the appropriate result for information security Strong Collaboration skills to effectively drive consensus and understanding among cross-functional teams on key security risks and vulnerabilities
  • Champions established strategic vision and drives adoption of key long term goals with clear communication of security risks and objectives to Technology and Business partners
  • Identifies opportunities that necessitate change and responds accordingly
  • Drives completion of key projects or assignments
  • Perform leading-edge areas of work for the professional field
22

Senior Consultant Security Engineer Resume Examples & Samples

  • Design and build platforms in CyberArk for new environments
  • Operationalize new deployments and hand them off to support teams
  • Act as Security SME to troubleshoot and diagnose issues with non-standard systems for CyberArk and Vasco
  • Work with different teams of SMEs to design technical solutions for integration
  • Work with different teams of SMEs to re-architect and re-engineer their processes for integration. This is a significant portion of the duties
  • Documentation creation and maintenance (Technical Architecture, SOPs, Runbooks, Standards, Executive Presentations) for handoff to junior team members
  • Training of operations teams, SME teams
  • Development of tools / scripts for maintenance / provisioning / deprovisioning
  • Conduct POCs for integration with CyberArk and Vasco Security products
  • Design, architect and implement the next generation of Vasco infrastructure
  • Design and architect the next generation of LDAP and Virtual Directory infrastructure
  • Provide CyberArk and Vasco SME (subject matter expert) level support to operations teams for both development and production environment. This will include occasional after-hours for escalated production issues
  • Work with security and compliance teams to provide auditing and reporting facilities and processes
  • Effectively engage with Architecture, Development, and Business teams to identify Privileged Account Management and Multi-Factor functionality that can be enabled and integrated to improve security or performance
  • Deep Windows, Linux, AIX, and Networking knowledge
  • Java, Perl, Bash, VBS, batch
  • LDAP, Radius, Kerberos
  • Extensive experience working with a Privileged Account Management solution, preferably CyberArk (3 or more years), or equivalent 5+ years of OS-authentication experience
  • Solid troubleshooting and problem solving skills
  • Hands-on experience with LDAP (ODSEE and UnboundID preferred) and RADIUS technologies
  • Extensive experience with Multi-Factor solutions (Vasco preferred)
  • Experience administering Unix/Linux servers
  • Experience writing and debugging Unix/Linux shell and Perl scripts
  • Experience with one or more of the following IAM products: Oracle Access Manager, IBM TAM, OpenSSO, SailPoint, Oracle Identity Manager
  • Experience with some or most of the following web and application servers: WebSphere, JBoss, Tomcat, Apache, IHS, IIS
  • Experience managing complex directory service environments on a global scale
  • Experience writing and debugging interpretive web-based code
  • Experience working in PCI/SOX controlled environments
  • *THERE IS NO SPONSORSHIP AVAILABLE FOR THIS POSITION***
23

Senior Consultant Security Engineer Resume Examples & Samples

  • Execute training of operations and SME teams
  • Responsible for the development of tools, scripts for maintenance, provisioning and de-provisioning
  • Effectively engage with architecture, development, and business teams to identify privileged account management and multi-factor functionality that can be enabled and integrated to improve security or performance
24

Senior Consultant Cyber Security Advisory Melbourne Resume Examples & Samples

  • Work across all areas of Cyber Security such as general risk controls, cloud, and data protection however this role will have a strong focus on Identity and Access Management (IAM)
  • Utilise your experience and knowledge to shape and inform our clients understanding of information security risks and solutions
  • Develop IAM strategies, architectures, use cases, test and implement plans and solutions
  • Define policies, business and technical requirements for IAM solutions
  • Manage /deliver projects, including development of project plans, project goals and objectives, tasks, required resources, and associated budgets and timelines for completion
  • 4 plus years’ external consulting experience in the field of Cyber Security in areas such as
25

Senior Consultant, Cyber Security Resume Examples & Samples

  • Working across a portfolio of cyber engagements with our clients, reporting to a Manager or Senior Manager, responsible for the day to day completion of security assessments or delivering elements of a security transformation programme
  • Contributing to the creation of proposals and marketing material
  • Security transformation programmes – design & management of security solution implementations and / or remediation programmes
  • Identity and access management (IDAM), assessing current IDAM practices and designing solutions to improve JML processes, privileged access and recertification programmes
  • Security policies and procedures, design and implementation of security policies, procedures, standards and controls in line with regulation and/or current standards, ISO27001, NIST, SANS etc
26

Senior Business Consultant CIP & Security Resume Examples & Samples

  • Customers: Exhibits extensive knowledge of the customer’s business, strategic drivers, financial requirements and is able to discuss and leverage strategic business value in conversation at the highest levels of the organization; should pursuit > €5M opportunities; could include
  • Opportunity discovery: discovers at an early sales stage a business opportunity for integrated HBS portfolio concerning industrial security and safety as well as telecommunication platform that supports their functionality
  • Sales process: proactively leads, manages and executes the disciplined sales process from start to finish, anticipated customer needs and requirements ensuring that they are met every step of the way from sale to execution, acts as team leader internally and externally during the entire sales process
  • Business relationships: actively sees outs, plans and leverages internal and external relationships to drive business for HBS. Establishes strategic relationships or a vision for developing a committed customer. Networks internally with HBS (Honeywell Building Solutions) and other Honeywell business groups to achieve full customer satisfaction with the best internal resources
  • Results: Profitable growth and focus on new opportunities and new customers
  • Bachelor's Degree in Telecommunications or Industrial Engineering
  • Demonstrated experience in consultative selling in similar positions
  • Seven + years of experience in sales activities
  • Fluent in English and Spanish
  • Strong knowledge of Oil & Gas market and EPC companies
27

Advisory Senior Consultant Cybersecurity Security Analytics Resume Examples & Samples

  • Consistently deliver quality client services
  • Bachelor's degree and a minimum of 2 years of related work experience, or a Master’s degree and approximately 1- 2 years of related work experience in the fields of Computer Science, Information Systems, Engineering, Business or related major
  • A strong academic record, including, without limitation, course work that EY deems relevant to this position
  • Experience with programming languages such as Java, C, C++, C#, asp, and .NET is a plus
  • Experience with security testing of web based applications is a plus
  • The ability to perform basic static and dynamic malware analysis is a plus
  • The successful candidate must hold or be willing to pursue related professional certifications such as the CISSP or equivalent
28

Senior Consultant, Security Resume Examples & Samples

  • Expertise - Collaborate with AWS field sales, pre-sales, training and support teams to help partners and customers learn and use AWS services such as Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S3), Amazon SimpleDB/RDS databases, AWS Identity and Access Management (IAM), etc
  • Solutions - Define and deliver on-site technical engagements with partners and customers. This includes participating in pre-sales on-site visits, understanding customer requirements, and proposing and delivering packaged offerings, and delivering custom solution engagements
  • Delivery - Engagements include short on-site projects proving the use of AWS services to support new distributed computing solutions that often span private cloud and public cloud services. Engagements will include migration of existing applications and development of new applications using AWS cloud services
  • Insights - Work with AWS engineering and support teams to convey partner and customer needs and feedback as input to technology roadmaps. Share real world implementation challenges and recommend new capabilities that would simplify adoption and drive greater value from use of AWS cloud services
  • Customer facing skills to represent AWS well within the customer’s environment and drive discussions with senior personnel regarding trade-offs, best practices, project management and risk mitigation
  • Highly technical and analytical, possessing significant IT implementation experience
  • Deep hands-on experience leading the design, development and deployment of business software at scale
  • Proven experience with software development life cycle (SDLC) and agile/iterative methodologies required
  • Experience with IT compliance and risk management requirements (eg. security, privacy, SOX, HIPAA etc.)
  • BS level technical degree desirable; Computer Science or Math background preferred; MS degree preferred
  • Strong track record of implementing AWS services in a variety of distributed computing environments
  • Integration of AWS cloud services with on-premise technologies from Microsoft, IBM, Oracle, HP, SAP etc
  • AWS Certification, eg. AWS Solutions Architect Associate
29

Security Consultant Senior Resume Examples & Samples

  • Works with product and engineering teams to review, manage, and track security vulnerabilities remediation efforts, and ongoing vulnerability testing
  • Lead cost-risk tradeoff discussions with the product teams, helping to decide how important and at what increased cost each security requirement/functionality can be justifiably added in the product
  • Ensures that the design and integration of products with Technology and business partners leads to the development and growth of the business through effective use of security
  • Works closely with product teams in order to fully understand business priorities of the function and the corporation as a whole
  • Establish functional strategic goals for improving operations, products and services. Initiate and direct activity aligned with achieving improvement goals
30

Senior Consultant Cyber Security Resume Examples & Samples

  • Working with team members you will create high quality reports, ready for review by a Manager or Senior Manager
  • Where possible, you will identify opportunities for EY to assist our clients further and escalate these potential areas to the engagement manager
  • Working with the engagement manager you will assist with the planning and delivery phases of engagements
  • Security strategy, assessment, designing and implementing security strategy, governance frameworks over processes, controls, organisation & infrastructure to management cyber security
  • Security architecture – creating secure architecture designs for solutions, designing secure patterns for reuse and the delivery of architectural reviews using TOGAF or SABA
  • Security relation qualifications such as CISSP, CISM, CISMP, ISO27001 lead implementer or auditor, MBCI, IAPP(desirable)
  • Project and programme related qualifications; Prince II, Scrum, Agile
31

Senior Consultant, Cyber Security Resume Examples & Samples

  • Application security and vulnerability assessments
  • Network security and infrastructure design and configuration
  • Strong academic record, to degree level or equivalent industry experience
  • Project and programme related qualifications; Prince II, Scrum, Agile (desirable)
32

Identity Access Management Senior Consultant Advisory Cyber Security Resume Examples & Samples

  • Implement IAM technology solutions (Access Certification , User Provisioning, , Web Access Management, Privileged Access Management, Role Management)
  • Develop IAM strategies, architectures, use cases, test and implementation plans
  • Undertake current state assessments of client’s current IAM capabilities
  • Define business and technical requirements for IAM solutions
  • Define business processes and policies related to IAM
  • Define Role Based Access Control (RBAC), Entitlement, and Segregation Of Duty models
  • Undertake role mining and access analysis; and
  • Professional services in Australia/or within the Australian market
  • Developing IAM strategies, architectures and implementation plans
  • Implementing or architecting IAM solutions such as SailPoint, CyberArk, RSA, Oracle OAM, OVD, OID or OIM, Dell, CA Identity Manager, IBM or IDaaS providers highly regarded
  • Integrating IAM solutions into clients' infrastructure and applications
  • Analysing regulatory requirements and compliance issues related to IAM
  • Performing current state assessments of IAM, including benchmarking/maturity assessments, developing strategies and roadmaps for improvement
  • A comprehensive understanding backed by demonstrable experience of implementing the IAM control set, including Segregation, Role Management, Attribute based access control and risk based authentication models, across people, process and technology levels
  • Completing role and user entitlement analysis
  • Performing identity clean-up and access remediation
  • Completing requirement analysis, process definition, workflow design and process mapping
  • Owning the development of client deliverables and technical content
  • Working with, and knowledge of security concepts and standards such as information security program transformation, security policy creation, enterprise security strategies, architectures and governance, data protection, IS27001/2, PCI-DSS, or data privacy
33

Senior PCI / QSA Security Consultant Resume Examples & Samples

  • Minimum three (3) years of experience performing Payment Card Industry (PCI) assessments
  • Certifications desired in: CISSP, CISA, CISM, ISA, PCIP
  • Ability to effectively present information in individual and group situations to clients and other employees within the organization
  • Bachelor's Degree from a four-year college or university in Information Assurance, Computer Science, Management Information Systems or related area of study; or related experience and/or training; or equivalent combination of education and experience preferred
34

Advisory Senior Consultant Cybersecurity Security Monitoring Resume Examples & Samples

  • Stay abreast of current business and industry trends relevant to the client's business and cybersecurity
  • Participate in research and provide recommendations for continuous improvement
  • Bachelor's degree and a minimum of 2 years of related work experience, or a Master’s degree and approximately 1-2 years of related work experience in the fields of Computer Science, Information Systems, Engineering, Business or related major
  • A deep understanding of TCP/IP networking
  • Experience with application security source code assessments is a plus
  • Must be able to effectively communicate with business partners in non-technical terms
35

ICS Security Senior Consultant Resume Examples & Samples

  • Have 5+ years of experience with industrial control system Cybersecurity, industrial control system design and industrial networks, with experience designing, maintaining and supporting Process Control Domain network infrastructures – e.g. CCNA, CCNP type qualifications
  • Ability to analyze and suggest recommended improvements to the industrial control system configurations, applications, systems and networks to meet industry standards and best practices
  • Able to author technical and non-technical documents, at varying levels of details (high and low levels)
  • Have a good knowledge of networking gained in a hands-on environment
  • Requires a comprehensive working knowledge of one or more of the following: IEC 62443/ISA 99, ISO 27001, NIST SP 800-82, CPNI Good Practice
  • Exposure working with, protecting and administering critical industrial network infrastructures, with demonstrable experience working with automation vendors such as ABB, Siemens, Rockwell, Honeywell, Foxboro, Emerson, Yokogawa etc
  • Experience and skills in safety-related control systems, including a working knowledge of IEC 61508 and IEC 61511 Functional Safety Standards
  • Knowledge of multiple operating systems including Windows and Linux/UNIX and have hands on experience of carrying out at least basic system administrator functions
  • Experiences and skills in Securing Industrial Wireless Networks and Industrial Internet of Things (IIOT) and monitoring packages such as SIEM, SOC and NOC
36

Senior Consultant, Cyber Security Resume Examples & Samples

  • Establishing and building a network of contacts across EY and across peer level networks within our clients
  • Security transformation programmes
  • Security policies and procedures, design and implementation in line with regulation and/or current standards, ISO27001, NIST, SANS etc
  • Data privacy, implementation of data protection / GDPR programmes
  • Strong academic record, to degree level or equivalent industry experience (Desirable)
  • ISO27001 certification (Essential)
  • Security relation qualifications such as CISSP, CISM, CISMP, MBCI, IAPP (Desirable)
37

Workday Security & Controls Senior Consultant Resume Examples & Samples

  • 3 – 5 years of Workday experience
  • Workday Certification
  • Demonstrate an understanding of business process designs, internal control risk management and IT controls involving Workday systems
  • Experience designing, configuring and testing Workday security and controls solutions such as
38

Senior Consultant Security Engineer Resume Examples & Samples

  • Responsible for the installation and administration of CA IdentityMinder for enterprise-wide global User Lifecycle Management
  • Design and develop provisioning and de-provisioning processes/workflows for accounts across various internal and external systems
  • Configure and develop adapters and connectors with various systems and databases for account provisioning, de-provisioning and updates to user accounts
  • Work with various business and application teams on User Lifecycle Management provisioning requirements
  • Deploy and support CA Identity Governance for user access certifications/attestations
  • Act as IG Administrator for new certification campaigns, using ETL tools for non-IDM connected applications and managing lifecycle of certification campaigns
  • Write custom code and/or web services for closed-loop remediation of role attestation rejections
  • Manage existing IAM infrastructure and provide Level 2/3 support. Work with help desk and other teams to troubleshoot and resolve/fix issues and bugs
  • Work with Security and Compliance teams to provide auditing and reporting facilities and processes
  • Work with Operations team to deploy and integrate new technologies into current environments
  • This role is for a core CAIM/CAIG developer
39

Senior Microsoft Security Consultant Resume Examples & Samples

  • Enterprise Mobility and Security Suite (EM+S)
  • Azure Key Vault, Azure Security Center, OMS
  • Architecture and security management
  • Strong understanding of security best practices
  • Securing network and enterprise cloud applications
  • Privileged access management technologies
  • Security frameworks, such as ISO/IEC 27001 or NIST 800-53
  • Creating security framework, SIRRP process and/or forensic handling methods
  • Knowledge of host hardening, auditing, logging and monitoring, network security, SEIM deployments, security analytics, anomaly detections, PKI
  • Certifications: CISSP, CISM, Microsoft Mobility MCP Exam 98-368, or other relevant certifications (preferred)
40

Senior Consultant, Cyber Security Resume Examples & Samples

  • Security strategy; assessments, designing and implementing security strategy, governance frameworks over processes, controls, organisation and infrastructure to management cyber security (Desirable)
  • Undertake Security and vulnerability assessments (Essential)
  • Security transformation programmes (Desirable)
  • Identity and access management (IDAM), assessing current IDAM practices and designing solutions to improve JML processes, privileged access and recertification programmes. (Desirable)
  • Security policies and procedures, in line with regulation and/or current standards, ISO27001 (Essential)
  • Data privacy / data protection / GDPR experience (Essential)
  • Security architecture (Essential)
  • ISO27001 certification (Desirable)
41

Senior Siem Security Consultant Resume Examples & Samples

  • Responsible for verifying and implementing the detailed technical design solution to the problem as identified by the Project/Technical Manager
  • Providing a detailed technical design (HLD and LLD) for SMB and/or enterprise SIEM / SOC solutions
  • Delivery of supporting policy, procedures and practices required to deliver, maintain and operate an effective operational SIEM solution
  • Regularly lead in the technical assessment and delivery of specific technical solutions to the customer
  • Produce complete proposals for smaller engagements within area of expertise
  • Implementation of new installations, designs, and migrations for technology solutions in the SIEM area
  • Provides advanced technical consulting and advice to others on proposal efforts, solution design, system management, tuning and modification of solutions
  • Collects and determines data from appropriate sources to assist in determining customer needs and requirements
  • Ability to deliver Subject Matter Expert level operational support to SIEM Solutions
  • Own the knowledge transfer of deployed SIEM Solutions to end user teams / SOC
  • Engages in technical problem solving across multiple technologies; often needs to develop new methods to apply to the situation
  • Contributes to knowledge sharing within the consultant community
  • Proactively encourages membership and contributions of others to professional community and coaches others in area of expertise
  • Integration of SIEM technology with varied end devices including, core security tools and applications, Threat Intelligence platforms, Asset Management platforms and business applications
  • Recognised Information Security qualification / certification such as CISSP, CISM, CISA or SANS
  • Expert product knowledge of SIEM and Log Management technologies such as ArcSight, QRadar, Splunk, LogRhythm, ELK etc. Vendor certifications are desirable to backup such experience
  • Excellent communication skills and the ability to document and communicate complex solutions
42

Senior IT Risk & Security Consultant Resume Examples & Samples

  • Coordinate Office of the CISO support activities including intake/engagement, mailbox monitoring and coordination across the global IT Risk and Security team (ITRS)
  • Conduct monthly BISO meetings to ensure security compliance requirements are consistently met
  • Manage IT Security project intake activities to ensure policy and minimum security requirements are embedded in project design and change management processes
  • Identify regulatory changes that will affect information security policy and compliance guidance for governmental laws and regulations and recommend appropriate changes
  • Evaluate and recommend security products, services and/or procedures to enhance productivity and effectiveness
  • Identify regulatory changes that will affect information security policy and compliance guidance for governmental laws and regulations and recommends appropriate changes
  • Facilitate use of technology-based tools or methodologies to review, design and/or implement IT security products and services
  • Execute projects in line with global IT Security governance strategy
  • Responsible for IT security metrics reporting activities and audit issue tracking/resolution
  • Collaborate and lead special information security-related projects as need arises
  • Implement and enforce enterprise security policies, processes and procedures
  • Support Federal and State Exams where IT Security input is required
  • 7+ years’ experience in IT and security, audit, or compliance related work experience
  • Project management skills, executing against strategy/plans
  • Understand security risks, controls and compliance requirements
  • Experience communicating with Leadership
  • Strong communications skills, both written and verbal
  • Reporting and metrics experience
  • Monitoring of KPIs
  • Vendor engagement