Security Engineer Information Security Resume Samples

4.5 (89 votes) for Security Engineer Information Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security engineer information security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
JL
J Lang
Jolie
Lang
14934 Isabel Harbors
Boston
MA
+1 (555) 797 5104
14934 Isabel Harbors
Boston
MA
Phone
p +1 (555) 797 5104
Experience Experience
New York, NY
IS Information Security Engineer
New York, NY
McClure-Cronin
New York, NY
IS Information Security Engineer
  • Analyze and audit environments providing recommendations for continuous improvement
  • Create and execute cyber incident response plans and train staff
  • Implement and maintain an information security risk management program at BC
  • Provide information security awareness training
  • Work with Sales teams to answer client questions related to information security
  • Designs, documents, and execute disaster recovery and business continuity drills or actual events
  • Develop automation scripts to handle and track incidents
Detroit, MI
Cyber Information Security Engineer Tier
Detroit, MI
Satterfield-O'Connell
Detroit, MI
Cyber Information Security Engineer Tier
  • Working knowledge of cyber security engineering
  • Working knowledge with software configuration, management, and administration
  • Web Application Firewall
  • Provide basic information security engineering support for multiple detection and alert tools including the following
  • Develop and maintain internal engineering documentation (e.g., policies, procedures, project schedules/timelines, etc.)
  • File Integrity Monitoring
  • Apply engineering principles to the design and enhancement of systems
present
Boston, MA
Information System Security Site Reliability Engineer
Boston, MA
Schuppe, Okuneva and Considine
present
Boston, MA
Information System Security Site Reliability Engineer
present
  • Assist in the construction and use of tracking tools and work with internal teams to ensure POA&M items are communicated in a timely fashion
  • Work with the development and operations teams to enhance and maintain 24x7 systems operations capabilities
  • Perform root cause analysis for service interruption recovery and create preventive measures
  • Manage upcoming and ongoing Certification and Accreditation and implement continuous monitoring according to ICD-503
  • Meticulous and cautious: identify and consider all risks and balance those with performing the task efficiently
  • Track action items from technical working groups and inform individuals of their action items
  • Develop Procedures and Training to transition support from Service Owners to Operations
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Bowling Green State University
Bachelor’s Degree in Computer Science
Skills Skills
  • Strong attention to detail and follow through
  • Strong Troubleshooting/Problem solving
  • Ability to communicate complex issues to all levels
  • Excellent listener
  • Strong written and oral communication
  • Ability to effectively organize and prioritize work tasks
  • Strong interpersonal skills
  • Leader, Self-directed, Consultant
Create a Resume in Minutes

15 Security Engineer Information Security resume templates

1

Security Engineer Information Security Resume Examples & Samples

  • Demonstrates extensive expertise in information security, penetration testing, and engineering practices. Integrates broad working knowledge in related disciplines to apply integrated security solutions for complex business situations
  • Consult internally with IS, IT, and business teams to apply security principles and best practices that meet business objectives
  • Provide guidance to security resources, business partners and IT staff when new projects are introduced to the business through all phases of the application life cycle
  • Participate in design and architecture decisions in the direction of security best practices
  • Participate in computer security incident response activities for network intrusions, malware infections, security violations, vulnerability remediation, etc…
  • Control attack surface by identifying attack vectors and potential or known vulnerabilities and establishing appropriate controls to mitigate such issues
  • Be passionate about information security and conduct research on current security topics
  • Application development background or experience analyzing code written in .NET, Java, C++, Objective C preferred
  • Scripting experience in at least one common language (Python, Ruby, Bash, VBScript, Powershell, etc)
  • 3+ years of IT proficiency and experience including some combination of system administration, security infrastructure, networking, development, etc…
  • 3+ years’ experience working with Microsoft, Unix, Linux, and mobile (iOS and Android) platforms
  • 3+ Experience with security technologies such as Firewalls, WAFs, vulnerability scanners, IDS/IPS, encryption technologies, AV, SIEM, DLP, FIM, etc…
  • Droll sense of humor appreciated
2

Information Security Engineer, VP Resume Examples & Samples

  • Point of escalation for problem resolution
  • Identify, investigate, and respond to security events or alerts
  • Participate as a security expert on projects and initiatives
  • Stay current with information security trends, attack techniques, and defensive measures
  • Automate processes in an effort to streamline our operational and response capabilities
  • Incident Response, Forensics, and Malware Analysis experience is a plus
  • Bachelor's degree from an accredited university and 6 years of technical experience OR High School Diploma or GED and 10 years of technical experience
  • 2 years of advanced experience with two of the following information security tools: firewalls, IDS/IPS, proxy, SIEM, DDOS protection, and advanced malware detection
3

Insider Threat Information Security Engineer Resume Examples & Samples

  • Researching, designing, engineering, implementing, and operating the next generation behavior analytics information security technologies and processes to address security issues holistically
  • Utilizing in-depth technical knowledge, behavior analytics focused methodologies and business requirements to design and implement secure solutions to protect the Bank's assets
  • Exercising judgment within broadly defined practices and policies in selecting methods, techniques, and evaluation criterion for obtaining results
  • Ability to apply reasoning and problem solving skills while utilizing next generation tools and technology to conduct deep behavioral analytics assessments/ investigations with a focus on mitigating information security related insider threats
  • Complete written reports in compliance with current reporting procedures and policies. Must have the ability to write detailed, concise, and accurate reports
  • May require on-call duties (evenings / weekends) to support tactical response partners
  • Aggressive curiosity, diversity of thought, critical thinking and persistence to identify risk
  • Strong oral and written communications skills and ability to interact effectively with technical and non-technical audiences, as well as present in front of small and large groups
  • Deep experience with Insider Threat as a focus area within Information Security
  • An excellent understanding of human behavior/ human psychology
  • Robust investigative and interview abilities
  • Knowledge of privacy, intellectual property, technology, and legal issues
  • Ability to recognize and deal appropriately with confidential and sensitive information
  • Working knowledge of common network protocols, information security practices and security vulnerabilities
  • Demonstrate a proven ability to self-direct project outcomes, with minimal supervision, to achieve program goals
  • Certifications- CeH, CFE, CFCE, CISSP, GCIH, SANS, GIAC
  • Experience conducting investigative interviews
  • Experience with Intrusion Detection & Prevention technologies (IDS/IPS)
  • Experience with SIEM systems and other data correlation engines
4

Information Security Engineer Ent Resume Examples & Samples

  • DNS and IP Address Assignment Firewall Rule Implementation
  • Auditing Security Vulnerability Assessment
  • Analysis Security Penetration Testing
  • Cybersecurity Incident Response
  • Cybersecurity Forensics
  • Log Review and Log Collection
  • Security Event management Log Collection
  • Processing Anti-Malware and Application Safe-listing
5

Cyber Information Security Engineer Tier Resume Examples & Samples

  • Provide basic information security engineering support for multiple detection and alert tools including the following
  • Data Loss Prevention
  • Network Behavior Anomaly Detection
  • Enterprise Anti-Virus
  • Enterprise Endpoint Forensics
  • Full Packet Capture
  • Evaluate tool configurations and policies and make recommendations to lead engineers
  • Collaborate with threat vulnerability and risk management teams to achieve global information security program objectives
  • Collaborate with other engineers to implement monitoring and performance metrics to ensure efficiency and effectiveness of services, and enable management to respond/take action on identified risks
  • Collaborate with internal security teams and vendors to implement security controls that protect the Navy Federal brand from confirmed or potential security breaches
  • Evaluate reported security vulnerabilities; makes recommendations to address deficiencies
  • Support engineering activities to address reported security vulnerabilities in adherence with the enterprise Change Management Policy and Incident Response Procedures
  • Gain and maintain active understanding of industry practices for threat analytics and incident response
  • Adhere to internal processes and detailed procedures to support the engineering function
  • Participate in ad hoc tasks or small projects
  • Perform regular and ad hoc diagnostic/health checks on systems
  • Keep current on industry best practices related to threat analytics and incident response
  • Develop and maintain internal engineering documentation (e.g., policies, procedures, project schedules/timelines, etc.)
  • Work on projects of varied scope
  • Apply engineering principles to the design and enhancement of systems
  • Working knowledge with software configuration, management, and administration
  • Experience in and knowledge of IT operations and change management
  • Familiarity with security operations and cyber-attack methods a plus
  • Ability to take direction from management and lead engineers
  • Effective skill in achieving goals through influence, collaboration, and cooperation
  • Effective skill in demonstrating Integrity and high standards of personal and professional conduct
  • Working knowledge of cyber security engineering
  • Effective organizational, planning and time management skills
  • Effective word processing and spreadsheet software skills
  • Desired: Bachelor’s Degree in Information Technology or the equivalent combination of education, training or experience
  • Desired: Familiarity with security operations and cyber-attack methods
  • Desired: Knowledge of Navy Federal operations, products, policies and procedures
  • Desired: Working knowledge of cyber architectures
  • Desired: CISSP, CISA, GIAC, CCNA or other related Information Security certifications
  • Desired: Experience with one or more cyber security detection/technologies/tools
6

Apple Information Security Engineer Resume Examples & Samples

  • Able to research, architect, and drive complex technical solutions, consisting of multiple technologies
  • Proficient with various programming languages such as Python/Java/Ruby/Perl/Go for automation or integration with multiple APIs (REST, SOAP, RPC)
  • Experience with data stream and data messaging services, including kafka, kinesis, syslog, fluentd, http
  • Experience with data storage (SQL, no-SQL) technologies and fast path query techniques
  • Working knowledge of network protocols and Linux/Unix system internals and transport protocols (TCP, TLS, HTTP, UDP)
  • Solid understanding of centralized configuration management and provisioning technologies, such as Ansible, Chef, Puppet, etc
  • Experience supporting services in distributed or cloud compute environments
  • Strong project management skills, including excellent presentation development
  • Excellent communications skills, capable of working with cross functional technical and business teams and varying levels of management in a professional manner
7

Information System Security Site Reliability Engineer Resume Examples & Samples

  • Document and disseminate security requirements relative to ICD-503
  • Manage upcoming and ongoing Certification and Accreditation and implement continuous monitoring according to ICD-503
  • Keep operational Security Design and other security documentation current. Be able to identify where work is needed and escalate concerns
  • Assist in the construction and use of tracking tools and work with internal teams to ensure POA&M items are communicated in a timely fashion
  • Delegate work appropriately to other IA staff with follow-up internally to ensure closure
  • Track action items from technical working groups and inform individuals of their action items
  • Ensure process documentation is complete and up-to-date
  • Effectively prioritize work and encourage best practices in others
  • Work with the development and operations teams to enhance and maintain 24x7 systems operations capabilities
  • Develop Procedures and Training to transition support from Service Owners to Operations
  • Define Standards for Configuration, Monitoring, Reliability, and Performance
  • Evaluate and implement technologies that improve efficiency, performance, and reliability
  • Develop and deliver creative solutions that automate System Engineering functions
  • Monitor systems and applications
  • Provide deep troubleshooting for production issues
  • Perform root cause analysis for service interruption recovery and create preventive measures
  • Coordinate with other departments to ensure problems are satisfactorily resolved. Track and report progress against established milestones, metrics, and deliverables
  • Anticipate and address preventable issues create incidents
  • Security Clearance required- TS/SCI preferred
  • Organized
  • Able to document and communicate ongoing work tasks and projects
  • Able to identify alternate, best-path solutions to technical problems
  • Positive, flexible, and personable – adaptive to change
  • Some experience with System Engineering & SDLC
  • Employ a systems-thinking approach to problem solving
  • Comfortable delegating work to the correct POC and escalating to management as needed Understanding of the NGA accreditation process
  • Experience with application of requirements from NISPOM, DCID 6/3, ICD 503, NIST 800-53 and related US Government standards and requirements
  • Advanced knowledge of Unix/Linux systems: know how page cache works and feel very comfortable at the command line
  • Code-writing ability (Python, Ruby, Java. Etc.)
  • Use automation to increase efficiency
  • Configuration management: experience managing an infrastructure with hundreds or thousands of servers and dozens of technologies
  • Strong networking fundamentals
  • In-depth understanding of web operations best practices
  • A knack for troubleshooting tough problems: a high level of ownership and curiosity empower this skill
  • Ability to learn rapidly
  • Meticulous and cautious: identify and consider all risks and balance those with performing the task efficiently
  • Comfortable working in a highly collaborative environment
  • Receptive to giving, receiving, and implementing feedback
  • Solid communicator with great customer service skills
  • Understanding of ITIL v3
  • Extremely curious about how things work
  • Education Background Preferred: Bachelors in Computer Science/ Information Systems Management/or relevant work experience
  • Years of work experience preferred: 5 years
8

Information Technology Security Engineer Resume Examples & Samples

  • Individual will be interfacing with multiple projects, and MUST have excellent customer service skillset
  • Perform analysis of security needs and contributes to System Development Lifecycle (SDLC) of network and systems architectures
  • Applicant should have a good networking background in order to understand and apply the requirements and needs of the customer(s)
  • Knowledge of various Operating Systems to include Linux, Windows, MacOSX
  • The successful candidate will have strong understanding of applying security measures for an enterprise environment with a multitude of information security technologies
  • Applicant will need to provide from a security prospective, technical oversight, design and engineering from initial phases of projects, activities
  • Must be well versed with NIST, FIPS standard security policies and be able to identify and apply security Policies, especially during designing/startup phase of project
  • Provide and identify where internal and external controls are necessary, and exercising and implementing those controls
  • BS degree and or equivalent and 5 years experience in IT, computer science and other cyber security related fields
  • Applicant MUST have ability to apply Security during Software implementation and designing
9

Information Security Tools Engineer Resume Examples & Samples

  • A minimum of 5 years of IT experience
  • A minimum of 3 years of dev-ops engineering experience
  • 3 years of development experience
  • Cloud Security experience (AWS and Azure), including both IaaS and PaaS models
  • Experience integrating diverse systems (e.g., SIEM, Log Aggregation, AV/AM, Enterprise Detection and Response, Threat Intel and other tools) to drive efficiency in Incident Response and Threat Hunting
  • Experience coding with Python or Ruby and providing integrations with REST or SOAP API?s
  • Proven experience developing and executing plans, meeting deadlines, operating under tight time constraints
  • Experience monitoring trends in information technology, identity & access, and security that could have an impact on the security of the organization's products, processes, infrastructure, or customers
  • Demonstrated experience making articulate and effective verbal and written presentations to different audiences
10

Information Security Innovation Engineer Resume Examples & Samples

  • Systems administration
  • Scripting languages (PowerShell, Python, or other languages)
  • Insider threat detection
  • Exceptional analytical/critical thinking abilities - must be able to analyze proposed technological solutions to not only understand how mechanisms work, but to also develop methods of effectively testing and evaluating technologies
  • Excellent research skills - must be able to identify relevant data sources for information about emerging technologies to gain an understanding of how things work, and be willing to dig in and take things apart to figure out how they work
  • Strong written communication skills - must be able to write technical whitepapers/reports on emerging technologies
  • Strong oral communication skills - must be able to present findings to broad audiences inclusive of senior technology and business management, requiring the ability to explain complex technical matters in a way both technical and non-technical personnel can understand
  • Hands-on technical abilities: Strong network knowledge (esp in the area of security), OS (Windows and RedHat), VMWare, endpoint and midrange, as well as development or scripting knowledge (e.g., Python, .NET, PowerShell, or Java)
  • Good software + hardware architecture experience: strong background productionizing applications in an enterprise environment
  • Ability to work independently: Must be adept at undertaking and completing tasks independently, meeting schedules and delivery timelines, and to moving swiftly from concepts and theory to action
  • Ability to build and execute testing methodologies unique to emerging technology products for which scant documentation exists
  • Ability to collaborate with teams at all levels: Line of Business, R&D, Operations, Technology Infrastructure, Platform Engineering, Vendor
  • Capable of advancing the program by developing policies, processes and procedures to promote security technology evaluation objectives for adoption throughout the Bank as an on-demand service
  • 5-7 years of experience with information security and either systems administration, networking, data analysis or application development
  • Bachelor’s Degree in Computer Science, Engineering or equivalent or higher in CS, IT, a related technical or engineering field
  • Experience working in the financial sector
  • Experience with the evaluation of emerging technology and /or experience as a technology innovator or maker
  • Demonstrated understanding of security vulnerabilities, attacks and ability to apply/implement appropriate controls or find new ones based on new technology being developed
  • Familiarity with the Bank of America environment, security controls and BAND builds
  • Strong knowledge of a plurality of languages, operating systems, and databases
  • Previous experience working on an R&D or Architecture team
  • Master’s Degree in a technology related field from an accredited university
11

Specialist Information Security Engineer Manufacturing & Perimeter Resume Examples & Samples

  • Participate in projects or initiatives where an Information Security Engineer is needed with a focus on ensuring inclusion of information security requirements
  • Provide mentorship and training on areas of expertise to Information Security and Amgen teams
  • Participate in on-call and perform appropriate escalation of problems and issues
  • Strong demonstrated working knowledge with GxP, ISA99, and other manufacturing-related standards and applying them in manufacturing and shop floor automation systems or environments. These includes experience in one or more of information systems supporting the manufacturing business unit like MES, Emerson DeltaV, Rockwell PLC/SCADA, BMS, and others
  • Strong demonstrated knowledge on perimeter security like IDS/IPS, Firewalls, Web Proxies, etc
  • Demonstrated knowledge and experience in one or more Information Security capability like security monitoring, threat intelligence, network security, data security, endpoint security, technical security assessments, security architecture
  • Demonstrated success in leading multi-functional initiatives without formal authority through the use of strong influencing and negotiating skills
  • Experience with regulated systems (GxP, SOX) in the pharmaceutical, biotechnology, healthcare industry
  • CISSP or equivalent security-related industry certifications
12

Specialist Information Security Engineer Resume Examples & Samples

  • Work with and provide guidance to Security Operations and other Information Security team activities on security strategies, processes, response and technologies
  • Support Incident Response on security incidents including contributing to mock security incident exercises
  • Collaborate, maintain and build relationships with Amgen and other parties that may impact Information Security services and technologies
  • Strong demonstrated knowledge and experience on cloud and cloud security with technologies and solutions like Cloud Access Security Broker (CASB), AWS, Microsoft Azure
  • Experience in using and managing Linux-based operating systems and developing Perl or Python scripts
  • Successful management of multiple priorities
13

Software & Information Security Engineer Resume Examples & Samples

  • Enable product teams to deliver secure and timely solutions to our customers
  • Manage incident response for reported vulnerabilities
  • Knowledge of security vulnerabilities and safeguards at the embedded layer and system layer
  • Knowledge of Privacy By Design
  • Knowledge of several current general purposes programming languages
14

Information Security Engineer Ent Resume Examples & Samples

  • Firewall security policy/rule
  • Security Operations Center (SOC)
  • Intrusion Detection System (IDS)/ Intrusion Prevention System (IPS)
15

Corporate Information Security Commerical Portal Engineer Resume Examples & Samples

  • Understand the enterprise's core information security competencies and the value they bring to business processes for a competitive advantage
  • Interact with internal and external customers to ensure continuous customer satisfaction, ensuring that SLAs and KPIs are met to support operating units
  • Leads the operational team within a functional unit supporting identity management solutions for high transaction oriented Commercial consumer facing web site
  • Ensures adherence to developed policies, standards and procedures or complete appropriate exception documentation
  • Partner with key stakeholders from within the LOB (including LOB Senior Management), CIS, and other groups throughout BB&T IT Services to offer transparency on matters pertaining to Information Security
  • Provide regular updates to CIS management on LOB strategies, critical projects and related risks, potential policy exceptions, and other items, as applicable
  • Ensure information security requirements are properly represented throughout LOB processes including risk assessments, new product evaluations, application development, testing, and ongoing operations
  • Manage the credentials, privileges and access across the organization to ensure all information systems are functional and secure
  • Develop and maintain IAM security policy including writing procedural documents to support policy
  • Analyzes security-related technical problems and provides basic engineering and technical support in solving these problems. This includes mobile device management
  • Performs vulnerability/risk analysis of computer systems and applications during all phases of the system development life cycle
  • Responsible for support of IAM release management and integration of IAM platforms with enterprise applications
  • Ensure new products meet security and business requirements
  • Represent CIS when working with BB&T business partners to understand business problems and providing solutions to those problems
  • Designs and develops testing strategies, methodologies and analyses; evaluates the adequacy and effectiveness of policies, procedures, processes, systems and internal controls; analyzes business and/or system changes to determine impact, identifies and assesses operational risk issues and assigns risk ratings consistent with established policy standards
  • Helps to prepare group-level reporting on program initiatives, implementation status, risk metrics and trends, and incidents and issues, as required
  • Develop and execute auditing processes to identify system access anomalies
  • Lead efforts related to designing, planning, enhancing and testing all information security technologies used throughout the enterprise, including base-lining current systems, trend analysis and capacity planning, as required, for future systems requirements
  • Analyze information to determine, recommend and plan the use of new information security technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources
  • Responsible for Tier III technical support of information security technologies, providing expert problem analysis and resolution in a timely manner
  • Participate in all areas of information security technology management, systems development, systems implementation and systems support, as assigned
  • Support training of less experienced personnel
  • Provide 24x7 on-call availability for supported information security technology infrastructure
  • Minimum of seven years of demonstrated experience in an Information Security technical support role for identity management solutions for high transaction oriented consumer facing web site, preferably at a financial institution
  • Experience using multifactor authentication protocols, namely Two-Factor, OTP, Biometric on mobile-native as well as enterprise applications on-prem and on Cloud
  • Experience implementing enterprise Identity and Access Management and security solutions (e.g., SailPoint, CA, IBM, BMC, Sun, Oracle, RSA IMG, etc.) in client environments
  • Exposure to IAM applications with common identity stores (LDAP, relational databases, application servers, virtual directory servers, physical access management systems)
  • Understanding of Business Process Improvement methodologies
16

Junior Security Information Engineer Resume Examples & Samples

  • Position will include occasional travel within the continental United States and potential travel outside the United States depending on task requirements
  • High School Diploma or GED equivalent with 2 years of directly relatable experience in the discipline (DoD 8570 IAT Level II Certification in lieu of 2 years of experience)
  • 2 years of experience in defining security programs or processes for the protection of sensitive or classified information
  • Currently have an active DoD Secret security clearance
17

Security Information Engineer Resume Examples & Samples

  • Analyzes and defines security requirements for information protection
  • Defines and develops security policies
  • Analyzes the sensitivity of information and performs vulnerability and risk assessments on the basis of defined sensitivity and information flow
  • Gathers and organizes technical information about an organization’s mission goals and needs, existing security products, and ongoing programs
  • Performs risk analysis which include risk assessments
  • Must possess, at a minimum, intermediate computer skills and experience with Microsoft Office applications including Word, Excel, PowerPoint, Access, Project and Outlook
  • BA or BS degree in Computer Science or Information Management with 4 years of directly relatable experience in the discipline (8 years of experience or DoD 8570 IAT Level II Certification in lieu of degree)
  • DoD 8570 IAT Level II Certification (CCNA-Security, GICSP, GSEC, Security+ CE, or SSCP)
18

Corporate Information Security Cyber Engineer Resume Examples & Samples

  • Participate in efforts related to designing, planning, enhancing and testing all information security technologies used throughout the enterprise, including base-lining current systems, trend analysis and capacity planning, as required for future systems requirements
  • Participate in technical assessment, research and testing of new technologies, as requested, using information security design, automation, and scripting best practices and procedures
  • Participate in the analysis of information to determine, recommend and plan the use of new technologies, or modifications to existing equipment and systems that will provide capability for proposed project or work load, efficient operation and effective use of allotted resources
  • Participate in the implementation of new information security technologies or integration of existing technologies, including initial configuration, installation, change management and operational handoff
  • Provide Tier III technical support of information security technologies, providing problem analysis and resolution in a timely manner
  • Using manual and automated processes, ensure adherence of all responsible information security technologies to established design and configuration standards
  • Establish and execute processes to monitor and report on information security technology infrastructure compliance to policies, standards and best practices
  • Execute system tuning and make recommendations for improvements
  • Monitor information security systems using enterprise class monitoring systems, proactively identify potential issues and exercise appropriate responses to events ensuring availability of the environment
  • Generate and communicate appropriate reporting to illustrate operational status and stability of the information security technology infrastructure
  • Bachelor’s degree in Computer Science or relevant field, or equivalent education and related training
  • Five years of experience in Information Security
  • SANS Security Essentials (GSEC) certification or equivalent
  • Grounded understanding of applied enterprise information security technologies including, but not limited to, firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering and mainframe security
  • Advanced knowledge of data flow, mainframe/client server systems, problem analysis and systems tuning; adept with network interfaces and technologies
  • Knowledge of one or more programming/script languages with proficiency in development of systems and process automation
  • Other technical certifications (e.g. Microsoft Certified Systems Engineer (MCSE), Cisco Certified Network Associate (CCNA), Red Hat Certified Engineer (RHCE), Network+)
19

Information Security Engineer Specialist Resume Examples & Samples

  • Must have experience supporting / administering NetIQ’s IDM product and integrating it within different application environments, directories (e.g. MS AD) and protcols (LDAP, SAML)
  • Must take initiative, and have a track record of continuous learning
  • Bachelor’s degree (B.A. / B.S.) in computer science, information systems or equivalent discipline
  • 5+ years of experience in IT/IS required
  • 5+ years of experience in information security
  • 5+ years of experience with NetIQ IDM
20

Information Security Engineer / Specialist Resume Examples & Samples

  • Serves as a leading customer interface for the Information Security Department. Consults with clients regarding information security requirements. Optimizes the use of technology to improve the customer experience. Develops and maintains strong working relationships with business areas throughout the enterprise. Advises business lines and IT team on security requirements and best practices. Prepares Bank-wide communications related to applicable security policies, standards and guidelines
  • Reviews internal, government, academic and commercial sources of information to anticipate new security requirements and identify advancements to best practices for protecting resources and information. Drafts local policies, standards, guidelines and procedures to supplement enterprise security frameworks. Creates, edits and publishes technical documentation including information security reports, white papers, technical notes, implementation and configuration guides for a wide variety of audiences
  • Leads security incident operations, responding to event escalation as needed. Identifies, investigates and escalates information security incidents on the district network. Plans, contributes to and participates in security incident plan exercises
  • Manages a comprehensive, business aligned, threat and vulnerability management program. Conducts threat modeling and analysis activities of business processes and current/potential IT solutions. Advise business partners of methods to remediate vulnerabilities, institute compensating controls and request risk acceptance. Develops and tracks metrics and measures to substantiate efficacy of the program
  • Consults with information system owners to categorize systems; select, implement and assess controls; and frame, assess and monitor risk. Maintains risk management documentation to monitor lifecycle progress, track acceptance decisions and catalog remediation actions. Experience applying risk management frameworks such as NIST 800-37 is required. Utilizes automated Governance, Risk and Compliance tools to track artifacts of the risk management lifecycle
  • Analyzes, designs, and implements business processes and requirements to ensure compliance with security policies and procedures. In accordance with approved security frameworks, advises information security colleagues and business clients on information security requirements, compliance responsibilities and methods to protect Bank resources and sensitive information. 
  • Product Testing & Evaluation
  • Microsoft Scripting Platforms Group Policy
  • GCWN / GCUX / GSEC / GISF CRISC
  • CAP/ CSSLP / GCIH/ GCIA / GPEN
  • SSCP / CISSP / ISSEP / CISA
  • BigFix knowledge
21

Information Security Junior Engineer Resume Examples & Samples

  • 4-7 years experience in an area of Information Technology Required
  • 2-4 years Information Security experience Preferred
  • 2-4 years experience in banking or relevant financial Preferred
22

Corporate Information Security Cyber Engineer Resume Examples & Samples

  • Lead technical assessment, research and testing of new technologies, as requested, using information security design, automation, and scripting best practices and procedures
  • Lead the implementation of new information security technologies or integration of existing technologies, including initial configuration, installation, change management and operational handoff
  • Ten years of experience in Information Security
  • Certified Information Systems Security Professional (CISSP) certification
  • Extensive understanding of applied enterprise information security technologies including, but not limited to, firewalls, intrusion detection/prevention systems, network operating systems, identity management, database activity monitoring, encryption, content filtering and mainframe security
  • Thorough knowledge of data flow, mainframe/client server systems, problem analysis and systems tuning; adept with network interfaces and technologies
  • Other security certifications (e.g. Cisco Certified Network Associate (CCNA) Security, GIAC (Global Information Assurance Certification) Security Essentials Certification (GSEC), GIAC Certified Enterprise Defender (GCED), Certified Perimeter Protection Analyst (GPPA))
  • Other technical certifications (e.g. CCNA, Red Hat Certified Engineer (RHCE), Microsoft Certified Systems Engineer (MCSE))
23

IT Information Security Engineer Resume Examples & Samples

  • 3-5 years' experience in Information Security
  • Have an understanding and working knowledge of regulatory requirements such as PCI, SOX
  • Familiarity with ISO and NIST standards for security
  • Excellent written and verbal communication skills. Ability to explain technical concepts to technical or non-technical personnel
  • Experience with internal project consulting and providing security requirements and recommendations for secure project implementations
  • Experience with threat and vulnerability management, tools and processes (Qualys, IDS/IPS)
  • Experience with security issue/incident investigations and incident response including reviewing logs and system events
  • Experience with Identity and Access management tools and processes
  • Experience in reviewing and approving firewall rules (but will not be responsible for implementing or managing firewalls)
  • One or more Security Certifications such as : CISSP, CEH, CISA, CISM, GIAC, CRISC
  • Ability to be on call 24x7 when needed
  • Experience working with Managed Security Service Provider
  • Prior hands on experience with firewalls, routers, switches
  • Prior hands on experience with IDS/IPS
  • Experience with DLP (Data Loss Prevention) tools and processes
  • Prior hands on experience with vulnerability management tools (such as Qualys)
24

Dcgs-a Information Security Engineer Resume Examples & Samples

  • A bachelor's degree in Computer Science, Mathematics, or other Engineering or Technical discipline and ten (10) years of professional work experience is required
  • CISSP Certified
  • Experience with either DCGS-A v3, DCGS-A Fixed, CDSS, or DE-AS/SS
  • 10+ years’ experience with any Army POR system and fielding
  • Demonstrated knowledge of VMware, SCCM, and database administration
  • Experience in scripting (PowerShell, VBScript, batch files, InstallScript, Wise Script, etc.)
  • MCSE or other related Microsoft certification
  • VCP5 or higher
  • Demonstrated experience with software developers or Lab Management operations
  • Software development, system engineering, and security engineering experience
  • Experience or training in the DIACAP or RMF accreditation process
  • Certification and Accreditation experience
  • Additional non-engineer skills to support the effort
25

Information Security Engineer With IAM exp Resume Examples & Samples

  • 7+ years’ experience working in information technology to include any combination of the following
  • 4+ years’ experience working in a security environment, specifically relating to identity and access management, with a focus in technical design
  • Previous work experience in analysis of security controls in a tiered model, including at least 3 of the following
  • Ability to code/script with Java
  • Certified Information Systems Security Professional (CISSP) - (ISC)²
  • Global Information Assurance Certification GIAC Global Information Assurance Certification GIAC
  • Security CompTIA
26

Information Security Engineer Systems & Telecommunications Resume Examples & Samples

  • Demonstrated knowledge of risk management frameworks, and management of corrective action plans
  • Demonstrated knowledge of security applications and tools (e.g. packet capture tools, penetration testing tools, data loss prevention software, spam filtering software, antivirus software, etc.)
  • Detailed knowledge of intrusion detection/prevention systems and strategies
  • Knowledge of domain administration, group policies, and Microsoft Server environment best practices
  • Knowledge of firewall configuration auditing and best practices
  • Knowledge of network architecture best practices
  • Extensive technical knowledge of systems, databases, networks, operating systems, and information management best practices, including VPNs, network topologies, defense-in-depth architecture, and encryption
  • Extensive knowledge of security, risk, incident, and contingency management concepts, including data integrity and loss prevention, authentication, authorization, network security architecture, attack recognition and response, business continuity planning, incident response planning, and risk management strategies
  • Knowledge of auditing principles and practices, specifically HIPAA, HITECH, PCI, and Meaningful Use, and a demonstrated ability to support internal and external efforts to maintain compliance with federal and state regulations, to include knowledge of intrusion techniques, penetration testing methods, corrective action planning, and the ability to direct information management efforts as needed to support internal or external audits
  • Multi-tasking ability
  • Interpersonal communication skills
  • Four years of information security experience with a wide variety of information management applications and technologies, to include hardware and software lifecycles, risk management, data loss prevention
  • Two years of experience specific to development and maintenance of risk management plans
  • Two years of experience in managing information security frameworks (e.g. HITRUST, NIST SP 800-53, etc.)
  • Prior experience in a healthcare systems environment desired
  • Prior experience with Cisco network equipment desired
27

IS Information Security Engineer Resume Examples & Samples

  • Implement and maintain an information security risk management program at BC
  • Assure IT Service Confidentiality, Integrity and Availability (CIA – security triad)
  • Conduct information security risk assessments and maintain security vulnerability status
  • Conduct internal and external penetration testing
  • Create and execute cyber incident response plans and train staff
  • Maintain current on information security trends, threats, and technologies – Propose solutions to meet business needs
  • Create and test security controls across BC
  • Work with Sales teams to answer client questions related to information security
  • Expert in cloud and mobile application security
  • Analyze and audit environments providing recommendations for continuous improvement
  • Provide information security awareness training
  • Responsible for all information security technologies at BC e.g. Anti-virus, web filtering, firewall configs, application vulnerabilities, SIEM system
  • Work with auditors to verify compliance with security controls
  • Consult all departments on relevant information security compliance or questions
  • Expert in one or more scripting languages and can automate tasks
  • Designs, documents, and execute disaster recovery and business continuity drills or actual events
  • Is a leader and mentor of others and is passionate to help other elevate their technical abilities
  • Creates department policies, procedures, and standards
  • Write and prepare documentation, plans, or reports as directed
  • AS or BS degree in technical area (or related experience)
  • Minimum 10+ years’ experience working in information security
  • Minimum 10+ years’ experience working in datacenters
  • Minimum 10+ years’ experience with networking (switching / routing)
  • Minimum 10+ years’ experience with virtual infrastructure (VMWare or other)
  • Minimum 10+ years’ experience with Storage Area Networks (SAN)
  • Minimum 10+ years’ experience with VoIP
  • Minimum 10+ years’ experience with Windows Server administration
  • Certification preferred: ITIL foundations, CISSP, CEH, Security+, Microsoft, GIAC