Security Expert Resume Samples

4.9 (101 votes) for Security Expert Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security expert job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
DP
D Purdy
Darien
Purdy
86921 Linnea Bypass
Dallas
TX
+1 (555) 891 9187
86921 Linnea Bypass
Dallas
TX
Phone
p +1 (555) 891 9187
Experience Experience
San Francisco, CA
Cyber Security Expert
San Francisco, CA
Jakubowski-Greenfelder
San Francisco, CA
Cyber Security Expert
  • Support the improvement of the enterprise information security risk management framework, policy, processes, and tools
  • Research and identify key indicators of compromise on the network, servers, and end user workstations
  • Perform daily in-depth analysis of current threat activity and trends
  • Manage relationships with security, technology and business stakeholders to identify and communicate security risks and mitigation approaches
  • Deal with ambiguity and make expert decisions in situations in which little to no precedent exist
  • Prepare detailed written analyses of incidents with root cause, containment, and remediation/prevention recommendations
  • Leverage third party services for delivery of cyber security threat management and threat intelligence
Phoenix, AZ
Infrastructure Security Expert
Phoenix, AZ
Batz Inc
Phoenix, AZ
Infrastructure Security Expert
  • Knowledge of TCP/IP and networking (LAN, WAN and Wireless)
  • Certified Information Security Manager (CISM)
  • Knowledge of network security
  • Work daily with the Group Information Security team
  • Provide awareness, indications, warnings, and operational readiness
  • Support increase the MOL’s Infrastructure Operation team’s cyber threat awareness and protection levels
  • BSc. in Computer/Industrial/Electrical & Electronics Engineering
present
Dallas, TX
Security Expert Embedded Software Attacks
Dallas, TX
Zieme Inc
present
Dallas, TX
Security Expert Embedded Software Attacks
present
  • Independent working style, but willingness to listen and to adapt
  • Knowledge of LLVM framework is a plus
  • Knowledge about JavaCard Applet progamming and development tools is a plus
  • Support the various HW and SW development teams of NXP with security reference designs
  • Specification / Design / Review of embedded software security architectures
  • End-2-end security architecture
  • Creation of innovative and disruptive security solutions
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
California State University, Fullerton
Bachelor’s Degree in Computer Science
Skills Skills
  • Good communicator, can engage with various levels within the organization with the ability to adapt the language used
  • Detailed knowledge of industry standards ISO27002, COBIT, ISF-SGP
  • In depth knowledge in multiple IT domains (e.g. Infrastructure, Applications, Identity & Access Management) and the security implications
  • Knowledge of the current malicious code, hacking techniques and network protocols are pre-requisites for analyzing and evaluating unethical behavior
  • Knowledge of ITIL (service management and lifecycle)
  • Ability to work with different cultures and time zones
  • Strong analytical skills
  • At least 4 years experience in an international IT environment and IT security monitoring
  • Experience managing outsourced security services and it’s providers
  • Fluent in English
Create a Resume in Minutes

15 Security Expert resume templates

1

IT Cyber Security Expert Resume Examples & Samples

  • Develop a solid understanding of our services and delivery methodologies
  • Review and update cybersecurity policies and procedures to ensure compliance with current standards
  • Perform and assist with client remediation, improvement and audit preparation projects
  • Process, policy, procedure and standard development
  • Design, implement and test internal IT controls
  • Develop, write and present analysis and remediation reports
  • Ability and willingness to travel as needed
  • BS or MS in Electrical or Computer Engineering, Computer Science or related field or the equivalent working experience
  • MCSE, CCNA, CISSP, GICSP or other relevant security certifications
  • 7+ years of overall IT security experience with strong preference for energy and electric industry experience
  • 3+ years of experience with enterprise level network support and administration
  • Experience with the following technologies/platforms: LINUX, UNIX, NT, LAN/WAN, VMware/Citrix, and system management tools
  • In-depth understanding of current cyber security frameworks (NERC CIP, NIST, ISO27000)
  • In-depth understanding of network design and security, and firewall and router configuration
  • Substation relay controls configuration
  • Knowledge of TCP/IP, including packet-level analysis
  • In-depth understanding of industrial control systems (EMS, DCS, SCADA)
  • Metasploit experience (or other exploitation tools)
  • SIEM products and services knowledge and experience
  • Ability and willingness to work extended and/or non-standard hours, with little notice and during urgent client needs as required
  • A background check will be conducted on the incumbent every seven years. Additionally, the incumbent will be required to complete annual cybersecurity compliance training
2

SAP Security Expert Resume Examples & Samples

  • Work with project teams to gather security specific requirements and translate requirements into design. Then develop and test security solutions through lifecycle into production
  • Consult with project teams in order to develop a solution design which is compliant with the architecture and standards of The Coca-Cola Company and CONA project
  • Perform system and integration testing including the functionality, performance, and fit to ensure that security solutions meet the original requirements and work within the defined constraints
  • Manage or participate in cross-functional teams to promote technology strategies, analyze and test products, or perform pilot and first implementations of new technologies in order to integrate new technologies into the CONA infrastructure
  • Establish routines with key IT and business clients to ensure alignment and provide avenues for open discussion regarding security solutions
  • Minimum of 2-4 years of experience in SAP security role creation and maintenance
  • Technical knowledge of SAP role development and maintenance
  • Strong verbal and written communications skills; ability to translate technical communications into business language
  • Good organizational skills with demonstrated ability to multi-task effectively, self-motivated team player
  • Experience in use and/or implementation of security tools (i.e. Segregation of Duties, provisioning)
  • Audit / Internal Controls experience
  • Experience within Fortune 500 organizations
3

Web Security Expert Resume Examples & Samples

  • You are up-to-date on the latest developments in web security
  • Solid and proven experience with the following Web technologies: TAMeb, F5-ASM, generic knowledge on: web access management, IIS vulnerability, Netscaler, PKI, firewalls, application firewalls, load balancers, networks, DMZ, TFIM, ISDI, knowledge in web and application servers including Apache, Websphere,, intranet, and extranet development
  • You're familiar with cryptography and cryptographic protocols
  • You see web infrastructure security as your field
  • You are already knowledgeable with respect to network and web security
  • Mandatory Business skills: follows the Customer processes for projects, incident and change management, and being standalone and team worker, analytical minded, meet commitment, ability to work in a dynamic and multi-cultural environment, flexible, customer-oriented, understand risk awareness, motivated self-starter, process-oriented with high attention to detail, ability to work in a fast-paced environment and flexibility to accommodate demanding projects schedules, strong interpersonal and communication skills (written and oral) and the ability to work effectively with a wide range of constituencies in a diverse community
  • You speak and write fluently in English
  • You can express yourself fluently in either French or Dutch and have at least a passive knowledge of the second language. Master of both languages? Then you're a step ahead!
  • You absorb new technologies and tools in no time
  • You are a team player
  • You possess good reporting skills
  • Master or equivalent by experience with at least 5 years’ strong experience in a similar function: Web Security infrastructure in a critical environment
4

Cyber Security Expert Resume Examples & Samples

  • Focus on cybersecurity management that suits enterprise markets and business characteristics, fully understand security requirements of key stakeholders combined with Huawei cybersecurity management practices, develop mid-term and long-term cyber security plans, strategies, and policies for enterprise business, guide and facilitate the implementation of security management and control objectives in enterprise business
  • Promote Huawei's E2E and customer-oriented cyber security assurance system and notions featuring transparency, mutual trust, and neutrality among key stakeholders, and make constant efforts to win their long-term trust in Huawei. Work with other departments of Huawei to develop strategies and key messages for Huawei's brand communication in security, and develop channels and relationship for the communication in cyber security and privacy protection
  • Follow up the trends in international security standards, government security legislation, and security technologies, and find out the gaps in Huawei security practices to develop security capability improvement plans and recommendations accordingly, particularly for cloud computing and enterprise products
5

Bigfix Application Security Expert Resume Examples & Samples

  • Serve as the lead for implementing and managing IBM BigFix security suite (Inventory, Compliance, Patch, and Lifecycle) into an existing customer network
  • Serve as a Subject Matter Expert in the analysis of tool outputs and providing recommendations for improving the overall security posture of the client
  • Mapping application components to network infrastructure and user population/landscape, define perimeters and interfaces with clients and other systems, and identify security problems and provide solutions
  • Supports cost-effective short- and long-term efforts to improve enterprise security
  • Promotes standards-based requirements for secure system development, support, assessment, remediation, and configuration/change management
  • Engages with other internal and external forces to get and share information to improve processes and security posture
  • Supports other team members’ efforts requiring deep understanding of routing, firewalls, VPN technologies, etc
  • Produce design and security documentation, including test plans
  • Leads troubleshooting application connectivity and performance through log analysis and network captures, etc
  • 6+ years of relevant work experience
  • Expert level knowledge of IBM BigFix Security Suite to include: Inventory, Compliance, Patch, and Lifecycle
  • Significant experience with endpoint security and compliance for servers, desktops, roaming laptops and Point of Sale devices
  • Experience ensuring security standards are met
  • Experience in analyzing logs in Windows, Linux, databases, application servers, Web servers, etc
  • Extensive technical knowledge of systems engineering, networking and software architectures
  • Extensive understanding of Linux or Windows system troubleshooting, integration, deployment, and administration
  • Advanced understanding of troubleshooting routing
  • Deep breath of networking experience
  • Experience evaluating systems for IA/security vulnerabilities
  • Knowledgeable in the areas of Software Defined Networking (SDN), virtual switches, routers and firewalls, and SDN solutions offered by leading vendors
  • Some familiarity with common network vulnerability/penetration testing tools including, but not limited to, Kali Linux tools, Nessus, and Nmap
  • Some experience with testing automation suites such as Selenium
  • Experience with OWASP and other security/hardening standards and guidance
  • Experience with system-hardening tools
  • Some experience with code analysis tools
  • Advanced experience with the use of runtime protections
  • Security documentation development experience (DIACAP/RMF)
6

IT Infrastructure Security Expert Resume Examples & Samples

  • Manages overall Security topics and issues
  • Defines security processes and templates, KPIs in alignment with management team
  • Identifies relevant security standards and regulations for IT
  • Drives the implementation of security recommendations, processes, activities and standards within our organization
  • Defines security polices in cooperation with the related subject matter experts
  • Ensures that security regulations are observed at all times
  • Coordinates security topics across all cloud customers
  • Leads security projects
  • Security incident handling and coordination of related security activities
  • Support for ISO audits (for example, with KPMG, TüV, SAP Cloud Compliance Office)
  • Collaboration with other SAP security teams (such as SAP Security Office)
  • Collaboration with other SAP internal stakeholders (such as SAP Cloud Compliance Office; Infrastructure Architecture)
  • Certified in ITILv3
  • Deep knowledge in IT Infrastructure security, operation and architecture
  • Knowledge of security laws, strategies, processes, standards and services
  • Knowledge of SAP and SAP IT Risk Management Solutions and Processes
  • Very good English skills verbally and written
  • Be able to collaborate / communicate on management level
  • C-level communication experience preferred
  • Work experience: 8 years+
7

Cyber Security Expert Resume Examples & Samples

  • 7+ years’ experience in cyber security
  • 3+ years of experience in delivering IT Security risk management, risk mitigation recommendations for a global company
  • 7+ years’ experience in IT Security, Application Development, Network Engineering, Database Administration, Middleware, Operating systems (UNIX, Linux, Windows, etc), and
8

Information Security Expert Resume Examples & Samples

  • Leverage an in-depth knowledge of the C&A processes according to NIST standards is required to make formal technical and policy evaluations regarding C&A program, practices and packages
  • Serve as an authoritative subject matter expert concerning C&A and the family of controls outlined in NIST SP 800-53. NIST SP Series, including: 800-37, 800-53, 800-18, 800-26, 800-30, 800-34 and 800-53
  • Effectively manage aggressive deadlines to respond to client inquiries and produce work of exceptional quality
  • Bachelors’ degree
  • 5 + Years of experience managing C&A process
  • Knowledgeable in OMB Circulars A-130, A-123 Appendix III, and FIPS-199
  • Experienced with the C&A methodology according to the NIST series of publications including 800-37, 800-18, 800-30, 800-34 and 800-53
  • Strong knowledge of mainframe, network components, system security appliances, and custom application information flows
  • Must be a Certified Information Systems Security Professional (CISSP) certification
  • Ability to work both independently and in highly collaborative, team environments
  • Experience using network mapping software and system vulnerability scanners
9

Information Security Expert Resume Examples & Samples

  • Ensures compliance to PCI DSS requirements: Monitors actions, performs periodic controls required by PCI DSS and guides the technical teams in new projects for PCI DSS compliance
  • Leads complex information security initiatives and projects, especially in the fields of vulnerability management, threat management & SIEM integrations
  • Tracks reports of malicious and suspicious activity, and presents themes and recommended solutions to Business Leader
  • Ensures security of the key management process by overseeing HSMs and key management process
  • Develops response plans for highest escalated issues
  • Influences and oversees implementation of solutions
  • Applies technical capabilities within information security to coach and develop junior employees
  • Allocates function resources and staff, and develops and manages employees in the function
  • Experience in security standards, especially in PCI DSS and ISO 27001
  • Able to lead project teams, collaborate with business partners, vendor/consulting organizations and peer level professionals from other IT disciplines
  • Information Security Engineering experience including risk identification with options and compensating controls to remediate
  • IT experience with demonstrated thought-leadership and functional influence and partnership demonstrated by a successful track record of enabling secure business through these technical decisions
  • Experienced in engaging external IT vendors, including managing vendor selection and maintenance of vendor relations
10

Presales Security Expert Resume Examples & Samples

  • Pre-sales - assist in qualifying sales leads from a technical standpoint
  • Conversant with networking applications and solutions
  • Provide assistance to identified customers with post-sales training
  • 5 – 8 years experience in technical/pre-sales support as a sales or systems engineer
  • Strong understanding of DNS and NFS, SMTP, HTTP, TCP/IP
  • Knowledge of the following technologies: Routing, Switching, VPN, LAN, WAN, Network Security, Intrusion Detection, and Anti Virus
  • Strong understanding in the following technologies and protocols: RADIUS, PKI, IKE, Certificates, L2TP, IPSEC, FIREWALL, 802.1Q, MD5, SSH, SSL, SHA1, DES, 3DES
  • Experience with encryption and authentication technologies required
11

Cyber Security Expert Resume Examples & Samples

  • Bachelors and fourteen (14) years or more experience; Masters and twelve (12) years or more experience; PhD or JD and nine (9) years or more experience
  • Demonstrated Cyber Security Experience in a large scale environment
  • An active Certified Information Systems Security Professional (CISSP) certification
  • Demonstrated experience with SIEM, malware identification and analysis, and digital forensics techniques and products
  • Knowledge of, and experience with, Transmission Control Protocol (TCP)/IP protocol and network/packet analysis
  • Five years of experience developing and documenting processes to comply with NIST 800-53 security controls
  • Demonstrated experience with FISMA and Health Insurance Portability and Accountability Act (HIPAA) computer security laws
  • Three years of experience recommending security architecture and security monitoring improvements
  • Familiarity with automating security-related tasks to support continuous monitoring, including administration, detection, and metrics
  • Excellent oral and written communication skills and experience in presenting plans and status to senior management and Government officials
  • Demonstrated experience with the following tools: ArcSight, FireEye, Encase and Cyber, SANS Sift kit, SNORT, Suricata, Core Impact, and Nessus
12

Product Security Expert for the Siemens Remote Service Resume Examples & Samples

  • As a Product Security Expert you have the overall (end-2-end) responsibility for the Security Concept of the Remote Software Solution at Siemens Heathineers. The span begins with specification of the security requirements over to safety requirements to coordination of activities for secure software development, testing and operation of the operation of the platform
  • You analyze threats and vulnerabilities of the existing software and develop advanced security concepts on ongoing basis
  • You facilitate the Governance during the development of software products focusing on security guidelines (secure coding guidelines, secure software architecture and design guidelines)
  • Therefore you continuously improve your know how in the field of application security, create and align mandatory guidelines, evaluate and recommend security tools
  • Furthermore you coordinate incident responses
  • You consult managers and domain experts regarding their responsibilities for information security
  • You plan and execute risk assessments as well as support implementation of suggested modification to ensure IT security
  • You have successfully graduated in the field of Computer Science, preferably with a focus on Information Security
  • You possess multi-year experience in the field of IT security, preferably designing software security solutions in corporate environment
  • Furthermore you have solid knowledge of technical and organizational aspects of information security as well as a good understanding of intrusion prevention in IT systems, networks and applications backed up by knowledge of theoretical (e.g. threat analysis) and practical methods (penetration testing)
  • You have the ability to clearly communicate and present technical topics and you are able to consult in technical and management-related matters
  • Fluent English, written and spoken and ideally German as wells as the willingness to travel internationally
  • On a personal level you are result-oriented and customer-focused, you have good analytical and problem solving skills, good written and verbal communication skills. Furthermore you must be able to work in a team environment and have advanced interpersonal and communications skills as well as good organizational skills
13

Product Security Expert for Remote Service Solutions Resume Examples & Samples

  • Analyze threats and vulnerabilities of the existing software and develop advanced security concepts on ongoing basis
  • Facilitate Governance during the development of software products focusing on security guidelines (secure coding guidelines, secure software architecture and design guidelines)
  • Create and align mandatory guidelines
  • Evaluate and recommend security tools
  • Coordinate incident response
  • Consult managers and domain experts responsible for information security
  • Plan and execute risk assessments as well as support implementation of suggested modification to ensure IT security
  • Multi-year experience in field of IT security, preferably designing software security solutions in corporate environment
  • Solid knowledge of technical and organizational aspects of information security
  • Good understanding of intrusion prevention in IT systems, networks and applications backed up by knowledge of theoretical and practical methods, e.g. threat analysis, penetration test, etc
  • Hands-on experience in systems administration
  • Hands on experience in IT administration
  • Ability to clearly communicate and present technical topics
  • Ability to consult in technical and management-related matters
  • Willingnes to travel internationally
  • Following of the personal traits
14

Security Expert Resume Examples & Samples

  • Hands-On of Security Projects
  • Consulting customers on their Security and Cyber needs
  • Provide technical solution required to address customer requirements, and recommends solutions that optimize value for the customer
  • Hands-On Experience in integration Security Products of leading Vendors (Anti-Virus, DLP, PKI ect)
  • Experience in Implementing SIEM Solution(QRadar advantage )
  • Write Technical Documents including RFP/RFI
  • Knowledge of Security Vendors and solutions (Other than IBM)
  • Understanding of the Security Industry
  • Customer orientation, maintain high customer satisfaction ratings that meet company standards
  • Well organized and structured, able to manage multiple tasks concurrently
  • 3 years of Technical background in providing customers Security solutions
  • Over 3 years of related experience in Professional Services Security Project
  • Working with wide range of large enterprise size Customers
  • ISISR0916
  • Leading Vendors Products certification
  • English (Speak Read and write)
15

Cyber Security Expert Medical Devices Resume Examples & Samples

  • Coordinate and drive the necessary initiatives within the Diagnostic Division to achieve the integration of Cyber Security aspects in the development of new products and in the update/upgrade, maintenance and support of existing products
  • Coordinate closely with relevant functions of the Diagnostics Business Areas, Global Functions and contracted solution providers to support Divisional Cyber Security goals
  • Define and propagate processes in the areas of Cyber Security to enable continuous compliance of product development and maintenance processes
  • Support Cyber Security related Product Risk Management activities, including risk identification, risk rating, selection and verification of risk mitigation and assessment of residual risks
  • Provide expertise to identify Cyber Security vulnerabilities in released products, performing proactive monitoring of off-the-shelf software and assessing the associated Product- and Business Risks
  • Ensure that Product Teams can respond to identified vulnerabilities, by providing technical vulnerability investigation, coordinating vulnerability response across multiple affected products, and planning risk remediation activities
  • Consult country sales affiliates and product case handling units in Product Cyber Security related issues
16

Cyber Security Expert Resume Examples & Samples

  • History of strong academic performance, advanced degree preferred
  • 5-7+ years of experience in operational cyber security, with demonstrated passion for the topic
  • Strong preference will be given to candidates who have prior work experience in enterprise cyber security functions, cyber security providers, government security or intelligence agencies, or security consulting
  • Knowledge on standard and advanced defense & remediation techniques and processes
  • High level of commitment, energy and creativity to meet demanding deadlines
  • Flexibility to travel on up to a weekly basis
  • Skilled communicator, proficient with cyber security language and terms
  • Prior work experience serving CIOs, CROs, and CISOs as a cyber security consultant
17

Senior Security Expert GiS Shared Services Resume Examples & Samples

  • You monitor security technology trends and emerging standards for new technology opportunities and security improvements
  • You support and guide the Junior Security Expert
  • You design, develop, implement and recommend solutions (security, infrastructure and applications/information), in close cooperation with architects and experts throughout the enterprise and its partners, translating functional requirements (conceptual) into technical (security) requirements and specifications (logical) to safeguarding the security of information within DSM
  • You are responsible for the in- and out-sourced security processes at a logical level and see the interdependencies between the services. You optimise the processes and make sure they are aligned with demand and strategy in cooperation with the architect and experts. You create new processes and manage them at the tactical level whenever necessary
  • You are responsible for demand management (capacity, performance and contingency) and resource planning
  • You are responsible for the quality, development and coaching of the employees in the (virtual and/or global) team
  • Define, maintain and monitor SAP security baseline
  • Interpret & analyze risk assessment results and design practical remediation plans
  • Collaborate with SSO Run & Maintain and our strategic IT partners to discuss SAP security risks on high-level, detailed, functional and technical level
  • In depth knowledge in multiple IT domains (e.g. Infrastructure, Applications, Identity & Access Management) and the security implications
  • Knowledge of ITIL (service management and lifecycle)
  • At least 6 years’ experience in an international IT environment and IT security monitoring
  • Experience managing outsourced security services and it’s providers
  • Experience in coordinating a team’s activities, coaching junior colleagues
  • Up to date knowledge on leading practices related to SAP security
  • Extended security knowledge in SAP architecture, networking, OS/DB & application layer
  • Extended experience with SAP security risks assessments and related monitoring of the SAP architecture, network, OS/DB & application
18

Security Expert Resume Examples & Samples

  • You execute (technical) audits and forensic research upon request
  • You identify and periodically evaluate information security controls and develop countermeasures to mitigate risk to acceptable levels
  • You ensure that IT solutions within the scope of the role are compliant to relevant corporate, security and architecture requirements, and that deviations are dealt with promptly according to the defined procedures
  • You lead all outsourced and non-outsourced security services (report on usage, quality and performance; monitor processes, procedures and KPIs) to safeguard proper functioning of the services. Escalate when services do not operate as expected / as per the contract with the security service provider
  • You translate detailed technical information to stakeholders across the organisation in an understandable and convincing way
  • You integrate risk, threat and vulnerability identification and management into the life-cycle processes
  • You align with business (key)users, Security Experts/Architects to improve the services
  • You are responsible for Practices, (parts of) the Security Roadmap and (parts of) the Security Reference Architecture and the Security To Be architecture
  • Knowledge of the current malicious code, hacking techniques and network protocols are pre-requisites for analyzing and evaluating unethical behavior
  • Detailed knowledge of industry standards ISO27002, COBIT, ISF-SGP
  • At least 4 years experience in an international IT environment and IT security monitoring
  • Ability to work with different cultures and time zones
  • At DSM’s Group Information Solutions (GiS) our vision is to provide a wide range of Desirable, Reliable, Efficientand Cost EffectiveDigital Solutions. We develop people who are passionate about delivering World Class servicesand solutions so DSM can fully realize its ambitions in business and in society
19

Senior Security Expert Resume Examples & Samples

  • You play a leading role in high impact incident handling (CERT, etc.)
  • You support and guide the Medior Security Expert
  • You are responsible for service delivery of suppliers, in accordance with the contract(s)
  • You communicate and engage to provide contract visibility and awareness
  • You are responsible for operational service management (escalation handling, handling service exceptions, ordering of contracted services, monitoring and evaluating the services delivered and control of change implementation)
  • You execute the financial contract matters at an operational level
  • Certified in ICT security, e.g. CISSP, CISA, CISM, CEH
  • Good communicator, can engage with various levels within the organization with the ability to adapt the language used
  • Experience in coordinating a team’s activities, coaching junior and medior colleagues
20

Evaluation Security Expert Resume Examples & Samples

  • Take on the challenging role of being a security evaluator of our high security solutions
  • Drive weakness analysis of security conceptsand implementationsboth related to attack on hardware as well as on software
  • Conduct code reviews of secure software, with the aim of identifying vulnerabilities. Your experience and knowledge will help to define adequate counter-measures
  • Be working in our well-equipped security labto setup attack together with specialist in semi invasive and side-channel attacks
21

ITN Security Expert Resume Examples & Samples

  • Rigueur dans les analyses
  • Connaissance de l'environnement technique des Télécom (GSM)
  • Connaissance en management des processus
  • Transfert d'un projet innovant
  • Etre orienté résultats
  • Avoir du leadership
22

Linux Security Expert Resume Examples & Samples

  • Strong Knowledge of Linux security controls and methods Good understanding of Linux internals
  • Shell scripting experience
  • Experience with aspects of network administration on Linux
  • Advantage: Mac OS internals and security knowledge, Linux admin knowledge, Work experience in a large global enterprise environment
23

Application Security Expert Resume Examples & Samples

  • True passion for Security: up to date and familiar with security vulnerabilities, trends, tools and practices
  • Strong leadership, execution and ownership skills
  • Strive for excellence and high standards
  • Team player and people person
  • 2+ years as pen-tester or application security expert
  • Hands-on expereience with common PT tools
  • Deep understanding of Web protocols, security and vulnerabilities
  • Active participation in bounty programs - advantage
  • Experience / background in Product Security - advantage
  • Coding capabilities - advantage
24

Cyber Information Systems Security Expert Resume Examples & Samples

  • Assessing known systems vulnerabilities and verifying system hardening and patching activities to ensure compliance with the most current applicable Security Technical Implementation Guides (STIGs)/Security Requirements Guides (SRGs) and related checklists
  • Preparing documentation (artifacts and bodies of evidence) to support assessment and authorization (A&A) activities necessary to ensure system sustained Approval to Operate (ATO)
  • Assisting in defining of cyber requirements and design solutions, providing guidance and direction related to security technologies, performing analysis on cybersecurity collected data and test results, identifying and implementing cybersecurity design, and preparing and maintaining engineering and security related documentation
  • Performing and providing vulnerability assessment results and recommendations to the NISSC Cyber Security personnel
  • Bachelor degree and 4+ years of experience related to Information Assurance or Cyber Engineering
  • Experience with performing assessments of various operating systems with DISA STIGs and SRGs
  • Experience with IA vulnerability testing and related network and system test tools; e.g., ACAS and Security Content Automation Protocol (SCAP)
  • Understanding of DoD RMF Certification and Accreditation Processes, assessing and validating compliance with IA controls and developing and maintaining associated certification and accreditation documentation
  • Must possess DoDI 8570.01-M IAT Level-II (Security + CE or equivalent) Compliant Certification
  • Secret with the ability to obtain and maintain a Top Secret
  • Familiar with NIST Risk Management Framework as described in NIST Special Publication 800-37
  • Experience with information security toolsets such as HBSS and Intrusion Detection Tools
  • Experience with network and system security administration, including operating system security configuration and account management best practices for LINUX, Microsoft, Juniper or CISCO systems
  • Self-starter requiring limited direction and supervision
  • Ability to support periodic travel (less than 5%)
25

Security Expert Embedded Software Attacks Resume Examples & Samples

  • Creation of innovative and disruptive security solutions
  • Vulnerability analysis
  • Threat analysis
  • Implementation of innovative software security concepts (code and data protection with integrity, authenticity and confidentiality)
  • Support the various HW and SW development teams of NXP with security reference designs
  • End-2-end security architecture
  • Presentation and reporting of results
26

Pre-sales Security Expert Resume Examples & Samples

  • Sales calls - be the main technical resource on sales calls and answer/ educate the customer on issues ranging from features, specifications and functionality to integration
  • Post-sales - be the lead technical contact for identified accounts for technical issues and will work closely with the technical support team and engineering to answer, elevate and resolve customer's technical issues
  • Flexible to travel. Travel will primarily be within the SE's designated region, but may also include occasional travel to other regions
  • 5 - 7 years experience in LAN/WAN/Internet services administration
  • Ability to design network and security solutions, effectively utilize Visio, ability to create BOMs (Bill of Materials)
  • Knowledge of the following technologies: Routing, Switching, VPN, LAN, WAN, Network Security, Stateful Firewalling, NGFW, Firewall policies, Identity based policies, NAT, IPS, AntiMalware, Botnet, Application Control, DDoS, Web Filtering
  • Strong understanding in the following technologies and protocols: TCP/IP, IPv4, IPv6, supernetting and subnetting, DNS, HTTP, SMTP, RADIUS, LDAP, Active Directory, PKI, IKE, Certificates, L2TP, SSL Decryption, SSL VPN, IPSEC, NAT, Stateful Firewall, Firewall Policies, 802.1Q, VLANs, LACP, MD5, SSH, SSL, SHA1, SHA512, 3DES, AES
  • Strong technical troubleshooting skills desired
  • White board skills are beneficial
  • Previous Vendor or Reseller experience is an asset
27

Infrastructure Security Expert Resume Examples & Samples

  • Responsible for coordinating infrastructure security activities within MOL IS
  • Responsible for analyzing threats, alerting, and reporting
  • Work daily with the Group Information Security team
  • Review of infrastructure products and verify their compliance to the MOL’s Information Security Standards
  • Formulate changes in technology, policy or procedure that may reduce the risk to infrastructure security
  • Support increase the MOL’s Infrastructure Operation team’s cyber threat awareness and protection levels
  • Provide awareness, indications, warnings, and operational readiness
  • Investigate how non-compliant items can be remediated or how their risk could be mitigated and provide recommendations in cooperation with the Group Information Security team
  • Support the IT infrastructure organization through internal and external audits
  • Act as SPOC for operation/project/program issue resolution
  • Monitor and maintain the fulfilment of Technology Security requirements
  • Participate in the investigation of the information security incidents, alarms
  • Advise technical security solutions
  • Assess technical security risks
  • BSc. in Computer/Industrial/Electrical & Electronics Engineering
  • Masters degree (preferably in Computer Science) or equivalent information security experience is a must
  • Must have knowledge of information technology and information security
  • Experience in cooperation in divers teams in enterprise environment towards delivery
  • Knowledge of major operating Systems such as UNIX/LINUX (e.g., Solaris) and Windows servers (2003, 2008, 2012)
  • Solid understanding of databases Oracle and SQL database management systems is required
  • Knowledge of TCP/IP and networking (LAN, WAN and Wireless)
  • Knowledge of network security
  • Knowledge of major security tools and technologies such as intrusion detection and prevention systems and application firewalls, data loss prevention and access control systems
28

Security Expert Resume Examples & Samples

  • In the frame of Security Strategy, he/she assures the implementation of the Country-level security strategy and policy, in accordance with Country CEO guidelines
  • He/she manages systems and operations for workforce defense and properties protection of key Country-level assets with subsequent quality monitoring and performance verification
  • He/she performs risk analysis and related operation of preventive measures: processes, systems, and regulations. Especially, he/she assures anti-fraud activity, with focus on HC loss
  • In cooperation with involved units (e.g. Supply&Sales, HSE, HR&Corporate Affairs), he/she participates in analysis of business issues and requirements with reference to security-related scope, with particular consideration to business and functional areas exposed to critical risks
  • In coordination with involved units, he/she supports investigations within his/her competence; takes part in due diligence-type security audits and security projects, prepare proposal based on investigation results
  • Together with Corporate Affairs/HSE/Logistics Units, he/she maintains liaison with the competent civil defense authorities and law enforcement organizations within his/her competence; collaborate in civil defense tasks within his/her competence
  • He/she plays a key role in security regulatory system update
  • Degree or Master in security area
  • 3/5 years of experience
  • Knowledge of financial planning, analytical, investigation, general property and law enforcement, quality management
  • Office knowledge
29

SW Security Expert Resume Examples & Samples

  • Threat and vulnerability assessment
  • Evaluation of security validation and threat/vulnerability analysis tools
  • Maintains substantial knowledge of state-of-the-art security principles, theories, attacks, security validation techniques, security tools and contributes to literate and conferences
30

Cryptography Security Expert Resume Examples & Samples

  • To undertake chargeable security evaluation tasks or duties with the respect of project management deadlines. The chargeable tasks may include
  • To perform vulnerability analysis based on code review of cryptographic algorithms, more particularly on payment systems with regards to side-channel, fault injection and protocol attacks. The generation of associated evaluation report in compliance with the Laboratory process
  • To perform penetration testing steps: realisation of the state-of-the-art cryptographic attacks on products under evaluation (side-channel analysis, and fault attacks), following the Laboratory process. The generation of associated evaluation report in compliance with the Laboratory process
  • To develop and improve cryptographic expertise in side-channel and fault injection attacks within the UL Laboratory
  • To follow-up the latest technical developments and be one of the leaders in the internal innovation in the embedded cryptography domain
  • To represent UL and promote UL Security Evaluation services in conferences, exhibitions or any key industry events
  • Any other duties as defined in the local Staff Handbook, UL Standards of Business Conduct and the Quality and Security policies
  • A Master Degree in Cryptography with good skills in algorithms
  • PhD in Embedded Cryptography would be appreciated
  • 6 years or more of experience in the embedded cryptography industry domain
  • Knowledge of microcontroller architectures and their assembly languages would be highly advantageous
  • Software coding / modelling skills (examples: C, Assembly Languages, etc.)
  • Will be able to demonstrate aptitude and a strong potential to learn quickly
  • Ability to work independently, to be innovative and creative
  • Ability to communicate with clarity and efficiency
31

Presales Security Expert Resume Examples & Samples

  • Experience with virtualization, NFV and emerging SDN technologies
  • Regularly interface, provides presales support and assist in training Fortinet Channel partners in your region
  • Presenting at events, seminars, customer and partner meetings
  • 3 – 8 years experience in technical/pre-sales support as a pre-sales or security expert
  • Knowledge of the following technologies: Routing, Switching, VPN, LAN, WAN, Network Security, Stateful Firewalling, NGFW, Firewall policies, Identity based policies, NAT, IPS, AntiMalware, Botnet, Application Control, DDoS, Web Filtering, SDN
  • Strong understanding in the following technologies and protocols: TCP/IP, IPv4, IPv6, supernetting and subnetting, DNS, HTTP, SMTP, RADIUS, LDAP, Active Directory, PKI, IKE, Certificates, L2TP, SSL Decryption, SSL VPN, IPSEC, 802.1Q, VLANs, LACP, MD5, SSH, SSL, SHA1, SHA512, 3DES, AES
  • Strong communication and writing skills. Previous experience on responding to RFP's is beneficial
  • Technical knowledge in Wifi, Load Balancing and Application Delivery, Ethernet Switching, ACI, API, Two Factor Auth, Malware Sandboxes, Mail Gateways, Web Application Firewalling, Cloud (AWS, Azure, etc), SDN, NFV, Virtualization, Centralized Management, SIEM, and Data Center redundancy are considered assets
  • Previous Vendor or Reseller experience is an asset. Education: Bachelors Degree or equivalent experience
32

Group Technical Security Expert Resume Examples & Samples

  • Continuously monitors the international technical security trends
  • Supports and controls the technical development processes in Regional Security
  • Coordinates, controls and exercises professional supervision over the activity of technical security experts operating group and regional level
  • Takes part in security reviews, audits and projects, proposes group and regional level preventive measures based on their results
  • College or university degree
  • At least 10 years’ experience in technical / information technology / security
  • Knowledge of Office / SAP R/3 HR / MS SharePoint / networks / op. systems
  • Experience with Controlled Access Systems, IP and analogue surveillance systems IT systems, Alarm systems, Project Management
  • Upper-intermediate English
33

Senior Cyber Security Expert Resume Examples & Samples

  • Support development of contingency plans to ensure continuity of IT operations and services
  • Analyze general information assurance-related technical problems and provide basic engineering and technical support to resolve these problems
  • Ensure that information systems are functional and secure
  • Contribute to the development of detailed specifications for programs. Perform security reviews and contribute, from a security perspective, to the design, development, testing, implementation, and documentation of new software and enhancements to existing applications
  • On-time delivery of deliverables that meet Engility quality standards
  • Provide consultation on concurrent complex projects and serve as technical specialist in all phases of applications analysis
  • Bachelor's Degree in computer science, electronics engineering or other engineering or technical discipline is required
  • Must have knowledge and experience in Cyber Security Tools, network topologies, intrusion detection, PKI, and secured networks
  • Knowledge of implementation and security levels and roles necessary for successful deployment
  • Experience in working on projects that leverage agile development with frequent releases
  • Experience in serving in a trusted advisor, objective third-party capacity to federal clients, providing consulting services and thought leadership
  • Ability to multi-task and demonstrate a high degree of organization in order to support multiple concurrent projects
  • Excellent written and oral communication skills, including effective interaction with senior GS levels within the federal government (e.g. GS 13s and above)
  • Experience with VA SDLC
34

Cyber Security Expert Resume Examples & Samples

  • Own and deliver a cyber-security protection service enterprise wide
  • Perform daily in-depth analysis of current threat activity and trends
  • Analytically triage and prioritize security issues and events
  • Deliver expert capabilities and direction on incident handling and forensic analysis
  • Correlate event data from IDS /IPS systems, firewalls, secure email and web gateways, SIEM’s and other security systems for potential threats and drive mitigation actions
  • Initiate escalation procedures to counter act potential threats and vulnerabilities
  • Prepare detailed written analyses of incidents with root cause, containment, and remediation/prevention recommendations
  • Leverage third party services for delivery of cyber security threat management and threat intelligence
  • Research and identify key indicators of compromise on the network, servers, and end user workstations
  • Deal with ambiguity and make expert decisions in situations in which little to no precedent exist
  • Accurately evaluate and effectively communicate on IT Security related risks. Deliver security solutions and recommendations that resonate with the vision, strategy, and direction of the cyber security program
  • Partners closely with other technical and business areas to ensure that security is properly implemented across the enterprise
  • Support the improvement of the enterprise information security risk management framework, policy, processes, and tools
  • Lead, support, and delivery the IT Security related reporting and metrics including Key Risk Indicators (KRI’s)
  • Lead and support the internal, external and cross-functional program resources to complete goals and initiatives
  • B.S. degree in Computer Science, Information Systems or other relevant field
  • 10+ years’ experience in cyber security and 5+ years in threat intelligence
  • Expert knowledge of cyber security is required, including proven investigation experience
  • Expert in delivering enterprise cyber security and incident handling and reporting
  • Expert knowledge in researching and tracking Advanced Persistent Threats (APT’s) campaigns
  • Experienced in performing programming and scripting tasks
  • Experienced in use of digital forensic techniques and tools
  • Expert knowledge in network traffic analysis and using advanced network security tools
  • Experienced with security architecture and engineering roles
  • Experienced in Cyber Kill Chain and Intelligence Driven Response
  • Experienced in reverse engineering of malware
  • Expert knowledge in conducting analysis of log data, data correlation, and device support of intrusion analysis
  • Experienced in information security operations
  • 10+ years’ experience in IT Security, Application Development, Network Engineering, Database Administration, Middleware, Operating systems (UNIX, Linux, Windows, etc), and have demonstrated experience with cloud security, mobile security, and IoT technologies. Security technologies such as cyber security & threat management , vulnerability management scanners, mobile security, DLP, next generation firewalls, IDS/IPS, End Point Protection (AV & AM), FIM, security scanners, secure web applications, secure web filtering and others
  • Required security certification such as SANS/ GIAC, or Certified Information Systems Security Professional (CISSP), or equivalent required
  • Exceptional planning skills a must
  • Results-oriented, with demonstrated problem-solving and decision-making skills
  • Ability to influence and work across all management levels and business groups to develop the most effective approach
  • Exceptional interpersonal skills to effectively promote ideas collaborate across teams and influence stakeholders
  • Active leader in the security industry; equipped with external networking relationships to maintain relevant knowledge of best practices, tactics, strategies and technologies
35

SAP Security Expert Resume Examples & Samples

  • Support the SAP Security Manager drive SAP Security and Segregation of Duties (SoD) across GFO processes
  • Act as a control owner for key controls in compliance with Sarbanes-Oxley (SOX) assurance and Financial Control Framework (FCF) landscape
  • Responsible for the implementation and ongoing maintenance of appropriate controls to ensure SAP Security s404 compliance in all Process Areas and Markets
  • Act as a technical expert with regard to SoD issues within the SAP systems to effectively resolve any issues and complex queries
  • Identify continuous improvement of the control environment for SAP Security
  • Interact with all business areas regarding the development of new processes to support this area of activity e.g. Live System Support, SAP Security team, System Controllers, etc
  • Liaise with markets regarding controls that need to be in place to mitigate any SoD risks
  • Carry out the process for reviewing regular SAP security controls for GFO
  • Train local MC system controllers and approvers to use the documentation developed to make appropriate decisions regarding system access to be granted