Security Information Analyst Resume Samples

4.5 (113 votes) for Security Information Analyst Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security information analyst job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
TJ
T Jones
Theresia
Jones
360 Sporer Ford
Dallas
TX
+1 (555) 435 8647
360 Sporer Ford
Dallas
TX
Phone
p +1 (555) 435 8647
Experience Experience
Houston, TX
Security Information Analyst
Houston, TX
Zulauf LLC
Houston, TX
Security Information Analyst
  • Advises and provides guidance to the CSAs/ SAs/ with regards to Regional and Country specific threats affecting the United Nations
  • Analyses trends of security incidents affecting United Nations system personnel, assets and operations in specific countries in the designated region
  • Conducts strategic security threat information liaison visits (SSTILV) to determine if the security threat information management system is functioning properly and in compliance with established Security Analysis Process and Practice Standards
  • Participates in development of procedures of security operations, contributing with preparation and review of briefs for UN and other key decision makers on current/significant security-related events in the designated region
  • Provides briefing materials such as periodic security threat information alerts, notices, warnings, and advisories on security for DSS senior management and Designated Officials on security threats
  • Identifies, through field research of threat actors, the operating environment of the UN in liaison with host government’s security interlocutors
  • Prepares early warning reports and indicators on security threats, as a planning tool for DSS Senior Management
New York, NY
Information Security Program Analyst
New York, NY
Homenick-Barton
New York, NY
Information Security Program Analyst
  • Assists in creating and enforcing security standards, policies and procedures
  • Influencing without formal authority
  • Analyzes and evaluates the design and operating effectiveness of Information technology and security controls that are in place
  • Working to deadlines
  • Researches and maintains current knowledge regarding information security issues, trends, solutions and potential implications for Navy Federal
  • Reviews existing and proposed legislation and regulations related to information security
  • Communicates with internal Navy Federal personnel to understand the services and/or products being provided by the vendor
present
Boston, MA
MYS Ctsm Kl-information Security COB & Controls Analyst
Boston, MA
Abernathy, Cummings and Spencer
present
Boston, MA
MYS Ctsm Kl-information Security COB & Controls Analyst
present
  • Monitoring and ensure periodic housekeeping of inactive user ids by Junior ISA is completed timely and accurately
  • Monitoring and ensure profile requests within the service turnaround standards established and agreed with the local and regionalized countries
  • Monitoring and ensure the following periodic review functions by Junior Analyst are completed timely and accurately
  • Perform backup duties for KL FC’s password administrators
  • Review and verification of all User Id/Profile provisioning managed by Junior ISA for internal, external and cross-border users (with compliance/regulatory clearance) accessing to business applications for which the security management systems are supported by GIDA, within CitiGroup Information security policy
  • Perform periodic housekeeping of inactive user IDs
  • Ensure completeness of tracking on undelivered error
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Webster University
Bachelor’s Degree in Computer Science
Skills Skills
  • Good judgment, tact, and decision-making ability
  • Experience working in information security and demonstrable understanding of the concepts of information security
  • Strong English language skills
  • An in-depth understanding of ISO 27000 and COBIT security frameworks, and a working knowledge of SOC2, PCI DSS and NIST 800 series
  • Ability to understand and integrate cultural differences and motives and to work with cross cultural teams
  • Knowledge of security policies and principles of information handling and protection
  • Ability to team well with others to facilitate and enhance the understanding and compliance to security policies
  • Good time management, organizational, and decision-making skills
  • Excellent interpersonal, communication and presentation skills
  • General technical knowledge of operating systems, databases, networks, and mobile and cloud technologies
Create a Resume in Minutes

15 Security Information Analyst resume templates

1

Information Security Forensics Analyst Resume Examples & Samples

  • Conduct computer forensic investigations and electronic discovery requests for legal and corporate clients, using proprietary methodologies and cutting edge forensic tools on multiple operating systems
  • The ideal candidate will have forensic knowledge and experience with the following operating systems: Microsoft Windows, Mac OSX, IOS, Android, and Blackberry OS as well as working knowledge of Windows and Linux
  • Must have understanding of information systems security; network architecture; general database concepts; document management; hardware and software troubleshooting; electronic mail systems such as Exchange and GroupWise; Microsoft Office applications and common intrusion tools
  • Must have working knowledge or certification in the use of computer forensic tools such as EnCase and FTK
  • The candidate must be able to conduct exams on potentially compromised computers and servers
  • Proficiency in conducting live analysis on networks, and multiple platforms is desired
  • 2-6 years professional experience in the computer forensic field
  • Must possess the ability to articulate in written and oral communication
  • Degree in Computer Forensics, Computer Science or equivalent field of study
  • Advanced studies in Information Security a plus
  • Must be able to manage multiple projects and maintain a computer forensic lab on a daily basis. The ability to multi-task is critical. The successful candidate must be very detail-oriented, and must be able to interact with other staff and clients, in person or by phone
  • An extensive interview will be conducted, and will cover a variety of topics,, including computer forensic methods and best practices, as well as investigative techniques. Candidate will have to pass in depth background check
2

Information Security Intermed Analyst Resume Examples & Samples

  • Assist with the creation of restricted access or toxic combination rules within the Oracle Identity Audit (Role Manager) tool
  • Minimum 2 years in information security, audit and/or compliance
  • Must have intermediate MS Excel and MS Access skills
  • Must be able to work independently in a deadline-driven environment
3

Information Security Post Incident Review Analyst Resume Examples & Samples

  • Minimum 3 years experience in an Information Security operational or regulatory role
  • Familiar with standard information security controls
  • Identifying risks and driving mitigation to prevent reoccurrences
  • MS Office Product experience
  • Report Creation experience
  • Creative thinking
  • Expert analytical experience
  • Strong problem solving capabilities
  • Ability to manage short term and long term projects end to end
  • Acts with speed and decisiveness
  • Prior experience in a root cause or incident review role
4

Information Security Intermediate Analyst Resume Examples & Samples

  • Assist with the creation of restricted access or toxic combination rules within the Oracle Identity Audit (Role Manager) tool and the migration to the EERS Scanning platform
  • Assist in the creation and tracking of business-specific Segregation of Duties reports
  • Work with ICG GISOs on mid-month trending metrics to ensure that all businesses meet established Key Risk Indicators (KRI’s) thresholds
  • Must have very strong written/verbal communication skills
  • Ability to adapt to changes is essential
  • 2+ years in information security, audit and/or compliance is a plus
5

Information Security Response Analyst Resume Examples & Samples

  • Support the development and deployment of threat detection solutions
  • Identify emerging cyber threats and coordinate risk detection efforts by utilizing best practices
  • Conduct analysis on the current threat landscape supporting periodic Threat Assessments
  • Consume threat intelligence from varied sources and where possible convert intelligence into actionable use cases and detection methodologies for threat analysis
  • Support cyber intelligence analysis, coordination and interaction across cross-functional teams
  • Document potential threats to allow for an increase in protection, detection, and response solutions
  • Collaborate with other Information Security Incident Response team members
  • Conduct research and evaluate threat intelligence to develop in-depth analysis and assessment on threats to critical networks and infrastructure components
  • Requires Bachelor's degree; Masters Degree
  • US Top Secret Clearance Required; or the ability to gain and maintain US Top Secret clearance as a condition of employment
  • 3 years’ experience in threats and risk analysis
  • 2 years’ experience in executing analytic trend analysis
  • Experience and knowledge in incident handling/triage, network analysis and threat detection, metric development, and security vulnerability information dissemination
  • Knowledge of network protocols, TCP/IP fundamentals and scripting
  • Requires deep knowledge of security incident management and reporting systems
  • Knowledge of current information security threat landscape and available threat intelligence sources
  • Previous experience working in incident response or security operations is preferred
  • Ability to work independently and with other members of a team
6

Security Analyst, Information Technology Resume Examples & Samples

  • Implement security controls and policies to ensure compliance
  • Assist in preparing the yearly PCI DSS Report
  • Stay current with requirements as they affect the company
  • Vulnerability Scans
  • Plan and execute vulnerability scans on a routine basis
  • Be familiar with the types of risks that exist
  • Have some experience with the tools used to scan
  • Implement and maintain Intrusion Detection Systems
  • Incident Management and Reporting
  • Ensure consistent tracking and reporting of security events
  • Assist in maintaining policies for incident response
  • Perform or assist with investigations
  • Security Event Logging and Monitoring
  • Log collection across servers, and monitoring for incidents
  • Advise network team on firewall rule setups
  • Review and approve firewall change requests
  • Antivirus products on Desktop and Server
  • Monitor system for compliance and usage, ensure up to date definitions and reporting
  • Including Spam protection for desktop users
  • Security Policy
  • Monitor information security policies, company wide
  • Review New and Change requests to architecture, for security compliance
  • Ensure Security patches are applied to desktop and Server systems in a timely fashion
  • Review and approve Access requests to our network via VPN
  • Third Party Vendors
  • Review potential third party vendors, and interact with them as needed to assist in the security functions
  • Security Reporting
  • Regularly gather and report metrics which report the state of the Company’s information security position
  • Bachelors Degree in Computer Science, related field or equivalent experience
  • Industry Certifications related to Information Technology Security
  • Background Security Check required
  • Understand the fundamentals of networking
  • Understand TCP/IP, web architectures and related technologies
  • Required Work Experience (List position, function, type of business and length of
  • Must be a good people person and able to work with all levels of management. Must be able to communicate clearly from both a written and oral perspective
  • Other (i.e., travel, physical requirements, etc.)
7

Information Security Product Analyst Resume Examples & Samples

  • 5-8 years experience in Business Analysis, Testing and Vendor Management
  • In-depth Information Technology/ Industry Knowledge
  • Deep knowledge of Information Security and Information Technology concepts
  • In-depth understanding of Applications Development as well as Infrastructure Project lifecycles
  • Familiarity and practical experience with any of the following technologies
  • Intermediate to Expert level of experience with MS Office experience (including Word, Excel and Access, or equivalent)
  • Experience with MS Visio or equivalent
  • Testing platforms such as HP Quality Center, ALM or JIRA
  • RSA Authentication Manager
  • CyberArk Privileged Identity and Session Management
  • Symantec Encryption Management Server (PGP Secure Email)
  • Symantec Data Loss Prevention
  • SAML
  • Service-Now
  • Develops support documentation
  • Develops Test Strategy, Test Plans and Test Scripts
  • Performs system analysis and produces business process diagrams, mapping documentation and technical specifications
  • Assists in testing activities and serve as the SME for User Acceptance Testing efforts
  • Reviews documents, processes or procedures and recommends where automation or improvements can be implemented
  • Ensures that all supported systems and applications maintain the availability standard
  • As subject area expert, provide comprehensive, in-depth consulting and leadership to team and partners at a high functional level
8

Information Security Policy Analyst Resume Examples & Samples

  • Conduct needs based assessment and ascertain adequacy of the current Information Security (IS) policy structure
  • Author IS policies/standards/procedures that are needed to meet business needs, address new technologies and threats, and align with common best practice and industry standards
  • Review/update existing IS policies on a periodic basis
  • Obtain stakeholder approvals for respective IS policies
  • Archive/retire outdated IS policies
  • Process/monitor IS policy exception requests for sustaining adequate compliance
  • Develop policy/security awareness materials, and training staff on policy/security awareness
  • Building our awareness campaign and writing / developing communications that will grow our awareness and advocacy campaigns
  • Bachelor's degree (BA) or equivalent combination of education and experience in management information systems, technical writing, communications, linguistics, or related curriculum
  • 3+ years' professional work experience, including 4+ years' of working knowledge of executing activities related to Information Security Policy Lifecycle required
  • Strong knowledge of information security management frameworks (e.g. ISO 27001 and 27002, NIST, Shared Assessments) required
  • Effective organizational, written, verbal, and interpersonal skills
  • Excellent communication, teamwork and client service skills
  • Strong presentation and project management skills
  • Aptitude to prioritize and execute on functional work efforts concurrently
  • Results-oriented person who can achieve tangible improvements in the corporate security arena
  • Marketing, communications, and change management skills
9

Information Security Program Management Analyst Resume Examples & Samples

  • Partner with project managers and leadership on a day-to-day basis to help ensure successful delivery of projects through adherence to processes and tools, identification/management of risks and issues, facilitation of/participation in key meetings, engagement of stakeholders, and on-time completion of milestones and deliverables to meet customer expectations
  • Work with program teams to actively identify and manage program-level risks and issues, working with project managers to create mitigation plans and follow-through to resolution
  • Participate in weekly reporting processes and monthly program reviews, including analysis and preparation of project dashboards, metrics, and materials
  • Provide structured program management guidance and support to GIS programs. Undertake analysis of project plans, identification of areas for enforcement of risk and issue management
  • Create and maintain program level material including Detailed Milestone Reports / Program Plans, Gantt Charts, Program Charters status reports and related PowerPoint presentations
  • Attend internal team meetings and participate in generation of work stream deliverables, as needed
  • Function as Subject Matter Expert (SME) for LPMT (Light Project Management Tool), the standard mandated tool from the Global Program Management Office (GPMO) for non-technology organizations. Maintain all required Program Management artifacts in LPMT for the GIS Initiative
  • Perform, as required, Program Office functions such as quality assurance on PMO programs deliverables, the creation of schedules for IS deliverables, the creation of required periodic reports, and the maintenance of the GIS Program Calendar
  • 5+ years work experience in similar role as Project Manager
  • Experience working on Information Security projects
  • Strong analytical and project management skills
  • Good written / verbal communication skills
  • Team player with excellent interpersonal skills
  • Ability to work with key stakeholders. Strong influencing, negotiation, and partnership skills
  • Ability to handle pressure and prioritize workload
  • Proficiency in Microsoft Office suite of products (Project, Excel, PowerPoint, Word)
  • Proficiency or experience with SharePoint
10

Information Security Remediation Analyst Resume Examples & Samples

  • Strong project management/business analysis skills
  • Information security in remediation/governance
  • A broad knowledge of information security principles (e.g. remediation governance, infrastructure, access, and application security)
  • Detailed, bank specific knowledge of application security, infrastructure, and access control remediation governance
  • Prior experience with SharePoint development and workflow design
11

MYS Ctsm Kl-information Security COB & Controls Analyst Resume Examples & Samples

  • Efficiently administer all profile requests for internal, external and cross-border users (with compliance/regulatory clearance) accessing to business applications for which the security management systems are supported by KL FC, within Citigroup Information security policy
  • Process profile requests within the service turnaround standards established and agreed with the local and regionalized countries
  • Maintain proper documentation of profile requests and related correspondences for all administrative processes under your administration
  • Arrange for necessary archival of hardcopy SMS audit logs and old records for Enable/Disable, Reset, Delete requests, as and when advised by unit head or department head
  • Maintain ongoing password maintenance statistics for management reporting, billing and resource budgeting purposes
  • Assist in investigation of complaints, access/password related problems to provide a timely resolution to the designated branch coordinators
  • Perform periodic housekeeping of inactive user IDs
  • Timely completion and update of KL FC’s DCFC chart for those tasks assigned
  • Participate in CoB contingency drills
  • Perform backup duties for KL FC’s password administrators
  • Perform any other duties as may be assigned by senior ID administrator or KL FC
12

MYS Ctsm Kl-information Security COB & Controls Analyst Resume Examples & Samples

  • Review and verification of all User Id/Profile provisioning managed by Junior ISA for internal, external and cross-border users (with compliance/regulatory clearance) accessing to business applications for which the security management systems are supported by GIDA, within CitiGroup Information security policy
  • Monitoring and ensure profile requests within the service turnaround standards established and agreed with the local and regionalized countries
  • Ensure proper documentation of profile requests, exception id provisioning, correspondences for all administrative processes by Junior ISA
  • Ensure completeness of tracking on undelivered error
  • Monitoring and ensure the following periodic review functions by Junior Analyst are completed timely and accurately
  • Monthly - disable and delete internal users profiles in Production for which passwords have not been changed for more than 60 days and 90 days respectively
  • Semi-Annually - disable and delete internal users profiles in UAT for which passwords have not been changed for more than 60 days and 90 days respectively
  • Semi-Annually - send internal users profile listings (not on EERS) to Direct/Designated Manager for review of validity of users and functions
  • Monitoring and ensure periodic housekeeping of inactive user ids by Junior ISA is completed timely and accurately
  • Provide guidance to Junior ISA on investigation of complaints, access/password related problems and provide timely response and resolution users
  • Timely completion and update of GIDA KL FC’s DCFC chart for those tasks assigned
  • Perform preparation and planning works with Team Leader and participate in contingency drills
  • Perform backup duties for both Junior and Senior ISA and Manila FC when call upon or assigned
  • Perform any other duties as may be assigned by GIDA KL FC Team Leader or Department Manager
  • Serve and act as main contact point for GIDA KL FC with GIDA Business Office on reporting and audit and compliance deliverables
  • Coordinate with Junior Analyst to ensure audit and compliance deliverables are reviewed and delivered timely
  • Plan and coordinate with Team Leader to ensure contingency drills are fully supported and completed successfully
  • Ensure DCFC compliance and premises sweeps performed by Junior Analyst are accurately reported and completed timely
  • Ensure compliance leave/new hire/control/information security trainings performed by Junior Analyst are accurately reported and completed timely
  • Perform periodic review with Team Leader to ensure Duty Roster and DCFC are duly updated
  • Ensure collation of GIDA Control Assessment (MCA) information for GIDA KL FC by Junior Analyst are accurately reported and timely submitted
  • Review and authorize Junior Analyst user id provisioning activities on EERS termination and revocation and Citisafe detach/attach function
  • Coordinate with Team Leader to ensure Service Now are timely reviewed by Junior Analyst
  • Serve and act as main coordinator for GIDA KL FC with GIDA Application SME team on CMP related activities
  • Prepare and planning with Team Leader on profile review scheduling and timeline
  • Ensure review of user profile setups are completed as per scheduled
13

Security Information & Event Managent Analyst Resume Examples & Samples

  • Technologyorganization partners with BMO’s lines of business to develop technology and IT solutions that meet our customers’ current and future needs, maximize the value of our technology investment across BMO, and enable our frontline customer service employees to provide a great customer experience. In addition, Technology’s Information Security team provides expert direction, planning and consultation on information security best practices and integrated processes. They also provide ongoing active information security leadership and management expertise to BMO
  • Product Operations supports all lines of business, providing exceptional service, fulfillment, and administrative solutions that support our customers’ personal and business financial transactions
  • Sourcing, Payables and Supplier Governance (SPSG) organization drives value for BMO by providing professional expertise to lead sourcing activities and supplier governance and the bank’s productivity initiatives as they relate to managing demand and supplier costs. SPSG is also accountable for BMO’s procurement, payables, and supplier governance technology, applications and processes
  • Corporate Real Estate manages the strategic planning and development, as well as the acquisition, sale, lease and facilities management of BMO's global real estate portfolio (including branch networks, office towers, critical facilities and BMO's data centres). The group also manages the ongoing infrastructure of all BMO Financial Group’s real estate assets. Corporate Services is another group under CRE and includes the Corporate Art Collection, Corporate Archives and Translation Services
  • 3-5 years of relevant experience, with a minimum of 2 years work experience in configuring, implementing and administering Security tools and delivering security services. Experience must include implementation and configuration management of multiple security tools and delivery of security services in large enterprise environments
  • Security monitoring practices
  • Creating and maintaining SIEM content, to assist in detection of new threats, reporting requirements, and efficiency in event monitoring
  • Content development will include reports, dashboard, correlation rule and tuning
  • Security signature generation methods and techniques
  • Create technical documentation around the operations, procedures, and content within the SIEM
  • Monitor the health and performance of the SIEM and work with supporting teams to consult on actions required
  • Work with various teams to resolve issues that may arise with log sources, SIEM host patching, connectivity etc
  • Coordinate escalations to internal teams to ensure timely delivery of incident resolutions
  • Work with the vendor for support and troubleshooting
  • Event flows (i.e. Syslog)
  • Familiarity with enterprise security tools such as IDS/IPS, Anti-Virus, Malware Gateway, Messaging Servers, Firewalls and Internet Proxy
  • Active Directory/LDAP
  • Log management tools (i.e. Splunk/ArcSight)
  • Network design and operation
  • Familiarity with Hadoop and Database technologies
  • Unix or Linux shell environments
  • Experience working in a corporate enterprise environment
  • Proficient in technical writing and communication
  • Security certification such as: CISSP, SANS GIAC, Security+, Network+, Linux+, MCSE, RHCE or CCNA-Security
  • Prior participation and responsibilities for 24x7 on-call schedule for technical support
  • Experience with defining, generating and operationalizing security metrics
  • Prior financial services institution experience a plus
14

Information Security Process Analyst Resume Examples & Samples

  • Assess team activities and identify opportunities to make improvements using proven process improvement and change management tools and techniques
  • Lead integration of processes across the teams to include standard tools, methodologies, standards, practices and processes
  • Lead implementation of new technology working closely with operational managers on development of new business process
  • Independently work with business process and sub-process owners, stakeholders, and subject matter experts to collect all information required for business process analysis and execute re-engineering
  • Drive partnership and engagement with cross-functional teams and key stakeholders across the organization on the integration of information security business process
  • Maintain regular communication with stakeholders. Assists with communication and training of processes
15

Security Information & Event Management Analyst Resume Examples & Samples

  • Progressive senior IT experience, ideally holding positions in both IT Infrastructure & Operations as well as Network Security
  • Solid understanding of additional security technologies / disciplines such as Palo Alto and Juniper firewalls, intrusion prevention, encryption, threat analysis, and vulnerability assessment
  • Comfortable with managing complex, enterprise-scale logging, including ensuring reporting and alerting is appropriate
  • Exposure to project management techniques
  • Self-motivated, proactive and with determination to achieve goals
16

Information Security Development Analyst Resume Examples & Samples

  • Broad infrastructure and technology background, including demonstrable understanding of security issues in critical environments
  • Proven experience with Unix / Linux administration, especially Red Hat/CentOS
  • Experience in Agile/DevOps working environments
  • Virtual environments / VMWare / VBlock security and/or administration experience
  • Cloud concepts and solutions understanding such as AWS, Rackspace, Azure, etcetera
  • Systems Engineering background preferred but not essential
17

Information Security Remedy Analyst Resume Examples & Samples

  • The ICG EERS Remedy Intermediate Analyst provides reviews of EERS feeds and assistance to all Citigroup ICG application teams, feed providers, business information security officers, and anyone else that may require help to feed data entitlements into EERS
  • The responsibilities include initial assessment, triage, research, and remediation of any issues found in the EERS feed
  • The individual will be required to attend conference calls that involve technical questions for Citi enterprise platforms, applications and systems including, but not limited to Mainframe, Active Directory, and UNIX
  • Additional duties may include project management, business process improvement, and overall people leadership
  • Duties include, but not limited to
  • Communicate EERS and Segregation of Duty (SoD) requirements
  • Facilitate an effective and efficient review of employees’ system access entitlements
  • Track the application team’s progress in remediating the feeds and use the escalation process effectively
  • College or university degree is required
  • Succeed in a fast-paced environment
  • MS Excel advanced functions
  • Citi Policy and Standards as it applies to user entitlement reviews
18

Information Security Intermediate Analyst Resume Examples & Samples

  • Liaise with all development teams and PM organization, schedule and allocate tasks for the Information Security Officers
  • Ensure all deliverables required for an ISO engagement in a project have been received and follow-up on missing items
  • Ensure the ISO is tasked against the project management system and allocate the resources as needed
  • Review project management reporting to ensure engagement by IS group
  • Monitor and control the risks that could affect the Project deliverables and milestones
  • Responsible for Metrics/Summary reporting and coordinate monthly status reports
  • Ensure policies, procedures, tools and controls are followed as per corporate standards
  • Perform low risk application security reviews, as needed
  • Expert on IS Review process and supporting tools
  • Manage knowledge transfer process
  • Participate in and coordinate other Information Security administrative projects and tracking
  • Maintain department operational/process manuals, documentation library
  • Undergraduate Degree with some Information Security or IT knowledge
  • Familiar with a project management tool such as MS Project or Planview
  • Proficient with MS Access. Limited scripting/macros in MS access and Excel
  • Familiar with MS Access, Excel, Word and Outlook required
  • Must have good organizational and communication skills. Attention to detail is a must
  • Must be able to analyze and create metrics. Work with capacity planning metrics to allocate projects to ISOs
  • Understanding of project management concepts
  • Good organizational, verbal and written communication skills
19

Information Security Technology Analyst Resume Examples & Samples

  • Document any findings, security breaches and non-compliant items
  • Support Technical Information Security Officers in their work for remediating any non-compliant items
  • Take responsibility for producing quality work and maintain a professional reputation
20

Information Security Ops Analyst Resume Examples & Samples

  • Participates in incident reporting for high priority events, from initial response to triage, to determining remediation actions and escalation paths
  • Evaluates new security technology for the organization through quantitative and qualitative measures
  • Conducts threat and vulnerability research, intelligence and monitoring
  • Four years progressive IT security skills, IT audit experience can be included in experience
  • Ability to work shifts based on need and situations in a 24X7 operations department
  • Technical expertise in Intrusion Prevention System (IPS)/Intrusion Detection System (IDS), SIEMs and other Computer Network Defense (CND) security tools
  • Ability to work with internal and external personnel
21

Information Security Policy Analyst Resume Examples & Samples

  • Translate recommendations from subject matter experts, vendor and industry best practices, standards and guidelines into high-quality, coherent policies and standards, awareness and training materials
  • Harmonize content of new and updated documents with other EY policies and standards and ISO 27000 framework
  • Work closely with Information Security, IT Audit and Risk Management teams to develop policies, standards, procedures, guidelines, technical documentation and training materials – including presentations, computer-based training modules and corporate training slides
  • Write, edit and maintain documentation and training materials for business users and IT professionals
  • Verify the accuracy of documentation and training materials
  • Brainstorm and implement improvements to current and future documentation
  • Support the writing and editing of proposals as needed
  • Ability to organize, structure and prioritize information from multiple sources
  • Ability to appropriately balance needs of EY Information Security with business and technological risks and business impact
  • Knowledge of security policies and principles of information handling and protection
  • Strong English language skills
  • Good writing, presentation, interpersonal, and communication skills are required
  • An in-depth understanding of ISO 27000 and COBIT security frameworks, and a working knowledge of SOC2, PCI DSS and NIST 800 series a plus
  • Familiarity with local and regional regulatory information security requirements
  • Skilled in executive level presentations and briefings
  • Extensive experience with Microsoft Office (Word, Excel, PowerPoint and Visio)
  • Experience with MS SharePoint, including development and maintenance of SharePoint sites
  • Experience with RSA Archer or other GRC systems
  • General knowledge of Project Management methodology a plus
  • Experience with coordinating tasks, allocating resources and following tasks and projects through completion
  • General technical knowledge of operating systems, databases, networks, and mobile and cloud technologies
  • Five or more years of experience in Information Security
  • Experience developing and maintaining Information Security policies and standards and security awareness programs
  • Experience working with common information security standards, such as: ISO 27000, NIST, PCI DSS, ITIL, COBIT. SOC2
  • Experience of working in a global virtual environment
22

Information Security Investigative Analyst Resume Examples & Samples

  • Responsible for the operation of formalized Information Security programs and processes such as data loss prevention (DLP) monitoring, security event monitoring, eDiscovery, and incident response
  • Responsible for identifying and reporting trends, errors, and improvements of data loss prevention rules and procedures
  • Responsible for root cause analysis of security incidents, DLP events, and security violations
  • Responsible for the technical execution of Information Security programs such as Event Monitoring
  • Responsible for the development, correlation and reporting of Security Metrics from various Information Security programs
  • Performs ongoing research of Information Security related topics, techniques, and technology
  • Required a Bachelor's Degree in a related field Computer Science, MIS, or Information Security or related field or equivalent work experience
  • Required 4+ years of experience in Information Systems
  • Required 2+ years of experience in Active usage and/or support of Information Security systems and activities
  • Preferred 1+ year of experience in Information Security Auditing
  • Preferred 1+ year of experience in Healthcare
  • Beginner ability to communicate and make recommendations to upper management
  • Intermediate demonstrated written communication skills
  • Intermediate ability to identify basic problems and procedural irregularities, collect data, establish facts, and draw valid conclusions
  • Intermediate ability to effectively present information and respond to questions from peers and management
  • Intermediate demonstrated interpersonal/verbal communication skills
  • Beginner knowledge of community, state and federal laws and resources
  • Intermediate demonstrated analytical skills
  • Intermediate demonstrated problem solving skills
  • Intermediate ability to multi-task
  • Beginner demonstrated organizational skills
  • Beginner demonstrated time management and priority setting skills
  • Preferred Information Security certifications (CISSP, GSEC, GCIH, OSCP, etc.)
  • Required intermediate Data Loss Prevention Technology
  • Preferred beginner Forensics and eDiscovery Technologies
  • Required intermediate Intrusion Detection and Prevention Technology
  • Preferred beginner Data Classification Tools
  • Preferred beginner Active Directory
  • Required intermediate Microsoft Word
  • Required intermediate Microsoft Excel
  • Required intermediate Microsoft Outlook
23

Information Security Investigative Analyst Resume Examples & Samples

  • Participates in the operation of formalized Information Security programs and processes such as data loss prevention (DLP) monitoring, security event monitoring, data classification, eDiscovery, and incident response
  • Supports the technical execution of Information Security programs such as Event Monitoring
  • Responsible for the collection and correlation of Security Metrics from various Information Security programs
  • Required an Associate's Degree in a related field Information Systems or equivalent work experience
  • Required 2+ years of experience in Information Systems
  • Preferred 1+ year of experience in Active usage and/or support of Information Security systems and activities
  • Preferred 6 months of experience in Information Security Auditing
  • Preferred 6 months of experience in Healthcare
  • Beginner ability to multi-task
  • Beginner demonstrated written communication skills
  • Beginner ability to identify basic problems and procedural irregularities, collect data, establish facts, and draw valid conclusions
  • Beginner demonstrated interpersonal/verbal communication skills
  • Preferred GSEC, Microsoft, Cisco, or other Information Security certifications
  • Preferred beginner Data Loss Prevention Technology
  • Preferred beginner Intrusion Detection Systems
24

Information Security, GRC Analyst Resume Examples & Samples

  • Oversee development and maintenance of GRC program by ensuring regulatory compliance
  • Serve as a subject matter expert for Governance & compliance frameworks. Keep abreast of industry regulations and assist in implementing actions to ensure continuous compliance
  • Maintain IT controls-related documentation for simple to complex systems in support of information assurance and compliance activities
  • Advises process owners on design and implementation of controls (manual and automated) into processes and systems using knowledge of risks and company objectives
  • Provide analytical support to the management team regarding governance, risk, compliance (GRC) metrics, reporting
  • Work closely with business groups, SMEs, regulators, vendors, & examiners to continuously identify and manage risks while ensuring readiness to satisfy internal & external audit requirements
  • Coordinate evidence gathering within InfoSec and all business units
  • Work directly with auditors
  • Assist in answering Security Assessment Questionnaires
  • Review processes & existing policies/procedures and assist IT process owners in the creation and maintenance of these policies/procedures
  • Conduct Information Security related assessments and audits to cover User Access management, Network & OS Security, Encryption and Cryptography, Change Management, Backup Management, Penetration Testing, Vulnerability Assessment, etc
  • Promote and monitor GRC associated with the Security Awareness program
  • 5-10 Years of Experience in Information Security, Governance & Compliance, Auditing or related disciplines
  • Familiarity with FedRAMP
  • Knowledge of IT governance industry practices, IT processes, compliance frameworks, and security management standards
  • Knowledge of federal, state, and industry regulations and requirements for information protection and control-related legislation
  • Knowledge of IT controls in enterprise applications, and systems to identify and evaluate control effectiveness, identify gaps and risks to draw conclusions
  • Ability to work in partnership with management from other business units to assure business practices meet defined policies, standards, and key business objectives for continuous IT compliance, governance, business continuity, and disaster recovery planning processes
  • Experience with project management methods, process mapping, and a solid ability to establish priorities and/or multi-task
  • Experience with GRC platforms
  • Experience with data classification and critical data protection
  • Excellent presentation skills, analytical judgment, decision-making skills, functional and technical skills, business acumen, detailed, and task oriented
  • CISSP, CCSA or CCSP certification a plus
  • Prior experience evaluating and reporting on SOC 2 compliance objectives
  • Experience with Sarbanes-Oxley Compliance
  • Experience with SAEE 16 Certification
25

Information Security Controls Program Analyst Resume Examples & Samples

  • Develop materials to articulate the EIS Controls Strategy to executive level audiences, including the Board of Directors
  • Develop and maintain the EIS Controls Catalog which includes all applicable information such as Control Owner, Control Testing Procedures, Authoritative Source Mapping, and Control Status
  • Work with Control Owners to develop a Controls Maturity Roadmap to illustrate how remediation and enhancement efforts will improve controls capabilities over time
  • Aid in the planning and execution of EIS Control Self-Assessments and provide guidance and support to stakeholders on the self-assessment process
  • Support Control Issue Remediation efforts ensure gaps are closed in an effective and timely manner
  • Participate in Control Owner Engagementefforts to ensure stakeholder awareness and understanding of the role
  • Support development of the Controls Training & Awareness Program to ensure impacted parties are aware of their responsibilities with regard to applicable controls
  • Benchmark EIS controls against authoritative frameworks (NIST, FFIEC, ISO27001, PCI, etc.) to identify opportunities and gaps
  • Bachelor's degree in Business, Computer Science, Technology, or Related Fields
  • Strong IT Security & Risk Management background
  • Financial services experience (top 10 bank preferred)
  • Minimum 3 years of related experience
  • Willingness to collaborate across the organization
  • Flexibility to work in varying business functions and capabilities
  • Ability to adapt to new and changing environment and handle multiple priorities, including ability to learn quickly
26

Information Security Policy Analyst Resume Examples & Samples

  • 3 years of experience with analyzing information security policy requirements and recommending changes
  • Experience with federal information security policy standards, including FISMA, FISCAM, NIST, and DoD STIGs
  • Knowledge of technologies used by the agency and potential impacts newly emerging policy requirements may have on those technologies
  • Ability to expertly develop and maintain Microsoft Project schedules
  • Ability to manage a resource
  • Knowledge of emerging security policies and governance that may impact the agency's information security policies
  • Ability to work independently to facilitate discussions among different groups within the agency
  • Possession of excellent analytical skills
  • Public Trust clearance
  • BA or BS degree in Information Security, Computer Engineering, Computer Security, or related field preferred
27

Analyst, Enterprise Information Security Resume Examples & Samples

  • Perform log analysis for security anomalies using monitoring and detection tools
  • Perform firewall policy and configuration reviews
  • Review operating systems security configurations
  • Identify security risks, threats, and vulnerabilities in regards to networks, systems, applications
  • Create operational documentation and processes
  • Be on call, respond to after hour support issues, work extended hours
  • Bachelor’s Degree (or 4 years of equivalent work experience), preferably in Computer Science, Information Systems, Engineering, or relate field
  • 4 years of relevant work experience (in addition to degree or years of previous experience), with a network engineering and/or system administration background (Unix/Linux/Windows)
  • Intermediate understanding of security impacts of network protocols TCP/IP, HTTP, etc
  • Intermediate understanding of authentication, authorizations, and public/private key encryption
  • Intermediate documentation and process creations skills
  • Novice experience with scripting in any of the following: Perl, Python, Unix Shell
  • Novice understanding of exploits, intrusion detection, and incident response
  • Novice understanding of system hardening for OS platforms and applications
28

Information Security Functional ID Investigation Analyst Resume Examples & Samples

  • To ensure function descriptions for the in-scope applications are accurate and complete to enable managers / delegates to conduct quality entitlement reviews in the Enterprise Entitlement Review System (EERS)
  • To interface with the Business and Application Owners, Business and Technology Information Security Officers (ISOs), Global ISA groups to achieve ongoing ICG FID program milestones at the Corporate and ICG sector levels, driving inventory cleanup and metrics reporting/follow-up to ensure authorized user list reviews are being completed in a timely manner. The ultimate objective is to ensure the data required for in-scope authorized user reviews is available for FID owners to determine appropriateness of authorized user list memberships
  • Work independently and effectively in a complex, multi-tasking, multi-cultural environment
  • Demonstrate ability to work effectively in a fast-paced and deadline-driving environment
  • Build and maintain strong relationships with different teams
  • Measure and report clear progress against established thresholds or milestones
  • Ensure effective tracking and quality reporting on the status of the ICG effort
  • 6+ years of Information Security and FID experience
  • Strong verbal, written and presentation skills
  • Strong influencing and interpersonal skills
  • Strong problem solving and analytical capabilities
  • Archer Development experience
  • Ability to build and maintain strong client relationships
  • Demonstrated ability to measure and report clear progress against established thresholds or milestones
  • Proven ability to work independently and effectively in a complex, fast-paced, multi-tasking, multi-cultural environment
29

Information Assurancecyber Security Analyst Resume Examples & Samples

  • Bachelor’s Degree in IT, computer science, information systems management or equivalent experience
  • A minimum of 2 years’ experience in the IA/Cyber Security Field with DOD or DON experience
  • Information Assurance/Cyber Security Experience with certification and accreditation, implementing Cyber Security technical requirements into systems and documenting compliance thereof
  • DoD 8570 Certification (e.g. Security + or CISSP, etc.) Security + minimum, An ability to communicate complex concepts to senior management and technical personnel equally
  • Familiar with skilled in working with vulnerability assessment tools and applications such as Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP) Compliance Checker, NESSUS, as well as Security Readiness Review Scripts and Security Technical Implementation Guides Benchmarks and Checklists
  • C&A and/or A&A experience
  • DoD IA Certification and Accreditation Proficiency
  • MS Office Products
  • Proficiency using the Enterprise Mission Assurance Support Service (eMASS) system
30

Information Security Product Analyst Resume Examples & Samples

  • Help drive development cycle of security products
  • Be familiar with agile and can contribute to the development of user flows, user stories, functional concepts, and non-functional requirements
  • Be able to define and prioritize product and customer requirements and features, working directly with Engineering as Product Owner in an Agile Scrum environment
  • Be a team player with strong collaboration skills
  • Have ability to manage multiple assignments and ensure deadlines are met
  • Be good at partnering with all stakeholders on roadmap and feature capability
  • Be an eloquent communicator (both written and oral) comfortable in front of a group
  • Be able to articulate complex technology simply
  • Be able to proactively identify and mitigate risks and issues
  • Have excellent negotiation and persuasion skills
  • Maintain meticulous records of projects and programs financials, issues, risks, decisions, schedules
  • Provide timely and accurate reporting to all stakeholders; hold regular cross organizational management briefings
  • Have familiarity/background in security and topics such as Application security, Cloud solutions, Software defined security, Open stack, Open source tools
  • Be good at partnering with product engineering, Infrastructure services and other stakeholders on roadmap and feature capability
  • Prior experience managing security product development or CISSP is a plus
31

Information Security Controls Analyst, VP Resume Examples & Samples

  • Engage, educate and support first line Control Owners in documenting Control Requirements taking into consideration regulatory requirements, authoritative control frameworks and industry best practices
  • Work with Control Owners and Security Architecture to identify and document Control Solutions to instantiate the controls across various technology platforms and organizations
  • Document Control Operating Procedures to guide Control Implementers in introducing the controls in their environment
  • Define Control Measurements for both compliance and operating effectiveness and work with the Controls Compliance Team to develop and incorporate appropriate metrics into their program
  • Work with the Control Assessment Team to document Control Testing Procedures and support them as needed in the development of remediation plans to address control issues
  • Work with 2nd Line to obtain input and approval that the controls defined by first line meet their Control Objectives
  • Support the development and implementation of an EIS Security Controls Training & Awareness Program to ensure Control Implementers understand the control solution and their role in achieving compliance
  • Support EIS Control Office activities on Risk and Threat Identification/Assessment and mapping the associated controls
  • Assist with the development of an EIS Control Strategy & Roadmap outlining how controls will be approved and matured over time
  • Strong, proven knowledge and experience working with Cybersecurity control frameworks and industry best practices
  • 5+ years in IT management or operations, technology or operational risk management, technology audit or related role, including experience testing and assessing controls
  • Experience in the financial services sector
32

Information Security Vulnerability Lifecycle Analyst Resume Examples & Samples

  • Orchestrate the analysis and delivery of Information Security Vulnerability Findings to customers with impactful, comparative, interpretative information security analysis in a clear, consistent, and factual manner
  • Responsible for reported metrics, including detection and use of various available inventories and scan results, data modelling, processing, calculating and transformation into meaningful metrics and reports
  • Analysing data or information, identifying the underlying principles, reasons or fact of information by breaking down information or data into separate parts
  • Support the organization through internal and external audits of the various processes and procedures in use
  • Revise and update documentation, PCMs
  • Evaluating information to determine compliance with standards
  • Prior experience includes 3 years+ Information Security or Information Technology experience
  • Knowledge of computer hardware and software including understanding of application and patch development and architecture
  • Basic understanding of computer networking
  • Understanding computer security policies and frameworks
  • Knowledge of SQL / Database, SSIS, MicroStrategy is an advantage
  • Good knowledge of statistics
  • Professional Certifications preferred or will be expected to acquire: CISSP, CEH
  • Excellent and complex problem solving abilities and analytical skills. Ability to see the big picture with high attention to critical details
  • Critical thinking, using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches of problems
  • Judgement and decision making considering the relating cost and benefit of potential actions to choose the most appropriate one
  • Can Do attitude
  • Effective communicator; has excellent writing and verbal skills
  • Active listening and learning, understanding the implication of new information for both current and future problem-solving and decision-making, understands the importance of sharing knowledge among peers; exhibits foundational leadership qualities
  • BA/BS preferred
  • 3+ years working in Information Technology or Information Security related field
  • 1+ experience or knowledge with one or more middleware products
33

Information Security, COB & Controls Analyst Resume Examples & Samples

  • Support the implementation of global programs in place to ensure adherence to corporate policy and legal/Regulatory requirements (SOX, Operational Risks, RCSA, regulatory, and Insurance Questionnaire)
  • Independently assess the effectiveness of controls and determine the potential impact of any control failures and corrective actions required
  • Identify control gaps/weaknesses and provide practical recommendations to improve the quality and effectiveness of the control environment
  • Monitor corrective actions and communicate to staff and management about status, dates and changes
  • Participate in internal and external audits and regulatory examinations/inspections by acting as audit liaison/interface, as required
  • Assist in periodic reporting (including quarterly risk assessments); analyze self-assessment (including information security risk assessment results) and audit results; and assist in formulating effective remedial solutions
  • Ensure compliance with Citi Information Technology Management Policies (CITMP) and Standards
  • Provide counsel and advice on the interpretation of methodologies, policies and standards
  • Work with management to instill a proactive risk management approach and awareness
  • Ensure that Technology Unit practices and processes conform with IS policies and standards
  • Ensure entitlement reviews are executed and quality assessed within Technology according to defined standards and procedures
  • Ensure Vulnerability Assessments (VAs) are being conducted according to defined standards
  • Participate in reviews of VA results of web sites owned by the businesses
  • Participate in review of findings from these tests and assist in defining corrective action plans and track issues to completion
  • Participate and provide technical expertise during on-site information security assessments of critical vendors or those who have access to, process, store or transmit Confidential data or higher classified data
  • Distribute IS/Risk awareness
  • Assist in the creation and distribution of periodic of IS/Control related management reporting
  • Ability to lead and manage projects
  • Bachelor's degree in Computer Science or Engineering is preferred with at least 3 years of relevant experience
  • A strong aptitude for managing Control & IS practices
  • Excellent communication skills both with Senior ICG Technology Managers and Staff
  • Ability to interact with Internal Audit (IA), Legal, Compliance and Technology Infrastructure (TI) Controls Groups
  • Experience with technology infrastructure (e.g., network, operating system, etc.), security engineering, and/or development of applications with security requirements
  • Experience with interpretation, creation, and application of policy and standards
  • Ability to work well with others at all levels of management
  • Industry certification a plus
34

Information Security Forensics & Ediscovery Analyst Resume Examples & Samples

  • Bachelor's degree in Computer Information Systems, Information Technology or related field
  • CISSP (Certified Information Systems Security Professional), CISM or CISA certification a plus
  • 1-3 years experience in Information Security with general understanding of information security best practices
  • General understanding of information systems technologies (IT), platforms and network design
  • Knowledge of industry applicable laws and regulations preferred
  • Prior experience drafting and developing procedures and/or documenting system requirements
  • Strong interpersonal skills with the ability to effectively communicate and engage with employees at all levels of the organization
  • Strong project management skills; demonstrated ability to manage projects through to successful fruition and within tight timelines
  • Solid analytical capability; ability to exercise sound judgment; solid decision making skills with the ability to align to organizational priorities and preferences
  • Strong attention to detail; high degree of quality orientation
  • Ability to perform multiple tasks within defined deadlines; strong organization and prioritization skills with the ability to effectively manage deliverables in a fast-paced, changing environment. Proactive follow-up; self-directed and self-motivated. Ability to take direction from multiple people and flex to the work styles of others
  • Strong collaboration skills; team player
  • Strong business acumen and fiscal aptitude
  • High proficiency with MS Office to include Word, Excel, PowerPoint, MS Project, SharePoint; prior knowledge and experience with RSA Archer eGRC a plus
35

Information Security Technology Analyst Resume Examples & Samples

  • Experience in dealing with customer queries
  • Experience with security testing is a plus
  • Communication – excellent writing and verbal skills
  • Strong work ethic and judgment
  • Experience with SharePoint or SQL is a plus
  • Degree in a technology related discipline is strongly preferred
  • 3-5 years working in an Information Technology related field
36

Information Security Administration Analyst Resume Examples & Samples

  • Responsible for provisioning/de-provisioning of access to applications, infrastructure and operating systems as per established policy, standards and procedures
  • Responsible for updating and resolving request tickets and ensuring timely settlement of assigned user requests and issues as outlined by Service Level Agreements
  • Serve as a subject matter expert and/or participant in business process re-design activities. Assist business partners in determining if and how system enhancements may improve process flow and business function
  • Drive process improvement & increasing adoption of business defined access role profile templates through standardization, simplification & automation
  • Conducts analysis of business goals, objectives, and needs of the business environment
  • Assist with troubleshooting and problem analysis by working with other teams, vendors or users in diagnosing and resolving users access issues
  • Strong client facing skills. Makes recommendations to improve business processes
  • Uses independent judgement to make decisions based on precedents and established guidelines
  • Know when to refer issues to manager
  • Independent worker with little to no supervision
  • Self-starter
  • Visionary who is able to think outside the box
  • Possess a degree in Business, Marketing, Computer Science, or closely related field and 2 years of related work experience
  • Experience working on cross functional teams, multitasking and managing time independently with little direction
37

Information Security Solutions Analyst Resume Examples & Samples

  • Developing best practices and documentation for existing shared security services
  • Developing technical best practices for compliance frameworks (e.g. NIST 800-53/171, PCI-DSS, GLBA)
  • Identifying opportunities to adapt single campus security solutions into best practices that can be applied at other campuses
  • Managing centralized aspects of shared security tools and services (IdentityFinder/Spirion, phishing assessment, Comodo certificates, Duo multifactor, etc.)
  • Management of IdentityFinder/Spirion service for System Administration division
  • Information technology security related certifications (CISSP, GIAC, etc.) and/or completion of information security focused coursework
  • Experience managing IdentityFinder/Spirion or other DLP discovery products
  • Experience managing third-party certificate issuing services (Comodo, Verisign, DigiCert, etc.)
  • Experience working with Duo multifactor or similar multifactor system
  • Experience with managing or advising technical compliance to NIST 800-53 or NIST 800-171
  • Experience working in IT within a higher education institution
38

Information Security Program Analyst Resume Examples & Samples

  • 10 to 15 years’ experience in email security protocols such as TLS and MTLS
  • Understanding of requirements to setup TLS, such as digital certificates, and email configuration
  • Understanding of encryption technologies
  • A complete understanding of corporate data protection and content monitoring email process
  • Understanding of how to develop and implement IS policies and procedures
  • Demonstrates knowledge of globally accepted IS principles
  • Industry-accredited security certifications (the candidate should be willing to obtain any or all of the following certifications –CISSP, CISM, CISA or Equivalent
  • Good Project Management skills/working knowledge of the techniques for planning, monitoring and controlling programs and resources
  • At least 1 year experience in both project/program management or information security
  • Adept at multitasking
  • Good analytical problem solving skills with the ability to present data in a format that facilitates senior management decision making
  • Ability to work independently with a virtual team. Comfortable working as part of global team across multiple countries, cultures and time-zones
  • Good organizational skills, ability to work under pressure and prioritize within deadlines while maintaining total accuracy
  • Ability to work in a matrix environment and partner with virtual teams
  • Quick learner and ability to work in a diverse, global environment
  • Good knowledge of Microsoft Office with Excel, and Outlook skills
39

Information Security Policy & Standards Analyst Resume Examples & Samples

  • Consult with GIS process owners on how to write policy and standard requirements to meet prevailing laws and regulations while being achievable and measurable at Citi
  • Subject Matter Expert (SME) and advisor on Citi Information Security Standards (CISS) and all related GIS standards, policies and processes
  • Interpret industry leading Security Frameworks (COBIT and ISO 27001/2) to define guidance for and provide consultation to GIS Process owners
  • Advise and direct policy and standard owners to ensure all standards and policies under review comply with the IT Policy Management Framework (ITPMF) and proper attributes for Standards development are maintained
  • Implement and integrate processes and procedures aimed at meeting internal and external regulatory or policy requirements
  • Develop and maintain process for cascading CISS updates to all affected Citi policies and standards
  • Delegate for GIS Senior Leadership as a Process Area Representative with the IT Policy Committee
  • Ensure that global standard policies, procedures and tools are being used while applying a comprehensive understanding of industry changes to internal systems and workflows
  • Understand, document, and communicate business processes to appropriate parties while fostering relationships with policy and standards stakeholders
  • Perform analysis to determine root cause of identified exceptions and proactively search for and proposed enhancements to high risk processes and policies
  • Maintain all supporting documents and evidence of approvals through the lifecycle of an Information Security Policy/Standard as necessary
  • Prepares, maintains, and submits clear and concise meeting materials and communications for Global Head of Information Security and the Information Security Risk Operating Committee (ISROC)
  • Possesses strong project management and interpersonal skills, make sound decisions, exhibiting initiative and intuitive thinking to streamline processes and add value to our constituents
  • Recognized by others as a Subject Matter Expert with in the Policy and Standards Process
  • Consulted often by others for advice and opinions and recognized as a leadership role model
  • Serves and promotes good working relationships across a project
  • Cultivate the people skills needed to develop trust and communication among stakeholders
  • Communicates to all concerned parties milestones, status updates, as well as any existing or potential issues. Proactively follows escalation and change control processes. Has overall ownership of all management reports on a given engagement
40

Information Security Applications Analyst Resume Examples & Samples

  • Understand Citi Policy and Standards as it applies to user entitlement reviews
  • Work with internal business partners in providing guidance throughout EERS feed QA or exemption processes
  • Skill in organizing resources and establishing priorities
  • Understand and implement the documented QA process
  • Ability to foster a cooperative work environment
  • Ability to provide technical coordination and management of development and/or implementation projects in area of expertise
  • Produce periodic metrics and reporting of progress, issues and possible risks
  • Track progress in Citi tools, including MS Excel
  • Analyze and provide feedback to the teams on feed quality analysis
  • Assist application and infrastructure development and support teams in creating high quality entitlement feeds into EERS
  • Communicate QA requirements to the application and infrastructure development and support teams
  • Provide continuous improvement suggestions around the QA process
  • Demonstrate influencing skills in a decentralized environment
  • Demonstrate good influencing, facilitation, and partnering skills
  • Individual should be analytical, flexible, and team-oriented, have good interpersonal, communication and follow up skills with strong attention to detail and ability to multi-task
  • Technical proficiencies in MS Word, MS Excel
  • General computer knowledge
  • Basic MS Access
  • Understanding of data transmission protocols
  • Ability to effectively communicate with a diverse, international user base
  • Lead meetings with this global community
  • Must be able to manage their own time while meeting deadlines and communicating their status with management
  • Take direction and produce results in a timely manner with minimum oversight
  • Willing to work occasional off hours to cover meetings in other parts of the world
  • Good communication and presentation skills to interact with Senior Management
  • MS Excel advanced functions / Power Point
41

Information Security Policy & Documentation Analyst Resume Examples & Samples

  • Responsible for managing the development of security policies in conformance with industry best-practices and relevant contractual, legal, regulatory standards requirements
  • Drives integration of information security policies and standards to align and integrate within Tenneco global business operations
  • Partners with the Information Security Training & Awareness team to create content and strategy for training and awareness initiatives
  • Collaborates with the Risk Management team to manage and track document exceptions
  • Experience with implementation of document SDLC processes
  • Assists with the development of IT documentation to support audit requests driven by regulations as well as external customer requests
  • Works with Legal to promote data retention schedules and guidelines within IT documentation
  • Supports the Tenneco Global Data Classification Scheme deployment through training and work instruction documentation development
  • Coordinates timely responses to questions submitted to the information security mailbox
  • A solid foundation in compliance frameworks and security management standards (e.g., I SO 27001:2013, COBIT, and NIST) and other related standards (e.g., ISO 9001 / TS 16949)
  • Possess a working level knowledge of Information Security program concepts, practices, and standards, as well as practical experience in the design and implementation of business processes
  • Excellent verbal and written communication skills for use through all management levels of the organization (e.g. senior executives, plant management, etc.)
  • Knowledge and experience working across a geographically and culturally diverse organization
  • 4 yr University degree in Computer Science, Engineering, Information Systems, Information Security or English or comparable level of experience
  • 5+ years of demonstrated experience in Information Technology/Security Governance, Risk & Compliance (GRC) domains
  • Information Security certification (CISSP, CISA, CRISC,CEGIT, etc.) strongly preferred
  • Policy document samples required for position consideration
42

Information Technology Security Analyst Intern Resume Examples & Samples

  • Strong understanding of Computer Science fundamentals
  • Understanding of wireless technologies (wifi, 802.11)
  • Strong understanding of Windows Operating Systems
  • Problem Solving and analysis skills
43

Information Technology Security Analyst Resume Examples & Samples

  • Travel to commands/sites and train personnel on technical functions such as running scans, review command documentation/policies, upload results into VRAM, and any other tasks necessary to complete a cyber inspection/assessment/audit
  • Train personnel on and/or perform or review vulnerability scans, conduct risk assessments, and implementing or overseeing of the implementation of vulnerability assessments
  • BA/BS in Information Systems Management, Computer Science or related discipline with minimum of 2 years experience. In lieu of a degree, 8 years of related experience (technical/engineering experience related to communications systems, computer networking or similar systems). Specific contract requirements will prevail
  • Current DoD8570 Security + certification
  • Travel: 50% travel required
  • Experience with ACAS, NESSUS
  • Experience with DoD Networking
  • Windows System Administrator experience
  • Desire is for an Analyst with database, especially SQL experience. Consideration will also be given to candidates with ACAS, HBSS experience. Highest preference will be given to candidates with SQL experience
44

Information Security IAM Center of Excellence Analyst Resume Examples & Samples

  • Strong analytical abilities
  • Strong control orientation, analytical skills, attention to detail, critical thinking and problem solving
  • Open to creatively solving problems and blending ideas from different sources
45

Security Information & Event Management Analyst Resume Examples & Samples

  • Be a subject matter expert in threat correlation, automation and reporting with in the SIEM
  • Participate on interconnecting the SIEM tool with sources of security incidents – e.g. logs from servers, network and security devices, Vulnerability Management system, Antivirus system, helpdesk ticketing systems, Application, Threat Intelligence, etc
  • Required expert level experience in LogRhythm SIEM solution, including dashboarding, report generation and case management tools
46

Information Security Program Analyst Resume Examples & Samples

  • Analyzes and evaluates existing information security programs and procedures to protect corporate information systems assets from intentional or inadvertent modification, disclosure, or destruction
  • Documents and maintains information security programs and procedures to protect all information systems data, including mainframe, networks, and software applications
  • Assists in creating and enforcing security standards, policies and procedures
  • Reviews existing and proposed legislation and regulations related to information security
  • Researches and maintains current knowledge regarding information security issues, trends, solutions and potential implications for Navy Federal
  • Performs risk assessments of business processes, systems and applications
  • Analyzes and evaluates the design and operating effectiveness of Information technology and security controls that are in place
  • Evaluates current business practices against regulatory and industry benchmarks
  • Performs assessments of new and existing vendors’ IT environments in protecting Navy Federal information assets from data compromise and/or identity theft
  • Communicates with internal Navy Federal personnel to understand the services and/or products being provided by the vendor
  • Evaluates the security controls the vendors have in place
  • Assesses an overall risk rating for the vendor based upon their control environment
  • Communicates with vendor personnel throughout the review process
  • Communicates status of reviews to Information Security management
  • Assists with the education of staff about the requirements of information security and the efforts to improve information security awareness
  • Develops communications and training materials regarding security policies, guidelines and standards to provide control and consistency throughout the organization
  • Advanced college degree in information security, cyber security, information technology, etc
  • Experience with security systems, assessment tools, and technical security
  • Professional certification (CISSP, CISA, CRISC) or a reasonable expectation to obtain the certification
47

Information Security Remediation Analyst Resume Examples & Samples

  • Proficient in application development a plus
  • Application Secuirty Remediation experience
  • Advanced proficiency with MS Excel
  • Detailed, bank specific application development knowledge with emphasis on security
  • Advance MS Excel knowledge
48

Security Information & Event Management Analyst Resume Examples & Samples

  • Follow pre-defined actions to handle BAU and High severity issues including escalating to other support groups.. Execute daily adhoc tasks or lead small projects as needed
  • Perform assessment as well as troubleshooting and help isolate issues with IDS/IPS sensors, Antivirus servers, Vulnerability scanners
  • Bachelor's, in Computer Science or related Degree or higher preferred
  • Ability to read and understand packet level data. Intrusion detection and prevention and Network Security Products (IDS/IPS, firewalls, etc) Host Security Products (HIPS, AV, scanners, etc)
49

Security Information Analyst Resume Examples & Samples

  • Contributes to the provision of advice to the PSA /CSO or a similar entity on threats affecting the United Nations
  • Supervises the Chief Security Operation in supervision of the Security Information Coordination Unit (SICU)
  • Evaluates and coordinates security information requirements, collection, collation and dissemination of security threat information to PSA or CSO, Designated Officials and Security Management Teams
  • Analyzes security information, identifies trends of threats and security incidents affecting United Nations system personnel, assets and operations in specific countries
  • Conducts trend analysis, gathers comprehensive information on all factors of insecurity, assesses the relevance and validity of security information and the reliability of information resources
  • Assists Senior Officers, PSA or equivalent in the development of specific security risk assessments for individual UN programs and activities within South Sudan, or in preparation of rapid threat and risk assessments
  • Contributes to the development of corresponding security advisories and recommendations on security operating procedures
  • Provides country-wide security risk analysis, briefing materials and presentations to PSA or equivalent, Designated Officials and Security Management Teams on security matters
  • Conducts and coordinates research on specific threat factors, support activities of the Crisis Management Team in response to specific security incidents
  • Maintains effective communication channels with security authorities of host countries and other interlocutors
  • Drafts and coordinates timely dissemination of security threat information to mission leadership, Security Personnel
  • Drafts reports on analyses of security incidents affecting United Nations system personnel, assets and operations
  • Contributes to the development of state threat assessments in coordination with Principal Security Adviser or equivalent in neighboring countries
  • Supervises and guides the activities of the Security Information Analysts in the SICU as well as any national staff assigned to the information cell
  • Performs other duties as directed by PSA or equivalent
  • Effective planning, implementation and coordination of a security information analysis system capable of maintaining situational awareness for the mission and other United Nations entities in the country
  • A minimum of five years with advanced university degree (seven years with a first-level university degree) of progressively responsible experience in security information analysis with a military, police, state, civilian information management or security management organization is required; At least two years experience and exposure at the international level is required; At least one year of experience in a conflict or post conflict environment is required; Other desirable experience: Security Information Coordination Unit (SICU), Joint Mission Analysis Centre, maintenance and coordination of priority information requirements, computerized data base and archives, mission-wide risk analysis; conduct of statistical analysis to identify trends and security incident patterns; assessment of conflict dynamics, GIS data basis management, military or national intelligence, etc
50

Information Security Program Analyst Resume Examples & Samples

  • Maintain a continuous process improvement work environment, recommending and implementing new/improved systems in accordance with industry standards and best practices
  • Perform risk assessments and security testing as part of a security team
  • Assist in creating and enforcing security standards and procedures
  • Develop communications and training materials regarding security policies, guidelines and standards to educate staff about the requirements of information security and to improve information security awareness
  • Perform technical management of Data Loss Prevention tools. Create and maintain Data Loss Prevention policies. Monitor metrics to demonstrate decreased data loss risk
  • Professional certification (CISSP, CISM, CRISC) or a reasonable expectation to obtain the certification
51

Information Security Project Analyst Resume Examples & Samples

  • Performs project security assessments
  • Assesses centralized user and configuration management systems
  • Partners with other Information Security groups to conduct security risk assessments on new solutions and systems, periodic security risk assessments on existing systems and identify and/or recommend appropriate security countermeasures and best practices
  • Assists in other areas of the department and company as necessary
  • A Bachelor’s degree in Computer Science or a minimum of 3 to 5 years of information systems security or related data processing auditing experience
  • One or more professional audit or security certifications such as CISA or CISSP (or equivalent work experience)
  • Experience with network-based detective controls like IDS, IPS and various SIEMS
  • Working knowledge of web technologies
  • Experience with performing vulnerability scans and assessments
  • Familiarity with SOA governance and policy management best practices
  • Familiarity of SDM, SDLC, and project management processes
  • Familiarity in a DevOps or DevSecOps environment