Security Information Specialist Resume Samples

4.6 (105 votes) for Security Information Specialist Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security information specialist job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
BD
B Denesik
Bertha
Denesik
8003 Kaitlin Lakes
New York
NY
+1 (555) 494 1654
8003 Kaitlin Lakes
New York
NY
Phone
p +1 (555) 494 1654
Experience Experience
Detroit, MI
Information Security Data Specialist
Detroit, MI
Green, Kuhlman and O'Conner
Detroit, MI
Information Security Data Specialist
  • Develop and manage program metrics and performance through tracking/reporting and active engagement with stakeholders for continuous service improvement
  • Work with various risk and information security teams in presenting recommendations for improvement to technology subject matter experts and management
  • Improve the efficiency of information security processes and advance the effectiveness of the information security controls of the operating model
  • Develop and maintain transactional and dimensional databases/warehouse
  • Understand front to back systems and manage transaction flow
  • Engage with cross sector, global and risk teams in the review and reengineering of key controls and processes to effectively and efficiently manage IS issues
  • Manage due diligence and vendor data loads
Philadelphia, PA
Information System Security Specialist
Philadelphia, PA
Strosin and Sons
Philadelphia, PA
Information System Security Specialist
  • Working knowledge of the Risk Management Framework (RMF) process
  • Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
  • Assist in the development/testing/management of application and system recovery plans
  • Follows Cerner policies, upholds professional standards, and performs all work in a manner respectful of others
  • Manage and control changes to the systems and assessing the security impact of those changes
  • Assist with preparation and maintenance of documentation
  • Ensure development and implementation of an information security education, training and awareness program, including attending, monitoring and presenting local IA security training
present
San Francisco, CA
Computing Security & Information Protection Specialist
San Francisco, CA
Carroll-O'Connell
present
San Francisco, CA
Computing Security & Information Protection Specialist
present
  • Conduct and mitigate risk assessments and investigations; and assist with activities of incident response
  • Provide audit compliance and assessment support
  • Assist in developing Certification and Accreditation (C&A) documentation for new and existing systems
  • Provide support with performing security analysis of operational and development environments, threats, vulnerabilities and internal interfaces to define and assess compliance with accepted industry and government standards
  • Develop certification and accreditation (C&A) documentation for new and existing systems
  • Integrate computing security activities with business partners, such as, IT, Program Management, or Engineers
  • Develop policies and provide oversight for protection of computing security systems
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Seton Hall University
Bachelor’s Degree in Computer Science
Skills Skills
  • Highly motivated; Deadline and detail oriented
  • Excellent customer service skills
  • Strong oral (phone) and written (email) communication skills
  • Excellent analytical thinking, troubleshooting, and problem solving skills
  • Information security, incident escalation and/or investigation
  • Information security or networking experience
  • Scripting languages – bash, Python, Perl
  • Relational databases & structured query language – MySQL, SQL Server
  • Intermediate Java programming skills
  • Extensible Markup Language - XML
Create a Resume in Minutes

15 Security Information Specialist resume templates

1

Information Security Technical Specialist Resume Examples & Samples

  • BS/BE degree in Information Security/ Computer Science/Electronics and Engineering /Information Technology
  • 9+ years of Information Security Risk Management with appropriate certifications (CISSP, CSSLP)
  • Ability to build and maintain positive working relationships across project and control teams
  • Strong risk management and risk articulation skills
  • Strong technical aptitude with a specialization in design, implementation and review enterprise information security architectures and processes
  • Strong knowledge in the application and infrastructure security areas related to but not limited to XML, SOAP, SSL, Java, Firewalls, Load balancers, PKI, OWASP, Network Security, Service management, industry regulations
  • Good project management and analytical skills with the ability to manage multiple priorities within targeted timeframes
2

Information Security Audit Specialist Resume Examples & Samples

  • Advises leadership of the readiness for audits and certifications based on pre-assessments, remediation of identified deficiencies, and current state of the entities in scope
  • Establishes and reports on metrics to gauge on audit program effectiveness, audit readiness, and key risk areas that could impede successful external audits
  • Develops detailed audit work plans, schedules, project estimates, resource plans and status reports
  • Liaises with internal auditors, external auditors, vendors and outside consultants as necessary for independent security audits
  • Interfaces directly with management teams for coordination of evidence collection and interviews with auditors
  • Recommend and implement process improvement strategies
  • Monitors remediation activities in-scope for external audits
  • Evaluation and selection of external assurance vendors
  • Demonstrated integrity and judgment within a professional environment
  • Demonstrated ability to think creatively while accounting for multiple perspectives in any given scenario
  • Working knowledge regarding Network and Application Penetration testing and experience in communicating vulnerabilities to technical and non-technical audiences
  • Experience performing audits preferred
  • Network and/or application pen testing experience a plus
  • In depth knowledge of SOC2 Trust principles and ISO 27000 frameworks
  • Good time management, interpersonal, communication, organizational, and decision-making skills
3

Information Security Project Specialist Resume Examples & Samples

  • Security Toolkit
  • ID Management
  • Secured Coding
  • Workplace Security
  • Minimum 3 year experience of working on IT Projects related to Infrastructure / Application Development or Workplace
  • Min 2 year of experience on client facing projects
  • Familiar with basic concepts of Security in any of these areas, Operations Compliance, Disaster Recovery
  • Min 1 year experience on IT Security tools (Antivirus, NIST, Hids. Fws, Log collectors, or any other)
  • English High level is a must
  • Availability to work from 14:00 to 22:00 p.m
4

Information Security Regulation Management Specialist Resume Examples & Samples

  • Prior Governance, Compliance, and or Audit experience desired
  • 5 years experience operating within an information security environment
  • Broad awareness of information security operations, and or enterprise information technology (Enterprise data management, application development, network management) experience
  • Must have a strong risk management acumen
  • Leadership competency in geographically diverse matrixed environment
  • Must be comfortable communicating technology impacts and risk to various levels of executive management understanding the need to tailor and deliver appropriate content for given audience
  • Ability to manage activities with minimal supervision
  • Ability to work and support a global virtual team
  • Ability to manage and operate within enterprise risk framework
  • Ability to effectively manage conflicts and or conflicting priorities
  • Ability to effectively manage and escalate items for resolution
5

Information Security Data Specialist Resume Examples & Samples

  • Develop and maintain transactional and dimensional databases/warehouse
  • Maintain data load processes
  • Manage due diligence and vendor data loads
  • Project management and documentation
  • Knowledge of Vulnerability Management tools and processes
  • Must be proficient with Microsoft Office Suite, SharePoint, and Microsoft SQL Server
  • Database design, stored procedures, triggers, reporting, ETL using SQL Server 2008/12, SSRS, SSIS, SSAS
  • Experience developing data queries using SQL and Excel
  • Communication – excellent writing and verbal skills in English
6

Global Information Center Security Specialist Resume Examples & Samples

  • Supports the implementation and management of the Information Security Management System and Privacy Program
  • Advises on Business Continuity Management (BCM) implementation and facilitates exercises of plans
  • Creates and carries out Security Awareness and Training plans
  • Advises on Information Security and Privacy control selection for internal projects as well as customer solutions, as needed
  • Plans and facilitates security assessments to help identify and manage risks (e.g. information security risk assessments, privacy impact assessments, physical and personnel security assessments)
  • Ensures audit findings are closed in a timely manner
  • Works with cross-functional key business stakeholders
  • Collects and analyses security metrics and reports status to management
  • Bachelors degrees required
  • At least 5 years in Information Security
  • Demonstrated ability to write technical reports, policies, procedures and to participate in presentations
  • Security+, CISSP or equivalent security or privacy certification preferred
7

Information Security Development Specialist Resume Examples & Samples

  • Deep technical understanding, and proven experience, with proactive frameworks and toolsets for operational intelligence. Forensic and big data analysis tools – any of the following - Splunk, MongoDB, Solr, Hadoop
  • Experience in designing, operating and managing Splunk, or similar big data forensic technologies (ELK)
  • Demonstrable experience undertaking forensic investigations using Splunk
  • Demonstrable understanding of information security related detection and protection methodologies
  • Unix / Linux security and/or administration experience, especially Red Hat/CentOS
  • Windows / Active directory security and administration experience
  • Demonstrable experience in automation, provisioning and configuration management on complex environments - Git, Ansible (or similar)
  • Deep technical understanding, and proven experience, with Operational Knowledge Management frameworks. I.e. CMDB, Vulnerability Management, IP Management
  • Proven software coding skills - covering at least 3 of the following - Assembly x86/x64, C, C++, C#, Python, JavaScript, Java, PHP, HTML, SQL, Node.js
  • Experience of leading or technically supporting Cyber Incident Management response and resolution
8

Information Security Program Lead Specialist Resume Examples & Samples

  • Develop and execute Information Security program strategy and governance framework to proactively identify risk and drive remediation
  • Analyze the maturity of the IS programs and execute the governance oversight for continuous improvement
  • Develop new information security standards, processes for firm wide IS programs
  • Establish working group across sectors to facilitate sharing of best practices and strategic direction of IS programs
  • Define a framework for delivery of risk measures and metrics reporting
  • Develop and manage program metrics and performance through risk-based metrics and active engagement with stakeholders for continuous service improvement
  • Improve the efficiency of information security processes and advance the effectiveness of the information security controls of the operating model
  • Work with various risk and information security teams in presenting recommendations for improvement to senior management
  • Additional ad-hoc IS & Risk related initiatives and projects
  • Prior experience includes 10+ years+ in information security or information technology management
  • Exercises judgment within broadly defined information technology and information security disciplines and practices in selecting methods, techniques, and evaluation criterion for obtaining results
9

Information Security SQL Specialist Resume Examples & Samples

  • Design, develop, test, and implement automation solutions
  • Monitor and troubleshoot scheduled jobs and resolve issues
  • Write custom SQLs for reports
  • Examining the process of data flow searching for the error sources, and constantly improving the process
  • Data visualization a plus, who can design and create visualizations of new high-impact visual applications to make data actionable and facilitate decision making for the clients
  • 3+ years of experience with programming in SQL
  • Strong data analysis skills to debug, trace, and fix problems
  • Problem solving abilities and analytical skills
  • Take ownership for ensuring activities are completed
10

Security Information & Event Management Specialist Resume Examples & Samples

  • Working knowledge of Linux, networking, ArcSight, troubleshooting, and security strategies
  • Familiar and experienced in the software development lifecycle process
  • Influencing skills to drive development standards
11

Information Security Monitoring Specialist Resume Examples & Samples

  • Minimum 5 years experience in the information security field
  • Candidate must have extensive knowledge of security threat vectors, networking, netflow, BGP, network security, the TCP/IP stack, and application security
  • Technologies include IDS/IPS, netflow analysis, DDoS mitigation, and Arcsight
  • Exceptional organizational skills, ability to manage multiple priorities in a fast-paced dynamic environment
  • Advanced problem solving skills, ability to develop effective long-term solutions to complex problems
  • Ability to design industry leading solutions to zero day security threats required
  • In-depth knowledge of common network protocols, packet formats, and common DoS attack types and security vulnerabilities is required
  • Experience with Python and other programming languages a plus
  • Experience with Arcsight a plus
  • Experience with network layer detection and mitigation devices a strong plus
  • Experience with Unix/Linux system administration a plus
  • BA/BS in Math, Information Systems, or Computer Science preferred
  • Strong network protocol & packet analysis preferred; Cisco & CISSP certifications a strong plus
12

Information Security Forensics Specialist Resume Examples & Samples

  • Bachelor’s Degree in a relevant discipline (Information Systems or similar field is preferred)
  • Completion of at least three of the following: GCIA, GPEN, GWAPT, GCIH, GSEC, CCNP, CISSP
  • 5-8 years’ experience in forensics
  • Advanced knowledge of scripting knowledge, Malware investigation and remediation, IDS support, Firewall support, Network traffic analysis, SIEM support and log review and URL and web traffic inspection
  • Expert knowledge of EnCase, Netwitness and other Forensics tools
  • Demonstrate expert knowledge in PKI, Access/Identity Management, secure authentication, change management and incident management
  • Organizational and self-directing skills – ability to initiate, coordinate and prioritize responsibilities and follow through on tasks to completion
  • An approach to work that includes initiative, sound judgment, diplomacy and Discretion
  • Ability to work without supervision with senior managers, supervisors, VIPs, Users and law enforcement
  • Demonstrates expert problem diagnosis and resolution techniques in the IT environment
  • Demonstrates expert knowledge of IT development processes and techniques
13

Information Security Data Specialist Resume Examples & Samples

  • Develop horizontal view of risk posture across multiple technology domains
  • Work with vulnerability lifecycle managers, operations and application support teams and the SSM team to analyze requirements, design and develop specs and manage data which supplies information to all vulnerability threat reporting and analysis
  • Develop and maintain transactional and dimensional databases/warehouse with further expansion to big data and other products if necessary
  • Develop and maintain ETL and data load jobs
  • Analyze requirements, co-design and develop specifications and manage data which supplies information to all threat reporting and analysis for the purpose of reducing risks to Citi's infrastructure
  • BA/BS degree or equivalent experience required, MS/MBA preferred
  • Strong work ethic, excellent use of discretion and judgment
14

Computing Security & Information Protection Specialist Resume Examples & Samples

  • Test and implement security solutions and procedures to ensure that systems are compliant with applicable policies, procedures, contracts and regulatory requirements
  • Provide compliance and audit support to maintain inspection readiness
  • Communicate and verify security policy to customers at various levels
  • Integrate computing security activities with business partners, such as, IT, Program Management, or Engineers
  • Assess and document verification test or analyze data to show security compliance
  • Knowledge of processes and tools to maintain, archive, sanitize, and retrieve digital files
  • Assist in developing Certification and Accreditation (C&A) documentation for new and existing systems
15

Computing Security & Information Protection Specialist Resume Examples & Samples

  • Develop policies and provide oversight for protection of computing security systems
  • Develop certification and accreditation (C&A) documentation for new and existing systems; perform risk managed file extractions in accordance with customer guidance
  • Interface with the appropriate government customers, suppliers, and company personnel to implement protective mechanisms to ensure understanding of and compliance with government and company computing security requirements
  • Current Top Secret clearance (investigated within the last 5 years) - US Citizenship Required - Applicants MUST include their Security Clearance Level, Investigation Type and Investigation Date clearly on their resume
  • IAM Level 1 DoD 8570 Certification. Applicants must include their IAM Level 1 DoD 8570 Certification clearly on their resume
  • Experience configuring Windows and/or Linux operating systems security policy settings
16

Computing Security & Information Protection Specialist Resume Examples & Samples

  • Participate in compliance audits and assessments
  • Analyze security events and records to determine if security incidents have occurred
  • Provide consultation on security issues
  • Use advanced investigative knowledge to assist in investigations
  • Participate in and/or lead incident response teams
  • Participate in and/or lead the development of information security training materials and processes
  • Provide compliance and audit support
  • Configure various operating systems such as Windows, Linux, and Solaris to meet Joint Air Force Army & Navy 6/3 (JAFAN 6/3), ICD 503, JSIG and National Industrial Security Program Operating Manual (NISPOM) standards
  • Develop certification and accreditation (C&A) documentation for new and existing systems
  • Perform risk managed file extractions in accordance with customer guidance
  • Review weekly audit logs and investigate any anomalies for UNIX, Linux and Windows systems
  • Analyze new technologies, both hardware and software, to determine security vulnerabilities and mitigations
  • IAM Level 1 DoD 8570 Certification
  • The position is contingent upon clearance verification and program/customer concurrence
17

Specialist Information Security Resume Examples & Samples

  • You will complete written Information Security responses to assigned client Information Security questionnaire requests
  • Monitor client Information Security questionnaire responses for applicability and accuracy as they relate to Broadridge products/services
  • You will ensure response compliance to Broadridge Information Security policies where possible (highlight non-compliance items to management)
  • You will interact with respective subject matter experts to ensure client Information Security questionnaire responses are accurately portrayed
  • Identify any assigned client Information Security questions that require management support
  • Perform Sharepoint status updates for assigned client requests in a timely manner
  • Handle management of Information Security knowledge base
  • You will evaluate/update client questionnaire Policies, Standards, and Procedures when required
  • You will participate in the higher education security community such as ISACA
  • DICE_TA
18

Information Security Controls Program Specialist Resume Examples & Samples

  • Support the EIS Control Officer who reports directly to the EIS Head and works with the associated Process Owner(s) within Integrated Services for the Americas (ISA)
  • Assist the EIS Control Officer with implementation and ongoing execution of the Risk Governance Framework (RGF) defined by the second line of defense
  • Assist the EIS Control Officer to assign EIS control owners (where appropriate) based on enterprise‐wide policies and standards
  • Provide subject matter expertise and guidance to the EIS Control Officer and assigned control owners during development of implementation plans to facilitate EIS compliance with enterprise-wide policies and standards
  • Assist with definition of EIS technical standards and operating procedures as needed to mitigate information risks and demonstrate compliance with enterprise‐wide policies and standards
  • Execute ongoing assessments to determine EIS compliance with enterprise‐wide policies and standards. Communicate instances of non‐compliance to the EIS Control Officer for review and validation
  • Assist with definition of EIS corrective action plans to remediate non‐compliance with enterprise wide policies and standards. Assign ownership in EISs for remediation and monitor completion of corrective action plans on an ongoing basis
  • Communicate material risk exposures and instances of EIS non‐compliance to the EIS Control Officer for review and validation
  • Monitor risk limits and tolerances to identify threshold breaches. Escalate any limit breaches to the EIS Control Officer for review and validation
  • Identify and assess EIS information risks using the criteria, tools and methods defined by the second line and the Central IRM Control Office
  • Quantify risk exposures using the risk analysis and risk acceptance criteria, tools and methods defined by the first line Central IRM Control Office and second line of defense. Communicate identified risk exposures to the EIS Control Officer
  • Execute EIS threat analysis using the criteria, tools and methods defined by the second line and Central IRM Control Office
  • Assist the EIS Control Officer with maintenance of EIS risk, threat and control libraries using the templates provided by the Central IRM Control Office and second line of defense
  • Provide subject matter expertise and guidance to the EIS Control Officer during definition of EIS risk mitigation plans in line with the Bank’s enterprise‐wide risk appetite, policies and standards
  • Enjoy analyzing and discussing risks and controls
  • Detail focus/methodical
  • Demonstrated ability to overcome obstacles and deliver assignments on-time and with high quality
  • High energy self-starter
19

Security Solution Sales Specialist Information Risk & Protection Resume Examples & Samples

  • At least 5 years experience in Software Sales
  • Knowledge of Security technologies and trends in any of the following Industries: State and Local Government, and Life Sciences
  • Must have proven track-record of effective account penetration, account development and account growth
  • At least 5 years experience in Security Software sales
  • Experience selling into State and Local Government, and the Life Sciences segment
  • Passionate about Security technologies and trends in State and Local Government as well as Life Sciences
20

Security Solution Sales Specialist Information Risk & Protection Resume Examples & Samples

  • At least 5 years experience in software sales
  • Knowledge of Security technologies and trends in any of the following: Healthcare, Life Sciences, or SLED
  • Experience selling into Healthcare, Life Sciences, or SLED
  • Passionate about Security technologies and trends in Healthcare, Life Sciences, or SLED
21

Computing Security & Information Protection Specialist Resume Examples & Samples

  • Work within a diverse team of computing security specialists in support of a multi-site programs and rely on their security and information technology background to evaluate computing/information security vulnerabilities and develop response plans to mitigate identified risks
  • Develop, test and implement security solutions and procedures to ensure that information systems are compliant with applicable policies, procedures, contracts and regulatory requirements
  • Analyze and record computing security events and verify that security parameters are in place
  • Provide consultation and advice on computing security issues
  • Develop policies and provide oversight to ensure computing infrastructure and applications are protected
  • Develop information security training materials and processes used to brief general and privileged users
  • Understand computer hardware and operating systems such as Windows 7, Server 2008/2012, Solaris, Linux, and/or UNIX
  • Develop security plans and associated ICD 503 documentation
  • Utilize communication skills in oral and technical writing, teaming, negotiation and time management
  • Work comfortably and efficiently in a dynamic environment with demanding deadlines to ensure that customer needs are met and effectively promoted in policy and security standards
  • Experience interfacing with a government customer
22

Computing Security & Information Protection Specialist Resume Examples & Samples

  • Current Secret clearance - US Citizenship Required
  • Applicants MUST include their Security Clearance Level, Investigation Type and Investigation Date clearly on their resume
  • IAM Level 1 (or higher) DoD 8570 Certification (Security + CE, CAP, GSLC, CASP, CISSP, CISM)
23

Entry Level Computing Security & Information Protection Specialist Resume Examples & Samples

  • Configure various operating systems such as Windows, Linux, and UNIX to meet Joint Air Force Army & Navy 6/3 (JAFAN 6/3), ICD 503, JSIG and National Industrial Security Program Operating Manual (NISPOM) standards
  • Provide audit compliance and assessment support
  • Analyze new technologies, both hardware and software, to determine security vulnerabilities and generate mitigations
  • Ensure that customer needs are effectively promoted in policy and security standards
24

Security Solution Sales Specialist Information Risk & Protection Resume Examples & Samples

  • 3+ years experience in software sales
  • Knowledge of Security technologies and trends in Financial Services (Banking and Insurance)
  • 3+ years experience in Security Software sales
  • Experience selling into Financial Services Market
  • Passionate about Security technologies and trends in Financial Services
25

Information Security Application Assessment Specialist Resume Examples & Samples

  • Work directly with client engagement leadership to schedule and conduct the assessment
  • Conduct the assessment using customized work plan to address key risks of the engagement
  • Travel on a limited basis
  • Minimum of 3 years Application Security Assessment experience (ie. assessment review, technical checks, automated scans, checking for policy violations and code vulnerability, etc)
  • Must be able to provide strong oral and written communication to executive leadership
26

Computing Security & Information Protection Specialist Resume Examples & Samples

  • Evaluates, communicates and mitigates computing and information security risks
  • Ensures that appropriate processes are in place and followed so that systems are compliant with applicable requirements
  • Participates in compliance audits and assessments. Analyzes security events and records to determine if security incidents have occurred
  • Develops policies and provides oversight for protection of computing security systems
  • Participates in and/or leads the development of information security training materials and processes
  • Provides compliance and audit support
  • Interfaces with the appropriate government customers, suppliers, and company personnel to implement protective mechanisms and to ensure understanding of and compliance with government and company computing security requirements
  • Ensures that customer needs are effectively promoted in policy and security standards
  • Performs security analysis of operational environments, threats, vulnerabilities and internal interfaces to define and assess compliance to accepted industry and government standards
  • Configures various operating systems such as Windows, Linux, and Solaris to meet Joint Air Force Army & Navy 6/3 (JAFAN 6/3), ICD 503, JSIG and National Industrial Security Program Operating Manual (NISPOM) standards
  • Develops certification and accreditation (C&A) documentation for new and existing systems
  • Performs risk managed file extractions in accordance with customer guidance
  • Reviews weekly audit logs and investigates any anomalies for Windows systems
  • Analyzes new technologies, both hardware and software, to determine security vulnerabilities and mitigations
  • Train general and privileged users in computing security processes, policies and procedures
  • Document and present for approval Information System Security Plans, Concept of Operations(CONOPS), and other written documentation as required by JAFAN 6/3, JSIG, NISPOM, ICD 503 and other customer direction
  • Assist FSO with various industrial security duties to include self-inspections, COMSEC, Administrative Investigations, personnel security, Site Security, Information Security. Participates, as requested, on enterprise Integrated Product Team (IPT) sub or task teams
  • Experience securing and/or analyzing security scan results on Windows or Unix/Linux systems
  • Minimum of 2 years computing security or information assurance experience
  • Risk Managed Framework (RMF) experience
  • SCAP/NESSUS/WASSP/SCESCN experience
  • UNIX/LINUX experience (i.e., auditing, configuring, vulnerability assessing)
  • Experience preparing and participating in security audits/inspections
  • CISSP certification must be obtained within 6 months of employment
27

Information System Networks Security Specialist Resume Examples & Samples

  • Develop security requirements for hardware, software, and services acquisitions specific to IA security programs as assigned by the program office or delegated authority
  • Coordinate between NAVAIR, NETWARCOM and regional IAM's in support of command IA security programs
  • Full understanding and awareness of all DoD and DoN IA directives, instructions, manuals and policy letters/memoranda and the ability to interpret, design, develop, and maintain all local IA security plans and policy directives in accordance with higher level policies and directives
  • Must be familiar with DISA tools especially SCAP and STIG as well as the NIST 800 series regulations
  • Provide scans for classified mission hard drives in support of system accreditation
  • Ensure anyone with privileged access performing IA functions receive the necessary initial and sustaining IA training and certification(s) to carry out their IA duties
  • Prepare or oversee the preparation of IA certification and accreditation documentation
  • Help prepare IA certification and accreditation documentation for network systems
28

Information Security Policies & Standards Specialist Resume Examples & Samples

  • Creating and revising information security policies and standards documents ensuring strategic alignment with business objectives
  • Managing documents’ lifecycle according to the defined process and with respective governance bodies
  • Establishing communication path with different ABB’s organizational units concerning new, revised, and withdrawn policy documents
  • Leading consultancy activities in the area of policy framework governance for ABB business and customers
  • Conducting analysis of a specific situation and/or processes as part of consulting engagements through interviews, meetings; working with project or operational teams
  • Supporting ABB IT and business teams in defining and implementing security controls or solutions in line with policies and standards requirements
  • Supporting security awareness activities including trainings around information security documents
  • Acting as a single point of contact for all type of inquiries on policy documents
  • Supporting external and internal audits conducted against information security
29

Information System Security Specialist Resume Examples & Samples

  • Takes appropriate action to prevent and report any compromises of security
  • Monitor IDS/IPS systems and escalate/respond to identified incidents
  • Respond to Security incidents and provide guidance to other support teams for incident remediation
  • Perform Vulnerability assessments of systems and applications
  • Complete risk assessments of new applications and systems as part of project management
  • Act as information security subject matter expert on technology implementation projects
  • Plans, coordinates, and implements applicable security measures to ensure appropriate use of data and prevent damage, unauthorized modification, and disclosure
  • Ensures integrity and completeness of data, network, tools, and environment as applicable
  • Works in accordance with corporate and organizational security policies and procedures
  • Manages and shows awareness of regulatory requirements
  • Performs maintenance, installations, upgrades, configuration, support and other technical duties
  • Assist in the development/testing/management of application and system recovery plans
  • Documents system or network modifications according to Cerner change control standards
  • Understands personal role in safeguarding corporate and client assets
  • Follows Cerner policies, upholds professional standards, and performs all work in a manner respectful of others
  • Experience with Intrusion Detection and Prevention systems (IDS/IPS)
  • Experience with using vulnerability scanning utilities to identify and escalate detected vulnerabilities
  • Risk assessment and management
  • Experience with analytical tools (ie. Spreadsheet, word processing, database)
  • Basic computer skills, including Microsoft Office suite
  • Security Incident Response and escalation experience
  • Familiarity with anti-virus and advanced malware threat detection utilities
  • Ability to clearly communicate information through an appropriate method; reads and interprets complex information; talks with clients and listens well
  • Bachelor’s Degree in a related field or equivalent experience
  • An Information Security/Cyber industry standard certification including SANS Certifications including GSEC, GCIH, GSE, etc.; CompTIA Security+; Cisco CCNA Security
  • An Information Security/Cyber industry advanced certification including Certified Information Systems Security Professional (CISSP); Certified Ethical Hacker (CEH); SANS Certifications including GSEC, GCIH, GSE; CompTIA Advance Security Professional (CASP)
30

Information Security Administration Specialist Resume Examples & Samples

  • At least 3 years experience with processes, tools, techniques and practices for assuring adherence to standards associated with accessing, altering and protecting organizational data
  • SOX control testing and compliance
  • IT standards, procedures, policy
31

Security Solution Sales Specialist Information Risk & Protection Resume Examples & Samples

  • At least 3 years experience in software sales
  • Knowledge of Security technologies and trends in the Communications/CSI Sector which could include any of the following: Telecommunications, Media &Entertainment, Energy & Utilities, Computer Services Industry
  • Experience selling into the Communications/CSI Sector which could include any of the following: Telecommunications, Media &Entertainment, Energy & Utilities, Computer Services Industry
  • Passionate about Security technologies and trends in Communications/CSI Sector
32

Security Solution Sales Specialist Information Risk & Protection Resume Examples & Samples

  • Knowledge of Security technologies and trends in Communications/CSI sectors
  • Experience selling into Communications Sector
  • Passionate about Security technologies and trends in the Communications Sector
33

Computing Security & Information Protection Specialist Resume Examples & Samples

  • Vulnerability Analysis/Ability to translate identified vulnerabilities to pro-active Boeing mitigation / remediation approaches
  • Project / team leadership skills with a desire to perform both technical and non-technical SOW
  • Understanding of technical controls and application used to mitigate risks (IDS/IPS, Firewall, Encryption, Server Hardening, Monitoring, Whitelisting, etc.)
  • Programming/Scripting (Perl, JESS, Windows Scripting, Powershell, Python, C#, etc…) a plus
  • Data analysis and SQL skills to support data mining / modeling
  • Understanding of Network Architectures (F5, Cisco, Firewalls)
  • Ability to identify vulnerable configurations or applications to support trend analysis
  • OS Platforms (Windows, Linux, HP-UX, AIX) and related deployment and configuration processes
  • Knowledge of Information Security policies and compliance tracking processes. Must be capable of developing new processes to improve remediation tracking for assessment activities
  • Competencies: Strong teamwork combined with leadership skills to think outside of the box in solving complex problems. Must be willing to dig into solving complex problems and use vulnerability data to drive enterprise improvements. Must be self-motivated, challenge the status quo and willing to learn new technologies and drive improvements. Knowledge of ITI deployment and patch management processes a plus
  • Any of the following certifications:CISSP(Certified Information Systems Security Professional), CASP (CompTia Advanced Security Practitioner), CISM (Certified Information Security Manager)
  • Experience with Linux shell scripting, Perl scripting, or Python scripting
34

Project Specialist, Information Security Resume Examples & Samples

  • Serve as the project manager leading the internal and external assessment processes with minimal oversight, including the creation of project plans and schedules in order to meet the business requirements
  • Ensure projects are planned appropriately and completed on schedule
  • Manage and contribute to proposal content databases containing "boilerplate" language
  • Six months work experience
  • Proven project management skills
  • Proven relationship-building skills and ability to work well under pressure and within tight deadlines
35

IT Specialist Information Security Resume Examples & Samples

  • Travel is dependent upon position description and availability of funding
  • Complete assessment questionnaire https://apply.usastaffing.gov/ViewQuestionnaire/10005535
  • Supporting documentation
36

Lead Computing Security & Information Protection Specialist Resume Examples & Samples

  • Oversee the development and/or deployment of enterprise-wide computing and information security requirements, policies, standards, guidelines, processes and procedures for multiple stakeholder organizations with highly complex or unique requirements
  • Consult on a broad range of information security and data protection requirements
  • Review or determine acceptability of unique configurations and implementation of security controls
  • Oversee the investigation, analysis and resolution of security incidents
  • Lead security assessments, audits and corrective action activities
  • Utilize advanced industry knowledge regarding information security and threat management
  • Perform security compliance monitoring
  • Analyze new technologies, both hardware and software, to determine security vulnerabilities and determine mitigations
  • Experience as an Information Systems Security Officer (ISSO)
  • Experience leading or managing teams
  • A current active Top Secret U. S. Security Clearance
  • Ability to obtain a SCI U. S. Security Clearance with CI Poly post-start
  • Ability to obtain certifications required by DoD Directive 8570 (CISSP or Security +) within six month of start
  • Familiarity with the Information Systems Risk Management Framework (RMF)
  • A current active TS/SCI with CI Polygraph U. S. Security Clearance
37

Information Security Control Assessment Specialist Resume Examples & Samples

  • Minimum of 3 years of experience with Cyber Security Frameworks including; ISO 27001, SANS Top 20, and the NIST Cyber Security Framework
  • Minimum of 3 years of experience in a Risk Management Role assessing policies and procedures
  • A least one current and recognized professional certification such as: CISSP, CISA, or the ISO 27001 Lead Auditor is Required
  • Understanding of information security controls across people, process, and technology that can be used to mitigate threats
  • Executive report-writing/PowerPoint and intermediate Excel skills
  • Data Privacy and Information Security legal and regulatory knowledge would be beneficial
  • Credible and comfortable with working with executive leadership
  • An inquisitive approach to assessing information security controls in order to identify issues proactively
  • Maintain a good familiarity with global policies and standards and understand what information security controls Accenture has in place
  • Ability to research a subject and establish an expert network of support contacts within and outside of Accenture
  • Demonstrated teamwork and collaboration in a professional setting; either military or civilian
38

Information Security & BCP Specialist Resume Examples & Samples

  • Assist with day to day Information Security activities including monitoring, compliance and standardization
  • Assist with updating business continuation documentation, updating testing schedules for applications and processes, etc
  • Gather and review reports for patching compliance and AV compliance
  • Update weekly dashboards for vulnerabilities, Tanium, Software Compliance and McAfee Endpoint Protection
  • Perform and complete customer required audits and security assessments
  • Perform local wireless access point testing and manage compilation of rogue wireless testing reports from other US production locations
  • Perform local and manage compilation of PCI scanning from other production locations
  • Writing of reports for penetration testing performed by internal resources
  • Assist with internal security reviews over US processes
  • Assist with internal risk assessments over US processes (Information Security Management)
  • Assist with updating and creation of Business Continuity Management documentation such as plans, impact analyses, internal audits, risk assessments, etc
  • Assist in personnel management during an outage, disaster or event
  • May act as lead on projects. Establish and communicate common goal and direction for the project
  • Other duties as assigned by Information Security and Business Continuity Leader
  • Possess a high degree of professionalism, customer centricity, and integrity
  • Familiarity with HIPAA, GLBA, PCI, etc
  • Must be fluent with Microsoft applications such as Word, Excel, and PowerPoint
  • Ability to apply a comprehensive knowledge of technical concepts, practices and procedures
  • Solid written and verbal communication, Must present exceptional leadership, problem solving, decision making, and time management skills
  • Ability to work in a remote capacity and in a team environment
  • Experience with coding, scripting, etc. are not required, but a plus
  • Associate’s Degree or higher in related field
  • Certifications in BCP or Information Security are not required, but a plus
  • Ability to work in a team environment or independently
39

Specialist, Security Information System Mgmt Resume Examples & Samples

  • 75% - Information Systems Security. The Senior Security Analyst will assume the responsibilities associated with the role of the Aerojet Rocketdyne Information Systems Security Manager (ISSM). As the ISSM, the candidate will support information assurance operations by
  • Interfacing with management and maintaining liaison with US Government information assurance oversight agencies and prime/subcontractor partners
  • Interpreting government and company policy to ensure compliance with designated accrediting authority requirements for classified information systems and/or networks of varying complexity
  • Providing information security guidance and direction to program and engineering management and participants. Establishing and maintaining required training and information security compliance deliverables
  • Developing, maintaining and submitting government compliant system security plans and their associated procedures that are compliant with NISPOM and NISPOM Supplement
  • Sustaining compliance with all aspects of government approved plans throughout system and program life cycles
  • Generates and maintains an on-going information systems education and awareness program
  • 10% - Physical Security. Support physical security operations in the following areas
  • Assists security management in the preparation of facility accreditation packages and site security plans
  • Provide technical guidance on access control and intrusion detection systems to control center operators
  • Provide continuous review and audit of physical security applications that support enterprise access operations
  • Recommends physical security hardware and electronic security system solutions
  • 5% - Communications Security
  • Assist security management in the maintenance and accountability of electronic communication equipment
  • Ensure secure communication systems are maintained and compliant with applicable oversight regulations
  • Stand up and support National Security Agency (NSA) communication security (COMSEC) account
  • Troubleshoot and deploy communication systems equipment
  • 10% - General Duties: As applicable, perform other assigned duties to assist in accomplishing department goals and objectives
40

Specialist, Information Security Resume Examples & Samples

  • Perform control, compliance and vulnerability assessments (inclusive of third parties) to identify, assess, and remediate potential control weaknesses
  • Assist with the deployment of technical solutions, standards, processes and the implementation of supporting tools to support the mitigation of technical threats
  • Reviews and validates internal and external suppliers’ technical proposals; participates in solution selection
  • Performing reviews, recommendations, implementation recommendations based on proven technical knowledge and risk management experience in financial organizations
41

IT Specialist System Administration Information Security Resume Examples & Samples

  • 464714100
  • Temporary Duty (TDY) travel is 10% percent
  • Knowledge of Electronic Key Management System (EKMS)
  • Ability to Provide IT Customer Support
  • Knowledge of Communications Security
42

Computing Security & Information Protection Specialist Resume Examples & Samples

  • Understand the applicable SOx risks, controls, and overall SOx process(s) for the functional area
  • Support execution of functional area general computing controls and be prepared to explain how the control(s) mitigates functional area risk(s)
  • Flowdown SOx information to control owners and control performers
  • Utilize common SOx processes and methodologies
  • Oversee the design and documentation of control activities
  • Provide ongoing assistance, guidance and training to control performers
  • Coordinate Corporate Audit and Deloitte testing and participate in SOx audits
  • Communicate potential and realized control deficiencies to management
  • Ensure root cause analysis of identified deficiencies and oversee timely corrective actions
  • Identify opportunities to improve and integrate compliance solutions and efficiencies
  • Previous experience with Sarbanes Oxley (SOx) requirements
  • Experience with application sustainment
  • Bachelors Degree or higher in Information Systems, Computer Science or similar degree
  • Previous experience working on corporate IT Audits
43

Information Security Certification Specialist Resume Examples & Samples

  • Proven experience in speaking to people at all levels across all organisational entities, preferably in a global environment
  • Strong interpersonal skills with the ability to facilitate/coordinate across multiple internal/external stakeholders
  • Excellent oral and written communications skills, including executive level reporting
  • Ability to consolidate, understand and analyse data
  • Good eye for detail
  • Ability to work independently and successfully operate multiple work streams
  • Strong Excel and PowerPoint skills
  • Undergraduate degree or equivalent
  • Working knowledge of the Accenture Operating Model
  • Information Security skills (such as exposure to ISO27001, CSA STAR, PCI/DSS, SANS Top 20, HITRUST, NIST Cybersecurity Framework, SOC2) would be of benefit, but appropriate training will be provided
  • Good familiarity with global policies and standards and understand what standard controls Accenture has in place
44

Information Security Customer Service Specialist Resume Examples & Samples

  • Strong critical thinking skills
  • Ability to make decisions and articulate recommendations
  • Creative problem solving and blending ideas from different sources
  • Ability to present and receive constructive feedback in a professional manner
  • Ability to manage time effectively
  • Ability to organize and manage multiple activities
  • Capable of meeting dates and deadlines
45

Experienced Computing Security & Information Protection Specialist Resume Examples & Samples

  • This position requires interfacing with the appropriate government customers, suppliers, and company personnel to implement protective mechanisms and to ensure understanding of and compliance with cybersecurity requirements
  • The candidate must proactively determine project or assignment requirements by breaking them down into tasks and identifying types of equipment, materials, and people needed
  • The candidate must have complete knowledge of verification, validation, certification and qualification processes and procedures, including knowledge of current governing regulations and compliance requirements
  • The candidate must have demonstrated leadership qualities, strong verbal and written communication skills, and must be able to communicate clearly at one-on-one and group levels
  • Ability to convey sense of purpose and mission that motivates others, maintains direction, and balances big-picture concerns with day-to-day issues
  • The candidate must set high expectations for him/herself first, and have the courage to raise the bar continuously. They will hold themselves and others accountable for continuous improvement
  • The candidate will communicate expectations directly, openly and effectively and must be able to guide others in creating relevant options for addressing problems/opportunities and achieving desired outcomes
  • The candidate must communicate with team leaders, managers and internal employees in the decision-making process to obtain needed information, make the most appropriate decisions, and ensure buy-in and understanding of resulting decisions
  • The candidate must proactively determine project or assignment requirements by breaking them down into tasks and identifying types of equipment, materials, and people needed. They must consistently and proactively identify more critical and less critical activities and assignments and effectively adjust priorities when appropriate
  • Advanced level of understanding and proficiency in the use of networking computing hardware and software applications
  • Extensive knowledge of processes and tools needed to maintain, archive, and retrieve digital files; as it relates to cybersecurity, ability to read and understand contracts, Statements of Work (SoW), and DD-254s
  • Technical bachelor's degree and typically 5 or more years' related work experience or a Master's degree with typically 3 or more years' or a PhD degree or an equivalent combination of education and experience. A technical degree is defined as any four year degree, or greater, in a mathematic, scientific or information technology field of study
  • Experience with policies and implementation of Risk Management Framework (RMF): e.g. DAAPM, ICD-503, JSIG, and NIST 800 series special publications
  • Experience in assessing and documenting test or analysis data to show cybersecurity compliance
  • Demonstrated knowledge with security relevant tools, systems, and applications in support of RMF to include: NESSUS, ACAS, DISA STIGs, SCAP, Audit Reduction, and HBSS
46

IT Specialist, Information Security Resume Examples & Samples

  • Work with computer system end users to discuss issues such as computer data access needs, security violations, and system or programming changes
  • Monitor reports of computer viruses/malware to ensure virus/malware protection systems are maintained up-to-date
  • Document computer security and emergency measures set forth in policies, standards, procedures and guidelines
  • Act as primary or secondary support for multiple IT security tools and systems, e.g., network access control, security information event management, privileged access management, identity access management, antivirus/anti-malware, endpoint encryption, forensics, eDiscovery, etc
  • Provide support to plan, coordinate, and implement the organization’s information and cyber security plan
  • Determine causes of security violations; recommend and implement corrective action to ensure information systems security
  • Monitor and enforce compliance of security policies, standards, procedures, and guidelines for multiple platforms and diverse system environments to enhance information systems security and prevent the unauthorized use, release, modification, or destruction of data
  • Conduct information security risk assessments on an enterprise-wide basis and participate in the development of risk programs to achieve required risk tolerance levels
  • Provide technical support for a wide range of information security issues including secure electronic data traffic, network security, and data security and privacy
  • Participate in the evaluation and integration of complex computer systems and networks to maintain system security
  • Assist senior personnel in performing forensic analysis of digital information and physical evidence
  • May administer user and system access and maintain records of authorized users and systems
  • Education: Bachelor’s degree (B.A./B.S.) or equivalent in computer science, information technology, or related discipline
  • Experience: Minimum of 3-5 years related experience in ITsecurity operations
  • Certification/Licensure:IT security related certification desired (e.g., Security +, CISSP, CISA, GSEC, or similar professional certification)
47

Security Information Specialist Resume Examples & Samples

  • Information security, incident escalation and/or investigation
  • Perl Compatible Regular Expressions - PCRE
  • Extensible Markup Language - XML
  • Relational databases & structured query language – MySQL, SQL Server
  • Scripting languages – bash, Python, Perl
  • Information security or networking experience
  • Highly motivated; Deadline and detail oriented
  • Excellent analytical thinking, troubleshooting, and problem solving skills
  • BSc in Computing is preferred
  • Intermediate Java programming skills
  • Strong oral (phone) and written (email) communication skills
48

Computing Security & Information Protection Specialist Resume Examples & Samples

  • IAM Level 1 DoD 8570 Certification or higher. (Security + CE, CAP, GSLC, CASP, CISSP, CISM)
  • Applicants must include their IAM Level 1 DoD 8570 Certification clearly on their resume
  • Experience reviewing application security policies and settings
49

Information System Security Specialist Resume Examples & Samples

  • Working knowledge of the Risk Management Framework (RMF) process
  • Must be familiar with security policy / manuals and the appropriate ICD’s and the guiding policy documents
  • Evaluate security solutions to ensure they meet security requirements for processing classified information
  • Maintain operational security posture for an information system or program
  • Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system or program
  • Develop and maintain system security plans and other IA documentation
  • Assist with the management of security aspects of the information system and perform day-to-day security operations of the system
  • Develop system security policy and ensure compliance
  • Plan and coordinate the IT security program and policies
  • Manage and control changes to the systems and assessing the security impact of those changes
  • Provide support for the program, organization, system of the information assurance program
  • Interact with customers, IT staff and high-level military and civilian personnel to define and achieve required IA objectives
  • Provide daily oversight and direction to contactor ISSOs
  • Participate in self-inspections; identify security discrepancies and report security incidents/deviations
  • Ensure development and implementation of an information security education, training and awareness program, including attending, monitoring and presenting local IA security training
  • This position is located in Bangor, Washington
  • Associates Degree in Computer Science or related technical discipline
  • Minimum 5 years experience in Information Systems Management
  • Add Your Resume to Our Talent Pools
  • Special Job Alerts
  • Electric Boat News, Press Releases and Submarine Images
50

Computing Security & Information Protection Specialist Resume Examples & Samples

  • Interfacing with the appropriate government customers, suppliers, and company personnel to implement protective mechanisms and to ensure understanding of and compliance with cybersecurity requirements
  • Perform security analysis of operational and development environments, threats, vulnerabilities and internal interfaces to define and assess compliance with accepted industry and government standards
  • Under the Risk Managed Framework (RMF) contribute to the Authorization and Assessment (A&A) process for new and existing information systems, to include facilitating Memorandums of Understanding (MOU), Interconnection Security Agreements (ISA), Risk Acceptance Letters (RAL) and Continuous Monitoring (CONMON)
  • Review various operating systems such as Windows, Linux, and Solaris for compliance with governing requirements
  • Direct, conduct and mitigate risk assessments and investigations
  • Oversee activities of incident response
51

Computing Security & Information Protection Specialist Resume Examples & Samples

  • Provide support with performing security analysis of operational and development environments, threats, vulnerabilities and internal interfaces to define and assess compliance with accepted industry and government standards
  • Conduct and mitigate risk assessments and investigations; and assist with activities of incident response
  • Current Secret clearance (investigated within the last 5 years) - US Citizenship Required
  • Demonstrated experience with performing security compliance monitoring and security policy assessments/audits