Security Operations Center Resume Samples

4.5 (83 votes) for Security Operations Center Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security operations center job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
MG
M Grimes
Marlin
Grimes
60887 Raphael Bypass
Philadelphia
PA
+1 (555) 964 7101
60887 Raphael Bypass
Philadelphia
PA
Phone
p +1 (555) 964 7101
Experience Experience
Los Angeles, CA
Security Operations Center
Los Angeles, CA
Langworth-O'Hara
Los Angeles, CA
Security Operations Center
  • Work with your peers to assist the global Security Operations Center Response Manager in defining the overall security response strategy for Amazon
  • Create reports and dashboard to provide metrics for SOC operations in a meaningful way for Sr. Management
  • Working with the Incident Response team to help create RCA’s for events escalated to incident levels
  • Perform Network Security Monitoring
  • Maintaining the relationship to keep clients and management informed and throughout the incident, problem and change management cycles
  • Lead and manage the local Tier 1 Security Operations staff
  • Services monitored will include, but are not limited to SIEM, IDS/IPS, Firewall, Web Application Firewalls, Data Loss Prevention (DLP)
Chicago, IL
Security Operations Center Engineer
Chicago, IL
Cronin, Nikolaus and Wiza
Chicago, IL
Security Operations Center Engineer
  • Recommending and implementing upgrades, patches, new applications and new equipment
  • Providing user support and guidance
  • Strong knowledge of Juniper JUNOS
  • Open an incident response ticket for all incidents and open a service ticket for all service requests. Monitor all tickets from creation to resolution to closure
  • Diagnose and resolve technical hardware and software issues by conducting basic and tier II troubleshooting for servers, workstations, and applications within the Active Directory environment providing first call resolution to incident reports and requests for service. Escalate all issues that cannot be resolved
  • Assist in administering and maintaining Windows servers, Windows Workstations, Virtual Machines, and other critical systems in an enterprise environment
  • Work will be in shifts to include nights, weekends, and up to 12 hour workdays with a changing/rotating schedule
present
Boston, MA
Senior Security Operations Center Engineer
Boston, MA
Langosh, Ziemann and Stanton
present
Boston, MA
Senior Security Operations Center Engineer
present
  • Perform network monitoring and capacity planning, ensure network performance meets SLAs (5%)
  • Industry research on security trends, goal of potential improvements in our own processes or tools
  • Knowledge of Palo Alto Networks products
  • Strong familiarity with security technologies in general, both at the host and network level
  • Working knowledge of Splunk / Splunk Enterprise Security
  • Mentor and provide training, methods and procedures for NOC staff (5%)
  • Working knowledge of T1, T3, Sonet, Frame-relay, and Ethernet
Education Education
Bachelor’s Degree in Confidentiality
Bachelor’s Degree in Confidentiality
Georgia State University
Bachelor’s Degree in Confidentiality
Skills Skills
  • Proven scripting skills in at least one of the following: Perl, Python, Ruby, or shell. Working knowledge of C, C++ or Java
  • Ability to self-motivate and a desire to take responsibility for personal growth and development
  • Ability to prioritize and manage multiple tasks
  • Proven direct experience with critical system logs and network protocols such as network flow data and full packet capture technologies
  • Proven ability to conduct security analysis of critical system logs and network protocols such as network flow data and full packet capture technologies; validate and test security architecture and design solutions to produce detailed engineering specifications with recommended implementation processes and procedures
  • Proven problem solving and troubleshooting skills with an emphasis on performing root cause analysis for preventative investigations and devising creative solutions
  • Proven ability to utilize effectively written and verbal business communication skills when interacting with clients and firm staff and/or management in a professional services business environment
  • To create and capture opportunities to advance your career and fulfill your potential. To learn more, visit us at www.pwc.com/careers
  • Demonstrates proven thorough abilities with technical network infrastructure, including, but not limited to, Next Generation Firewalls, IDS/IPS, Proxy, operating systems (Windows/ nix) and one or more SIEM/ Security Analytics solutions (i.e Splunk ES, HPE ArcSight, IBM QRadar, LogRhythm Elastic ELK)
  • Communicating in an organized and knowledgeable manner in written and verbal formats including delivering clear requests for information, responding to such requests, and communicating potential conflicts, risks, or issues; and,
Create a Resume in Minutes

15 Security Operations Center resume templates

1

Global Security Managing Consultant Security Operations Center Resume Examples & Samples

  • At least 10 years experience in professional services (providing consulting for end clients)
  • At least 5 years experience in Information Security Consulting
  • Over 5 years experience in Technology Risk, IT and/or Information Security and Risk and IT Security Architecture
  • Subject Matter Expertise in at least one or more of the following: IBM QRadar Security Information & Event Manager, ArcSight, CA,Cisco, LogLogic, RSA EnVision, Symantec SIM, LogRhythm, Splunk & other similar marketplace products
  • At least 3 years experience in network and endpoint infrastructure security technologies, specializing in product-based consulting, architecture and implementation
  • Basic knowledge in and ability to interface and communicate with all client management and operations personnel, follow methodologies, and create and present clear, concise deliverables
  • Bachelor’s or higher degree in business information systems, computer science or an appropriate field from an accredited university
  • Knowledge of security process frameworks, compliance and risk requirements and regulations, with particular regard to data privacy and protection
  • At least 3 years experience in security event analysis and incident response and ability to develop processes and procedures around security event management
  • Basic knowledge in and expertise with tools and processes used in security incident detection and handling
  • Basic knowledge in and an understanding or proficiency in information security and compliance regulations
  • Basic knowledge in and an understanding of Information Security regulations, frameworks and leading practices
  • Proven experience facilitating workshops, generating reports, preparing presentations and project management
  • Coding Experience along with Qualifications
  • Experience in facilitating workshops and developing and conducting presentations and training for both business executives and technical audiences
  • Proven command of spoken and written English
  • Associate's Degree/College Diploma
  • At least 5 years experience in Technology Risk, IT and/or Information Security and Risk and IT Security Architecture
  • At least 1 year experience in working in an international deployment role
  • At least 3 years experience in in network and endpoint infrastructure security technologies, specializing in product-based consulting, architecture and implementation
  • Certified in Information Security, CISSP, CISA or CISM
2

Director, Cyber Security Operations Center Resume Examples & Samples

  • 10+ years of experience with a demonstrated track record in leading and coordinating Incident Management activities in a large organization
  • 15+ years of relevant experience, with a minimum of 8 years work experience in managing a Security program or as an Information Security lead/management role
  • Experience must include monitoring multiple security tools (SIEM, DLP, IAM tools), maintaining security platforms and supporting overall security program. Experience must also include developing/managing incident response programs
  • Work with Managing Director to continuously enhance Information Security & IT Security platforms to enhance security monitoring
  • Work with Security Officers to manage all external and internal audits/lead audit liaison process
  • Review all team deliverables before submission
  • Excellent oral and written communication skills required
  • Prior experience communicating program status to upper management
  • Prior financial services institution experiences a plus
3

Security Operations Center Team Lead Resume Examples & Samples

  • Lead team of analysts in day-to-day monitoring and resolution of Cyber Security incidents within established Service Level Agreements
  • Drive the response to Cyber Security Incidents by coordinating team members, leading incident calls and SOC activities, and creating the required communications and updates
  • Perform daily real-time monitoring and analysis of security events from a variety of sources to determine effective resolution from a security and business perspective
  • Create and supports Use Cases for security correlation and monitoring to ensure efficiency and validity
  • Participate in SOC Projects and Engagements as a SOC representative, in addition to completing assigned tasks
  • Conduct team training and tabletop exercises
  • Document the processes and procedures needed for SOC daily operations
  • Collaborate with technical teams for security incident remediation and communication
  • Utilize industry leading tools and solutions to affect enhanced security posture for the company (especially in the vulnerability management/scanning and security event correlation areas)
  • Escalate problems to management in a timely manner
  • Act as an escalation point for SOC analysts and as a backup to the SOC Manager
  • Translate information security terminology into terms understandable to diverse groups within the enterprise
  • Identify and analyze security risks and communicate risks to appropriate parties to enable risk-based business decision making
  • Bachelor’s degree and/or equivalent work experience- 5+ years of security, network or operating system related technologies experience – SOC experience also preferred
  • Subject matter expert (SME) in one or multiple areas such as SIEM, Windows Unix Firewalls IDS/IPS Threat Detection or Information Risk
  • Strong understanding of TCP/IP and networking concepts
  • Solid and demonstrable comprehension of Information Security including malware, emerging threats, attacks and vulnerability management
  • Proven ability to understand and analyze highly complex issues then apply experience and judgment to develop sound recommendations especially as related to malware current threats/attacks and vulnerability management
  • Strong researching and writing skills
  • Experience in reviewing and analyzing log files and data correlation (i.e. firewalls IDS/IPS system logs)
  • Knows when to notify management when deadlines are at risk
  • Experience in leading a team or significant project
4

Systems Analyst IT Security Operations Center Resume Examples & Samples

  • Work closely with rest of Corporate IT (CIT) Security team to ensure all security protection measures, policies, and procedures, including general IT standards, are implemented and functioning as planned globally. Research virus outbreaks, vulnerabilities, and other suspected security problems globally and work with/advise local IT staff on how to fix the issues. Assist in IT Security projects that have been approved by Director-IT Security. Configure, maintain, and troubleshoot all security technologies to ensure applications, users, systems, and the network continue to operate securely and in a globally consistent manner. Regional variances must be kept to a minimum to ensure consistent operations of fault-tolerant/automated technologies, processes, and support by any of the CIT Security staff
  • Keep current in IT Security and IT trends and technologies by reading/following security industry publications and networking with other security professionals. Participate in educational programs and professional societies involving security technologies, threats, and trends
  • Assist other IT teams in troubleshooting applications as they traverse the network in regards to configuration of the security devices. Ensure user requests are handled in gracious manner without negatively impacting the security of Kohler Co. systems or data. Research systems and programs to determine causes of failure or poor operational performance; then define, test and implement detailed solutions
  • Provide spirited, positive input when working on projects, issue resolution, and prevention improvements. Challenge obsolete practices; question accepted truths
  • Prepare and publish status reports and metrics
  • Assist in providing inputs for project review meetings and management presentations
  • Participate in educational programs involving company personnel relating to specific projects
  • Bachelor’s degree is required, preferably in Information Technology, Business, Supply Chain or related field. Under some circumstances an Associate Degree in Information Technology and minimum 2 years’ experience will be accepted
  • Minimum of 2 years full-time work experience in IT consisting of at least 1 year doing windows systems administration, and includes experience with Active Directory, DNS, and network routing. Candidate must have additional experience configuring and maintaining IT Security technologies such as firewalls, intrusion detection systems, and antivirus. Security certifications such as CCSA and/or CCSE, GIAC, CISSP, SSCP, etc. are a strong plus
  • The ability to read, write, and speak Mandarin, French, or Mexican Spanish is a strong plus
5

Global Security Operations Center Associate Resume Examples & Samples

  • Manage and coordinate response to incoming alarms
  • Build and maintain positive relationships with associates using outstanding customer service
  • Provide maintenance vendor CCTV checkouts for stores globally
  • Perform security and emergency dispatch functions for the corporate campus
  • 4-year degree in international affairs, emergency management, criminal justice, criminology or related field is preferred
  • 3+ years experience in loss prevention, safety, security, law enforcement or military intelligence is a plus
  • Knowledge of other languages is a plus
  • CPR and first aid training is a plus
  • Possess a positive attitude and ability to adapt in an evolving environment
  • Knowledge of current world and political issues
  • Attention to detail and follow through on issues in a timely manner
  • Successful completion of criminal background investigation
  • Ability to multi-task in a dynamic work environment and manage competing priorities
6

Security Operations Center Senior Analyst Resume Examples & Samples

  • Participate in detecting, investigating, and resolving security events
  • Assist in the collection and production of tracking metrics
  • Capable of working independently and involving leadership as necessary
  • Identify and propose areas for improvement within the Cyber Defense Response Center
  • Provide coaching, documentation, and project support
  • Perform troubleshooting, tuning, and hands-on maintenance on the monitoring infrastructure
  • Information Security Principles, Technologies, and Practices
  • Good social, communication and technical writing skills
  • Comfortable navigating and troubleshooting Linux and Windows system issues
  • Minimum of 5-7 years of experience in one or more of the following
  • Working in a Network or Security Monitoring environment
  • Understanding of electronic investigation, forensic processes and methodologies including log correlation
  • Proficiency with IDS/IPS technologies, such as Snort; working knowledge of Linux and/or Windows systems administration (Including AD); proficiency analyzing netflows and packet captures
7

Security Operations Center Team Lead Resume Examples & Samples

  • Works autonomously;guides work of other team members
  • Strong business/financial knowledge; in-depth understanding and interpretation of security policies, leading to security best practice implementation and recommendations
  • Interacts with partners as needed to explain work product, security techniques, methodology and results to ensure appropriate business value
  • Provides technical security consulting support to address complex business and technology projects and requests
  • Interfaces with technology partners and line of business areas
  • 5+ years of information security, incident response and/or information technologies experience
  • Strong understanding of security, incident response and/or networking/PC concepts
  • Ability to communicate concisely, effectively and directly to executive management
8

SVP Cyber Security & Networks Security Operations Center & Infrastructure Defense Service Manager Resume Examples & Samples

  • GBO Service Management provides support for security and networks services through end-to-end business relationship management of all Citi business sectors, engineering, 3rd party vendors, and senior business and technology executive management. The organization serves to provide one point of contact to customers & stakeholders and oversight of management processes & systems, while allowing the operational functions to focus on core responsibilities. The domains include Infrastructure Defense; Security Event Monitoring & the Security Operations Center; Network & Security Build Services; Network Operations; Authentication & Host Security; Vulnerability Assessments & Ethical Hacking; Mobile Application Gateway; & Global System Log Review
  • Incident Management: Provide response coordination during production incidents and represent organization on various business forums related to the restoration, resolution, and root cause analysis of incidents
  • Client and Technology On-boarding: Oversee the end to end life cycle of technology implementation (purchasing to client follow ups) and client on-boarding onto new and existing security solutions with emphasis on time to market
  • Project Management: Design and drive large, complex projects to meet client, IS, and regulatory requirements
  • Provide management support to the Authentication & Host Security Senior Leader
  • Experience in a Business Analysis, Technology Operations, Client Management and/or Project Management role is required. General knowledge/experience in the following Information Security (IS) technology frameworks is required (in-depth knowledge is a plus): ITIL Service Management and/or COBIT Frameworks, application & host security, networks, network security products, and common architectures that deliver high performance and resilient solutions (such as systematic trading environments). Computer Engineering/Science Degree is required and MBA is a plus
9

Security Operations Center Lead Resume Examples & Samples

  • SOC or Secured Operations Center Management experience
  • Manage and allocate limited resources in a dynamic, fast paced environment to meet information security SLAs and also emerging, real time operational security needs
  • 6 to 8+ years related experience to include
  • 2 years of experience managing a security operations center
  • At least four years of demonstrated experience in system, network, and/or application security
  • Experience working in a SOC or NOC
  • Knowledge of network and web-related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, BGP, and other routing protocols)
  • Detailed knowledge of system security vulnerabilities and remediation techniques, including penetration testing and the development of exploits
  • Breadth of knowledge in the information security space with emphasis on TCP/IP network security, operating system security, common attack patterns, and exploitation techniques
  • Certification are a plus: Security+, CAP, CASP, CISM, CISSP or other related security certifications
  • McAfee Nitro SIEM
  • Tivoli
  • Linux OS
  • Palo Alto content
  • Fidelis DLP
  • Ciena
  • Cisco routers/switches
  • Cisco Iron Port
  • Active Directory
  • Saint vulnerability scanner
  • NAC - ForeScout
  • Encase
  • NESSUS
  • NMAP
  • PGP
  • Other related security tools, software and experience
10

Security Operations Center Technician Resume Examples & Samples

  • Respond to and internally route trouble tickets via support queues
  • First line outbound customer communication for alerting and event response
  • 1 year of relevant experience
  • Minimum of 1 year experience in a customer support, help desk or call center role
  • Minimum of 1 industry related certification or 1 years of work experience in an IT role
  • Must be ready to come to a place where you are free to innovate, collaborate and shape how the world lives, works and plays
  • Having a desire to stop evil in its tracks a plus
11

Security Operations Center Practice Manager Resume Examples & Samples

  • Bachelor’s Degree in Computer Science, EE, related field or equivalent professional industry experience
  • Overall Experience: 7-10 years or equivalent experience in the IT industry
  • 5-7 year(s) of experience or equivalent in a customer facing environment such as Professional Services, Sales Engineering or Technical Account Management
  • 1-3 years team lead experience
  • Project Management experience (PMP or Big 5 experience a plus)
  • Working knowledge of the full software development technologies including J2EE/Java, .NET, open source tools and various component models (CORBA, COM, Java Beans)
  • Detailed knowledge of Internet technologies, thorough understanding of eCommerce, On-line Marketing, Web Analytics and Security
  • Must possess excellent written, verbal and presentation skills
  • Must be action oriented, capable of independently solving complex technical problems and able to communicate clearly and effectively to both technical and business audiences
  • Must be willing to travel 25-50%
  • Prior experience managing managers and a team of 15 people or more
  • 10 years IT solution delivery experience, preferably within a consulting organization
  • Experience with running and analyzing metrics and forecast data
  • Successful leadership on medium and long term projects, (6+ months)
  • Experience in mentoring new hires and experienced staff members
  • Proven ability to lead with informal authority
  • Proven track record of hiring and retaining top-talent
  • Experience implementing enterprise scale J2EE or .NET projects with direct client exposure
  • Experience with UNIX and one or more web development languages, methodologies, and/or architectures – HTTP, DNS, Perl, PHP, Shell Scripting, J2EE, .NET, C#, JSP, ASP, Tomcat, Apache
  • Experience with TCP/IP network debugging with tcpdump or similar
  • Experience delivering streaming technologies in the enterprise or B2C, including encoding, server technologies, client and server playlists/metafiles, custom media player creation, DRM a plus
12

Director IT Security Operations Center Resume Examples & Samples

  • Conducts reviews of threat analysis activities performed by other SOC staff members to identify trends for potential efficiency and potential gaps with services
  • Recommends courses of action based on analysis of both existing and emerging threats. Delivers reports, briefings, and assessments to leadership, facilitating understanding of cyber threat entities and environments
  • Provides oversight to incident response activities (triage, root cause analysis, escalations, notifications, communication, etc.) and develops strategies to contain and eradicate the incident, and recover operations effectively
  • Provides technical investigative support to Legal, Human Resources, Fraud Investigations and any other stakeholders as required
  • Responsible for developing and delivering technology and process improvements for the SOC and the information security incident process
  • Perform integrated analysis that draws on an individual's insight, in addition to their ability to leverage technologies and techniques, to identify potential risks or business disruptions to The Standard
  • Partner with internal partners as well as external business partners and vendors to collect data and response to information security incidents
  • Work with the team to build appropriate training, exercises and partnerships to deliver consistent response capabilities
  • Manage a team of highly skilled security and IT professionals across multiple disciplines and with multiple vendors
  • Keep team focused on addressing the top priorities
  • Ensure timely delivery of security services
  • Create partnerships with key stakeholders
  • Provide open and timely communication with business units, vendors and partners
  • Communicate with senior leadership on incidents, projects, priorities, and expectations
  • Manage active and complicated work order queues with tactical and strategic objectives across multiple technologies
  • Manage complex and demanding security portfolio
  • Design and achieve aggressive strategic goals
  • Coordinate with internal and external audit entities to provide evidence for regulatory compliance
  • Hire qualified security professionals to support mainframe, midrange, and entitlement review objectives
  • Bachelor's degree required, Master's degree preferred. Focus in IT or Information Assurance
  • Demonstrated experience managing resources responsible for the constant enrichment of security capabilities as it relates to cyber threat detection and response
  • Requires a minimum of 10 or more years of progressive experience with a focus on both business and management aspects of the job
13

Security Operations Center Senior Program Manager Resume Examples & Samples

  • Program management experience managing deliverables, budgets, customer satisfaction and strong organization skills
  • Network Assurance and Cyber Workforce Management
  • Former supervisory experience overseeing 24/7 operations OR Lockheed Martin Manager overseeing a 24/7 SOC environment
  • At least 7 years of experience managing mission-critical projects with multiple staff and contractor team personnel
  • A minimum of CISSP and PMP certifications
14

Software Engineer, Security Operations Center Resume Examples & Samples

  • Technical leadership - Provide strong technical direction to multifunctional product development team. Coordinate day to day product development activities including software development, system integration, and support to operations. Lead formal requirements and architecture development activities. Serve as a customer Point of Contact. Support cost and schedule planning with program management
  • Software Development – Design, develop and document cloud based software components for the automotive security ecosystem of products and services
  • Cyber Security – Have thorough understanding of cyber security concepts, processes, and algorithms. Guide implementation of crypto algorithms and key management protocols within cloud based software environment
  • SOC Operations – Be familiar with SOC processes and governance. Contribute to automated workflow, automated and manual analysis, event escalation and automated report generation processes
  • Development Process – Ensure compliance with defined secure software development process
  • Data visualization – Provide solutions for SOC analysts and automotive OEMs to visualize and analyze security event data in order to provide actionable information
  • User interface – Develop rich, interactive graphics and data visualizations which allow users to quickly and effectively manipulate data to extract answers
  • Database – Design database systems, address performance and scalability and diagnose technical issues
15

Global Security Operations Center Coordinator Resume Examples & Samples

  • This is not a Monday to Friday, 8AM-5PM job. The schedule is a rotating schedule and every 4 weeks your shift will change
  • Monday through Fridays are 8 hour shifts – 7 am – 3 pm, 3 pm – 11 pm, 11 pm – 7 am
  • Saturday and Sunday are 12 hour shifts – 3:00PM-3:00AM, 3:00AM-3:00PM
  • The shifts per week changes each week – 32 hours one week (4 days) and 48 hours the next week (6 days), no more 12 hour weekend shifts required
  • Shift is a 24/7 operation – holidays and weekends are included
  • Fixed role, steady rotation, you will know your schedule for the entire year
  • **All eligible candidates must be open to working on the above schedule****
  • Bachelor’s degree (Business/Political Science/International Relations) OR Associate degree with 2+ years’ experience in a related field
  • Top attributes the manager is looking for are self initiative, confidentiality, professionalism, great phone skills, professional success
  • Language preference – Korean, and Mandarin a huge plus
  • Strong team player with a professional interpersonal style
  • Aptitude for clear and effective writing under time-sensitive conditions
  • Superior telephone and face-to-face verbal communication skills, including experience clarifying information in a friendly and positive manner
  • Flexibility to work all shifts and a willingness to work scheduled and unscheduled overtime
  • Ability to establish priorities, multitask, work independently, and complete objectives in a fast-paced and demanding work environment
  • Sound operational judgment
  • Must maintain a high degree of confidentiality
  • Comfortable in a high-tech work environment, with constant learning of new tools and processes
  • Good working knowledge of Microsoft Office Suite, especially Word, Excel, PowerPoint, SharePoint
  • Broad geopolitical awareness, knowledge of international events, and cultural sensitivity
  • Experience conducting research and acquiring and analyzing data
  • 2nd language – Mandarin, Korean, German, French, Spanish or Portuguese
16

Flex-global Security Operations Center Shift Supervisor Resume Examples & Samples

  • The Shift Supervisor will act as the incident leader for business disruptions and crisis management
  • The Shift Supervisor answers routine and emergency calls, monitors alarms and video equipment including fire alarms, door alarms, and duress alarms
  • The Shift Supervisor will dispatch security officers, ERT, facilities, police, fire and EMS personnel as required
  • The Shift Supervisor maintains various records of communications and events
  • The Shift Supervisor communicates and disseminates information, using established communication vehicles, to key partners using best practices
  • The Shift Supervisor takes an active role in position related projects. The levels of responsibility will vary from consulting to owning projects based on the individual
  • The Shift Supervisor will manage the maintenance of tools and technologies and will manage vendor relationships
  • Proven ability to influence key business partners
  • Strong organization and planning skill with the ability to work in and define ambiguity/gray areas
  • Ability to work under stressful and tight deadlines as well as the ability to manage in a fast paced environment
  • Above average computer hardware ·and software knowledge
  • Excellent verbal and communication skills
  • Ability to multi-ask, discerns patterns in detail
17

Security Operations Center Resume Examples & Samples

  • Monitoring and analysis of cyber security events
  • Recognize potential; successful; and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information
  • Experience with technical writing
18

Security Operations Center Resume Examples & Samples

  • Lead and manage the local Tier 1 Security Operations staff
  • Manage shifts for the Tier 1 staff including managing weekend coverage and availability
  • Ensure compliance to Internal SLA’s , adherence to processes and improvisation to achieve operational objectives
  • Create reports and dashboard to provide metrics for SOC operations in a meaningful way for Sr. Management
  • Bachelor’s degree or equivalent combination of education and 8+ years of experience in computer science, computer engineering, mathematics or related field
  • 3+ Years of Demonstrated management and leadership experience in a 24x7x365 SOC or NOC
19

Director of Security Operations Center Resume Examples & Samples

  • Develops the global security operations team capable of providing freedom of action in the cyber environment for every location and geography where Nielsen operates
  • Works closely with IT and Business Operations and other functional area specialists to ensure threat indicators are rated by severity and responded to in a manner consistent with the threat
  • Delivers a leadership role in providing network and system security advice and risk analysis to business units who engage with the Cyber Security team
  • Develops and leads the Global Threat and Vulnerability Management team to ensure a well-defined program operates to identify, risk rate, and track vulnerabilities to remediation
  • Works closely with the Cyber Security Threat Intelligence team to ensure security threat information, system log information, and sources of external intelligence are combined to provide real time response to cyber events
  • Defines, gathers and reports on metrics regarding all security systems within the global Nielsen environments
  • Experience with leading, developing, and establishing best practices in a Cyber Security Operations Center. Understanding of how to design security operations center procedures, programs, and services across a globally diverse environment
  • Expert knowledge of security devices, networks and systems compliant with the requirements of a desired security posture or state
  • Highly knowledgeable of network and system security principles such as defense in depth, granularity of privilege, etc. and how they are applied in the real world
  • Expert knowledge of modern network security technologies such as network and host-based intrusion detection/prevention, vulnerability assessment (including app/web-layer interrogation), DDOS protection, sandbox technology, Security Information Event Management, host-based integrity checking, endpoint protection, AV/AM, application security solutions, virtualization, Data Loss Prevention, etc
  • Expert knowledge of intrinsic security weaknesses within core infrastructure components such as TCP/IP, VPN, file transfer and remote administration protocols
  • Knowledge of PCI, SOX and other regulatory and statutory compliance
  • A bachelor's degree in computer science, information systems or other related field; or equivalent work experience
  • Strong conceptual thinking and communication skills - the ability to conceptualize complex business and technical requirements into comprehensible models and templates
  • Demonstrated leader with team-oriented interpersonal skills, with the ability to interface effectively with a broad range of people and roles, including upper management, IT leaders, and technology vendors
  • Calmness and clarity of thought under pressure and ability to maintain confidentiality
  • Understanding of strategic business objectives and the ability to drive results toward those objectives
20

Emergency Dispatch Flex-global Security Operations Center Shift Supervisor Resume Examples & Samples

  • The Shift Supervisor will oversee the daily operations of the GSOC. This includes, but is not limited to the following: ensuring the GSOC team is aware of the daily activities/schedule, addressing scheduling concerns/gaps, approving reports, and briefing leadership on incidents - potential or realized
  • They will recognize and identify GSOC requirements for additional software, hardware or staffing modifications
  • The Shift Supervisor works collaboratively with the GSOC and security leadership team to prepare for, respond to, and recovery from all incidents and crisis events that may impact Client domestically and internationally
  • The Shift Supervisor uses multiple internal and external resources to gather and manage information and intelligence about events that are occurring both domestically and internationally that may impact Client
  • Strong analytical critical thinking and problem solving skills
  • Ability to build strategic vision and drive organizational change
  • Strong inter-personal and networking skills with a strong ability to work in a team environment
21

Cyber Security Operations Center Specialist Resume Examples & Samples

  • Must have current TS/SCI and able to pass CI polygraph with 60 days of hire
  • Experience working within a wide range of environments to include Linux, UNIX, Windows in addition to a strong understanding of networking, the OSI model, and TCP/IP protocols
  • One or more of the following certifications: CISSP, GCIA, Security+, CEH
  • Familiarity with common IDS/IPS platforms (Snort, Cisco, Sourcefire)
  • Experience with Web technologies and databases
22

Security Operations Center Resume Examples & Samples

  • Provisioning & Certification tools (Oracle and Sailpoint preferred)
  • Oracle Directory
  • Access Management tools (Oracle & Siteminder Preferred)
  • Database serving as a back end to the IAM platform
  • Application server Configuration
  • Web Server Configuration; and,
  • Common networking protocols
23

Security Operations Center Resume Examples & Samples

  • Demonstrates proven thorough abilities with technical network infrastructure, including, but not limited to, Next Generation Firewalls, IDS/IPS, Proxy, operating systems (Windows/ *nix) and one or more SIEM/ Security Analytics solutions (i.e Splunk ES, HPE ArcSight, IBM QRadar, LogRhythm Elastic ELK)
  • Proven scripting skills in at least one of the following: Perl, Python, Ruby, or shell. Working knowledge of C, C++ or Java
  • Proven problem solving and troubleshooting skills with an emphasis on performing root cause analysis for preventative investigations and devising creative solutions
  • Proven ability to conduct security analysis of critical system logs and network protocols such as network flow data and full packet capture technologies; validate and test security architecture and design solutions to produce detailed engineering specifications with recommended implementation processes and procedures
  • Proven direct experience with critical system logs and network protocols such as network flow data and full packet capture technologies
  • Proven ability to utilize effectively written and verbal business communication skills when interacting with clients and firm staff and/or management in a professional services business environment
  • Ability to self-motivate and a desire to take responsibility for personal growth and development
  • Candidates must be able to work a flexible schedule within a 24x7x365 Security Operations Center (SOC) environment, as well as may be expected to work holidays
24

Security Operations Center Resume Examples & Samples

  • Oracle databases
  • Microsoft SQL Server databases
  • LDAP based directories
  • Windows local server account management
  • Various flavors
  • An understanding of TCP/IP networking; and,
  • Familiarity with cybersecurity concepts, concerns, and technologies
  • Communicating in an organized and knowledgeable manner in written and verbal formats including delivering clear requests for information, responding to such requests, and communicating potential conflicts, risks, or issues; and,
25

Director, Cyber Security Operations Center Resume Examples & Samples

  • Plan, design and implement an overall risk management process for the SOC. The process includes: detection, triage, analysis, containment, recovery and reporting
  • Lead the incident response process and execution including unauthorized access, security policy violations and intellectual property leaks
  • Manage and execute processes responsible for the advanced analysis of security threat intelligence (malicious code, hackers and zero day exploits, etc.) in order to proactively prepare for security events
  • Develop communication channels with the business units to ensure solid incident response and risk assessment processes
  • Work with cross functional organizations in analysis of security controls and best practices
  • Provide assistance in BlackBerry Services external audits, certifications and accreditations; to achieve and maintain compliance
  • Contribute to development of product security roadmaps
  • Bachelor’s degree in computer science, software engineering or equivalent IT based experience
  • 7-10 years of people management and leadership experience
  • 7+ years of experience as a Security Analyst or in a Security Operations Center
  • Demonstrated experience with managing and ensuring the timely response and investigations of security events and incidents by the security operations center
  • Solid understanding of log and monitoring management systems, security event monitoring systems, network-based and host-based intrusion detection systems, firewall technologies, malware detection and enterprise-level antivirus solutions/systems and encryptions standards
  • Working knowledge of the various industry standard information assurance disciplines and generally accepted practices governing software development
  • Strong ability to communicate with external parties
  • Excellent organizational skills with ability to drive timelines and understand when to proactively escalate
  • Motivated self-starter with the proven ability to; work autonomously, meet deadlines and adjust to changing priorities to meet business goals
  • Master’s degree in computer science considered an asset
26

AWS Security Operations Center Team Lead Resume Examples & Samples

  • Act as a leader and peer mentor in their respective space and team
  • Assist in cross-team meetings with internal stakeholders and business partners
  • Configuration of security devices and provisioning access to Data Center space
  • Identify, analyze, and report risks pertaining to compliance standards
  • Conduct security audits and risk analysis
  • Provide live and weekly status updates and risk mitigation for AWS physical security to Operational Managers
  • Disciplined self-starter; collaborative team player
  • Ability to work any shift within the 24/7 operation, including holidays and weekends
  • 1+ yr of AWS Security Operations Center experience
  • Formal mentoring program background
  • Ability to speak a foreign language (Japanese, Chinese, Spanish, etc.)
27

Technical SOC Lead-security Operations Center Resume Examples & Samples

  • Manage the relationship with the customer
  • Provide weekly and monthly reports on SOC investigations and activities
  • Oversee training and exercises to ensure SOC team proficiency
  • Develop and support strategic plans and projects to meet SOC goals and objectives
  • Bachelor’s degree (or equivalent years of experience) in a technical field such as Computer Science, Information Security, Information Technology, Computer Engineering, Information Systems, etc
  • 5+ years of SOC or MSSP experience with at least 2 years in a managerial role
  • 5+ years of SIEM experience
  • Experience working in fast paced environments, and ability manage workload even during times of stress or escalated activity
  • Willingness to be active in the training, coaching, and development of the SOC team
  • Ability to think strategically in implementing overall task and responsibilities of the SOC
  • Master’s degree in Information Security or related field
  • Relevant security certifications a plus (such as: CISSP, GCIA, GCIH, GREM, CEH, others), but not mandatory
28

Lead Engineer, Security Operations Center Resume Examples & Samples

  • Act as the technical lead for the Security Operations Center
  • Support of Security infrastructure, services, software and hardware; these include firewalls, proxies, vulnerability management, security incident event management (SIEM), surveillance cameras, antivirus, physical access controls, Kerberos, and standard Windows and Linux operating environments
  • Systems administration including scripting automatable tasks, server builds, patching, and troubleshooting
  • Audit of the implementation of security policies and assistance as-needed with the remediation efforts that may follow
29

Security Operations Center Specialist Resume Examples & Samples

  • Perform deep packet analysis to identify DDoS/Cyber attack vector and apply mitigation strategy
  • Support customer communications to coordinate security posture and ddos attack response
  • Audit ongoing attack mitigation policies to identify tactical improvements
  • 4+ years of experience in Networking, network security and/or web and application security
  • CISSP certified or 1 year experience in leadership role
  • GIAC Certified in 2 certifications under GIAC Management or Security Administration or 3 years experience in Security Management/Security Administration
  • CCNP or 3 years equivalent experience in network troubleshooting (subnetting, network tools, etc.)
  • Working knowledge of network protocols & topologies, with concentration in internet-web communications
  • Technical Bachelors Degree from an accredited university or 4 years equivalent experience in Information Technology
  • 2 years experience administering security systems (firewall, ids)
  • Experience administering bind or nameserver configurations
  • Experience administering Web application servers
  • Experience administering a common SQL service
  • Operational experience with security issues and access control mechanisms to prevent unwanted access
  • Working knowledge of network routing and network troubleshooting
  • Experience administering web application systems
  • Perl/PHP/Python experience a huge plus
  • Have the drive and take ownership to personally resolve issues
  • Ability to work in a fast paced, team environment without unnecessarily increasing stress levels
  • Ability to handle contention and potential conflict situations with clients professionally
  • Should be highly analytical
  • Should show aptitude to derive facts quickly, methodically, and accurately
  • Must have the desire to think faster and move forward!
30

Cyber Security Operations Center Resume Examples & Samples

  • Read, understand, investigate, resolve or escalate alerts from various security devices to include SourceFire, BlueCoat, Symantec, etc
  • Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation
  • 2+ years of related experience in a cyber Security Operation Center or various components of a Security Operation Center
  • Ability to utilize Splunk as the enterprise SIEM
  • Ability to independently work an investigation
  • Ability to read and understand alerts from various security devices (to include SourceFire, BlueCoat, Symantec, etc.)
  • Ability to obtain a Public Trust
  • Desirable Certifications: CISSP, CEH or similar
31

Physical Security Operations Center Specialist Resume Examples & Samples

  • PC proficient fully functional with Microsoft Office applications and Windows environments
  • Strong customer service skills and ability to multitask in a fast paced and quickly-changing environment
  • Able to work flexible schedules including nights, weekends, holidays, periodic overtime and unscheduled shifts
  • Excellent research, writing, and critical thinking skills; ability to effectively and independently compile high-level Situation Reports
  • Excellent time-management, communication, presentation, and organizational skills required
  • Demonstrated ability to prioritize workload based on urgency; and communicate to a range of audiences
  • Background monitoring enterprise physical security monitoring systems, such as C*CURE or other access control platforms (i.e. OnGuard or Prowatch) and CCTV Video Management Systems
  • Experience using intelligence monitoring and reporting applications (i.e. NC4, TRIS) in an operations center environment
  • Familiarity with security badging and scheduling technologies and processes
  • Experience effectively responding to incidents, monitoring assets, and communicating to a range of audiences utilizing various channels, including mass notification tools
  • Bilingual or multilingual speaker with knowledge of pronunciation rules and natural language processing is a plus
32

Security Operations Center SOC Analyst Resume Examples & Samples

  • Daily review of security alerts/logs with follow-up on any suspicious activity
  • Perform investigation of network and hosts/endpoints for malicious activity, to include analysis of packet captures, and assist in efforts to detect, confirm, contain, remediate, and recover from attacks
  • Proactively monitor, identify and analyze complex internal and external threats, including viruses, targeted attacks and unauthorized access, and mitigate risk to IT systems
  • Work in concert with team members, Information Security engineering, and relevant Subject Matter Experts to process, analyze and drive the remediation of identified IT related vulnerabilities
  • Responsible to follow the IT Security Incident Response policies and tools
  • Contribute to Information Security policies, standards, and supporting documentation
  • Root cause analysis, troubleshoot complex issues with existing security and privacy protection protocols
  • Responding to inbound security monitoring alerts, emails, and inquiries from the organization
  • Providing support for Incident Response, including evidence collection, documentation, communications, and reporting
  • Maintaining and improving standard operating procedures and processes
  • Providing documentation of work through a variety of communications such as ticketing, operational briefs, and status reportsAssist with the operation and management of vulnerability solutions across the team's portfolioIdentify security issues and risks, and assist with the development of risk mitigation plans
  • Help drive continual improvement in the vulnerability management and security posture
  • Conduct security research to maintain current knowledge of latest security trends and issues
  • Maintaining a high level of confidentiality
33

Senior Cyber Security Operations Center Consultant Resume Examples & Samples

  • Design and create Information Security and processes (e.g., vulnerability mgmt., incident response, event monitoring, etc.)
  • Review and approval of substantive security control changes, including corporate security policies, industry frameworks, and security frameworks
  • Participation in the development of Dell SecureWorks proprietary improvement framework
  • Meet with Executive and Director level management to communicate value proposition, work efforts required to improve security operations, organization, schedule, and lead security operations work stream design and process development discussions
  • Lead security operations transformation and transition efforts with large teams and complex security challenges
  • Create security operations design documents that map workflows, roles, and technical task required to define a work stream and governance models and responsibility matrices to drive organizational focus, alignment, and understanding
  • Create executive and detailed reporting to provide an assessment with recommendations on how to improve security operations capabilities
  • Collaborate with client architects, legal, HR, engineers, specialist, and others to crate purpose-built recommendations and design principals based off desired needs
  • Collaborate with internal Dell SecureWorks teams to organize and create transformative deliverables for organizations with the desire to improve security operations capabilities
34

Edison Security Operations Center Supervisor Resume Examples & Samples

  • The evolution of the Edison Security Operations Center to a command, control, communication and intelligence (C3I) environment to support the Corporate Security mission
  • New and advanced measures to address the evolving threat landscape through prevention, detection, response and recovery
  • Comprehensive security response policies, procedures and work instructions to achieve full security incident command and control
  • A complete training program for ESOC Specialists and Operators to ensure familiarity with roles and responsibilities and efficient and accurate incident response
  • Business requirements and integration of advanced security technology applications to facilitate enhanced monitoring, assessment, communication, and response capabilities for a variety of security alarms and incidents
  • Make, recommend and/or approve employment decisions
  • Establish performance expectations and goals aligned with company objectives, policies and procedures
  • Provide coaching/feedback regarding employee performance and development opportunities
  • Oversee the development of schedules to ensure appropriate staffing levels so that all work is executed and completed in a safe and efficient manner
  • Create and maintain a safety conscious work environment by leading and influencing others to follow Edison safety protocols and safe work practices
  • Develop business requirements and facilitate the integration of security technology systems such as a Physical Security Incident Management System, Visitor Management System, Video Management System, Case Management System and others to enhance the capabilities of the ESOC and drive quality and consistency response to security events and emergencies
  • Coordinate closely with security field staff to fully understand and incorporate the unique attributes of field facilities to monitoring and response
  • Develop and implementing a training program to ensure ESOC staff familiarity and understanding of security response procedures and policies
  • Work closely with security vendors to address performance issues and maintain quality service
  • Develop a documented alarm testing program for security systems monitored by the ESOC and oversee the break/fix activities and new installations
  • Increase visibility for the ESOC by creating and maintaining relationships with key stakeholders in Business Resiliency, Cyber Security, Corporate Real Estate, Transmission and Distribution and others
  • Must have a minimum of 5 years of experience supervising security operations and control room functions within a corporate or governmental environment
  • Bachelor Degree in criminal justice, information technology, business administration or an equivalent combination of education, training, and experience
  • Typically possesses 10 years of experience supervising security operations and control room functions in a regulated industry
  • Demonstrated experience effectively integrating advanced security technology applications including a Physical Security Incident Management System (PSIM), and other common security subsystems such as video management, access control and visitor management
  • ASIS, CPP or PSP certification, preferred
  • Demonstrated conceptual understanding of NERC CIP physical security standards
35

Security Operations Center Specialist Resume Examples & Samples

  • Working knowledge of Web applications, network protocols & topologies, with concentration in internet/web communications
  • 2 years experience administering security systems (Firewall, IDS)
  • Experience administering Bind or NameServer configurations
  • Experience administering a SQL service
  • Must have the desire to think faster and move forward
36

Security Operations Center Supervisor Resume Examples & Samples

  • Conduct training and exercises as necessary for SOC operators to improve on SOC protocols and operator proficiency and readiness
  • Oversee the daily operations of the SOC. This includes, but is not limited to the following: ensuring the SOC team is aware of the daily activities/schedule, addressing scheduling concerns/gaps, approving reports, and briefing leadership on incidents - potential or realized
  • Act as the incident leader for business disruptions and crisis management
  • Answer routine and emergency calls, monitors alarms and video equipment including fire alarms, door alarms, and duress alarms
  • Dispatch security officers, ERT, facilities, police, fire and EMS personnel as required
  • Maintain various records of communications and events
  • Recognize and identify SOC requirements for additional software, hardware or staffing modifications
  • Work collaboratively with the SOC, GSOC and security leadership team to prepare for, respond to, and recovery from all incidents and crisis events that may impact the client domestically and internationally
  • Use multiple internal and external resources to gather and manage information and intelligence about events that are occurring both domestically and internationally that may impact the client
  • Communicate and disseminates information, using established communication vehicles, to key partners using best practices
  • Take an active role in position related projects. The levels of responsibility will vary from consulting to owning projects based on the individual
  • Will manage the maintenance of tools and technologies
  • Ability to meet and maintain any applicable state licensing requirements
  • Must have prior experience as a team leader
37

Specialist, Global Security Operations Center Resume Examples & Samples

  • Provides guidance, training, and leadership to GSOC assigned staff
  • Leads projects and other tasks received by the GSOC
  • Complete risk and intelligence driven reports to Global Security and other stakeholders such as travel briefings, situational intelligence reports, and daily briefings. Review on products completed by other GSOC staff
  • Facilitates and Supports Biogen crisis response to incidents worldwide
  • Configure, troubleshoot, reassess current GSOC supported platforms and identify needs to better support Biogen business
  • Develop, implement, and continually reassess/refine GSOC Operational Procedures. Perform drills with appropriate personnel to ensure compliance and comprehension
  • Intelligence, corporate and/or security experience
  • Candidates must have ability to communicate at executive level, both written and orally
  • Experience working within a supervisory or guidance role
  • Ability to analyze and think critically
  • Should possess working knowledge of global current events and global geography/cultures
  • Candidates should have extensive knowledge of risk and security industry standards
  • Ability to analyze complex security and risk problems
  • Candidates must have solid computer knowledge and skills
  • Ability to work independently and with groups
  • Ability to make decisions, multi-task, and operate in high stress situations
  • Willingness to be available 24/7/365
38

Security Operations Center Level Threat Hunt Analyst Resume Examples & Samples

  • At least 3 years-Using SIEM technology to identify threats
  • At least 3 years-Incident response
  • At least 3 years-Apply problem solving techniques
  • At least 3 years-Analyzing threat data
  • At least 3 years-Analyze or perform technical troubleshooting in Network Security Solutions
  • At least 1 year using IBM Qradar SIEM technology
  • At least 5 years-Apply Problem Solving Techniques
  • At least 5 years-Analyze or perform technical troubleshooting in Network Security Solutions
  • At least 5 years-Understand Firewall Solutions and Device Applicability
39

Global Security Operations Center Supervisor Resume Examples & Samples

  • Full accountability for the GSOC and its personnel, systems, and procedures to ensure effective and timely response to alarms, calls of distress, incidents and other activities
  • Serves as the liaison between the GSOC, Contract Security Management, and Global Security Management
  • Develop and direct the functions, processes, and operations of the GSOC and ensures policies, procedures, and objectives align with client goals
  • Develops, implements, and documents scheduled and ad hoc training exercises to ensure effective performance of the personnel assigned to the GSOC
  • Develop GSOC functionality and assist in identifying new technologies and upgrades for existing systems
  • Receive and respond to emergency and non-emergency calls from employees, outside vendors, law enforcement, and the security field force via telephone, automated alarm monitoring, radio systems, Skype, and other systems
  • Motivates, coaches, and provides leadership to the GSOC staff to develop direct reports
  • Manage, administer and work within software programs used to support operational processes such as travel security, emergency notification, global incidents, etc
  • Provides feedback to both client and contract security management to mitigate failures and improve performance
  • Serves as a point of escalation for any inter-company customer service issues related to the GSOC operations
  • Perform on-call duty (includes after-hours, weekends, holidays) to take appropriate action on staff questions and issues
  • Develop and monitor intelligence sources to identify potential threats or incidents which may target the client
  • Ensure adequate/skilled staffing; select employees
  • Establish performance goals and priorities and perform performance appraisals
  • Create and deliver security presentations, reports, and participate in required meetings
  • Perform other duties as assigned by the Contract Security Account Manager or Global Security Management
  • Must possess a minimum of 2 years of supervisory/management experience
  • Must possess a minimum of 1 year of working in a Security Operations Center or closely related operation
  • Ability to coach, mentor, and motivate direct reports
  • Proficient computer skills and ability to quickly learn multiple computer software programs
  • Must be able to work a flexible schedule on a variety of shifts
  • Ability to research, investigate, and compile information
  • Ability to critically think and conduct analyses in a dynamic environment
  • Adaptable to changing priorities
40

Security Operations Center Resume Examples & Samples

  • 1 year of experience in the security area (Cyber defense/MSS)
  • Security certifications (SIEM, IDS, IPS, FW) are considered a plus
  • English knowledge
41

Global Head of Information Security Operations Center Resume Examples & Samples

  • Compiles and formulates the annual budget and submits them for scrutiny and approval by the IS&RM leadership
  • Manages the IT budgets on a daily/monthly/annual basis. Initiates corrective actions to balance income and expenditure in line with the budgets
  • Produces regular Statements of Accounts for management information and to allow relevant managers to manage their own areas of the budgets
  • Examines and reports on value for money on all major activities, projects and proposed expenditure items for IT
  • Evaluate staffing requirements on a regular basis or upon major changes to the business, operational or IT environments to ensure that IT has sufficient resources to adequately and appropriately support its business goals and objectives
  • Define and regularly review the achievement of individual objectives for each Cyber Security Operations Center associate
  • Ensure appropriate development of associates through training, career development and coaching
  • Define and identify replacements/backup and succession planning for personnel, and minimize reliance on a single individual performing a critical job function
  • 10+ years of working experience, 7 of those years with Information Security management
  • Demonstrated senior leadership skills: >8 years experience in senior management positions in a matrix organization
  • Experienced IT executive or Corporate Information (or IT) Security Officer with broad and in-depth technical, analytical and conceptual skills
  • Experience in reporting to and communicating with C-level management (with and without IT background, with and without in depth risk management background) on information risk topics
  • Excellent written and verbal communication and presentation skills; interpersonal and collaborative skills; and the ability to communicate information risk-related concepts to technical as well as nontechnical audiences, and to audiences with a risk management profile as well as those with a less outspoken risk management profile
  • Excellent understanding and knowledge of general IT application technology, systems and management processes
  • Experience with financial/budget management, scheduling and resource management. Design and implementation of new processes or methodologies in complex organizations
  • Experience of sourcing complex IT services, working closely with vendors and making full use of their capabilities
  • Proven experience to initiate and manage projects that will affect other divisions, departments and functions, as well as the corporate environment
  • 5+ years of working experience with leading, developing, and establishing Cyber Security Operations Center, relevant procedures, programs, and services across a globally diverse environment
  • Experience with working in an outsourced environment
  • Good understanding and knowledge of regulated industries, preferably pharmaceutical industry. Good understanding and knowledge of business processes in a global industry, preferably pharmaceutical industry
  • Demonstrated senior leadership skills with the ability to manage large geographically and/or functionally dispersed teams
  • Good mediation and facilitation skills
  • Excellent knowledge of IT Project Management
  • Experience with compliance requirements (e.g. SOX, GxQ / CSV, E-compliance, Records Management, Privacy)
  • Knowledge of (information) risk management related standards or frameworks such as COSO, ISO 2700x, CobiT, ISO 24762, BS 25999, ISF Standard of Good Practice and ITIL
  • Expert knowledge of modern security technologies and intrinsic security weaknesses within core IT components
42

Senior Security Operations Center Specialist Resume Examples & Samples

  • Participate in day, evening or overnight security operations center shift schedule
  • Identify network connectivity and routing issues and escalate appropriately
  • Troubleshoot platform and customer integration issues
  • Tune equipment configurations to apply unique attack response strategies
  • CCNP or 4 years equivalent experience in network troubleshooting (subnetting, network tools, etc.)
  • RHCE or 3 years equivalent experience administering linux/unix systems
  • 4 years experience administering security systems (Firewall, IDS)
  • Service provider experience a huge plus
  • Ability to navigate bash and administer a linux system
  • Demonstrate a high level of attention to detail
  • Ability to duplicate and solve Customer reported problems
43

Cyber Security Operations Center Senior Analyst Resume Examples & Samples

  • Establish a baseline risk posture, identify current and fusture threats and recommend remedial actions
  • Provide day to day management of SOC analyst and associated activity
  • Produce and maintain operational processes and procedures for use by all shift personnel
  • Work within current change management processes to apply patches, provide 1st line support for supported Security tools
  • Remain up to date with current attack methods and characteristics in order to identify threats and advise on prevention, mitigation and remediation
  • Demonstrate experience of risk identification and remediation within a global SOC environment
  • In depth knowledge of two or more of the following: SIEM,NIDS/NIPS, Endpoint Security toolsets, DLP, Network security technologies
  • Degree level or demonstrable equivalent experience
  • Ability to analyse complex problems in a methodical manner and work through to resolution
44

Security Operations Center Associate Manager Resume Examples & Samples

  • Utilizes critical thinking skills to develop and execute project tasks
  • Develops relationships with multiple business partners, internal and external
  • Maintains project integrity by performing quality assurance functions
  • Provides intelligence, resource, and tactical recommendations to leadership during crisis situations
  • Collaboratively prioritize new and existing business initiatives, which focus on consistent and efficient Global Security operations
  • Communicates initiative status and feedback to managers, key stakeholders, and senior management throughout the organization
  • Frequently engage with vendors to understand systems capabilities/limitations leverage knowledge gained to improve SOC operational capabilities
  • Solidify organizational relationships with other Global Security teams, and other stakeholder organizations
  • Available to serve in an on-call capacity to manager incident/crisis response
  • Three or more years of applicable experience
  • Must have human resource experience in leading a large team
  • Able to write clearly and succinctly
  • Ability to work independently and think outside the box
  • Seek out trends and provide solutions to solve the issue
  • Possesses strong analytical skills
  • Skilled in use of PowerPoint and Microsoft Suite of tools for developing presentations
  • Ability to meet multiple, tight deadlines, and take ownership of writing tasks from start to finish without management oversight
  • Travel to other office locations could be required
45

Global Security Operations Center Resume Examples & Samples

  • Execute all aspects of the day to day functions of the Global Security Operations Center
  • Utilize and execute checklists, protocols and phone listings to effectively manage global incidents and make applicable notifications
  • Investigate alarms responding by sending patrols or alerting fire services or police as needed
  • Minimum of 2 years of security/security control room experience
  • Work experience must include the following
46

Security Information & Event Management Analyst Security Operations Center Resume Examples & Samples

  • Design, Build, Test, deploy SIEM with in MMC
  • Serve as a deeply skilled and knowledgeable resource within the SIEM technology area
  • Primary contact for the SIEM deployment with in MMC
  • Create necessary documentation to help transition the operations to Security Operations
  • Design/Deliver high-level plans for architecting recommended solutions
  • Note - Qualified candidates must be located in or near the Westlake, TX / Dallas, TX area(s) OR being willing to relocate
  • Bachelor’s degree in Computer Science with 3-5 years’ experience in SIEM Technologies
  • Preferred working knowledge and experience with administration of Unix/Linux operating systems
  • Preferred experience with audit and compliance
  • Required proficiency in written and spoken English
47

Information Technology Services Intern Cybersecurity Security Operations Center Resume Examples & Samples

  • Identify potential security exposures that may currently exist or may pose a potential future threat to the US Firm’s networks or systems. Ensure IRC leadership is notified when these exposures are identified and develop potential remediation plans
  • Work jointly with Infrastructure and IRC teams to periodically review existing security device architecture and recommend potential updates or enhancements for group review
  • Candidate for a Bachelor degree in any technical field (sophomore or junior standing)
  • Willing to reside in the Nashville, Tennessee greater area for the duration of the internship
  • Ability to effectively communicate written and verbal to all levels within the organization
  • Strong organizational skills and ability to multitask under pressure and project deadline
  • Identify, analyze, and drive problems to resolution, handling complex issues simultaneously while effectively communicating across teams
  • Strong commitment to professional and service excellence
  • Quick learner, proactive individual with the ability to work in a dynamic, fast changing environment
48

Security Operations Center Resume Examples & Samples

  • Above all else: A passion for real-world Information Security. You live and breathe IT security - you want to be the best. Without this you simply won't fit in
  • Demonstrable experience as a team lead / manager of a high-performance SOC team in a multinational or cyber-security focused organization
  • 2-5 years advanced IT security related experience
  • Demonstrable experience with an enterprise-grade SIEM platform preferably AlienVault
  • Experience in developing security policy and process documentation
  • Excellent communication skills, verbal and written, and a good understanding of the use of different channels and formats for different audiences
  • A deep understanding of cyber-security operations and risk-management in the delivery of IT services
  • Ability to build strong effective partnerships with peers across the technology organisation and beyond to security professionals and business risk owners
  • Evidence of implementing the appropriate methods and processes, test phases/types, ways of working, organisation and governance across the testing life cycle
  • A desire to keep learning, extending your skills and pushing the boundaries of your knowledge
49

Security Operations Center Specialist Senior Resume Examples & Samples

  • Minimum 3-5 years' experience in Mortgage, either in an Underwriting, Closing, or Processing function
  • Wholesale or Correspondent Lending experience a plus
  • Prior experience managing teams is preferred
  • Proven experience in developing and maintaining positive inter-departmental relationships
50

Security Operations Center SOC Analyst Resume Examples & Samples

  • Responsible for alignment with IT Security Incident Response policies and tools
  • Perform root cause analysis, troubleshoot complex issues with existing security and privacy protection protocols
  • Respond to inbound security monitoring alerts, emails, and inquiries from the organization
  • Provide support for Incident Response, including evidence collection, documentation, communications, and reporting
  • Maintain and improve standard operating procedures and processes
  • Provide documentation of work through a variety of communications such as ticketing, operational briefs, and status reports
  • Assist with the operation and management of vulnerability solutions across the team's portfolio
  • Identify security issues and risks, and assist with the development of risk mitigation plans
  • Maintain a high level of confidentiality
  • SOC/NOC Experience - 1-3 years' experience in 24x7 shifted operations environment of a large number of critical production servers and High Availability uptime environments
  • Bachelor's degree in Computer Science, Information Security and Risk Management, Information Systems, Engineering, Business or related major and/or prolonged course of study in a specialized field or equivalent experience
  • Minimum 3 years working experience securing IT systems. Certified Information Systems Security Professional CISSP, Security Information Security Manager, Global Information Assurance Certification, or related Security Certificate required
  • Experience with security incident management, administration and management of Windows, Linux, UNIX, and mobile operating systems, real-time monitoring and triage Cyber intelligence Network, host, and malware analysis IPS/IDS Sensor tuning Custom IPS/IDS signature creation SIEM
  • Scripting skills such as Python and Perl
  • Strong analytical mindset, natural curiosity and attention to detail orientation
51

Security Operations Center Resume Examples & Samples

  • Ensures the development, documentation, and presentation of information system security education, awareness, and training activities for facility management, information system personnel, users and others, as appropriate. Manages, and ensures the development and documentation required of the approval process for the accreditation of information systems processing national security information
  • Identifies and documents unique local threats/vulnerabilities to information system
  • Reports information system security incidents to appropriate points of contact. Follows up to ensure that proper protection or corrective measures have been taken when an incident/vulnerability has been discovered
  • Implements vendors supplied authentication (password, account names) features or security relevant features
  • Implements security features for the detection of malicious code, viruses, and intruders (hackers), as appropriate
  • Develops and implements general and remote maintenance procedures based on requirements provided by the customer and/or government
  • Selects and hires employees. Trains and evaluates employees to enhance their performance, development, and work product. Addresses performance issues and makes recommendations for personnel actions. Motivates and rewards employees including providing salary increases, bonuses and promotions within allocated budgets and company guidelines
  • Prepares and presents information system security education, awareness and training for appropriately cleared management, information system personnel, users and others as appropriate
  • Nine or more years of experience in computer science, management information systems, systems analysis or data security
52

Security Operations Center SOC Analyst Resume Examples & Samples

  • Providing documentation of work through a variety of communications such as ticketing, operational briefs, and status reports
  • Assist with the operation and management of vulnerability solutions across the team's portfolioIdentify security issues and risks, and assist with the development of risk mitigation plans
  • 1-3 years' experience in 24x7 shifted operations environment of a large number of critical production servers and High Availability uptime environments
53

Security Operations Center Lead Analyst Resume Examples & Samples

  • Assist in leading the Security Operations Center as a lead
  • Provide analysis and trending of security log data from a large number of heterogeneous security devices
  • Initiate incident response procedures when an incident is identified and follow through the incident response procedures until completed and documented
  • Notify Security Operations Center Manager of all incidents
  • Perform scheduled and non-scheduled threat and vulnerability scans on the environment and report any threat artifacts to appropriate parties with remediation recommendations
  • Analyze and respond to previously undisclosed software and hardware vulnerabilities
  • Create, modify, and remove security alerts and notifications based off of current and emerging threat landscape
  • Create, modify, and remove reports, dashboards, and metrics of SOC analytics and other relevant data
  • Analyze system baselines and investigate anomalies within those systems
  • Perform daily threat hunting aimed to identify threats not currently being monitored
  • Propose new methods and engineer new solutions and integrations to better improve the SOC posture
  • Perform onboarding of security-relevant data sources and integration into SIEM
  • Ensure audit trails, system logs and other monitoring data sources are operational
  • Integrate and share information with other analysts and other teams
  • Maintain a threat intelligence knowledgebase comprising of security advisories and alerts, current and emerging threats, as well as strategic and tactical recommendations on detecting, mitigating, and remediating these threats
  • Assist in feedback loop to better develop and maintain the Security Monitoring and Visibility, Threat and Vulnerability Management, and Incident Response policies, procedures, and standards as well as all other supporting materials
  • Assist subsidiaries in carrying out their own respective incident response and threat and vulnerability management process if they do no abide by the ESO’s respective programs
  • A minimum of 4 years of IT experience, 2 of which are in information security role
  • Bachelor's degree prefered in information technology or computer science or equivalent work experience considered. M.B.A. or M.S. in techonology related field is a plus
54

Security Operations Center Lead Analyst Resume Examples & Samples

  • CISSP, CEH, SANS Security and other industry and vendor specific security certifications highly preferred
  • Advanced knowledge of SIEM platforms (Splunk preferred)
  • Experience with event escalation, security incident analysis, and utilizing formal Security Incident Response procedures
  • Familiar with malware, ransomware and phishing techniques
  • Understanding of reconnaissance, attacks, exploitations and system compromise techniques; knowledge of modern network vulnerabilities and exploits
  • Extensive knowledge of Windows OS file systems, registry functions, and desktop
  • Experience with a variety of core security systems and platforms such as firewalls, intrusion detection systems, next-generation endpoint protection solutions, content filtering, and secure email gateways
  • Experience with the integration of end-point controls with Security Information and Event Management Systems (SIEM) and log management systems
  • Ability to demonstrate analytical expertise, close attention to detail, excellent critical thinking, and logic; solution-oriented with ability to learn and adapt quickly
  • Good understanding of baselines security standards and configurations for end-points and servers to include Windows and Mac systems
  • Experience identifying system critical and single points of failure. Work with other teams and third party vendors to resolve security issues
  • Experience identifying and analyzing emerging and advanced threats (such as APT, OWASP top-20 and others)
  • Experience with responding to security incidents and reporting on incident handling and resolution
  • Experience with participating in post-mortem investigation of security incidents and preparation of security incident reports documenting the findings
  • Considerable writing proficiency and visual design skills, oral presentation skills, problem solving and decision-making skills
  • Excellent verbal and written communication skills, including executive-level presentations
  • Ability to facilitate productive meetings and work successfully in a team-oriented environment
  • Ability to exercise sound judgment in complex situations
  • Have the ability to work with technical and non-technical business owners to develop solutions
  • Ability to work well under minimal supervision
  • Some travel may be required for internal, conference, customer, partner and vendor meetings
  • This position requires the ability to work a regularly scheduled shift or rotating shifts depending on need
55

Security Operations Center Team Lead With Top Secret Clearance Resume Examples & Samples

  • Must have 3+ years of experience managing a 7x24 Security Operations Center
  • Must have 5+ years working in a Security Operations Center as a Security Analyst or Incident Handler
  • Must have ITIL, Security+, CISSP or similar certifications desired
  • Must possess a functional understanding of log and monitoring management systems, security event monitoring systems, network-based and host-based intrusion detection systems, firewall technologies, malware detection and enterprise-level antivirus solutions/systems, VPN technologies and encryptions standards
  • Must possess a working knowledge of the various industry standard information assurance (IA) disciplines and generally accepted practices governing the present day IA industry
  • Experience reviewing the feasibility of various project approaches and make recommendation(s)
  • Experience performing administration/tuning/troubleshooting supporting multiple projects
  • Possess good interpersonal skills to interact with customers and team members
  • Possess good communication and management skills to work effectively with team members, and support personnel
  • Must have demonstrated experience with managing people and ensuring the timely response and investigations of security events and incidents
  • Must have demonstrated experience leveraging IDS/IPS tools, SIEM, and log analysis tradecraft to identify risks to network, detect malicious cyber activities, and mitigate risks
  • Must have experience using Intelligence Community, industry, and government resources to build threat awareness reports that inform leadership of risk assessments and decision-making
  • Must have experience designing, executing and evaluating exercises that test an organization's ability to detect, respond to, and contain risk events
  • Must have experience with conceptualizing, developing, publishing and communicating status reports for executive leadership
  • Must have demonstrated experience with managing and ensuring the timely response and investigations of security events and incidents
  • Must have experience with oversight and management of an operations center
56

Senior Engineer, Security Operations Center Resume Examples & Samples

  • Responsible for day-to-day oversight of the SOC, to include global cyber and physical threat monitoring, detection, triage, investigation and response
  • Manage SOC personnel, to include administrative managerial functions, day-to-day performance, coaching, counseling, and career development
  • Reviews, analyzes, and responds to security events triggered through the security monitoring systems according to internal security procedures, for both cyber and physical events
  • Remains on the cutting edge of exploits and vulnerabilities and provides proactive feedback to senior personnel and management as required
  • Provides suggestions for improvement of tools and processes as sees fit
  • Operates in both the physical and cyber landscape, holistically protecting the organization on several fronts
  • Drives projects and enhancements for both cyber and physical processes and technologies
  • Provides coaching, support and guidance to junior SOC members on both cyber and physical processes and procedures
  • Provides Quality Assurance reviews of tickets and assists with metrics and reporting
57

Associate Analyst, Security Operations Center Resume Examples & Samples

  • Reviews, analyzes, and responds to security events triggered through the security monitoring systems according to internal security procedures for cyber events
  • Remains on the cutting edge of cyber threats, exploits and vulnerabilities
  • Provide proactive feedback to senior personnel and management as required
58

Incident Response Team Lead-security Operations Center Resume Examples & Samples

  • Monitors client networks for active intrusions, and/or compromises
  • Responsible for understanding the global threat landscape and tracking changes in this area, as well as understanding the direct or indirect impact to the DXC MSS customer base
  • Conducts research on and maps out response to emerging threats, including understanding the level of impact and exposure to our customers, proactively communicating to internal business unit staff and customers on a regular basis updates on emerging threats, and ensuring DXC MSS has thorough detection capabilities in place for emerging threats
59

Cyber Security Operations Center Tier Resume Examples & Samples

  • Monday- Friday; 10:00pm- 6:30am
  • Active real-time security monitoring of alerts and escalating critical alerts to Security Engineering, external organizations, and vendors in compliance with the appropriate operational level agreements
  • Follow pre-defined written procedures to troubleshoot security incidents
  • Develop internal documentation, such as detailed procedures, playbooks, and operational metrics reports
  • Perform critical analysis, response and remediation on events and determines course of actions for cyber incidents in compliance with the appropriate operational level agreements
  • Provide independent critical thinking to diagnose and analyze high severity issues that have been escalated from Tier 1 including real time decision making on response and remediation
  • Provide shift turnover materials to coworkers
  • Provide technical guidance and mentoring to Tier 1 Staff as required
  • Previous experience in cyber security and/or information technology (IT) security
  • Proficiency with trouble ticketing systems and incident workflow preferably with a , Security Information and Event Management (SIEM) preferred
  • Effective ability to document resolution path for incident response and remediation activities into standard operating procedures
  • Effective research, analytical, and problem solving skills
  • Effective ability to present findings and conclusions clearly and concisely to all levels of staff, management and/or vendors
  • Desired: Graduation from an accredited four year college or university in a technical / engineering discipline or equivalent work experience
  • Desired: Previous Security Operations Center (SOC) experience
  • Desired: CISSP, GIAC Certs, OSCP Cert or other related Information Security certifications
  • Desired: Knowledge of IT Security Standards and Frameworks including ISO and NIST a plus
60

Senior Security Operations Center Engineer Resume Examples & Samples

  • Perform network monitoring and capacity planning, ensure network performance meets SLAs (5%)
  • 5 - 7 years of experience with Network Engineering
  • Knowledge in DDoS detection and mitigation
  • Experience in vendor product evaluation (hardware, software, service provider)
  • Working experience in Arbor Peakflow or Cisco Guard DDoS detection and mitigation platform
  • Working knowledge of T1, T3, Sonet, Frame-relay, and Ethernet
61

Security Operations Center Engineer Resume Examples & Samples

  • Design and implement network infrastructure based on business requirement and industrial best practice in a cost effective manner (10%)
  • Bachelor's degree in Engineering or Computer Science preferred
  • 3 - 5+ years of experience with Network Engineering
  • Knowledge in large and complex network design and implementation in large enterprise or ISP environment
  • Strong network problem isolation and troubleshooting skills
  • Expert knowledge of Cisco IOS and CAT OS
  • Hands-on experience in Cisco routers/switches/load balancers/firewalls, Juniper routers, F5 load balancers, traffic generators
62

Lead, Info Security Operations Center Lead Resume Examples & Samples

  • Lead Incident Response process to ensure monitoring and reporting activities are performed in a timely and consistent manor and assist with potential breach investigation and reporting
  • Monitor real-time policy based monitoring systems and respond to non-compliant activities, events, or notifications and inform management of findings and developments
  • Serve as the subject matter expert for security, mentoring junior staff
  • Lead the completion of Information Security Operations documentation
  • Lead various projects in the security operations space, as assigned by management
  • Bachelor Degree in Computer Science, Audit, Networking or other computer related field of study
  • Certified Incident Handler Certification- GCIH
  • 3+ years working in an information security or risk management related field
  • 3+ years working within a Network or Security Operations Center in a global enterprise
  • Experience in a leadership position within a Security Operations Center
  • Experience working with log management, security monitoring and security incident/event management tools
  • Ability to execute Incident Response stages of Preparation, Identification, Containment, Eradication, Recovery and Lessons Learned
  • Experience in a security role with strong working knowledge and understanding of information security frameworks
  • Must possess a deep technical understanding of log and monitoring management systems, security event monitoring systems, network-based and host-based intrusion detection systems, firewall technologies, malware detection and enterprise-level antivirus solutions/systems, VPN technologies and encryptions standards
  • Must possess a working knowledge of the various industry standard information assurance disciplines and generally accepted practices governing the Financial Services industry (PCI, GLBA, SOX)
  • Must possess a working knowledge of regulatory compliance directives to include various NIST security controls, monitoring and reporting requirements
  • Must have demonstrated experience with managing and ensuring the timely response and investigations of security events
  • Must have experience with creating and maintaining shift schedules to ensure 24x7 coverage by operations support personnel
  • Must have experience with conceptualizing, developing, publishing and communicating dashboards and status reports for executive leadership
  • Must have proven track record of developing, implementing and overseeing SOC standard operating procedures used to guide daily activities focused on automation and resource efficiency
  • Broad range of skills with different technical platforms (servers, networks, storage, security, etc.) Special consideration for Mainframe and Web environments
  • Working knowledge of ISO 27001/27002, NIST security standards
  • Passionate motivator with high energy, vision, ability to direct, mentor and advocate
  • Possess analytical, problem-solving, project management skills, and a working knowledge of core banking platforms and FFIEC requirements
63

Technical SOC Lead-security Operations Center Resume Examples & Samples

  • Bachelor’s Degree (or equivalent years of experience) in a technical field such as Computer Science, Information Security, Information Technology, Computer Engineering, Information Systems, etc
  • Master’s Degree in Information Security or related field
  • Ability to attain a Public Trust Clearance prior to start date
  • US Citizen
64

Security Operations Center Specialist Resume Examples & Samples

  • Perform deep packet analysis to identify DDoS/DoS attack vectors and security threats
  • Implement security countermeasures to mitigate security related threats (DDoS/DoS/Attacks)
  • Create and coordinate attack response based on security product
  • Provide customer communications relating to Security events
  • Monitor and respond to all required operational support Network events
  • Perform telemetry monitoring to identify security platform issues
  • Correlate data by researching logs, analyzing graphs and packet inspection to provide detailed customer reports
  • Troubleshoot advanced network connectivity and routing issues
  • Troubleshoot high level security platform and customer integration issues
  • Minimum 5 years of experience overall in relevant roles
  • Minimum of 2 years experience in a customer support, help desk or call center role
  • Minimum Bachelor’s Degree from an accredited university or 4 years in an IT role
  • 2 year of experience in an information security based role(Desired) 2 network or systems administration certifications
  • Advanced knowledge of tcpdump using Berkeley Packet Filters, tshark, and Wireshark traffic analyzing tools like a mad scientist
  • Experienced with stopping evil in its tracks with IDS/IPS, WAF, and other advanced firewall security concepts
  • CEH, CCNA, CCNP, RHCT, Linux+ or any advanced Forensic or Security GIAC certification
  • SQUID is not something used for bait
  • Kung-fu knowledge of various security packages, DoS & DDoS attack types & an awareness of the white hat/black hat/grey hat communities and tools used by its members
  • Knowledge of Akamai’s DNA
65

Security Operations Center Supervisor Resume Examples & Samples

  • Manage the security operations team located in Hyderabad, India
  • Annual performance reviews and goal setting for the SOC team
  • Creation of scheduled and ad-hoc security reports for the senior IT management team
  • Monitor and enforce incident response service level agreements
  • Vulnerability management assessment and remediation
  • Ensures IT security compliance to NIST and ISO frameworks
66

Senior Security Operations Center Engineer Resume Examples & Samples

  • Responsible for log analysis, event triage and investigation, and security incident response activities
  • Conduct investigation and uncover issues by analyzing security events and coordinating response activities
  • Drive monitoring of security events using a SIEM and other feeds, looking for significant events, and processing reports of unexpected network activity
  • Ownership of events escalated as potential security incidents
  • Triage of escalated security events, in depth event review and analysis where appropriate including ability to troubleshoot an event, research the potential cause, and recommend a course of action
  • Use threat intelligence to hunt for indications of compromise in log data and utilizing endpoint security tools
  • Coordination of incident response activities, including written and verbal communication with stakeholders
  • Schedule and run “after action” reviews of completed incident response activities
  • Identification and tracking of security improvements identified during incidents or as part of a review
  • Document and communicate repeatable processes and procedures for Incident Response based on best practices
  • Industry research on security trends, goal of potential improvements in our own processes or tools
  • Experience with security incident management and network monitoring in medium to large organizations
  • General Information Security experience, CISSP preferred
  • Strong communication skills and experience working in the enterprise
  • Strong familiarity with security technologies in general, both at the host and network level
  • Knowledge of Palo Alto Networks products
  • Working knowledge of Splunk / Splunk Enterprise Security
  • Scripting experience and experience developing or integrating of security tools using APIs
  • Experience with Forensic Analysis (EnCase or similar) is a plus
67

Senior Cyber Security Operations Center Consultant Resume Examples & Samples

  • Review and design according to substantive security controls, including corporate security policies, industry frameworks, and security frameworks
  • Establishment of virtual connectivity solutions for client who leverage off-shore resources during a transition effort
  • Collaborate with client architects, legal, HR, engineers, specialist, and others to crate purpose-built recommendations and capability design based off desired needs
68

Security Operations Center Tier Analyst Resume Examples & Samples

  • Performs network security monitoring and incident response for a large organization, coordinates with other government agencies to record and report incidents
  • Maintains records of security monitoring and incident response activities, utilizing case management and ticketing technologies
  • Monitors and analyzes Security Information and Event Management (SIEM) to identify security issues for remediation
  • Knowledge of creating Security Information Event Management (SIEM) tool rules
  • O 1-3 (+) years of related experience in information technology and/or information security
69

Security Operations Center Specialist Senior Resume Examples & Samples

  • Perform telemetry analysis to identify new DDoS/Cyber attacks or platform issues
  • Monitor and respond to all required operational support system events
  • GIAC Certified in 3 certifications under GIAC Management or Security Administration or 4 years experience in Security Management/Security Administration
  • Good knowledge of OWASP Top 10
  • Knowledge of various DDoS attack types a huge plus
  • Working knowledge of tcpdump and Wireshark traffic analyzing tools
  • CEH,CCNA/CCNP, ITIL, RHCT, Linux+ or any GIAC certifications is a plus
  • Ability to handle potentially conflict situations with clients professionally
  • To contribute and participate in a continuous improvement cycle
  • To be motivated to take advantage of all training opportunities and gain the appropriate qualification
70

Security Operations Center Resume Examples & Samples

  • Lead and coordinate the activities of the Threat Response node located in Seattle, WA to ensure timely and effective response to information security threats
  • Support security engineers in the team with response prioritization and actions plans, and provide clear communications to information security and business leaders
  • Execute security response processes, identify and measure critical metrics and continually improve the efficiency and effectiveness of the Threat Response US node
  • Ensure continuity of operations for security events through effective communications between the global nodes of the Amazon Security Operations Center
  • Work with your peers to assist the global Security Operations Center Response Manager in defining the overall security response strategy for Amazon
  • Create a positive work environment & provide a goal-driven framework for information security success in which team members may achieve organizational & individual performance objectives
  • Provide technical & soft skill coaching to maintain a well-rounded, innovative & operational organisation
  • Supervise day-to-day activities of the team, providing management escalation support as required
  • Define, prioritize, track and report on key initiatives being delivered by the team
  • Strong information security risk-based prioritisation abilities
  • 3+ years of progressive experience within a Security Operations Center or similar operating environment
  • BA/BS in computer science, information security, related discipline, or equivalent work experience
  • Experience working across remote locations
  • Experience architecting/operating/securing Amazon Web Services
71

Global Security Operations Center Coordinator Resume Examples & Samples

  • In support of the Incident and Risk Monitoring portion of the Visa Global Security Operations Center (GSOC), monitor and identify geopolitical developments, incidents, and trends that could affect the security of Visa's interests around the world
  • Assists with tasks related to the Intelligence Analysis component of Visa Global Security Command Center, including writing and research
  • Align activities with and integrate analysis into broader Global Security functions including Executive Safeguard, Travel Safety, the Security Risk Management System (SRMS) Program, the Expatriate Security Program and the Site Security Review process
  • Self-motivated, creative, able to work independently and in a high pressure, time sensitive environment
  • Creation and implementation of training plans and in-depth documentation for GSOC applications and Response Protocols
  • Evaluate, beta test and ensure quality of equipment and tools used in the GSOC
  • Work closely with the client to ensure the strategy and vision for providing security support for all the client’s Sites globally is instituted
  • Work with client to identify, analyze and solve problems and create opportunities for continuous improvement
  • Perform other related duties and responsibilities as assigned or required
  • Ability to troubleshoot issues and provide corrective actions
  • Manage GSOC environment systems and applications
  • Monitor open-source intelligence channels
  • Alert Client’s Staff of global safety and security concerns
72

Senior Security Operations Center Specialist Resume Examples & Samples

  • Provides guidance and direction in developing incident management and global situation procedures and process with internal and external stakeholders
  • Implement training programs, develop guidance manuals, and conducts security related exercises
  • Works on the development and maintenance of security support plans, addressing short and long term operational workarounds, physical displacement, and recovery resource needs
  • Provides essential security operations subject matter expertise to internal and external partners
  • Fosters relationships and develops networking opportunities to gather and disburse security operational information
  • Facilitates the process of conducting risk assessments and identifying prevention, recovery and mitigation efforts
  • Contributes to the development and maintenance of a corporate emergency response, prevention, partner safety, physical displacement, enterprise awareness and incident management program
  • Bachelor’s Degree or equivalent military experience
  • This role requires the ability to work 2pm to 10pm shift (M-F) with occasional weekends
  • Previous Operational Center or Business Continuity Planning experience (4 years)
  • Cross-functional project experience (3 years)
  • External and internal training and communication (3 years)
  • Participation on cross-functional groups and projects (3 years)
  • Experience with Recovery Tests and Tabletops (3 years)
  • Certified Business Continuity Professional or Professional Certification in the business continuity field
  • Experience in 24/7 Global Security Operation Center or equivalent military center preferred 2 years
  • Ability to build successful cross-functional relationships
  • Strong analytical, problem-solving, and project management skills
  • Ability to work both independently and as part of a team; with ambiguity or clarity
  • Ability to gain senior leadership support
  • Proficiency in common Microsoft tools like Word, Excel, PowerPoint, and Visio
  • General skill in business operations in a fast-moving company
  • Strong organizational skills applied in a flexible, dynamic environment
  • Ability to build effective relationships with all people; up, down, and sideways, inside and outside the department and beyond Starbucks
  • Results-oriented; achieves results and meets goals under challenging conditions
  • Bachelor’s degree or equivalent combination of higher education and achievement
73

Security Operations Center Engineer Resume Examples & Samples

  • Ability to accomplish monitoring and analysis with independence and creativity
  • Ability to modify searches and/or dashboards (SPL) Search Processing Language
  • Troubleshooting ability with TCP/IP Utilities, CISCO, Windows, and Linux
74

Security Operations Center Resume Examples & Samples

  • Deliver recommendations to continuously improve detection, escalation, containment and resolution of incidents
  • Enhance existing incident response methods, tools and processes
  • Collect, assess, and publish threat indicators
  • Maintain knowledge of the current security threat level by monitoring related Internet postings, intelligence reports, and related sources
  • Perform comparative analysis on results collected against threats, vulnerabilities and other malicious technological programs launched through the internet
  • Available for extended hours in the event of a major incident
  • Based on the nature of the security threat, assess and establish mitigation steps to ensure appropriate treatment as well as ensure notification of the customer and management as appropriate
  • Proactively manage all perimeter security equipment, intrusion detection and prevention systems, information event management systems (SIEM), data correlation tools and/or system components as may be required to interrupt or affect the above threat
  • Receive customer requests. Participate in new customer and services integration. Prepare implementation of services
  • Develop, maintain and update documentation associated to production releases
  • In the customer integration he act as a SME. (Process integration + technical integration, documentation, training)
  • In the operations, he is the one who should challenge the customer when the requirements are not aligned on security best practices. He is part of all customer major projects and he is responsible to document all changes. (lvl3 don’t have access in the production environments. They are responsible to document the work instruction for the technician who will push the change in Production.)
  • Perform cap and perf reports
  • Experience / Knowledge of variety of Intrusion Detection platforms
  • CISSP and any GIAC certification or similar certification desirable
  • Proven experience performing analysis of security events to determine root cause and provide resolution
  • Certification in security incident and event management systems such as ArcSight or enVision
  • Previous experience in troubleshooting day-to-day operational processes such as report generation, data verification, data correlation, etc
  • Experience translating complex and ambiguous problems into actionable components
  • Thorough knowledge of security information events management (SIEM) and server hardening and encryption
75

Global Security Operations Center Coordinator Resume Examples & Samples

  • Communicating directly with Corning employees around the world as a primary first-contact/first-report for all questions and concerns pertaining to security
  • Gathering security and threat information from multiple open-source intelligence services using a variety of web-based and in-house tools
  • Conducting risk analysis, and providing proactive guidance to travelers, expatiates, and facility management
  • Global monitoring of company assets, including alarm response with dispatch of emergency and/or security services
  • Compiling situational and after-action reports for both security and company management
  • Providing as-needed support for various security operations, crisis response and business continuity functions
  • Performing business functions such as document drafting and revision, data tracking, budget forecasting and data analysis
76

Security Engineer, Security Operations Center Resume Examples & Samples

  • Ensuring the operational availability and efficiency of the SOC systems and infrastructure
  • Direct and lead in the problem management of technical and performance issues in SOC systems and infrastructure
  • Conduct training for new deployed systems in SOC
  • Familiar with SOC processes
  • Minimally possess a Bachelor Degree in Information Technology / Computer Engineering
  • Hands-on experience in the provisioning and interpretation of log and network packet data
  • Strong foundation in Internet protocols (TCP/IP) and routing protocol
  • Experience in vendor management
  • 12 hours rotating shift (day and night)
77

Security Analyst, Security Operations Center Resume Examples & Samples

  • Perform monitoring, triage, analysis/investigation and escalation of real time security events
  • Team supervision and administration
  • Support the SOC Manager in the preparation of SOC management and statistical reports
  • Minimal 2 years of relevant working experience in SOC as security analyst with hands-on experience in monitoring, triage, analysis and incident management of real time security events
  • Minimally possess a Polytechnic Diploma
  • Hands-on experience in Unix/Linux and Windows administration
  • Strong foundation in Internet protocols (TCP/IP) and security concepts
  • Strong ability to understand and analyse log and network packet data
  • Strong foundation in security threat and attack countermeasure
  • Analytical problem solving and troubleshooting skill
  • Effective communication skill
  • Able to perform 12-hour shift duties
  • Only Singaporeans need apply
78

Security Operations Center Lead Resume Examples & Samples

  • 2+ years of experience with working as a Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC), or Security Operations Center (SOC) analyst
  • 2+ years of experience with Anti-Virus, Intrusion Detection Systems, Firewalls, Active Directory, Web Proxies, Vulnerability Assessment tools, and other security tools found in large enterprise network environments
  • 2+ years of experience in working with Security Information and Event Management (SIEM) solutions, most notably ArcSight
  • Experience with leading SOC teams
  • Experience with working in a large government or corporate enterprise environment
  • Knowledge of various network and host-based analysis tools, including Fidelis Resolution 1, EnCase, Wireshark, and Volatility
  • Knowledge of scripting, including batch, shell, powershell, or python
  • Ability to present complex, technical information to technical and non-technical audiences
79

Security Operations Center Supervisor Resume Examples & Samples

  • Lead and manage the local Security Operations staff
  • Manage shifts for the staff including managing weekend coverage and availability
  • Development and execution of Standard Operating Procedures and Event Handlers as required for successful completion of all tasks within the SOC
  • Ensure compliance to Internal SLA's , adherence to processes and improvisation to achieve operational objectives
  • Security Event Correlation and Reporting
  • Working with the Incident Response team to help create RCA's for events escalated to incident levels
  • Bachelor's degree or equivalent combination of education and 8 years of experience in computer science, computer engineering, mathematics or related field
  • 3 Years of Demonstrated management and leadership experience in a 24x7x365 SOC or NOC
  • Possess an understanding of security standards and risk management
80

Security Operations Center Shift Leader Resume Examples & Samples

  • Managing shift attendance ensuring the GAM is manned for the rostered shift at all times
  • Coaching team on alarm monitoring, response and escalation
  • Managing shift service levels, adherence to processes and work flow
  • Management of multiple projects as required
  • Ensuring reporting and logs are kept up to date and issued within agreed service levels
  • Remotely accessing critical devices across the globe and monitoring for alarms
  • Determining the severity of alarms and alerts from critical devices and take appropriate action including; escalation and managing first responders for on-site intervention
  • Ascertaining the possible causes of alarms and alerts from critical devices, identifying trends and analysing alarm trend patterns
  • Developing and managing communications to key stakeholders throughout the incident life-cycle
  • Working with teams such as Technology and Incident Response when a problem is severe enough to require shutdown of equipment
  • Updating technical documentation for all critical system equipment
  • Compiling and distributing monthly reports including carbon emission data entry and reporting using Carbon View
  • Must possess a high school diploma or equivalent Minimum 3 years engineering qualification or mechanical/electrical trade qualification
  • Demonstrated experience in team supervision
  • Prior experience working in an alarm, security, safety, or emergency operations center desirable
  • Ability to communicate effectively with people at all levels and functions within the organization
  • High level of integrity and professionalism
81

Security Engineer Security Operations Center Resume Examples & Samples

  • 4+ years of information security related experience, in areas such as: security operations, incident analysis, incident handling, and vulnerability management or testing, log analysis, intrusion detection
  • 2+ years of being a Level 2 Engineer
  • In depth experienced with the following technologies: leading SIEM technologies such as Splunk and ArcSight, IDS/IPS, network- and host- based firewalls, data leakage protection (DLP), DAM (Database activity monitoring), and IR Tracking tools such as IBM Resilient, Archer, Service Now, or Swimlane
  • Experience designing secure networks, systems and application architectures
  • Experience planning, researching and developing security policies, standards and procedures
  • In depth hands-on experience with at least two of the following technologies: Unix administration, Windows Server administration , Active Directory, Windows Workstation, Routers /Switches management, Firewall Management, SANS/NAS, Web servers, IAM/AAA, IDS/HDS, System vulnerability scanning tools, application/database vulnerability scanning tools, mobile device analysis or Secure coding
  • In depth understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity and possible abnormal activities, such as worms, Trojans, viruses, etc
  • Proven SOC process knowledge
  • Advanced knowledge in system security architecture and security solutions
  • Advanced knowledge in scripting. Python and PowerShell required
82

Security Operations Center Dispatcher Resume Examples & Samples

  • Possess a minimum of 1 - 2 solid years' experience in an SOC environment or similar
  • Be able to work at multiple tasks at once, i.e. monitor surveillance system while using radio to contact team
  • Be able to use computer programs such as Microsoft Excel, Word, Access, and PowerPoint
  • Demonstrate strong verbal and written communication skills
83

Security Operations Center Subject Matter Expert Resume Examples & Samples

  • Conduct network and media forensics related to Agency incident and compromise response activities, including, but not limited to: Malware Detection, Lateral Movement Detection, Data Collection Detection, and Data Exfil Detection
  • Perform Advanced Adversary Hunting
  • Provide guidance and expertise to Incident Response Teams associated with FISMA systems operated by or on behalf of the NRC in the areas of digital forensics and malware analysis
  • Monitor industry threat intelligence sources to proactively tune Agency tools
  • Develop, maintain, and optimize, Agency’s malware analysis environment
  • Prepare and provide network and media forensics, malware analysis, and advanced hunting reports using Agency-approved report formats
  • Utilize industry standard evidence acquisition, transport, storage and destruction to prevent unauthorized disclosure of data
  • Develop and share Indicators of Compromise (IOCs) with designated NRC personnel for dissemination to relevant stakeholders
  • Utilize Agency Malware Analysis form for forensics and malware analysis reporting
  • Collaborate with, and provide required technical expertise to, internal and external entities (OCIO, contractors, US-CERT, DHS, and local Law Enforcement) for incident response and investigative activities as directed by COR
  • Conduct ad hoc, daily, weekly, and monthly security briefs and reporting to designated OCIO personnel Forensics and Malware Analysis program and activities
  • Maintain, and optimize all program documentation related to Forensics, Malware Analysis and Advanced Hunting based upon innovation, industry techniques, policies, laws, and regulations
  • Provide risk analysis for vulnerabilities, incidents, and changes as requested
  • Provide subject matter expertise on policies, industry trends, techniques related to Forensics, Malware Analysis, and Advanced Hunting
  • Work with designated personnel to develop and optimize the agency’s security toolsets and services distribution to provide comprehensive visibility, situational awareness, and response readiness
  • Adhere to exiting policies and procedures for preserving chain of custody of equipment as part of investigations, as required by federal law and by associated agency offices
  • Ensure that appropriate digital media analysis tools and equipment (i.e. spare hard drives for replication) are maintained
  • Ensure that personnel are appropriately trained and certified in digital media analysis processes and the specific tools selected, to include use of distributed enterprise digital media analysis tools deployed to remote systems, and able to identify signs of malicious code infection on target systems
  • Provide remedial recommendations and produce consistent comprehensive reports on findings
  • Provide required documentation and possible evidence to security investigators
  • Extensive experience analyzing and synthesizing information with other relevant data sources
  • Experience providing guidance and mentorship to others in cyber threat analysis and operations
  • Experience evaluating, interpreting, and integrating all sources of information
  • Experience fusing computer network attack analyses with counterintelligence and law enforcement investigations
84

Security Operations Center Engineer Resume Examples & Samples

  • ManTech International Corporation provides innovative engineering and systems integration services that help our customers solve their toughest, most intractable problems. National defense and homeland security clients depend on our rapid, cost-effective development of adaptable, interoperable, integrated solutions that provide high performance in quick-response scenarios. ManTech is looking for a Computer Security Systems Engineer to support Marine Corps Intel Dept
  • First line of defense of Incident Response for the MCISRE
  • Maintain a 24/7 presence to managing an entire domain with over 40 garrison and tactical sites
  • Work will be in shifts to include nights, weekends, and up to 12 hour workdays with a changing/rotating schedule
  • Assist in administering and maintaining Windows servers, Windows Workstations, Virtual Machines, and other critical systems in an enterprise environment
  • Able to use System Center Operations Manager (SCOM) and Service Manager Console to monitor enterprise services and generate tracking tickets as needed. Provide user support for all enterprise services
  • Diagnose and resolve technical hardware and software issues by conducting basic and tier II troubleshooting for servers, workstations, and applications within the Active Directory environment providing first call resolution to incident reports and requests for service. Escalate all issues that cannot be resolved
  • Open an incident response ticket for all incidents and open a service ticket for all service requests. Monitor all tickets from creation to resolution to closure
  • Assist and support with account creations, resetting passwords, troubleshooting system and network problems, installation of hardware and workstations, unlocking accounts, and transferring data
  • Brief leadership on the health of systems, individual and/or enterprise
  • Support Accreditation efforts related to technologies
  • Providing user support and guidance
  • Recommending and implementing upgrades, patches, new applications and new equipment
  • Update/Create documentation as needed (user guides, admin guides, knowledge base articles, FAQs, quick reference guides)
  • Meet DoD 8570 IAT Level II requirements (for example, must have and maintain active Security + CE, Microsoft certificate, and at least 3 years in IA technology or a related area)
  • Working knowledge of SCOM
  • Working knowledge of SCCM
  • Active directory (user account creation, password resetting, Kerberos setup, PKI setup)
  • Set-up, configuration and support of internal and external networks
  • Identifying and analyzing systems requirements
  • Developing and maintaining system applications and security
  • Developing and maintaining network configurations
  • Troubleshooting network performances issues
  • Developing and maintaining disaster recovery place
  • Ensuring proper documentation, coordination and maintenance of multiple systems
  • PowerShell scripting using any/all of the respective plugins related to the applicable technologies
  • Working knowledge of DoD STIGs related to the applicable technologies and how to implement, mitigate, and write POAM statements
  • Respond to, incidents, change requests, and service requests making sure to follow up with the customer to ensure completion
  • �Knowledge of standard DoD and Marine Corps concepts, practices, and procedures. Familiarity with Navy/Marine Corps interoperability requirements is preferred
  • Active Directory, Group Policy, Linux OS, Networks, MS Exchange, MS Lync, SCCM, Service Manager, MS Hyper-V, MS SQL Server, Networked Printers/Services, Distributed File Services, Data Protection Manager, SMB
85

Security Operations Center Specialist Resume Examples & Samples

  • Excellent knowledge of Intrusion Detection (deep TCP/IP knowledge, and Cyber security), various operating systems (Windows/UNIX), and web technologies (focusing on Internet security)
  • Exposure on Vulnerability assessment as well as penetration testing or forensic analysis fields are an advantage
  • Certifications from EC-Council, GIAC, (ISC)² are preferred [CISSP, C|EH, GCIA, CCNA]
86

Security Operations Center SOC Lead Resume Examples & Samples

  • Demonstrated Security Operations Center (SOC) experience to drive a security response team from discovery through post-mortem review
  • 14 years of Information Technology experience with a focus on Security
  • 5+ years of experience in System Administration, Networking, or other operations-related field
  • 5+ years of experience with security technologies such as IDS/IPS, Firewalls, SIEM, and Proxies
  • Understanding of key security technologies such as IDS/IPS, Firewalls, WAF, Proxies, SIEM, and Application Whitelisting
  • Experience with FISMA and other federal government compliance standards
  • US Citizenship and ability to pass a background check
  • BS CS, Engineering or related field