Security & Privacy Resume Samples

4.9 (86 votes) for Security & Privacy Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security & privacy job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
MW
M Ward
Meaghan
Ward
698 Johnpaul Dam
Boston
MA
+1 (555) 968 7019
698 Johnpaul Dam
Boston
MA
Phone
p +1 (555) 968 7019
Experience Experience
Chicago, IL
Security & Privacy Consultant
Chicago, IL
Cartwright-McLaughlin
Chicago, IL
Security & Privacy Consultant
  • Assist customers in developing a secured Identity/Access management
  • Work in a team and develop other members in the team
  • Assist in developing knowledge assets such as methodologies, templates, white papers etc
  • Work in a team and develop junior members in the team
  • Actively establish & strengthen relationships with external and internal customers
  • Build and nurture positive working relationships with clients with the intention to exceed client expectations
  • Understand clients' business environment and basic risk management approaches
San Francisco, CA
Senior Consultant, Security & Privacy
San Francisco, CA
Gleason, Schinner and Ward
San Francisco, CA
Senior Consultant, Security & Privacy
  • The Security and Privacy Sr. Consultant's primary responsibilities will be focused on executing engagements covering several areas, including
  • Actively participate in engagement planning, execution, and reporting activities including
  • Documenting meeting minutes
  • Pursues continuous professional development through internal/external training, certifications and/or continuing education
  • Analyzing documentation, process information, technical configurations, or other client provided information and documenting the results of analysis
  • Clearly articulating the status and results of work performed, both orally and in written form, to internal management and the client
  • Familiarity with security risk frameworks including, but not limited to: ISO 27000, NIST SP800 Series, COBIT, PCI-DSS, and HIPAA
present
San Francisco, CA
Senior IT Auditor, Security & Privacy
San Francisco, CA
Walsh Group
present
San Francisco, CA
Senior IT Auditor, Security & Privacy
present
  • Clearly articulate the status and results of work performed, both orally and in written form, to internal management and the project client
  • Analyze documentation, process information, technical configurations, or other client provided information and document the results of conversations and analysis
  • Research new technologies, understand existing processes, and reference recognized standards and frameworks Interface with our project clients to identify and understand potential risk areas
  • Operate effectively and with minimal supervision, within a team or independently, performing special
  • Operate effectively and with minimal supervision, within a team or independently, performing special projects and related duties, as assigned
  • Research new technologies, understand existing processes, and reference recognized standards and frameworks
  • Identify opportunities for continuous improvement
Education Education
Bachelor’s Degree in Relevant Discipline
Bachelor’s Degree in Relevant Discipline
California State University, Los Angeles
Bachelor’s Degree in Relevant Discipline
Skills Skills
  • Establish and audit a security policy for the client’s Unified Data Architecture – which may include Teradata, Teradata Aster, Hadoop, Open Source and Teradata Applications
  • Provide security services on systems that are located on premises, in the cloud, or functioning in a mixed environment
  • Design features for a Trusted Database Interpretation (TDI), formerly the National Computer Security Center (NCSC) guidelines
  • Implement the basic security components of Teradata, Teradata Aster, Hadoop, Linux, and Teradata Applications
  • Conduct system security audits and identify gaps
  • Educate customers on security and privacy issues, best practices, and Teradata, Teradata Aster, Hadoop, and Teradata Application security features
  • Design and develop the security privacy architecture, roadmap, and standards for Teradata, Teradata Aster, and Hadoop systems that will align with the customer business and IT objectives
  • All Consultants are expected to build value in themselves. Teradata’s extensive library of both instructor led and web based training provides ample opportunity for the consultant to build and maintain marketable skills. Time has been allocated specifically for this task and each consultant is expected to have a ‘Learning Plan’. Progress against the learning plan is part of the annual appraisal
  • All Consultants are expected to build value in their practice through the contribution and reuse of consulting assets. At the conclusion of each assigned project, a consultant is expected to evaluate the project deliverables and to contribute those items that may be useful to other consultants that may be assigned similar projects. When a new project is assigned, the consultant will search the asset repository for assets that may improve or accelerate the project delivery
  • 15+ years of total IT experience
Create a Resume in Minutes

15 Security & Privacy resume templates

1

Security & Privacy Research Intern Resume Examples & Samples

  • You must be a student enrolled in a Master of Science or a Ph.D. degree program in Computer Science and/or Electrical Engineering or equivalent with focus on software and platform security
  • Must have at least 6 months of experience in Security research experience demonstrated by at least one security-related publication in a peer-reviewed conference proceedings or journal
  • Must have at least 6 months of experience developing software with C++, C, or Java
  • Must have at least 6 months of experience with wireless communication security
2

Project Manager Data Security & Privacy Resume Examples & Samples

  • Experience in DS&P industry
  • Familiarity with DS&P controls
  • Organizational skills to manage complex client requirements
  • Experience and support of audits
  • Self motivated and process oriented
  • Certification in Risk Management is preferred
  • At least 3 years experience in project-specific Data Security & Privacy (DS&P) process training, creation, and maintenance, and project-specific evidence gathering and filing
3

Security & Privacy Consultant Resume Examples & Samples

  • At least 5 years experience with proven technical and consulting skills with subject matter expertise in one or more of the following specialties: penetration testing, incident response, application security assessments, security code reviews, network protocols, network devices, computer security devices, secure architecture & system administration in support of computer forensics & network security operations
  • At least 3 years experience in experience and thorough understanding of programming languages, software development life cycle, OWASP (Open Web Application Security Project) top 10, and best practices for improving security of application coding practices
  • At least 3 year experience in technical report writing which should include experience within the following writing areas: Executive Summary, Data Collection/Preservation, Data Analysis, Findings, Conclusions & Recommendations
  • Certified in CISSP plus 1 or more of the following CISA, CRISC, ENCE, CCE, GCFA, GCIA, GCIH, CHFI or PCI DSS QSA
  • Demonstrated experience facilitating workshops, generating reports, preparing presentations and project management
  • Experience in the identification, assessment, mitigation and management of information security risks and issues
  • Proven command of spoken and written English & French (ability to write a publication quality level to recommend to clients)
  • Readiness to travel 50% travel annually
  • Bilingual: English & French Fluent
  • At least 5 years experience in penetration testing, incident response, application security assessments, security code reviews, network protocols, network devices, computer security devices,secure architecture,system administration
  • At least 3 years experience in Report Writing: Executive Summary, Data Collection/Preservation, Data Analysis, Findings, Conclusions & Recommendations
  • Certified in  Certified in CISSP plus 1 or more of the following CISA, CRISC, ENCE, CCE, GCFA, GCIA, GCIH, CHFI
4

Security & Privacy Consultant Resume Examples & Samples

  • Must possess the technical/functional skills necessary to understand and manage consulting project engagements
  • Experience in developing identity/access management strategies, architectures and implementation plans
  • Some experience with at least one of the following development environments/languages: J2EE, Java, JavaScript, .NET or C#
  • Assist customers in developing a secured Identity/Access management
  • Contribute towards training and mentoring the team
  • Demonstrate knowledge of market trends, new technology and security services
  • At least 2 years experience in Tivoli Identity Manager and Tivoli Access Manager
5

Security & Privacy Consultant Resume Examples & Samples

  • Responsible for executing consulting engagements in the areas of SOC
  • Ensure quality delivery as per IBM/client requirements
  • Proactively identify project risks and escalate to project stakeholders
  • Actively establish & strengthen relationships with external and internal customers
  • Assist in developing knowledge assets such as methodologies, templates, white papers etc
  • Work in a team and develop junior members in the team
  • Identify potential business opportunities on existing consulting engagements
  • Suggest ideas on improving engagement productivity and identify opportunities for improving client service
  • At least 5 years experience in security architect for SIEM solutions
  • At least 5 years experience in consulting and system integration projects for SIEM
  • At least 5 years experience in IT Security
  • Basic knowledge in Operating system Windows/Linux
6

Security & Privacy Consultant Resume Examples & Samples

  • At least 5 years experience in database security
  • At least 2 years experience in architecting, implementing and managing Gaurdium data security solutions
  • At least 5 years experience in vulnerability assessment, penetration testing and application security assessment
  • Basic knowledge in DLP projects
7

Engagement Principal, Security & Privacy Resume Examples & Samples

  • The Security and Privacy Engagement Principal's primary responsibilities will be focused on leading engagements covering several areas, including
  • Bachelor's Degree in Information Security, Computer Science, MIS, or a related Engineering discipline with solid academic credentials
  • Minimum of 8 years of progressive responsibility as a security practitioner and security manager
  • Demonstrated team management experience
  • Understanding of infrastructure components, including: servers, operating systems, data storage (e.g., SANs, databases), directory services (Active Directory), and networking concepts/protocols
  • Understanding of security risk frameworks including, but not limited to: ISO 27000, NIST SP800 Series, PCI-DSS, and COBIT
  • Understanding of data privacy principals a plus
  • Professional certification is a plus (e.g., CISSP, CISM, CompTIA, SANS, ISC2, etc.)
  • Proficient in use of Microsoft Office suite (e.g., Excel, PowerPoint, Visio)
  • Ability to travel up to 25-35% annually, including domestic and international travel
8

Cyber Security & Privacy Director Resume Examples & Samples

  • Providing and leveraging technical and operational privacy and/or standard industry practices and thought leadership in the following areas—privacy, advanced analytics, and emerging technologies, such as cloud, Internet of Things (IoT), et al
  • Providing and leveraging technical and operational privacy and/or standard industry practices and thought leadership involving common privacy industry standards/regulations, especially as it relates to building a program and/or managing internal controls, risk assessments, business process or operational auditing--GDPR, HIPAA / HITECH, EU Safe Harbor, COPPA, State Breach Disclosure Laws, CANSPAM, GLBA, et al
  • Understanding and applying thought leadership involving the common privacy issues facing clients who provide products and services in several sectors, especially writing, communicating, facilitating, and presenting cogently to and/or for all levels of industry audiences, clients and internal staff/management; and,
  • Providing consultancy and assurance services for cybersecurity, privacy and IT risk strategy, policies, organization and governance, including the participation in proposal development efforts and advising CXO's on emerging technologies and privacy consistent with clients' business strategies
  • Enhancement of data privacy programs
  • Privacy impact and gap assessments
  • Data inventories
  • Creation of incident response plans
  • Cross-border data transfer issues, including Safe Harbor certification
  • Investigations and investigatory responses to data privacy and security incidents with FTC and other regulatory agencies; and,
  • Project work pertaining to compliance and reputational risk mitigation, emphasizing U.S. and international Privacy, Data Protection and Information laws and understanding the privacy risks impacting a particular industry
  • Leading and managing business development opportunities and engagements from pre-sale and initial scoping through final delivery and signoff
  • Engaging with and support client executives in a decision-making process that is strengthened by insight into business value
  • Leading teams to generate a vision, establish direction, and motivate members; creating an atmosphere of trust, leveraging diverse views, coaching staff, and encouraging improvement and innovation; and,
  • Managing and/or contributing to project planning, engagement administration, budget management, successful completion of engagement work stream(s) and solution development.This role is responsible for Selling and Delivering Privacy & Information Protection solutions within Cybersecurity architecture
9

Security & Privacy Consultant Resume Examples & Samples

  • Analysis and problem-solving skills
  • Good organization & administrative skills
  • Ability to work with all levels of the business - PMs, DPEs and Partners
10

Security & Privacy Resume Examples & Samples

  • Track key performance factors and ensure compliance with firmwide I.T. security solutions best practices
  • Build revenues in key strategic industry segments
  • Further penetrate existing clients
  • Acquire strategic new clients
  • Drive competitive client conversions
  • O Bachelors degree required in Business Administration, Computer Science, Accounting, Engineering, Information Systems, Economics or similar discipline
11

Director of Security & Privacy Practice Resume Examples & Samples

  • Continue building our information technology security and privacy practice through expansion of team size and skill-sets
  • Provide oversight and training to managers and staff during the delivery of technical services to ensure quality delivery while allowing staff to learn and grow
  • Use proven business development skills to acquire additional clients and expand relationships with existing clients
  • Identify business opportunities and enhance go-to-market strategies
  • Be able to communicate to clients regarding the strategic and tactical risks of advanced security threats, the methods malicious actors compromise such issues, and potential solutions that may prevent such incidents from occurring
  • Successful track record of building and growing a security and privacy practice
  • Proven demonstration of the ability to manage a marketing campaign to launch a new or expanded services
  • Demonstrates comprehensive knowledge and a proven record of success with identifying and obtaining new service opportunities and taking the opportunities through the sales cycle
  • Demonstrates thorough abilities to identify and address client needs, including developing and sustaining meaningful client relationships and understand the client's business
  • Timely completion of work, priority special projects
  • Positive results of Peer Reviews
12

Senior IT Auditor, Security & Privacy Resume Examples & Samples

  • Research new technologies, understand existing processes, and reference recognized standards and frameworks Interface with our project clients to identify and understand potential risk areas
  • Contribute to the definition of final project scope
  • Analyze documentation, process information, technical configurations, or other client provided information and document the results of conversations and analysis
  • Clearly articulate the status and results of work performed, both orally and in written form, to internal management and the project client
  • Develop staff auditors in audit methodology, the understanding IT process and controls, and direct some staff activities
  • Operate effectively and with minimal supervision, within a team or independently, performing special projects and related duties, as assigned
  • Pursue continuous professional development through company paid internal/external training, certifications and/or continuing education
  • Identify opportunities for continuous improvement
  • Bachelor’s Degree in Computer Science, MIS, Engineering, Information Security, or a related discipline with solid academic credentials
  • Minimum of 3-5 years of experience, with 3+ years of recent experience as a security practitioner
  • Strong IT Security knowledge (application security architecture, network security, IT infrastructure, data security administration, database security). Working experience and/or knowledge of web and mobile technology
  • Familiarity with common security risk frameworks, for instance, ISO 27000, NIST, and CIS Critical Security Controls
  • Strong interpersonal skills, including: written and verbal communications, willingness to assist in areas outside of direct assignments when necessary, and commitment to self-improvement and completion of team objectives
  • Professional certification (e.g., CISSP, CISM, CompTIA, SANS, ISC2, etc.) is a plus
13

Senior Consultant, Security & Privacy Resume Examples & Samples

  • Security Policy, Governance, and Risk Assessment
  • Access and Authentication Management
  • Threat and Vulnerability Management
  • Security Threat Intelligence
  • Security Response Management
  • Operates within a team or independently to conduct audit and advisory projects across technology areas, which may cover business units from Comcast Corporate, Comcast Cable, and NBCUniversal. Out-of-town travel approximately 25-35%
  • Planning Assists the team in identifying the project scope and key milestones, which includes researching background information, evaluating metrics, assessing risks, identifying scope areas and designing innovative test procedures. Participates in presenting project plan to CAAT and Business Leadership
  • Execution Works within assigned scope area to develop and document lines of inquiry and testing procedures and may provide support to junior staff. With manager oversight, interacts with all levels of management and Company employees to fully investigate scope area. Performs testing and works with team to develop impactful audit findings
  • Reporting Communicates findings by assisting team in developing an Audit Report, which includes recommendations and action plans developed with Business Management. Participates in presenting the Audit Report to CAAT and Business Leadership
  • Development Uses resources available to develop audit and business skills. Identifies opportunities for improvement to audit methodology, tools, and training. Actively participates in CAAT, Comcast, and other external community activities and service
  • Stay abreast of current and emerging security risks that could impact the Company
  • Actively participate in engagement planning, execution, and reporting activities including
  • Researching new technologies, understanding existing processes, and referencing recognized service management frameworks
  • Interfacing with our clients to identify and understand potential risk areas
  • Contributing to the definition of final engagement scope
  • Documenting meeting minutes
  • Analyzing documentation, process information, technical configurations, or other client provided information and documenting the results of analysis
  • Clearly articulating the status and results of work performed, both orally and in written form, to internal management and the client
  • Operates effectively and with minimal supervision, if needed, within a team or independently
  • Pursues continuous professional development through internal/external training, certifications and/or continuing education
  • Shares knowledge gained through previous experience and engagements performed with other staff members
  • Performs special projects and related duties, as assigned
  • Minimum of 3-5 years experience, with 3+ years of recent experience as a security practitioner
  • Solid foundational understanding of infrastructure components, including: servers, operating systems, data storage (e.g., SANs, databases), directory services (Active Directory), and networking concepts/protocols
  • Working experience and/or technical knowledge of virtualization/cloud/mobile technology (e.g., VMware, Open-Stack, Microsoft, IaaS, PaaS, SaaS, MDM platforms)
  • Familiarity with security risk frameworks including, but not limited to: ISO 27000, NIST SP800 Series, COBIT, PCI-DSS, and HIPAA
  • Understanding of programming languages, such as C, C++, Perl, and Python a plus
  • Demonstrated ability to work in a complex, dynamic, and fast-paced environment with strong inherent project execution skills, including: prioritizing tasks, balancing workload between multiple projects, anticipating next steps, adapting to changing situations and project scope
  • Willingness and genuine desire to tackle new areas and consistently challenging topics
  • Able to quickly grasp complex subject matter (both technical and business processes) and apply strong analytical skills and business orientation to assessing processes, risks and controls
  • Strong interpersonal skills required, including: written and verbal communications, willingness to assist in areas outside of direct assignments when necessary, and commitment to self-improvement and completion of team objectives
  • Professional certification is a plus (e.g., CISSP, CIA, CompTIA, SANS GIAC, etc.)
  • Previous consulting, compliance, or internal audit experience is a plus, but not required
14

Data & Security Privacy Consultant Resume Examples & Samples

  • Serve as the data security/privacy consultant on Federal projects to ensure that security and privacy is built into the project throughout the project’s entire lifecycle
  • You will be knowledgeable in security best practices (e.g., COBIT); Federal and commercial laws (e.g., Federal Information Security Management Act (FISMA), Privacy Act, HIPAA/HITECH), Federal and commercial regulations and guidance (e.g., NIST, FISMA, OMB)
  • Experience in HIPPA and Data privacy
15

Information Security / Privacy Analyst Resume Examples & Samples

  • Interpret, monitor, and assess the company’s security and privacy systems and related projects for potential risks, violations, and adherence to the corporate Information Protection Program
  • Perform assessments and monitor information being shared across enterprise level exchanges and networks
  • Understand and can perform the detailed technical intricacies necessary to establish protected security systems
  • Aggregate and correlate alerts from highly distributed networks and systems into a SIEM and other analytical tools to provide context, environmental awareness, baselines, and support for root cause analyses
  • Tune security monitoring tools to focus on the alerts and events that pose the greatest risk
  • Investigate compromised systems, malware, rootkits, packet captures, and other security incidents
  • A minimum of 5 years of experience performing network administration, systems administration, or other technical trade demonstrating solid technical infrastructure knowledge
  • Current CISSP, GCIH, CCNA or 2-3 years equivalent work experience in information security
  • Prior experience in overseeing activities related to the adherence of federal and organizational policies and procedures of confidentiality pertaining to Personal Identifiable Information (PII), HIIPPA, FINRA and other sensitive information
  • Experience with the administration of Linux/Unix based systems
  • Network architecture and engineering experience including firewall and proxy administration
  • Prior experience with email monitoring (including spam/phishing and exfiltration)
  • Experience with incident handling process and procedures
  • Post-secondary education in Computer Science or related technical discipline preferred
16

Director of Security & Privacy Resume Examples & Samples

  • Communicate complex technical issues to client senior management through the ability to transform such data into layman and executive style reports and presentations
  • Leverage industry and technical expertise to identify improvement opportunities for assigned clients and assist with the development of remediation services for identified findings
  • Proven people skills: demonstrates thorough knowledge and/or a proven track record of success with operating in a professional services firm or large consultancy
  • Quality of various oral and written reports
  • Positive feedback from clients
  • Growth into larger clients
  • Achievement of business development goals
  • Achievement of practice economics goals
17

Summer Consulting Risk Advisory Services Security & Privacy Associate Resume Examples & Samples

  • Assess security of client networks, hosts, and applications
  • Determine technical, business impact and likelihood of identified security issues and provide remediation guidance to clients
  • Perform analysis and testing to verify the strengths and weaknesses of mobile and web applications and web services (SOAP, WSDL, UDDI)
  • Perform Internet penetration testing using blackbox and whitebox methodologies
  • Review application code, system configurations and device configurations using manual and automated techniques
  • Measure and report clients' compliance with established industry or government requirements
  • Work with the firm's consulting professionals with a variety of credentials including Certified Ethical Hacker (CEH), Certified Information Systems Security Professionals® (CISSP®); Certified Information Systems Auditor® (CISA®) and Certified Information Security Manager® (CISM®)
  • Minimum B.A. or B.S. degree or equivalent from an accredited university by the time employment commences with a major in Computer Science, Information Technology, Information Systems Management, Information Security or other similar degrees
  • Technical background in computer science and related fields
  • Strong knowledge of computer network technologies, protocols and topologies
  • Proficiency with a variety of Windows, Unix and Linux operating systems
  • Proficiency with commercial and open source software packages including database management systems (MySQL, MS-SQL), web servers (Apache, IIS),
  • Software development, programming and/or scripting experience (Perl, Python, C, Java, PHP, ASP, etc.)
  • The ability to interpret and convey technical information through written and oral communications to all levels of technical aptitude, including senior management
  • High degree of integrity and confidentiality, as well as ability to adhere to company policies and best practices
  • Possess a strong internal drive and motivation for continuous improvement
  • Practical hands-on or lab experience with IT infrastructure components such as servers, firewalls, IDS systems and other network infrastructure components
  • Practical hands-on or lab experience with security applications, such as a AppScan, Metasploit, BurbSuite, Nessus, Social Engineering Toolkit, Kali Linux, etc, or other commercial and public domain security tools
  • Operating system configuration and security experience (HP-UX, Linux, Solaris, AIX, etc.)
  • Configuration and security experience with web servers and web applications (Apache HTTP/Tomcat, Microsoft IIS, Sun One, Oracle iPlanet, IBM WebSphere, etc.)
  • Database Configuration and Security experience (MySQL, Microsoft SQL, IBM DB2, Sybase, Oracle, etc.)
  • Familiar with security testing techniques such as network discovery, port and service identification, vulnerability scanning, network sniffing, fuzzing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing and password cracking
18

Ers-security & Privacy Services Resume Examples & Samples

  • Responsible for ISO 27001 based Information Security Management System implementation and sustenanceaudits and assessments
  • Responsible for advising clients on Business Continuity Planning, IT Disaster Recovery planning
  • Assess client information security posture , identify the gaps/risks in the existing environment and develop solutions to mitigate the identified gaps/risk
  • Responsible to assist client in review / implement Information Security controls in areas as mentioned below, but not limited to
  • B.E/B.Tech in Computer Science, Information Technology
  • Minimum 3 years’ experience working in Conducting Application Security Testing and Source code review
  • In-depth experience in using Application Security testing tools like Accunitex,Burpsuite, Nicto, and others
  • Experience in Using tools like Checkmark , HP fortify for Secure Source code review
  • Rich experience in developing Shell scripts on open source platforms to carry out various customised tests
19

Senior IT Auditor, Security & Privacy Resume Examples & Samples

  • Execute projects and audits within the domains of: Security Policy, Security Governance, Access and Authentication Management, Threat and Vulnerability Management, Security Threat Intelligence,
  • Operate effectively and with minimal supervision, within a team or independently, performing special
  • Bachelor's Degree in Computer Science, MIS, Engineering, Information Security, or a related discipline with solid academic credentials
  • Strong IT Security knowledge (application security architecture, network security, IT infrastructure, data security administration, database security)
  • Working experience and/or knowledge of web and mobile technology
  • Strong interpersonal skills, including: written and verbal communications, willingness to assist in areas outside of direct assignments when necessary, and commitment to self-improvement and
20

Information Security Privacy Analyst Resume Examples & Samples

  • Responsible for the implementation and/or execution of financial, administrative, people management, organizational, governance policies, processes and procedures required for the smooth and effective operation of an organization
  • Preparation of communications within the organization
  • Participates in organizational change initiatives for the organization
  • Implements governance activities for the organization
  • Captures, analyzes and reports key business, financial, compliance, project and/or compliance key performance indicator (KPI) metrics
21

RSM Security & Privacy Dfir National Leader Resume Examples & Samples

  • Help to continue building and growing Digital Forensics and Incident Response (DFIR) practice
  • Manage client relations including insurers, law firms, and individual clients
  • Provide oversight to client services in delivering technical projects
  • Identify business opportunities and enhance the go- to market strategies
  • Communicate technical issues by translating technical information for C-level executives and clients of non-technical executive level backgrounds through presentations and summarization of technical documents
  • Oversee the work and manage the engagements and team members ensuring quality best practices is delivered to client and staff learn and grow
  • Leverage industry and technical expertise to continue to build out methodologies and labs
  • Proactively participate and supervise on projects involving
  • This position is for individuals with 7-15 years of hands-on technical or digital forensic investigative experience of personal computer systems, servers, email and electronic data storage, and mobile devices, with a preference for prior consulting or professional services backgrounds
  • Bachelor's degree in computer science or related field from an accredited college/university
  • Strong understanding of the various legal and regulatory issues that could affect an organization
  • Must possess a high degree of integrity and confidentiality, as well as the ability to adhere to both company policies and best practices
  • One or more of the following technical certifications or similar: GIAC Certified Enterprise Defender (GCED); GIAC Certified Incident Handler (GCIH); GIAC Certified Incident Analyst (GCIA); GIAC Certified Forensic Analyst (GCFA); GIAC Reverse Engineering Malware (GREM); or equivalent vendor specific certifications (e.g. AccessData)
  • One or more of the following governance certifications: Certified Information Systems Security Professionals® (CISSP®); Certified Information Systems Auditor® (CISA®); Certified Information Security Manager® (CISM®)
  • Expertise in one of the following and familiarity/experience with the others
22

IT Auditor, Security & Privacy Resume Examples & Samples

  • Execute projects and audits within the domains of: Security Policy, Security Governance, Access and Authentication Management, Threat and Vulnerability Management, Security Threat Intelligence, Security Response Management, and Application Security Architecture
  • Research new technologies, understand existing processes, and reference recognized standards frameworks Interface with our project clients to identify and understand potential risk areas
  • Clearly articulate the status and results of work performed, both orally and in written form, to internal management and the project client.Operate effectively and with minimal supervision, within a team or independently
  • Perform special projects and related duties, as assigned
  • Pursue continuous professional development through company paid internal/external training, certifications and/or continuing education Identify opportunities for continuous improvement
  • Actively participate in Vanguard’s community service activities
  • Minimum of 1-2 years of experience, with recent experience as a security practitioner
  • IT Security knowledge (application security architecture, network security, IT infrastructure, data security administration, database security). Working experience and/or knowledge of web and mobile technology
  • Professional certification (e.g., CISSP, CISM, CompTIA, etc.) is a plus
  • Exposure to consulting, internal audit, compliance or other internal control functions is a plus
23

Cyber Security & Privacy Consultant Resume Examples & Samples

  • Review Request for Proposals (RFPs) during the solution design phase, explain technical and contractual requirements to project team, and perform research to determine if IBM can support contractual regulatory and security requirements such as FISMA, NIST: 800-53, ISO27001 and SSAE16 compliance, help team draft response to the proposal and size the project for control implementation during the solution delivery phase
  • Review contractual requirements during solution delivery phase, identify project’s risks and controls to mitigate the risks
  • Assist project teams in the implementation of client security and regulatory requirements such as mentioned above (including HIPAA, PCI and FFIEC) during the solution delivery phase
  • Assist projects in implementing required controls to mitigate the project’s risks and continue to sustain the controls throughout the project lifecycle
  • Assist projects on a wide range of security topics which involve secure architectures, network security, platform, data security and privacy throughout the project lifecycle
  • Security Consulting (3 or more years of experience)
  • Knowledge of or experience with various industry standards / regulations / best practices (ISO27001, COBIT, Privacy Regulations, PCI-DSS, HIPAA, FFIEC, etc)
  • Security certifications or meets requirements to achieve one within 12 months (CISA/CISM/CRISC/CISSP)
  • Capable of delivering work that meets / performs to functional requirements based on business requirements defined and approved by the client
  • Understanding of application development and maintenance life-cycle, processes and related security controls
  • Exposure to full life-cycle experience in large projects; knowledge and experience with testing methodologies, configuration and release management, system migration and deployment practices and data conversion tools, techniques and procedures
  • Ability to work effectively with project technical leads
  • Strong (written and verbal) English communication skills
  • Familiarity with one or more project management methodologies
  • ISACA IT Audit and Assurance Standards, Guidelines, Tools and Techniques, Code of Professional Ethics, Internal Control, General Computer and Application Control Audit background
  • Knowledge of control objectives and controls related to information systems including disruptive technologies like Cloud, Analytics and Mobile Apps
  • Exposure to ERP Packages, knowledge of fundamental business processes e.g. purchasing, payroll, accounts payable, accounts receivable including relevant Information Technology
  • Know of the technology concepts related to hardware and network components, system software and database management systems
  • Knowledge of system resiliency tools and techniques e.g. fault tolerant hardware, elimination of single point of failure, clustering
  • Knowledge of system performance monitoring processes, tools and techniques e.g. network analyzers, system utilization reports, load balancing
24

Security & Privacy Intern Resume Examples & Samples

  • Ability to manage and respond to emails quickly and juggle multiple projects at one time
  • “Team-player” with strong work ethic who is comfortable working in a fast-paced environment and with other internal teams like engineers, project managers, business relationship managers, etc
  • Excellent attention to detail and ability to work independently; attempt to find answers before asking questions
  • Strong organizational and interpersonal skills and desire to make security and privacy processes more efficient
  • Comfortable with and excited about technology
  • Assist with conducting information security and data privacy related reviews
  • Become familiar with the data security components of ISO 27002 and other security related best practices
  • Review business compliance with security and privacy related controls and document findings
  • Research latest US and International privacy laws, rules, and regulations and write up an impact assessment considering knowledge of operations
  • Draft documentation (including SOPs) to formalize security and privacy controls and processes
  • Communicate with business process owners to facilitate completion of work and preliminary findings identified
  • Assist with committee preparation, administrative duties, and other ad hoc assignments
  • Work on the GHI HITRUST Privacy remediation and ISO certification
  • Currently enrolled in as 3rd or 4th year (or recent graduate with in 2 years of) University, Trade School, or IAPP Certification
  • Familiarity with and interest in Information Security and Privacy
  • Strong communicator with ability to maintain open communication with internal employees, managers and customers
  • Able to integrate and apply feedback in a professional manner
  • Able to prioritize and drive to results with a high emphasis on quality
  • Must be able to work 30-40 hours/week during the months of May through August for Summer 2016 internship (exact dates will be determined upon hire)
  • Familiarity with the IAPP program or other privacy and security training or coursework; IAPP certification(s) (e.g., CIPP/US, CIPP/E, CIPP/M) a plus
  • Time management and organizational skills
  • Good writing and verbal communication skills
  • Ability to work in individual as well as team environment
  • Effective in managing multiple assignments
  • Productive in a fast-paced environment
  • Interpersonal and analytical skills
  • Basic knowledge of auditing principles
  • Proficient in Microsoft Office suite of applications
  • Ability to organize and manage to deadlines
  • Motivated to learn information security, privacy
  • Able to make sense of ambiguity and devise innovative solutions
  • Attention to detail and ability to learn new operations quickly
25

Technology Consulting Security & Privacy Forensics Manager Resume Examples & Samples

  • Extensive experience with system and network forensics
  • Report writing and communication to management and clients
  • Strong technical background as demonstrated through knowledge of forensic tools or IT security or data management working with e-discovery platforms
  • Extensive knowledge using EnCase, dtSearch and FTK
  • Best practices in digital forensics process and data handling procedures
  • Experience engaging in multiple large complex projects and managing multidisciplinary teams from each aspect of forensics and e-discovery
  • Proven ability to meet deadlines, prioritize workload, and manage time effectively
  • Ability to travel on short notice domestically and internationally
  • EnCE, ACE, CFA, CCE, GCFA, GREM, GCFE, GCIH, GCIA, GPEN, CHFI, CISSP, Security+ are a plus
  • PCI DSS or PA DSS knowledge and experience is a plus
  • Static and dynamic malware analysis experience is a plus
  • Incident response and breach investigation experience is a plus (e.g. PFI)
  • Vulnerability assessments and web application assessments experience is a plus
  • Electronic File Processing familiarity expertise in Law (a plus, but not required)
  • Advanced skill-sets in Relativity, Clearwell, Concordance and Summation (a plus, but not required)
  • Microsoft Windows (95, 98, Me, 2000, XP,Windows 7)
  • Microsoft Exchange Server (2000, 5.5, 2003)
  • Computer Forensic Tools/Utilities (Encase, FTK)
  • Analysis of RAM, Windows registries, system logs, security logs, network logs, network traffic captures
  • Vulnerability Assessment Tools/Techniques
  • Log Analysis / SIEM
  • General Database, Networking, and Systems concepts
  • Experience with: SQL, SQL+, Visual Basic/VBSCRIPT, SAS, MS–Access, C++, Java, ASP, DOS, Windows, UNIX, Linux and Mac OS. Programming experience not requires, but solid scripting capabilities a plus
  • Foreign language skills + (Spanish, Russian, Chinese, or French preferred)
  • Skills in any of the following tools: RegRipper, Log2Timeline, SANS SIFT, Joe Sandbox, Volatility, Redline, Memoryze, Nessus, Acunetix, Hailstorm
  • Frequent travel may be required based on client requests/commitments
26

Philadelphia Technology Consulting Security & Privacy Senior Consultant Resume Examples & Samples

  • Using creative approaches to identify vulnerabilities that are commonly missed in security assessments
  • Using social engineering techniques to obtain sensitive information, network access and physical access to client sites
  • Assessing physical security controls by lock picking, camera evasion, tailgating, dumpster diving and other evasive techniques
  • Executing opportunistic, blended and chained attack scenarios that combine multiple weaknesses to compromise client environments
  • Improving methodologies, toolsets and offerings through collaborative development work and by updating team documentation
  • Ability to quickly learn new concepts and skills
  • Excellent interpersonal skills to interact in team environment and foster client relationships
  • Advanced verbal and written communication skills including documentation of findings and recommendations
  • Strong listening skills to discern the best course of action for our clients
  • Demonstrated ability to deliver projects using well-defined methodology across various security assessment disciplines including
27

Philadelphia Technology Consulting Security & Privacy Senior Manager Resume Examples & Samples

  • Interpersonal skills to interact in team environment and foster client relationships
  • Proficiency in utilization of static code analysis tools such as Checkmarx, Veracode, Fortify, etc
  • Experience with
28

Technology Consulting Security & Privacy Senior Consultant Resume Examples & Samples

  • Exploiting vulnerabilities and identify specific, meaningful risks to clients based on industry and business focus
  • Performing complex wireless attacks both against wireless clients and access points
  • Network Vulnerability Assessments
  • Penetration Tests
  • Wireless Network Security Assessments
  • Social Engineering (Telephony, onsite and remote pre-texting, spear phishing, etc.)
  • Physical Security Assessments (Tailgating, lock picking, camera evasion, dumpster diving, etc.)
  • VoIP Security & War Dialing
  • Product/Hardware Security Assessments
  • Web application Vulnerability Assessments (SQLi, XSS, Session management issues, etc.)
  • Ability to combine multiple separate findings to identify complex blended vulnerabilities that would not be exploitable as a result of a single weakness required
  • Ability to identify, describe and report vulnerabilities and standard remediation activities, to include clear demonstration of risk to clients through post-exploitation activities required
  • Experience with commercial and open source security tools required (e.g. Nessus, Nexpose, SAINT, Qualys, Burp, NMap, Kali, Metasploit, Meterpreter, Wireshark, Kismet, Aircrack-ng, etc.)
  • Familiarity with various network architectures, network services, system types, network devices, development platforms and software suites required (e.g. Linux, Windows, Cisco, Oracle, Active Directory, JBoss, .NET, etc.)
  • Demonstrated ability to create comprehensive assessment reports required
  • Ability to convey complex technical security concepts to technical and non-technical audiences including executives required
  • Passion for creating tools and automation to make common tasks more efficient
  • Knowledge of programming and scripting for development of security tools
  • Recognition in the security community for speaking preferred
  • Published white papers preferred
  • Strong programming skills (Python, Ruby, Node.js, C/C++, Assembly, etc.) preferred
  • Reverse engineering/Binary analysis experience (firmware, x86 applications, etc.) preferred
29

San Francisco Technology Consulting Security & Privacy Senior Consultant Resume Examples & Samples

  • Assisting with Internal Audit projects evaluating IT security control effectiveness
  • Assisting with HIPAA/HITRUST-related projects
  • 3+ years hands on experience with security or administration of either systems (Windows/Linux) or network devices (routers/firewalls/switches). As a substitute, less experience in those areas but experience in database administration or software development is acceptable
  • Participation in information security conferences
30

San Francisco Technology Consulting Security & Privacy Senior Manager Resume Examples & Samples

  • Above average written communication skills including the ability to communicate technical subjects in relation to business strategies, goals and objectives
  • Secure Network Design and Architecture
  • Knowledge of common application architecture (Client Server, n-Tier Architecture, Web Application etc.) and the security implications associated with each
  • Knowledge of Industry Standards, e.g., ISO 2700x series, NIST Publications and other Industry Related Security Standards
31

Technology Consulting Security & Privacy Senior Manager Resume Examples & Samples

  • 7+ years of experience in one or more of the following
  • Developing, implementing and/or supporting secure environments using one or more of the following Operating Systems: Windows Server 2012/200x, Linux and UNIX
  • Knowledge of Attack and Penetration in testing of Internet infrastructure and Web-based applications utilizing manual and automated tools
32

Metro DC Technology Consulting Security & Privacy Senior Manager Resume Examples & Samples

  • 7+ years hands on experience in one or more of the following Operating Systems: Windows Server 2003/2000/NT, Linux and UNIX
  • 7+ years practical experience in TCP/IP Networking
  • Attack and Penetration experience in testing of Internet infrastructure and Web-based applications utilizing manual and automated tools
  • Travel throughout the month frequently required based on client requests/commitments
33

Information Security & Privacy Audit Manager Resume Examples & Samples

  • Partner with relevant teams to stay up to date on the new product pipeline and provide input on potential security and privacy requirements to mutually agree on desired controls
  • Partner with the Information Security and Privacy teams to continuously strive to understand Facebook's information security and privacy risk profile to translate this knowledge into audit planning
  • Work with the Internal Audit team to understand and perform the day to day work of our audit programs in order to implement new processes and contribute to ongoing process improvements
  • Serve as the central Internal Audit point of contact for the Information Security and Privacy teams to conduct relevant audits
  • Take input from Information Security and Privacy teams to plan and execute planned and ad hoc security and privacy audits
  • Develop and manage project plans for Information Security and Privacy audits from audit pre-planning, planning, execution, remediation, and post remediation validation
  • Work cross-functionally with relevant parties on technology implementation projects to validate controls and meet Information Security and Privacy requirements as defined by the respective teams
  • Partner with relevant parties to analyze applicable laws and regulations and provide a point of view on audit requirements as it relates to information security and privacy controls
  • Build strong relationships with business partners and technology teams to thoroughly understand their business processes and partner with Information Security and Privacy teams to identify appropriate and pragmatic risk mitigations
  • 8+ years of experience with Big Four or internal audit with a focus on Information Security and Privacy
  • BA/BS
  • Demonstrated experience of project management practices, tooling, and managing audit projects through their lifecycle
  • Communication skills, interpersonal skills, and presentation skills that allow effective interactions with business partners
  • Working knowledge of audit participation in systems development/change management projects, including experience with ensuring information security and privacy control requirements are included in the system/process design and adequately tested prior to going into production environment
  • Independently operate in a fast paced and diverse environment while managing multiple projects
34

San Francisco Technology Consulting Security & Privacy IDM Resume Examples & Samples

  • Conducting cross-functional role-modeling exercises with both business and technical users to create roles that accurately reflect the organization’s business and corresponding IT access authorizations to fulfill those business needs
  • Installing and configuring IAM products
  • Performing role audits to find loosely coupled roles that are redundant or are overlapping and then work on to aggregate or split the role into more coherent and self-reflecting job functions
  • Designing and implementing access certifications
  • Designing and running role campaigns in any popular IAM environment
  • Analyzing Segregation of Duties (SOD) using GRC software and defining policy in IAM software to enforce that policy
  • Performing role discovery and role refactoring (maintaining and optimizing existing roles)
  • Performing role mining using both top-down, business-oriented role modeling and bottom-up IT role mining
  • Working with clients in the consulting engagement and assisting Protiviti team members in IAM / role management areas
35

Dallas Technology Consulting Security & Privacy Senior Consultant Resume Examples & Samples

  • Assessing clients’ network security posture through the use of automated tools and manual techniques to identify and verify common security vulnerabilities
  • Creating comprehensive assessment reports that clearly identify root cause and remediation strategies
  • Communicating strengths and weaknesses to the client or internal project management team and developing effective solutions
  • Providing support in the ongoing development of security assessment offerings through tool creation and process improvement
  • Experience performing Security Assessment work (vulnerability, penetration tests, web application, wireless security and social engineering) for at least the past year strongly preferred
  • ~20% travel throughout the month based upon client requests/commitments. Travel may include suburban, regional, or out of state locations
36

Security & Privacy Research Intern Resume Examples & Samples

  • Strong communication and interpersonal skills. In particular, they should be self-motivated, show initiative, and drive closure of technical issues
  • Software development with: C++, C, or Java
  • Implementing wireless channel model
  • Research background in Automotive Systems and Network security
  • Familiarity with CAN, DSRC, LTE-V2X, 5G etc
  • Knowledge of wireless channel models and wireless communication protocols, and exposure with mmWave
37

Dallas Technology Consulting Security & Privacy Managing Director Resume Examples & Samples

  • Experience managing engagement teams and provided technical leadership in the assessment, design, and management of successful IT improvement programs
  • Ability to use knowledge of the current Security & Privacy environment and industry trends to identify the engagement and client service issues and communicate this information to the engagement team and client management through written correspondence and verbal presentations
  • Knowledge of key IT management processes and industry frameworks (e.g. CMMI, COBIT,ITIL, Six Sigma, ISO 2700x, TOGAF, project management life cycles, systems development life cycles, PMBOK, Prince2, data center operations, etc)
  • Demonstrated and applied thorough understanding of complex information systems and technology organizations
38

Data Security & Privacy Consultant Resume Examples & Samples

  • Serve as a subject matter expert and thought leader in Security and Privacy
  • Support RGP’s external clients with the execution of a broad range of Data Security and Privacy initiatives
  • Manage client engagements, executing specific deliverables, and transferring knowledge or subject matter expertise to RGP clients
  • Bring solutions, best practices, and tools for project execution and management
  • Bachelor degree required and ideal candidates must possess a high degree of subject matter expertise in Data Security and Privacy, with a preference for certification(s) in the fields as follows: CISA, CISSP, CISM, CRISC, CIPP or other Information Security or Privacy certification
  • A minimum of 8-10 years of experience within Data Security and/or Privacy; a mix of both industry and consulting leadership is preferred
  • Deep experience with a variety of frameworks and regulations (e.g. NIST, PII, PCI, GLBA, GDPR, FFIEC, HIPAA, SOX, ISO 27001, SSAE16, SOC1/II, COBIT, COSO, etc.)
  • Ability to travel, as required, to complete projects on a domestic scale
  • Proven ability to direct high-level professionals in an individual and team capacity as well serve as an individual contributor
  • Exceptional strength in the areas of relationship management and project management, with the ability to elicit cooperation from a wide variety of sources
  • Exhibits the leadership capacity to diffuse tensions, overcome obstacles, sensitively address difficulties among the project team or client, and bring projects to successful completion
  • Demonstrates superior verbal and written communication skills, with the ability to create full scale project plans, white papers, RFPs and associated client presentations and communication documents
  • Effectively communicates at all levels within an organization
  • Exhibits a keen ability to define problems, collect data, establish facts, and draw valid conclusions; quick to interpret technical and/or abstract data and define solution design
  • Ability to confidently and credibly articulate RGP’s business model and value proposition across all practice areas
  • Demonstrated entrepreneurial drive and achievement; proven ability to create the framework of a successful Data Security offering
  • Our Consultants enjoy the flexibility and autonomy to choose the client projects that interest them, while continuing to build professional relationships within our global community of Consultant and business professionals. We offer a comprehensive compensation and benefits package including health and life insurance, a 401(k) savings plan which includes a discretionary company match, employee stock purchase plan, paid personal time off program, professional development and certification courses
39

Atlanta Technology Consulting Security & Privacy Senior Consultant Resume Examples & Samples

  • Prior project management and supervisory skills ideal
  • Intermediate knowledge of common IT topics such as networking and configuring Windows and/or Linux systems
  • Knowledge of information system architecture and security controls (i.e. firewall and border router configurations, operating systems configurations, wireless architectures, databases, specialized appliances and information security policies and procedures)
40

Technology Consulting Security & Privacy Senior Consultant Resume Examples & Samples

  • Performing internal penetration testing and vulnerability assessments at client sites
  • Develop and apply proficiency with Protiviti policies and methodologies
  • 3+ years hands on experience in one or more of the following Operating Systems: Windows Server 2012/200x, Linux and UNIX
  • Hands on experience with securing systems, networks, and/or applications
41

Chicago Technology Consulting Security & Privacy Senior Manager Resume Examples & Samples

  • Prior project management and supervisory skills required
  • Above average written communication skills including documentation of findings and recommendations
  • Strong skills and proficiency in building security into the SDLC cycle, dev ops, and secure coding
  • Prior development experience is a plus
  • Limited Travel throughout the month required based on client requests/commitments
42

Chicago Technology Consulting Security & Privacy Director Resume Examples & Samples

  • 15+ years of experience in security and technology management
  • Privacy experience
  • Consulting experience in Information Security
43

Dallas Technology Consulting Security & Privacy Cyberark Senior Consultant Resume Examples & Samples

  • Some travel (< =50%) may be required
  • Knowledge and experience normally acquired through, or equivalent to, the completion of a Bachelor’s degree, preferably in an IT field, and a minimum of 5-7 years of job related experience
  • 1+ year experience designing, building, testing, optimizing and/or administering solutions comprised of the CyberArk’s Privileged Account Security Solution, including Enterprise Password Vault and Privileged Session Manager
  • Strong troubleshooting and debugging skills with IAM technologies
  • Experience with facilitating requirements gathering and testing
  • Information security or audit experience is a plus
  • Experience in security policy development as it relates to IAM is a plus
44

Dallas Technology Consulting Security & Privacy Microsoft Identity Manager Resume Examples & Samples

  • 3+ years of experience in the integration of commercial identity management software packages (i.e. SailPoint, Oracle, CA, FIM/MIM)
  • 1+ year experience designing, building, testing, optimizing and/or administering solutions comprised of Forefront Identity Manager / Microsoft Identity Manager, .NET, AD, and SQL
  • Must be able to work with little supervision and manage multiple tasks of a complex nature
  • Strong technical acumen and experience leading the development of IAM solutions
  • Knowledge of key IAM technical standards (SAML, OAUTH, LDAP, Kerberos, etc.)
  • Must possess the ability to work as a team member with globally distributed and cross-functional teams
  • Good Windows, Linux and/or UNIX skills
  • Working knowledge of Identity Management suite products from leading vendors such as SailPoint, CyberArk, Microsoft, Oracle, CA, etc
  • Experience with languages/technologies such as MS .NET, Java, XML, Perl, shell scripting, and/or PowerShell
  • Agile development experience is a plus
45

Information Security Privacy Analyst Senior Resume Examples & Samples

  • * Selected candidate subject to special background check procedures
  • * Selected candidate will be required to obtain the Security Assurance for the Federal Reserve (SAFR) certification within one year of hire
  • Provides consultation and facilitation support services to Fifth District, Cash Product Office, and National Product Office in privacy, information security matters, compliance with the Security Assurance for the Federal Reserve (SAFR) policy and other control mechanisms used by the Bank
  • Analyzes, designs, and implements business processes and requirements to ensure compliance with security/privacy policies and procedures. In accordance with approved frameworks, advises colleagues and business clients on privacy requirements, compliance responsibilities and methods to protect Bank resources and sensitive information
  • Consult with business areas on Personally Identifiable information (PII) collection, minimization, appropriate use, information sharing, proper handling and disposal
  • Participate in assessment of supplier (3rd party vendors and cloud services) and provide recommendations to management for improving the vendor assessment process. Support the evaluation of suppliers and develop recommendations to improve security and mitigate security risks
  • Advise management and legal on privacy provisions in 3rd party contracts
  • Performs risk assessments and risk management for new and existing Information Technology (IT) products and projects. Delivers support for the Security Assurance for the Federal Reserve (SAFR) program based on NIST controls
  • Consults with information systems owners to categorize systems; interpret, select, implement and assess controls; and frame, assess and monitor risk
  • Maintains risk management documentation to monitor lifecycle progress, track acceptance decisions and catalog remediation actions
  • Utilizes automated Governance, Risk and Compliance tools to track artifacts of the risk management lifecycle
  • Responsible for information security preparedness, policies, practices, and identifying and mitigating information security risks to applications, systems, infrastructure, and data on behalf of Fifth District, Cash Product Office, and National Product Office business areas
  • Coordinates the execution of SOX (COSO) IT compliance activities by testing, collecting, and reporting results to management. Documents and tracks issues and/or deficiencies discovered during testing
  • Prefer 4 or more years of IT and business/industry work experience. At least 3 years must have been in privacy. Additional years may encompass project management, information security, risk management and compliance
  • Bachelor’s Degree in Information Technology, compliance, risk management, privacy, law, information security, or other related field, or equivalent combination of work experience and education
  • Data privacy professional certification (CIPP, CIPM, DPO, etc.) highly preferred
  • Industry recognized certifications within the domain of information security, information technology and project management (e.g., CISSP, GIAC, CISM, CISA, PMP, etc.) considered a plus and recognized as an indication of work experience
  • Attorney license and experience preferable
  • Expert knowledge of privacy concepts and their practical application
  • Expert knowledge applying risk management frameworks such as NIST, FISMA, or ISO 27000
  • Expert knowledge of regulatory compliance initiatives related to Sarbanes Oxley/SOX (COSO control framework)
  • Working knowledge of governance, risk and compliance (GRC) platforms and applications (e.g. RSAM, Archer)
  • Advanced knowledge of risk management policies, initiatives, and procedures
  • Experience working with internal and external auditors Excellent oral and written communication skills, as well as the ability to convey technical and security related issues to business audience
  • Proficient in the design and implementation of effective Privacy and related IS controls
  • Detail oriented with strong organizational and prioritization skills to handle multiple priorities
46

Chicago Technology Consulting Security & Privacy Senior Consultant Resume Examples & Samples

  • Must be able to handle highly confidential information in a strictly professional manner
  • Financial Services Industry experience
  • Knowledge of regulatory compliance initiatives e.g., Gramm-Leach-Bliley Act (GLBA), FDIC, New York DFS cyber security regulation (NYDFS), Payment Card Industry (PCI) and / or FFIEC Cybersecurity Guidance
  • A working understanding of broader IT Risk Management concepts and fundamentals, including overall IT Risk Governance, Assessments, and integration with business and operational risk objectives
47

Seattle Technology Consulting Security & Privacy Manager Resume Examples & Samples

  • Above-average written and verbal communication skills, including documentation of findings and recommendations
  • 5+ years hands on experience with security or administration of either systems (Windows/Linux) or network devices (routers/firewalls/switches). As a substitute, less experience in those areas but experience in database administration or software development is acceptable
  • 5+ years hands on experience in one or more of the following Operating Systems: Windows Server 2012/200x, Linux and UNIX
48

Security / Privacy Software Engineer Resume Examples & Samples

  • Systems programming languages such as C, C++, Go, and/or Rust
  • Network protocols and programming (Ethernet, IP, TCP, UDP, SSL/TLS)
  • Mobile programming in Android and/or iOS
  • Distributed systems programming and algorithms (replication/consistency, Paxos/BFT, DHTs, peer-to-peer protocols, gossip, swarming, etc.)
  • Applied cryptography (ciphers, RSA, DSA, elliptic curves, zero-knowledge proofs)
  • Team-based code and project management using revision control (e.g., Git), open-source workflows (e.g., GitHub), unit tests, and continuous integration
49

Security & Privacy Consultant Service Integration Leader Resume Examples & Samples

  • Provide security consultation and make key decisions and recommendations in the area of security operations
  • Manage day to day security operations management like Vulnerability Management, Anti-virus management, IPS/IDS management, anti-spam management, proxy management, etc
  • Review and approve change control activities for changes that may impact the current security posture and perform impact assessment
  • Prepare and present the monthly security operations report
  • Ensure that developed security policies are implemented and understood by the delivery team
  • Review technical specifications for a wide range of platforms such as, but not limited to: Wintel, UNIX, Database, Middleware, Network devices, security devices and mainframe
  • Liaise with security vendors, suppliers, service providers and external resources in analysing, recommending, installing and maintaining software security applications
  • Monitor contractual obligations and ensure SLAs are being met
  • 5 yrs
  • 3 – 5 yrs
50

Security & Privacy Architect Resume Examples & Samples

  • Establish and audit a security policy for the client’s Unified Data Architecture – which may include Teradata, Teradata Aster, Hadoop, Open Source and Teradata Applications
  • Provide security services on systems that are located on premises, in the cloud, or functioning in a mixed environment
  • Define client requirements related to security and privacy
  • Design features for a Trusted Database Interpretation (TDI), formerly the National Computer Security Center (NCSC) guidelines
  • Define requirements for physical system security
  • Implement the basic security components of Teradata, Teradata Aster, Hadoop, Linux, and Teradata Applications
  • Conduct system security audits and identify gaps
  • Educate customers on security and privacy issues, best practices, and Teradata, Teradata Aster, Hadoop, and Teradata Application security features
  • Design and develop the security privacy architecture, roadmap, and standards for Teradata, Teradata Aster, and Hadoop systems that will align with the customer business and IT objectives
  • All Consultants are expected to build value in themselves. Teradata’s extensive library of both instructor led and web based training provides ample opportunity for the consultant to build and maintain marketable skills. Time has been allocated specifically for this task and each consultant is expected to have a ‘Learning Plan’. Progress against the learning plan is part of the annual appraisal
  • All Consultants are expected to build value in their practice through the contribution and reuse of consulting assets. At the conclusion of each assigned project, a consultant is expected to evaluate the project deliverables and to contribute those items that may be useful to other consultants that may be assigned similar projects. When a new project is assigned, the consultant will search the asset repository for assets that may improve or accelerate the project delivery
  • 5+ years information security practice experience with increasing levels of responsibility
  • Proficiency in data security standards and exposure to databases
  • Experience with PCI, HIPAA/HITECH/Omnibus, GLBA/FFIEC, SOX, BITS, SASE16 assessments and compliance
  • Knowledge of international privacy and data protection compliance assessments such as GDPR
  • Prior knowledge and experience with RDBMS, especially Teradata, Oracle, MSSQL or PostgreSQL
51

Information Security & Privacy Manager Resume Examples & Samples

  • Understand enterprise environments
  • Analyze administrative, physical, and technical security controls, based on risk
  • Develop size-appropriate recommendations for identified security gaps, based on industry best practices
  • Produce well written and highly detailed reports
  • Write comprehensive information security documentation (i.e., policies, standards, guidelines, procedures)
  • Perform other security-related engagements, including security architecture reviews, network/web application vulnerability testing, and other ad hoc security consulting services
  • Works with sales team to provide technical expertise that can be translated into new and existing
  • Responsible for the coordination, delivery, and quality of presales artifacts (e.g. contracts, agreements, RFP’s, etc.)
  • Responsible for designing, developing and proposing enterprise-wide information security systems that meet ML needs
  • Demonstrated experience navigating the customer security and accreditation process to include certification and accreditation of an IT system per customer policy
  • Proficient in key areas of security such as: Risk Assessment, Incident Response, Identity and Access Control, Data Security and
  • Assists in conducting certification testing and reporting in accordance with the Risk Management Framework (RMF) and NIST 800-53; able to identify deficiencies and provide recommendations for solutions
  • Assists in statement of work review
  • Strong Pre-Sales and relation building experience
  • Consulting skills to connect client business processes and information security risks
  • Strong briefing and client management skills
  • Strong critical thinking and analytical skills; demonstrated ability to identify risks associated with business processes, operations, information security programs, and technology projects
  • 5+ years of experience with security architecture demonstrating solutions delivery, principles and emerging technologies
  • 5+ years of experience designing and implementing security solutions
  • 5+ years of consulting and engineering experience
  • 5+ years of experience with cloud computing & security considerations
  • CISSP, CISM, CISA, ISSAP, ISSEP certifications or SANS related certifications
  • Expert leader in security best practices on current and emerging
  • Working experience with and knowledge of NIST, ISO27001, COBIT and COSO
  • Information Technology: Minimum of 5 years
  • Information Security Compliance: Minimum of 5 years
  • Security: Minimum of 6 years
52

Security & Privacy Architect Resume Examples & Samples

  • 15+ years of total IT experience
  • 8+ years Information Security practice experience with increasing levels of responsibility
  • Proficiency in data security standards
  • Proficient in hardening techniques for the network and operating system
  • Knowledge of Architecture Principles, Advocated Positions, Design Patterns, and Implementation Alternatives
  • Work with the appropriate project management methodology (Agile or Waterfall) based upon customer and project requirements
  • Implementation level experience with Directory Integration Services, LDAP/Kerberos authentication, LDAP authorization
  • Implementation level experience with OS Hardening of Linux, UNIX, Hadoop and Windows servers
  • Implementation level experience with Credential pass-through solutions, centralized directory and identity management
  • Implementation level experience with Syslog monitoring and exportation to SIEM solutions
  • Implementation level experience with RDBMS log facility monitoring, rule configuration and exportation to SIEM solutions
  • Strong SQL and RDBMS skills particularly relating to design and implementation of row and column level security
  • Working knowledge of solutions providing encryption of data-in-motion, data-at-rest, full disk encryption, in-database column-level encryption/tokenization, file level encryption and application level encryption
  • Familiarity with operation/implementation of Protegrity and Voltage Security solutions is a plus
  • Experience with NIST/ISO conforming risk assessments
  • Knowledge of data layer centric security controls, data warehousing, and massive parallel processing architecture (MPP)
  • Interest in cyber security solution design, implementation, cyber hunting and APT kill-chain interdiction
  • Ability to work independently in a virtual environment with little or no supervision
  • Superior diagnostic and troubleshooting skills
  • Superior client communication, writing and presentation skills
  • Ability to obtain a US secret security clearance (existing active secret or higher security clearance a plus)
  • Attitude and desire to become a trusted security advisor to our customers
  • Desire to be a key contributor in the best, world-class information security professional services team in the industry
  • Knowledge of HFS, Hadoop and Aster clusters
  • Sysadmin experience and SLES / SuSE
  • Prior experience with or certifications on Teradata systems
  • Proficient in Teradata, Teradata Aster, Hadoop, and Teradata Application features used to implement data access security and intrusion detection
53

Dallas Technology Consulting Security & Privacy Associate Director Resume Examples & Samples

  • Maintain primary contact with significant clients and for maintaining client satisfaction on all client work
  • Lead client needs assessments, delivery, and/or management of delivery of ERP package control solutions
  • Analyze compiled data and make recommendations to mitigate risks, improve processes or controls
  • Prepare and present detailed reports and findings to senior management
  • Develop existing engagement opportunities, playing significant roles in developing new clients, and establishing relationships within the business community
  • Responsible for the profitability of all client related work within their portfolio as well as managing the profitability of these portfolios
  • Apply understanding of Protiviti policies and proficiency in Protiviti methodologies
  • Apply understanding of business processes and technical skills to successful completion of project assignments
  • Supervise, train and mentor project personnel
  • Prior management and direct supervisory experience in a team environment
  • Must work creatively and analytically in a problem-solving environment
  • Demonstrated excellent leadership and interpersonal skills
  • Demonstrated advanced written and verbal communication skills
  • Must have ability to multi-task
  • Excellent client relationship and business development skills
  • Demonstrated mentoring and people development skills
  • Specialized Industry skills
  • Knowledge of leading ERP Access Security packages, e.g. Approva, Applimation, Virsa (SAP GRC), and other automated assessment tools
  • Experience with Order-To-Cash, Purchase-To-Pay, and Financial Close business process scenarios
  • Knowledge of the COSO or COBIT frameworks or related methodologies
  • Experience in assessing an ERP installation in the context of a Sarbanes-Oxley compliance effort
  • Substantial implementation functional team leadership experience and/or “Big 4” Audit experience in a technology audit/risk assessment practice
  • Experience in ERP security, life-cycle implementation and/or auditing
  • Experience performing internal control reviews and risk assessments for customers running SAP, Oracle E-Business, and/or PeopleSoft
  • Knowledge of segregation of duties concepts, sensitive access and experience in user access security including configuration of SAP, Oracle E-Business, and/or PeopleSoft Financials/Human Resources
  • Experience implementing SAP, Oracle E-Business and/or PeopleSoft Financials/Human Resources, while having exposure/interaction with process owners and SMEs
  • Working knowledge of business processes and application integration
54

Dir Information Security & Privacy Resume Examples & Samples

  • Provides leadership and direction for applicable security, privacy, and compliance teams within the Patterson organization
  • Participate in the effort to develop an enterprise Infrastructure technology strategy including a multiyear implementation roadmap
  • Provide leadership to team members by creating a high performance culture, driven by strategic objectives and goals of Patterson
  • Establish short-term and long-term metrics for departmental goals and implementation of the enterprise Infrastructure strategy
  • Develops, implements, and maintains information security and privacy strategies
  • Develops, implements, and maintains relevant data privacy and security policies, standards, and processes
  • Provides support for corporate response to data privacy or security complaints from customers and other stakeholders
  • Performs periodic information security audits to identify and mitigate risk concerns
  • Evaluates and implements new security technologies and software to improve compliance, reduce risks and protect sensitive information in accordance with the security/privacy strategy, risk tolerance, and policies
  • Acts as key point of contact with the Department of Health and Human Services (HHS) for HIPAA-related issues and with acquiring banks for issues relating to PCI DSS compliance (including ROC, SAQ D, and ASV reporting) in any compliance reviews or investigations
  • Promotes awareness of data privacy and security through development and delivery of educational material through various media and techniques (including browser-based learning, live presentations and one-on-one training)
  • Provides consultative services to IT and other departments to review systems and applications for impact on security and privacy practices
  • Works with business owners to identify statutory and regulatory compliance requirements that impact the business
  • Maintains relevant records of data privacy and security compliance as required by law or contractual obligation
  • Provides investigative assistance and subject-matter expertise to Human Resources as needed to manage relevant ethical and policy violations by employees, temps or subcontractors
  • Chairs Patterson's Information Security and Privacy Governance Committee
  • Maintains current knowledge of applicable international, federal and state data privacy and security laws and accreditation standards
  • CIPP/US, PCIP, CISSP, CISA and/or CHP certifications
  • Prior experience as a PCI DSS QSA or ISA
  • 1-3 years experience working in healthcare and/or pharmaceutical industry
  • 6 to 8 years of IT and business/industry work experience , including 3-5 years experience in data security and/or privacy compliance Significant, proven knowledge of HIPAA/HITECH, PCI DSS and other relevant data privacy and security laws, regulations and standards
  • Experience working with outside auditors and regulators
  • Experience developing, enhancing, implementing and auditing data privacy and security policies and standards
  • Working knowledge of IT security practices, methods and technologies
  • Proven ability to recommend efficient and effective solutions for maintaining compliance with HIPAA regulations and PCI DSS standards
  • Ability to influence employees at all levels and departments to affect change across the organization
  • Excellent verbal and written communications with ability to effectively communicate at all levels in the organization
  • Excellent organizational skills, fine attention to detail and task follow-up skills
  • Demonstrated willingness and ability to learn new subjects quickly
  • Ability to work with confidential and/or sensitive data by maintaining professional discretion at all times
  • Ability to use logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems
  • Proficient in Microsoft Office Suite (Word, PowerPoint, Excel, etc.)
  • Experience with the development and delivery of compliance training and employee awareness programs
  • Experience with sensitive health information and/or payment card data
  • Experience with data breach response and mitigation processes and tools
  • Contract and vendor management experience
  • Experience with Business Associate Agreements strongly preferred
  • Proven ability to use logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems
  • Highly motivated and self-driven with the ability to work efficiently with limited supervision
  • Strong technical background in developing IT Infrastructure strategies and standards
  • Deep experience in IT Infrastructure and Architecture, and industry best practices
  • Demonstrated ability to lead and work in a collaborative, cross-functional, international team environment
  • Demonstrated ability to work with and influence senior level management and key stakeholders
55

Data Security & Privacy Specialist Resume Examples & Samples

  • Provide and maintain the annual Release Calendar with major events, releases and maintenance windows documented
  • Monitor the release schedule and the related release notes and promptly notify client of all schedule changes and exceptions
  • Assign related sets of changes to specific releases according to client business requirements
  • Assist the Release Requester with technical feasibility of release
  • Assign releases to Release Specialists for planning and implementation
  • Approve releases to move to production; evaluating and approving the software changes associated with the release
  • Review impact of emergency changes on planned releases, as needed
  • Communicate the release calendar, specific release plans, specific release content and its impact
  • Start Release Management process for the specific applications
  • Review and update Release management process documentation
  • Provide resource On-Boarding and Off-Boarding processes
  • Support Access control and revalidation process for production and non-production environments
  • Support Workplace security process
  • Review and update matrices of Separation of duties for applications in accordance with users’ roles and accesses
  • Oversee, direct, and delivery DS&P education to employees and appropriate third parties to promote understanding and awareness
  • Identify and review DS&P risks, discuss them with managers and implement actions for risks minimization
  • Manage any issues related to data security and privacy
  • Review and update DS&P process documentation
  • Project management skills with the capability to establish action plans, to set clear goals, monitor and communicate progress, and supervise all initiatives to completion
  • Knowledge of IT systems and programs
  • Self-starting ability to work independently and as a team member within established processes
  • Integrity, liability, and good judgment in a fast pace environment
  • Demonstrated organization, facilitation, communication, and presentation skills
  • Bachelor or Master Degree in Engineering, Computer Science
  • Knowledge and experience in information technology, data security
  • A minimum of 2 year experience in the banking sector, preferably in application support & development, data security
  • Upper intermediate written and spoken English, including ability to communicate efficiently in English via both phone and e-mail
  • Proficiency with MS Office (Word, Excel, PowerPoint)
56

Dallas Technology Consulting Security & Privacy Iam-active Directory Senior Consultant Resume Examples & Samples

  • Communicating with the client and helping client understand different implementation options at business and technical level
  • Developing and delivering technical documentation, presentations for client use, and conducting research
  • Designing secure AD deployment architectures
  • Assisting with the creation of implementation approaches for directory deployments
57

Dallas Technology Consulting Security & Privacy IAM Associate Director Resume Examples & Samples

  • Developing and delivering technical documentation, presentation for client use, and conducting research
  • Designing deployment architectures
  • Designing and implementing implementation approaches for projects related to: access certification, provisioning, SSO, privileged access management, enterprise role management, directory & virtual directories
  • Understand and research current trends related to relevant IAM market - technologies, tools, approaches, etc
  • Provide mentoring to junior team members to assist in their professional growth and development