Security Resume Samples

4.5 (94 votes) for Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
JM
J Morar
Johann
Morar
8133 Quigley Cove
Detroit
MI
+1 (555) 815 6620
8133 Quigley Cove
Detroit
MI
Phone
p +1 (555) 815 6620
Experience Experience
Boston, MA
Security
Boston, MA
Purdy Inc
Boston, MA
Security
  • Identify any personnel problems occurring at posts, such as payroll issues, employee relations complaints or other concerns, and forward any such issues to Operations Manager and/or Corporate HR Director; may also be responsible for writing a report of the situation or assisting with an investigation, as directed by Operations Manager or Corporate HR Director
  • Direct, conduct and/or coordinate the investigation of crimes committed against Applied Materials or its employees under the direction or guidance of the investigations manager. These may include: misappropriation, theft, industrial espionage, threats, due diligence, computer crimes, competitive intelligence, accidents, claims, conflict of interest, assault, harassment, employee vetting, litigation support, etc
  • Conducts sensitive security investigations of a diverse and varied nature on a site-wide or corporate-wide basis; provides guidance, assistance or support for other security personnel involved in the conduct of investigations
  • Receives weekly timesheets and updates Winteam schedules as necessary (verify such for self-scheduling accounts). Runs bi-weekly payroll according to company procedures. Ensures records are properly maintained and updated to reduce payroll errors. Resolves payroll discrepancies in a timely and efficient manner, and communicate status of such to affected employees, to minimize financial exposure for Company
  • Familiarity with database functionality, especially Microsoft Structured Query Language (SQL) or IBM DB2 databases. Build queries, tune performance, adjust security
  • Perform other operations related functions (e.g., payroll, review and maintain incident reports, issue uniforms, coordinate fleet vehicles, assist in preparation of security surveys and post orders)
  • Coordinate and/or conduct site-specific OJT, client-specific training, and annual refresher training for security personnel, as well as meet Allied Universal’s corporate training standards
San Francisco, CA
Cyber Security
San Francisco, CA
Heller, Casper and Mosciski
San Francisco, CA
Cyber Security
  • Provide analyst supporting consultation on risk management controls to involved stakeholders and partners with them to effectively manage third party risk
  • Interface with Cyber engineering and vendors to provide process improvement practices
  • Provides technical interface between development and operations teams
  • Perform design validation testing and pre-work in non-production environments when necessary to ensure successful implementation in production
  • Providing investigation findings to relevant stakeholders to help improve information security posture
  • Perform packet analysis and analyze network traffic for security events
  • Be a strong team contributor who provides ideas and improvements to service offerings
present
Dallas, TX
Information Security
Dallas, TX
Treutel-Macejkovic
present
Dallas, TX
Information Security
present
  • Coordinating contractors, employees and vendors in conducting assessments, testing controls and implementing remediation
  • Provide support in researching, designing, testing, and implementing new technologies that will enhance the organizations capabilities
  • Assist with application security penetration testing activities, including scheduling, resources, tool execution, and reporting
  • Coordinating stakeholders across Firm departments to scope relevant testing e.g. Policy Compliance Testing, request based control testing
  • Coordinating contractors, employees and vendors in conducting assessments, testing controls and tracking them to completion
  • Scripting / Programming Strong working knowledge of scripting languages such as Python, Perl, regex, etc
  • Identifying, researching, validating, and exploiting various different known and unknown security vulnerabilities on server and client side
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Arizona State University
Bachelor’s Degree in Computer Science
Skills Skills
  • Have a strong desire for quality, and an attention to detail; excellent analytical skills
  • Proven excellent customer service skills and ability to be flexible, a team player and interface professionally with all levels of internal and external
  • Professional, articulate and able to use good independent judgment and discretion
  • Ability to grasp, lift and/or carry or otherwise move goods weighing up to 70 lbs. Sufficient manual dexterity in hands
  • Ability to identify critical issues quickly and accurately
  • Ability to proficiently operate computer software and hardware for data manipulation, analysis, and presentations
  • Ability to perform basic mathematical calculations
  • Basic knowledge of security practices and procedures
  • Solid understanding of operating systems (Windows, LINUX, UNIX) with an in-depth knowledge of related tools and architecture
  • Strong knowledge of IT security principles
Create a Resume in Minutes

15 Security resume templates

1

Archer Senior Security Analyst Resume Examples & Samples

  • Any combination of a related Associate's or Bachelor’s degree, certification or 5 years of related experience
  • Archer eGRC experience is required
  • Expertise with the eGRC Archer Application suite of Policy, Risk, Enterprise and Compliance Management, Vendor and compliance management
2

Security Access Analyst Resume Examples & Samples

  • Researches, evaluates, and implements Identity and Access Management Systems
  • Responsible for risk detection and remediation
  • Maintains knowledge of security laws, principles and practices and identity management best practices
  • Independently performs due diligence research and makes decisions with respect to exception requests
  • Identifies security gaps and suggests solutions to mitigate the risks in accordance with the business owners’ risk tolerance
  • B.S. in Computer Science, MIS or related degree and a minimum of two (2) years of related experience in Information Security and Project Management or an equivalent combination of education, training and experience
  • Systems Security Certified Practitioner (SSCP) certification
  • Computer Information Systems Security Professional (CISSP) certification or the ability to obtain within one (1) year
  • Information Security Concepts and practices
  • Structured problem definition, requirements gathering, functional specifications, solution analysis, and testing as it relates to implementing system/application security
  • Heavy SQL experience required
  • Advanced Excel knowledge
3

IT Security Engineering Manager Resume Examples & Samples

  • Platform, network, mobile device management, and application security assurance engineering; including technology evaluation, selection, implementation, operational handoff and third-level support
  • Establishes IT security standards, including but not limited to network, hardware and operating system security configuration standards
  • Coordinates and implements IT security policy
  • Manages the activities of department associates; assigns responsibilities, provides guidance and monitors workflow and performance. Responds to operational issues
  • Manages project planning and resource utilization in terms of scope, time, cost and delivery
  • Researches and prepares reports and recommendations on evolving information security technologies
  • Monitors available information security resources to identify and assess new threats and vulnerabilities which could affect firm computing resources
  • Minimum of Bachelor’s degree in Computer Science, MIS or applicable degree and seven (7) years of related experience in systems or network engineering with an emphasis in security and leadership experience or a combination of education, training and experience
  • Certified Information Systems Security Professional (CISSP) or Systems Auditor (CISA) preferred or ability to obtain CISSP within 18 months
  • Series 99, or ability to obtain within 120 days (as required by FINRA), may be required depending on assigned functional area
  • Strong understanding of the financial industry, products, policies and procedures highly preferred
  • Knowledge of the following
  • Builds a cohesive team, and develops structure & direction to meet or exceed customer needs
  • Provides feedback, empowerment and coaching to help others excel in current and future job responsibilities
  • Creates a trusting work environment where people can realize their full potential
  • Interacts with others in a way that promotes openness & trust and gives confidence in one’s intentions
4

Information Security Resume Examples & Samples

  • Risk management methods and techniques
  • Potential process and technology vulnerabilities and detailed understanding of the security mechanisms that can potentially be deployed to reduce risk to an acceptable level
  • Planning and delivery of information security engagements
  • Writing client reports
  • Review and quality assurance of client deliverables
  • Engagement assurance and commercial risk management
  • Managing and mentoring junior engagement team members
5

Security Resume Examples & Samples

  • Lead and deliver large-scale ITRA engagements
  • Manage financial aspects of client engagements and communicate significant issues, fees, and estimates to complete to Partners and Clients
  • Assist Partners and Directors with generating new business opportunities and building client networks and relationships
  • Understand all our service offerings and actively identify opportunities to better serve clients
  • Develop people through effectively supervising, coaching, and mentoring all levels of staff
  • Cyber Security/ Cyber Crime assessments, implementation or cyber frameworks (e.g. NIST) – including any past experience with security operations and knowledge of SIEM solutions
  • Identity and Access Management
6

Security Resume Examples & Samples

  • Conduct performance reviews and contribute to performance feedback for staff
  • Manage, coach and support associate team members on your assignments
  • Assist in preparing reports and schedules that will be delivered to clients and other parties
7

Information Security Resume Examples & Samples

  • Maintain intake process for new countries to engage the ISFM team
  • Build and maintain local relationships within different geographic locations
  • Oversee and execute local and global ISO implementation activities as per the 27001:2013 standard
  • Coordinate and conduct site assessments for in-scope locations
  • Coordinate and conduct risk assessments for each asset within the area of scope
  • Work closely with local area contacts to identify assets and associated ownership
  • Understand and be able to implement all aspects of the ISO 27001:2013 standard as it relates to requirements versus EY implementations
  • Coordinate project management activities to tie each component of implementation and continuous improvement
  • Update and maintain ISMS documentation specific to each implementation
  • Define and implement hand-off activities in working with ISMS Management for on-going maintenance and continuous improvement
  • Ability to appropriately balance firm security needs with business impact & benefit
  • Flexibility to adjust to multiple demands, shifting priorities, ambiguity and rapid change
  • Ability to deal efficiently with escalations and difficult situations/people under pressure
  • A thorough understanding of the business objectives of Service Lines and CBS
  • Strong ability to lead and manage resources from various geographic backgrounds
  • Global mindset for working with different cultures and backgrounds
  • Ability to work in time-sensitive and stressful situations with ease and professionalism
  • Possess a versatile communication style that adjusts to the audience; communications to top management will need to be different for lower levels as well as external parties
  • In-depth familiarity with the ISO 27001:2013 standard
  • Experience and knowledge in previous ISO 27001 implementations
  • Experience in conducting on-site audits and managing the entire lifecycle for risk treatment and corrective action plans
  • An Information Security background to speak intelligently to both technical and non-technical teams and understand the variation of risks posed to the firm in different situations
  • Enterprise knowledge of the firm to assess risks and integration into the Information Security Management System and convey to external auditors
  • Guide other junior members of the team in coordinating daily activities
  • Assist in the development of other junior members of the team
  • Act as a role model within the entire team by demonstrating professional and ethical behavior with optimum efficiency and productivity
  • Some flexibility to travel to different office locations based on scope of activity
  • Five or more years of experience in a significant Information Security risk management function
  • 10 or more years of experience in an Information Security or Information Technology
  • Exceptional judgment, tact, and decision-making ability
8

Security Consulting Lead Resume Examples & Samples

  • Translate technical vulnerabilities into business risk terminology for business units and recommend corrective actions to customers and project stake-holders
  • Plan the training and development of staff to develop their skills and maintains state-of-the-art knowledge in information security
  • Experience facilitating meetings with multiple customers and technical staff, including building consensus and mediating compromise
  • Experience with security architecture, design and assessment of ERP and CRM solutions
  • Experience in managing the communication of security findings and recommendations to IT project teams and management
9

Active Directory Security Analyst Resume Examples & Samples

  • Ability to manage and maintain an Active Directory forest infrastructure
  • Ability to recognize and research attacks and attack patterns
  • Ability to prioritize events so that the most impactful are addressed first
  • Strong network and/or system background
  • Knowledge of PKI desired
  • Strong knowledge of information security technologies
  • Excellent team skills and integrity in a professional environment
  • Knowledgeable in legal issues within information security environments (i.e., data privacy)
  • TCP/IP network expertise
  • Exceptional social, communication, and technical and general writing skills
  • 6 years’ experience in one or more of the following
  • Active Directory configuration, administration, and troubleshooting
  • Deep understanding of the TCP/IP protocol stack
  • Experience with programming languages such as Java, Java script, C, C , C#, ASP, .NET, Visual Basic and is a plus (perl, python as well)
10

Security IAM Service Delivery Portfolio Manager Resume Examples & Samples

  • Portfolio management for projects delivering large and complex Identity and access management infrastructure specific technologies
  • Manages projects delivering core IAM multi-domain infrastructure technologies with a focus on Microsoft technologies
  • Will have significant impact in transitioning major new IAM technologies to business as usual run state in Operations
  • Manages the project and financial management aspects of a portfolio of projects valued at greater than $10M plus on an annual basis
  • Builds and manages a large, diverse, and geographically dispersed group of project teams
  • Maintains a high level of employee satisfaction and retention
  • Delivers executive level presentations and communications
  • Manages a diverse and sometimes challenging set of stakeholders
  • Demonstrates the key leadership capabilities commensurate to this role
  • Consults and collaborates with the Security IAM Architecture lead, management, vendors, and the team in technical matters regarding IAM projects
  • Ability to articulate and manage the financial aspects of infrastructure and IAM programs, change requests, and budgets
  • Monitor program/project baselines to ensure activities are occurring as planned - scope, budget and schedule
  • Proactively identify risks and issues on programs/projects – advising team on the development of risk management and issue management plans
  • Identify potential points of contention for missed deliverables
  • Develop and manage plans to address program/project strengths, weaknesses, opportunities and threats
  • Ability to balance both the "science" of how to perform program/project management and the "art" of program/project management
  • Analysis of program/project data to produce management information and identify and deliver continual improvement
  • Develops communication plans, communication artifacts, stakeholder plans and has the experience to continually update and monitor these as project conditions change
  • End to end understanding of IT life cycle (pipeline, resource, demand, project delivery, financial)
  • Experience in end-to-end large infrastructure portfolio and project management including financial management, resource management, scope management, and stakeholder management
  • Very good understanding of service delivery related key performance indicators
  • Customer orientation and responsiveness
  • Outstanding self-management , influence management , information presentation and interpersonal, communication
  • 7 to 10 years of program and project management experience with large and complex information security, Identity and access management, infrastructure, or technology projects delivered in a global setting. This should include budget responsibilities for $10M plus on an annual basis
  • Experience with business and IT improvement through process engineering
  • 3 to 5 years working with Microsoft core infrastructure multi-domain infrastructures and technologies in a project management or Business analyst role
  • Experience building and maintaining large, geographically and organizationally diverse technical project delivery teams
  • Proven experience with executive level presentations, including the ability to convince leaders to follow a particular direction
  • Desired: 3 to 5 Years of large scale operational management experience
  • Desired: Experience with specific technology (this should include both Microsoft and non-Microsoft provisioning and SSO type of technology) Consulting experience a plus
  • Desired: deep understanding of the overall infrastructure , IAM, and related technologies market place, including the various technologies, tools, and top tier vendors
11

Security Assessment Analyst Resume Examples & Samples

  • CISA, CIA, CISSP certification
  • Manage competing deadlines and prioritize responsibilities to effectively meet business needs
  • Demonstrate an understanding of business processes, internal control risk management, IT controls, and how they interact together
  • Demonstrate leadership and problem solving skills
  • Possess advanced interview skills to tailor the types of questions based on responses provided by internal personnel or supplier contacts
  • Bachelor degree or an equivalent combination of education and work experience
  • 4 years relevant work experience
  • Demonstrated basic understanding in processes related to the position, including applying standard security awareness techniques/principles in gathering information, conducting fieldwork, and reporting issues
  • Demonstrated effective verbal and written communication skills for the purpose of explaining technical information to clients, vendors, senior management and staff
  • Analytical, problem solving, strong documentation skills; attention to detail
  • Strong relationship and team building skills
  • Solid Microsoft Word, Excel, PowerPoint skills
  • 6 years information security experience or a combination of information technology work experience and information security experience
  • Demonstrate solid knowledge of information security risks and countermeasures and GLBA, PCI and other information security and control frameworks
  • Demonstrate effective verbal and written communication skills for the purpose of explaining technical information to clients, vendors, senior management and staff and ability to apply knowledge and deductive reasoning
  • Strong analytical, problem solving, organizational, documentation; time management skills
  • Strong relationship and facilitation skills
  • Proficient with Microsoft Word, Excel, PowerPoint, and Access
12

Security Team VP Resume Examples & Samples

  • Serving as the primary liaison between Edinburgh business units and CRSS functional leads
  • Supporting global initiatives for CRSS functions
  • Manage EMEA security issues including: physical security, access control, site risk assessments, local investigations and incident response / management
  • Provide security support for events and executive visits including coordination of staff and vendors as well as on-site presence
  • Partner with business leaders across EMEA to ensure that the security program is well socialized and designed to meet the needs of the business
  • Respond to requests for assistance with security issues
  • Oversee and manage local vendors, including the acquisition of new vendors as necessary
  • Significant experience with security, business continuity and / or crisis management
  • A preference will be given to candidates with Financial services business knowledge
  • Preference will be given to those that have played a leadership role at the regional level in a Financial Services organization
  • Requires in-depth experience interacting with senior management
  • Good judgment is essential as is the ability to know when to escalate issues and involve additional stakeholders
  • Requires experience managing corporate security metrics
  • Requires strong relationships with law enforcement personnel
  • Preference will be given to candidates with experience working in a combined physical security / business continuity environment where they played an active role in business continuity / crisis management planning and response
  • Potential for out of hours work on the basis of a requirement to respond to unexpected emergencies and situations at any of Blackrock’s locations globally
  • A change agent with the ability to apply analytic thinking and approach to improve operations
13

Mobile Application Security Analyst Resume Examples & Samples

  • Familiarity with IOS, iPhones and iPads,
  • Familiarity with Android applications,
  • Application development experiencein Java, Objective C, and/or .Net,
  • Experience with the development and deployment of mobile applications
14

Incident Responder Computer Security Incident Response Team-cyber Security Resume Examples & Samples

  • 7 year's industry experience in a large, mission-critical environment
  • 4 year's incident response experience
  • In-depth knowledge of network intrusion methods, network containment and segregation techniques
  • In-depth knowledge of operating systems (Windows & UNIX, Mac OS X a plus)
  • Expert understanding of TCP/IP networking, routing protocols and full packet capture analysis
  • Experience with application security and penetration testing frameworks
  • Proficiency in malware triage
  • Proven understanding of log parsing and analysis
  • Shell, Perl, Python scripting knowledge
  • Knowledge of digital forensics in support of incident response
15

Information Security Risk & Controls Analyst Resume Examples & Samples

  • Previous experience in Information Security and Risk Management
  • Experience in incident response and handling of data privacy related incidents
  • Experience in threat and vulnerability management
  • Solid comprehension of Information Security best practices
  • Experience with information security tools including Data Loss Prevention (DLP) and encryption
  • Knowledge of web proxy, database and secure data transport solutions
  • Knowledge of firewalls and best practices for rule implementation
  • Ability to review, comprehend and discuss the results of vulnerability scans
  • Knowledge of compliance and privacy regulations impacting financial institutions
  • Experience working on a global team
  • Ability to present complex problems and solutions to a broad audience
  • GCIH, GCIA, CISSP,CRISC certifications a plus
16

Information Security Intern Resume Examples & Samples

  • Communicate and escalate issues and incidents as required by process or management
  • Collaborate with CCB Cyber Security, Global Technology Infrastructure, Corporate Cyber teams, and Line of Business Information Risk Management teams for issue resolution and mitigation
  • Very good oral/written communication and interpersonal skills
  • Excellent planning and organizational skills. Ability to handle multiple projects simultaneously
  • Very good negotiation/mediation skills. Must be able to work collaboratively with other departments to advocate information security solutions
  • Working knowledge of Microsoft Office products. Some exposure to desktop and server operating systems
  • Basic understanding and/or interest in of networking protocols, TCPIP
  • Ability to articulate technical information into real world business impact at a level that is understandable by non-technical staff
17

IT Security Log Management Engineer Resume Examples & Samples

  • Performs all administration, management, configuration, testing, and integration tasks related to the Splunk, BigData/Hadoop, ArcSight ESM, Loggers, and Connector Appliance Platforms to include content creation, maintenance, and administration tasks
  • Prior hands on experience in engineering and supporting large scale Splunk based event logging solutions for large corporations
  • Previous experience in Hadoop/BigData technology configuration
  • Good command on Python, Perl, SQL, Regex and Shell scripting is required
18

Asset Management Information Security Lead Resume Examples & Samples

  • Act in a leadership and trusted partner capacity to coordinate, harmonize, and optimize AM Information Security management activities globally and with other LOBs in order to proliferate best practice and reduce duplication of effort, providing a single point of contact for the Americas executive management on all matters related to information security
  • Identify and propose key information security program priorities, initiatives, plans, practices and tools
  • Liaison with and offers strategic direction to related governance functions (such as Physical Security/Facilities, Technology Control, IT, HR, Legal and Compliance) plus senior and middle managers throughout the organization as necessary, on information security matters such as routine security activities plus emerging security risks and control technologies
  • Oversee execution of approved information security projects and internal/external security audits, and provide regular status reporting on progress of such projects to senior management
  • Act as the primary control point during follow-up on significant information security incidents, oversee development of response plans, and provide timely update reporting
  • Monitor information security trends and evolving technologies and keep senior management informed about related information security issues and implications for the Company
  • Understand potential and emerging information security threats, vulnerabilities, and control techniques and communicate this information to appropriate team members
  • Maintain strong relationships with Incident Response team in managing information security incidents for AM
  • Master’s Degree preferable
  • Minimum of 7 to 10 years of experience in IT Security, IT Risk Management or related area
  • Minimum of 5 years of experience interfacing with remote/international team preferred
  • Strong technical skills relevant to Information Security such as vulnerability management, secure coding standards, ethical hacking techniques, IDS/IPS, SEIM
  • Familiarity with Information Security industry standards/best practices and relevant regulations
  • Analytical and detail oriented
  • CISSP/CISM preferred
19

Senior Information Security Risk & Operations Manager Resume Examples & Samples

  • Comprehensive experience in delivering an Information Security Operations service
  • Able to identify, develop and maintain key information security risk and operations processes
  • A professional and ethical approach with a strong desire to succeed
  • At least 3 years working in Information Security, Compliance, Data Loss Prevention, and/or Data Protection
20

Cyber Security Resume Examples & Samples

  • General understanding of regular expressions
  • General understanding of database structure and queries
  • Experience in conducting vulnerability scans and recognizing vulnerabilities in security systems
  • Knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies
  • Experience in performing packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)
  • Knowledge of network design, defense-in-depth principles and network security architecture
  • Experience in network mapping and recreating network topologies
21

Security Analyst Tier-operations Resume Examples & Samples

  • Up to 3 years of Information Technology experience with network technologies, specifically TCP/IP, and related network tools is required
  • General Knowledge of TCP/IP, IPv6, UNIX, Windows, HTTP
  • General understanding of database structure and querie
  • General understanding of network services, vulnerabilities and attacks
22

Solutions Rates & Security Valuation Resume Examples & Samples

  • Responsible for maintenance and support of our existing Security Valuation and Interest Rate models, applications and processes, used to value and calculate risk measures for securities on Aladdin
  • Contribute to strategic and tactical Rates and Security Valuation projects to ensure the Firm and its clients have the most up-to-date and relevant analytical capabilities and tools
  • Develop deep understanding of financial modeling theory and techniques & develop subject matter expertise in specific product areas such as equity derivatives, FX derivatives, interest rate derivatives etc
  • Work closely with Security Valuation and Term Structure Financial Modeling Group and play an active role in coordination of analytics releases, including testing and validation of new models and analytics, developing deployment plans, creating documentation for the changes, and communicating and explaining new capabilities to the internal and external client base
  • Follow global markets to understand how macro factors and industry changes affect modeling, analytics and investment decisions and help guide our analytics agenda accordingly
  • Serve as a resource to internal groups (Portfolio Analytics, Client Analytics, Risk & Quantitative Analysis, and Portfolio Management Group) as well as external clients on analytics and modeling topics
  • Provide ad-hoc just-in-time modeling assistance to BLK PMs or BRS clients
  • Create and improve documentation for analytical models and processes for external consumption
  • 2-3 years in the Financial Services industry
  • Good understanding of financial concepts, products and markets
  • Strong quantitative skills are a must
  • Problem-solving and organizational skills, including the ability to multitask
  • Excellent written and verbal communication skills, attention to detail
  • Ability to work and deliver results independently
23

Application Risk Data Lead-cyber Security Resume Examples & Samples

  • Develop a sustainable reporting and analytical structure that encompasses the complex nature of applications (components, COTS, 3rd party applications, open source, etc)
  • Provide ‘end to end’ risk posture views at an application level across the SDLC
  • Translate requirements from the DRIVE initiative and develop sustainable analysis
  • Develop analytical capabilities at an LOB level to measure compliance and areas of improvement as it relates to secure SDLC
  • Liaise with various data owners including but not limited to RADAR, SEAL, ITRAC, and training central to build best in class analytic capabilities to support the global application security program
  • Manage the overall data model which will be leveraged to support the global application security program
  • Establish and meet reporting SLAs as defined
  • Establish measurable ‘tollgates’ throughout the JPMC SDLC ensuring documented compliance is achieved for JPMC leveraged code/applications
  • Develop and maintain analysis monitoring the JPMC ‘perimeter’ leveraging data sources such as test results, WAFs, and outputs from 3rd party tools such as malware detection
  • 5 years analytical experience
  • 3 years technical experience in data management
  • Must be highly organized with strong analytical skills
  • Advanced MS Office capabilities specifically in PowerPoint, Visio, Access and Excel
  • Foundational knowledge of secure SDLC and application security concepts
  • Must have a collaborative work style ensuring that stakeholders are engaged in decision making processes
  • Data modeling experience a plus
24

Security Administration Resume Examples & Samples

  • Familiarity with security and access management practices
  • Experience managing security and/or access management teams in large scale diverse environments
  • Strong operational background with UNIX/Linux, Windows, security technology
  • Experience managing and leading global teams, and relationship management across large technology organizations
  • Experience with risk reporting / dashboard generation / KRIs
  • Experience with regulatory engagements and internal audits
  • Ability to influence and engage with senior management
  • Ability to manage expectations and handle high-pressure situations with tightdeadlines
  • Excellent communication / interpersonal skills to be able to interact at all levels & be effective as part of a broader team
  • 8 to 10 years of experience in technology operations or risk management inthe financial services or other regulated industry
  • Certifications in the IT risk and security areas such as CISA, CRISC, CISSP /CISSM (or equivalent) would be an advantage
25

Information Security Authentication Resume Examples & Samples

  • Analyze problems to determine the best solution
  • Design solutions to challenging security problems
  • Collaborate with peers to vet proposed designs
  • Review designs and assess risk from application development and other teams in subject area
  • Write formal security reviews in subject area
  • Able to support afterhours escalation
  • Provide expert level troubleshooting and resolve problems
  • Create, review and make presentation
  • Solid understanding in one or more: Kerberos, RADIUS, SecurID, identitymanagement
  • Solid understanding of common network and system attack methods I
  • Solid understanding of security best practices
  • Expert level PERL programming
  • Strong C, C++, PERL, JAVA programming
  • Strong knowledge of Unix networking (sockets)
  • Solid understanding of IP networking (TCP/IP and standard services)
  • Prior experience in multinationals and large infrastructure
  • Ability to describe technical concept verbally and on paper
26

VP, Nbcuniversal International Security Resume Examples & Samples

  • Identifies, develops, implements and maintains consistent and standardized international security and safety processes and policies, in order to mitigate risk and safeguard the enterprise worldwide
  • Limits exposure and liability in all areas of physical, personal and reputational risk
  • In conjunction with IT Security team, will research and deploy state-of-the-art technology solutions and innovative security management techniques to safeguard the NBCUniversal assets, including intellectual property, as well as to enhance security within all NBCUniversal business units
  • Develops and maintains relationships with senior-level law enforcement and international security counterparts to include in-country security and international security agencies, intelligence and private sector counterparts worldwide
  • Coordinates and implements site security, operations and activities to ensure protection of NBCUniversal employees, customers, stakeholders, and visitors
  • Partners closely with International NBCUniversal business leaders and units to better understand their work and proactively strategize the operations, preparations and local partnerships needed to meet critical business needs
  • Collects, evaluates and applies threat information in order to assess threats to NBCUniversal assets worldwide, validate security measures and develop mitigation strategies
  • Partners with the NBCUniversal Global Intelligence Analyst to provide proactive and timely intelligence information to NBCUniversal executives
  • Assists business units in developing and testing business contingency plans, policies for workplace violence, implements investigative policies and procedures and executive protection procedures as needed
  • Liaison to Corporate Legal for NBCUniversal international security related criminal matters
  • Responsible for oversight of international security plans for all major events, such as the Olympics, all international NBC Sports venues, NBC News and movie production
  • Extensive experience and track record of success in positions of increasing responsibility within private sector corporate security or related public sector organization
  • Demonstrated experience leading a security team in a significant leadership role
  • Proven ability to identify global security risks in domestic and international venues
  • Proven ability to develop effective strategies keyed to likely risks, in collaboration with organization's stakeholders
  • Proven ability to anticipate, identify and evaluate "below the surface" and "around the corner" issues, and to communicate accurate and timely recommendations regarding those issues to the organization, with solid focus on detail, as required
  • This role will require extensive travel to the US and international locations
  • Security experience within both the private and public sector is a plus
  • Proactive and long range thinking skills with sound judgment and the ability to articulate security related decisions to corporate leadership
  • Impeccable integrity with the willingness to work long hours to accomplish the mission
  • Confidence to effectively communicate in a clear, concise, and professional manner within all levels of an organization, including briefing executive NBCU leadership
  • Demonstrated ability to build, motivate and lead a professional security team internationally
  • Demonstrated track record of collaborating and developing consensus with business leaders within all business units
  • Demonstrated track record of exercising flexibility and adaptability in a unique business environment
  • Bachelor’s degree in related field preferred, advanced degree in related field a plus
27

Tier Security Analyst Resume Examples & Samples

  • Knowledge of Intrusion Detection System (IDS) tools and applications
  • Knowledge of Windows/Unix ports and services
  • Experience in scripting (Perl, PHP, etc)
  • Prefered GIAC Certs: GCIA
  • Optional Certs: GSEC, GCED, CISSP
28

Solutions Term Structure & Security Valuation Manager Resume Examples & Samples

  • Strong analytical skills: We seek candidates with an advanced degree in Math, Physics, Engineering, CS or similar
  • Aptitude for programming: Enthusiasm for programming and the ability to produce production quality C++ code are essential. Familiarity with OOP concepts is crucial
  • Knowledge of Finance: We seek candidates with 3+ years of experience in quantitative modeling and programming. It is expected that the candidate possesses solid knowledge of practical aspects of finance
  • Good communication skills: A fluent command of the English language is required
29

Security Resume Examples & Samples

  • 70% HEALTH & SAFETY AND ENVIRONMENTAL ADMINISTRATION
  • Collecting & collating utility data, and inputting into database on monthly basis
  • Distribute & follow up on ergonomic assessments and training reports
  • Liaising with Facilities Department regarding works that require RAMS
  • Periodic H&S building checks
  • Updating documentation for internal web page
  • First Aider and Fire Warden administration
  • Purchasing first aid & ergonomic supplies
  • Liaising with Health & Safety and Environmental Committees to arrange meetings
  • Updating H&S notice boards
  • 30% ADHOC DUTIES
  • Travel arrangements
  • Expenses reports
  • Raising Purchase orders and vendor set-ups on SAP
  • Diary Management
  • Stationery & business card orders
  • Arranging team meetings / events - on & off site
  • Other administrative tasks as required
  • Assist SEHS Department team members with projects as requested
  • Help promote and advocate for the SEHS department
  • IOSH or equivalent H&S qualification helpful
  • Experience/knowledge of health & safety or sustainability in the workplace
  • Previous data entry and database experience
  • Team player with the ability to use own initiative
  • High standard of administration skills
  • Excellent computational skills and analytical skills
  • Ability to work under pressure and to meet deadlines
  • Flexible/innovative approach to problem solving
  • Ability to prioritise workload
  • Excellent computer knowledge of Excel, PowerPoint, Word,
  • Knowledge of SharePoint, Lotus Notes, Concur, Ariba , SAP is advantageous
  • Strong verbal/written communication skills
  • Typically at least two years previous experience relevant to the key responsibilities of this post
  • Previous experience of the media industry or associated skills would be advantageous
  • Proficiency in English plus a second language would be advantageous
30

Perimeter Security Integrations Analyst Resume Examples & Samples

  • Knowledge of TCP/IP protocol suite
  • Unix / Linux knowledge is a must
  • Strong knowledge of Firewalls and Network Security Devices
  • Knowledge of Cisco / Juniper routers & switches
  • Check Point / Palo Alto / Juniper Firewall knowledge is a big plus
  • Experience in Change Management
  • 2-3 years of network security experience is required
31

Security Processing Representative Resume Examples & Samples

  • Gather, assess and develop high-level and detailed business requirements documents according to defined standards for various projects relating to fund processing activities
  • Work with the end-user and the development team/vendor to design systematic solutions to address the business needs
  • Work with various vendors and technical support staff to implement software changes
  • Create/assist in preparing test scripts and execute test plans for patches and application releases
  • Work with the acceptance test team and the end-users to verify product quality Provide business analysis of processes and systems in place to recommend changes and improvements
  • Co-ordinate and lead medium to large sized projects following project standards Report to management on the progress and status of projects
  • Provide application support for software products used by the business units Troubleshoot problems raised by the business units
  • Participate in the development of training programs where required Participate/assist in performing fund/series launches, fund mergers and fund conversions
  • Work overtime as necessary to satisfy client deadlines
  • Post secondary education in accounting, business or systems applications Minimum 2-3 years work experience in a fund accounting environment
  • Experience with derivatives instruments such as futures, forwards and options Experience as a business analyst within the financial services industry
  • Ability to take initiative and work under minimum supervision
  • Ability to work effectively as part of a team in a dynamic, fast paced environment Strong time management and organization skills, with the ability to prioritize and multi-task
32

Security Processing Rep Resume Examples & Samples

  • 1) Security Pricing / Currency Exchange
  • Create any New Security Profile (in details) in Systems
  • Update/validate any re-active Security Profile (in details) in Systems
  • Review security classifications to ensure GICS and other classification standards are followed
  • Update Currency Spot/Forward Exchange Rates and review large variances against Other Source
  • Monitor Currency Spot Rates between Noon time and 4PM, and update them when applicable
  • Review Price Exception and Variance Reports against Bloomberg
  • Maintain Excel spreadsheets for unlisted securities (derived prices based on formulas)
  • Ensure Options, Futures, and Indices market prices are updated accurately
  • To verify security price variances identified by Fund Accounting Teams at Pricing time Prepare and 1st review Static Prices on a weekly basis
  • 2) Corporate Actions / Dividends
  • On Ex-date basis, to record Cash Dividend information (Record date, Payment date, Dividend rate, Currency, … etc.) in Fund Accounting system dBs for all securities held
  • Monitor securities with missing/amended dividend information for any updates
  • Research / Analyze all corporate actions effecting securities held Process corporate actions in the Fund Accounting System dBs
  • Ensure Safekeeping discrepancies resulting from corporate actions are resolved in a timely manner
  • Maintain Access dBs of all corporate actions processed
  • 3) Miscellaneous
  • Backup for other Team members
  • Assist in special projects, where required
  • Assist to file document and to retrieve document for internal/external audits
  • To document internal control procedures – daily/weekly/monthly/semi-annually/annually
  • Over 2 years experience in Fund Accounting / Financial Services Industry Undergrad/College, preferably in Finance or Accounting related discipline
  • Strong experience in Microsoft Excel (Knowledge in Marco is an assets) Experience with various security instruments, such as Equities – Domestic and International; Fixed Income – Fixed/Variable/Floating Rate Bond, Asset-backed/Mortgages-backed; Short-term Notes; Derivatives – Futures, Options, and Currency Forward Contracts; Others – Warrants, Rights, Restricted Securities, etc. Experience with Financial Information Providers such as Bloomberg, Reuters, StatPro
  • Ability to work under pressure with minimal supervision
  • Ability to prioritize tasks and meet strict deadlines on a daily basis
  • Highly accuracy and attention to detail is a requirement
  • Proficient in Microsoft Word and Access
  • Completion of Investment Funds or Canadian Security Course
  • Good communication, interpersonal and client relationship skills
  • Experience with Mutual Fund Accounting System Attributes
  • Analytical Thinker / ability to analyse a situation
  • Must be able to work well as part of a team as well as independently
  • Ability to handle multiple deadlines
  • Good Time Management
  • Willingness to learn and ability to learn quick
33

Sec Processing Rep-security Master File Resume Examples & Samples

  • Recent college grad with Finance or related degree
  • 2 years of business experience
  • 1 year of securities or financial industry experience
  • Strong PC skills: MS Word, MS Excel, MS Access Strong written and verbal communication skills
  • Strong interpersonal, analytical, time management and problem solving skills
  • Organized, detail oriented, tenacious, multi-task ability and solution focused
  • Ability to learn new processes
  • Must be able to work extra hours when business need dictates and may work US Holidays
34

Cyber Security Fusion Center Core Team Scripter Resume Examples & Samples

  • Understand networking protocols and infrastructure designs; including routing, firewall functionality, host and network intrusion detection/prevention systems, encryption, load balancing, and other network protocols
  • Experience in administering and troubleshooting operating systems, including Solaris, Linux, and Microsoft Windows Server is a plus
  • Ability to understand complex technical topics and specialized information
  • Ability to quickly find a solution for to tactical CSFC operational requirements and teams
  • Thorough knowledge on VB Script, Java Script, Excel Services and MS Access
  • Ability to develop in Python, Perl, ASP, MySQL, JavaScript, and shell scripts across a variety of environments
  • Assist other development staff in investigation/resolution technical issues
  • Find solutions to feed data sources into repositories from multiple sources
  • Work with vendors to get information on the usage and any guidance necessary in regards any third party tools
  • Should be a good team player and work independently in pressure situations
  • 4 or more years working in a RAD development environment
35

ISG Security & Pricing Operations Support Assistant Resume Examples & Samples

  • Oversight of security set ups and modifications
  • Oversight of reconciliation and data quality projects
  • Support Pre-market events and Post-market Close events
  • Be able to work hands-on with tight deadlines
  • Gain thorough industry knowledge quickly and effectively interact with other operating units
  • Provide effective maker/checker function to ensure data quality and accuracy
  • Ensure adherence to all audit policies and procedures
  • Provide SIT, UAT testing with strategic technology rollouts
  • Coordinate with global coders in other regions to resolve issue
  • Understand global procedures to support other markets during off hours
  • Independently assess workflow issues and redirects work as necessary
  • Provides subject matter expertise to related projects
  • Identifies policy gaps and formulates policies
  • Interprets data and makes recommendations
  • Provide training support
  • Familiarity with a wide array of financial product types
  • Knowledge and familiarity with financial product data vendors (Bloomberg, Reuters, S&P, Telekurs, etc.)
  • Previous hands on experience with financial securities data is preferred
  • Previous hands on experience with financial securities data Skills Required
  • Strong organization skills with an excellent attention to detail
  • Ability to focus on high quality work while under pressure
  • Advanced knowledge of MS Office Suite, including proficiency in Excel
  • Ability to write SQL Queries is preferred
  • Must possess good written and oral communication skills with the ability to be assertive
36

Technical Information Security Resume Examples & Samples

  • Undergraduate Degree with 4 years of IS experience or very strong IT knowledge
  • A good understanding of application security (web apps/services and/or, mainframe) and development processes and proven ability to identify security threats
  • Application security architecture, a plus
  • Experience in one or more of the following desired: development with web based technologies, mainframe, Wintel, Unix, database, network, messaging, Siteminder or LDAP security
  • Experience working under minimal supervision from management with a strong commitment to team participation
  • Leadership skills and ability to work with and influence developers, development managers, project managers, technology peers, and business contacts are required
  • Consultative / advisory skills
  • Some influence / conflict resolution skills
  • Citi IS Standards and/or industry IS standards
  • CISSP or equivalent certifications (preferred)
37

Security Analyst, Digital Products Resume Examples & Samples

  • Network. Engineering and management of all network security hardware and software including firewalls, intrusion detection/prevention, information/event log management/analysis, antivirus/malware, access control. Engineering and management of security configurations at the host, service, storage, and database layers, including server/device hardening, configuration file management, encryption, auditing and monitoring. Participation in Internet edge security including traffic analysis, DDOS, secure DNS, partnerships with ISP and CDN. Participation in security architecture development including network, host, and application stack design as well as secured data flow. Participation in system performance analysis, system instrumentation/management, and change management activities. (30%)
  • Application. In-depth knowledge of secure web site code development including OWASP best practices, data masking/obfuscation/tokenization, API and encryption key handling. Working knowledge of major web development languages and application frameworks. Understanding of Web SDLC including QA process, pre release scanning, code signing. Participation in risk and security assessments of new and existing Internet products developed by internal teams as well as third parties. (30%)
  • Incident/Vulnerability. Engineering and management of vulnerability management programs including scanning, patching/remediation, and penetration testing. Experience with responding to security breaches and other outages including proactive risk mitigation, incident response, and forensics. Participation in formal and ad-hoc computer emergency response and incident response teams. (20%)
  • Privacy/Audit/Compliance. Engineering and management of encryption programs at both hardware and data layers including hard disk encryption, database encryption, key management, PKI and SSL. Understanding of applicable regulations including PCI, HIPAA, COPPA as well as experience with building and maintaining control procedures and environments. Participation in all routine and ad-hoc activities related to system and data integrity. (10%)
  • Performs other duties as assigned. (10%)
38

Security Processing Rep FTC Resume Examples & Samples

  • To ensure that documents are processed in accordance with relevant procedures
  • Build and maintain relationships with internal / external contacts to include corporate tax, local and foreign tax authorities and account managers
  • Ensure required management data is reviewed regularly and that department controls are adhered to
  • To take control of issues arising in supervised markets and escalate where appropriate
  • Assisting with enquiries from Clients and other departments within GTS
  • Ensure a pro active approach towards initiating new department ideas and improving existing policies and procedures is undertaken
  • Strong Client service skills
  • Candidates should be at an Intermediate level in the use of Excel
  • Good organisational skills, ability to work under pressure of deadlines
  • Flexible and responsive to new challenges
  • Ability to work as part of a team, but also under own supervision
  • Possess the ability to develop good working relationships with external departments and internal colleagues
  • Comfortable working with figures
  • European Language skills an advantage but not a requirement
39

Security Technical Operations Resume Examples & Samples

  • Multi-task in fast-paced environment
  • Ability to work well with others
  • Work Independently
  • Good communication skills - oral written
  • Analytical skill to review troubleshoots JPMC GS&I Video applications
  • Basic Network IP configuration knowledge
  • Basic Security system knowledge background
  • Proficient in SQL Db, MSExchange, and WIN 2000 OS
40

Security Resume Examples & Samples

  • Check identification of any guest who appears to be under 30 years of age who is drinking alcoholic beverages inside the venue
  • Communicate clearly using radios, hand signals and flashlights.Remain in constant contact throughout the shift
  • Position is events/show based. Must be able to work a part-time, flexible schedule
41

Information Security & Technology Risk Resume Examples & Samples

  • Risk assessing vendor and third party relationships
  • Risk assessing requests for deviation from established IT risk and information security policies and standards
  • Strong aptitude to develop and maintain internal and external business relationships and to leverage those relationships in pursuit of their day to day goals and responsibilities
  • Knowledge of IT Security Domains / Frameworks (e.g., NIST, ISO27002)
  • Knowledge of Compliance regulations
  • Understanding of IT Audit process
  • Knowledge of application and system vulnerabilities and exposures
  • Knowledge of basic system, network, and operating system hardening techniques
  • Knowledge of network communication protocols
  • Knowledge of system administration concepts for Unix/Linux and/or Windows operating systems
  • Knowledge of what constitutes a security “threat” to a large enterprise
  • Skill in identifying threat behaviors
  • Software Development Security
  • Security Architecture and Design
  • Business Continuity and Disaster Recovery Planning
  • Physical (Environmental) Security
42

Director of Information Security Resume Examples & Samples

  • Maintain and enhance an information security program to ensure the integrity, confidentiality and availability of information that is controlled or processed by the organization
  • Drive information security projects and enhancements to adapt to existing, changing and emerging information security threats. Mitigate threats and risks as identified by risk assessments and audits
  • Perform information security risk assessments and coordinate the performance of 3rd-party internal and external network and systems vulnerability assessments
  • Develop, maintain and manage the incident response plan, lead incident responses and investigations of security breaches, and assist with disciplinary and legal matters associated with such breaches as necessary, in coordination with the Risk Management department
  • Create and manage information security awareness training programs for the organization
  • Facilitate audits and examinations by regulatory agencies. Create risk mitigation plans for audit findings and track the plans to completion
  • Maintain awareness of changing and emerging information security and cyber security threats, and provide subject matter expertise to executive management on a broad range of information security topics and standards
  • Oversee the management and monitoring of layered security controls such as firewalls, NAC, IDS/IPS, AV, DLP, MFA and others
  • Bachelor’s Degree in Information Security, Computer Science, Information Management Systems, or related field or equivalent in relevant work experience
  • Minimum of 7 to 10 years of experience in IT Security, IT Audit or related area
  • Minimum of 3 to 5 years of experience interfacing at the Executive level
  • Strong technical skills relevant to Information Security such as ethical hacking techniques, IDS/IPS, DLP, NAC
  • Familiarity with Information Security industry standards/best practices and relevant regulations (e.g., PCI, HIPAA, ISO, CobiT)
  • Ability to adapt to a flexible schedule
  • Ability to maintain the highest level of confidentiality
43

FTC Security Infrastructure Analyst Resume Examples & Samples

  • Support ST&S group with help getting projects delivered on time by doing security research and technical evaluations
  • Excellent practical & theoretical understanding of security strategies and technologies including secure global network design, remote computing, desktop and server hardening, Compliance Auditing, Secure Software Development Lifecycles, Software Auditing, and Penetration Testing, Security Monitoring
  • Strong understanding of the security mechanisms associated with Windows or Unix operating systems, switched networks, applications and databases
44

Security Analyst, Technology Resume Examples & Samples

  • 3-5 years experience leading IT compliance programs
  • 3-5 years experience testing IT control effectiveness
  • 3-5 years experience in project management
  • Ability to manage staff who are not directly reporting to you
  • Ability to deliver on goals in an environment that is ambivalent towards compliance, policy, and risk
  • Ability to communicate effectively with all levels of management, translating technical risks into business terms that can be understood by executive management
  • Ability to manage vendors
  • Detailed knowledge of PCI, COBIT, SOX GCC, ISO 9001, ITIL, HIPPA, Privacy Acts, and other IT compliance frameworks
  • Understanding of Gap Inc IT Security policies and standards
  • Experienced with MS suite of tools
  • Attention to detail, patience and flexibility
  • Multitasking and time management
  • Certified Information Systems Security Professional (CISSP), Qualified Security Assessor (QSA), or Certified Information Systems Auditor (CISA) preferred
  • 4 year college degree preferred
45

VP, Security & Controls Resume Examples & Samples

  • Determines enterprise-wide vision for information security issues, policies, standards, priorities and projects
  • Identifies security protection goals, objectives and metrics consistent with strategic plan and priorities
  • Determines information security resources including budget, staff, training needs and resource allocation
  • Evaluates proposed project plans and determines priorities for major initiatives and insures proper implementation of programs and projects
  • Insures that the department is compliant with current with global legislation; provides vision and anticipates potential legislation at a federal and state level, determines proactive responses
  • Continually educates management on changes in information security as well as threats on a global level
  • Reviews standards for information security from multiple sources including National Institute Standards and Technology (NIST), Pay Card Industries (PCI), ISO
  • Plans for incident-specific responses as well as disaster recovery planning
  • Uses an integrated risk management approach to create executive level perspectives and status reports regarding all security risks that the Company may encounter; this includes risks in physical security, access and control issues, data security and contingency planning
  • Serves as the ELC “champion” to promote information security disciplines and new information security technologies; insures that state-of-the-art approaches used
  • Acts as primary change agent to facilitate improvements in information security
  • Serving as CISO, determines enterprise-wide information security policy, procedures, standards, and guidance consistent with departmental and federal requirements
  • Establishes and enforces a process to ensure that all users receive appropriate information security training to perform duties along with periodic information security awareness training; insures appropriate levels of information security awareness and personal responsibility
  • Provides subject matter expertise to the ELC executive management team, legislators and the judiciary
  • Oversees evaluation and final approval of company information security procurement
  • Evaluates and purchases software and develops automated systems to maintain state of the art vulnerability assessment
  • Insures continuous monitoring and tracking all company systems against potential threats including hackers, software flaws, viruses, spyware, phishing and self-adaptive or mutating computer threats
  • Develops effective communication system to quickly disseminate information and solutions to manage potential threats and mitigate risk
  • Receives continual updates on potential threats and implement patches or responses within hours
  • Develops contingency plans to respond to potential threats and security breaches
  • Develops and annually tests disaster recovery plans; conducts “what if” analysis and response scenarios
  • Manages incident security incident response team to handle intrusion detection including digital forensics in activities such as
  • Provides leadership to foster a culture of customer service, disciplined business conduct, and healthy communication
  • Directs and manages implementation of established policies and procedures
  • Optimizes resource use and foster linkages with other business units within ELC
  • Oversees development of fair and effective hiring processes to assess the qualifications of candidates to perform job duties
  • Defines the work and roles of subordinate staff, and establish performance goals and standards for each function
  • Conducts performance reviews for subordinate staff and provides coaching and staff performance feedback
  • Directs employees in the successful execution of job responsibilities to achieve their annual work plan objectives
  • Information security technologies, markets and vendors including firewall, intrusion detection, assessment tools, encryption, certificate authority, web, and application development
  • Information systems industry and best practices in network, application and hardware platform security
  • Audit and assessment methodologies, procedures and best practices that relate to information networks, systems, and applications
  • Identity and access management, security program policies, processes, standards, requirements and procedures and various supporting security technologies
  • The position must possess well-developed skills in
  • Managing advanced information security technical staff within the environment
  • Understanding business objectives and the planning processes to achieve them as well as legislative and political processes that influence them
  • Communicating technical issues to non-technical employees
  • Motivating and supporting staff to achieve business goals
  • Communicating industry standards, best practices, testing techniques, and the interpretation of assessment, and testing results for customers
  • Interpreting industry best practice information and assessment results to provide consultative direction to clientele
  • Providing assistance in the identification, prioritization and remediation of information systems vulnerabilities to diverse users
  • Managing large and complex projects to plan, manage and coordinate diverse enterprise technical projects
  • Leading complex projects, establishing priorities, allocating resources / workloads in a team environment
  • Developing collaboration among the internal stakeholders and groups and to motivate them to act on requirements and recommendations for change
  • Apply in-depth critical and analytic thinking skills to unique problems and projects to provide effective assessment and solution generation; models or solutions are not readily available
  • React quickly and effectively to daily threats from external and internal sources on a 24/7 basis
  • Lead the development of response options, and quickly dissemination technical plans/solutions for varied audiences; these solutions may include automated response systems
  • Oversee fiscal and budgetary controls; advise management on the current and planned needs
  • 10 - 15 years of information technology experience including
  • 5 years of management experience with solid background in information security and privacy, protection key function areas with enterprise-wide administration expertise highly preferred
  • Combination of education, experience and training must qualify the candidate as an information security expert
  • Current security certifications, including CISSP, CISA or CISM are highly desired
46

IT Electronic Security Analyst Resume Examples & Samples

  • Design, plan, implement, upgrade, monitor and/or support Orvis electronic security infrastructure, including firewalls, intrusion detection and prevention, event monitoring, encryption and tokenization, vulnerability scanning and penetration testing, security patching, content filtering and anti-malware
  • Develop and implement security strategies, policies, controls, procedures, and standards
  • Respond to security breaches
  • Train users and promote security awareness to ensure system security
  • Research and make recommendations for security best practices
  • Interface with vendors to solve problems and present solutions to better Orvis’s use of technology
  • Provide technical support and problem resolution
  • Support technology after regular business hours and on weekends as needed
  • Perform other tasks as assigned by supervisor
47

Manager of Security Resume Examples & Samples

  • Administer the PCI compliance program
  • Assists with the evaluation, design and support of security technologies to detect potential IT security events
  • Collaborate with 3rd parties to ensure efficient security-related solutions, practices and processes are in place
  • Responds to security related service issues, problems, and critical situations to support resolution and minimize downtime
  • Assists in development and implementation of security process and procedures
  • Provides reporting as to the performance of security program
48

Equity Security Settlements Resume Examples & Samples

  • Help to shape and execute on the Control, Commercial and People agenda for Security Settlements in EMEA
  • Own the relationships with internal infrastructure teams including Legal and Compliance, Technology, Operations Risk and Control teams, as well as external regulators and exchanges
  • Drive the review of the control and processes in order to reduce operational and client risk
  • Identify opportunities to improve operational efficiency and strive for the delivery of commercial initiatives
  • Career development and people management for a team of 19
  • Technical understanding of transaction lifecycle in Cash Equities and knowledge of regulatory policies & regulations
49

Intermediate Security Analyst Resume Examples & Samples

  • Provides day-to-day security application and infrastructure support to ensure security processes meet BMO standards
  • Creates and documents security operational procedures in order to comply with security policy and operational framework
  • Participates in Change Management, Problem Management, Configuration Management, and Asset Management activities based on the ITIL framework to meet organizational goals
  • Participates in the planning process for security services for service optimization
  • Participates in Disaster Recovery planning and Business Continuity planning exercises to ensure regulatory and corporate compliance
  • Operating McAfee Vulnerability Manager console for the purpose of running ad-hoc (unscheduled) and setting up monthly scheduled scans
  • Operating Qualysguard VM tool
  • Operating the Appdetective DB scan tool
  • Recording activities in the Remedy service management tool
  • Reviewing , triaging and responding to incoming email requests for Vulnerability Assessment Services
  • Provides support to Bank of Montreal Intrusion Protection, Malware Protection and Security Event Management applications in order to protect bank information assets
  • Provides support in security analysis and MIS for the purpose of operational management
  • Participates in testing, evaluation, upgrade and implementation of new and existing security applications to combat emerging threats and vulnerabilities
  • Sundry duties as assigned
  • Experience in creating, configuring and running Vulnerability Assessment tools, specifically McAfee MVM, Qualys and Appdetective
  • Familiarity with managing work flow requests
  • Familiarity with Remedy service management tool
  • Ability to work in a fast paced environment, balancing multiple competing priorities
  • Experience in customer service and high quality personal interactions in person, via phone or email
  • Possesses a university degree/college diploma in Science or equivalent work experience, and/or 3 years industry experience (development, infrastructure, application, operations and security)
  • Actively working towards completion of security certifications is considered an asset
  • Demonstrates good knowledge of the standard operating platforms, system administration, network administration, development process and security process
  • Knowledge of technical currency in Bank platforms would be considered an asset
  • Working knowledge of change, incident and problem management
  • Illustrates good problem diagnosis and resolution techniques in the IT environment
  • Exhibits working knowledge of IT development processes and techniques
  • Current Windows Server knowledge
  • Demonstrated experience working in a Linux environment
  • Excellent written and verbal communications
  • Demonstrates commitment to continuous learning in a dynamic environment
  • Exhibits good analysis skills
  • Is self-motivated and team oriented
50

Security Domain Lead Resume Examples & Samples

  • Proven experience with the defensive practices used in firewalls and network intrusion detection systems
  • Experience in configuring firewalls and particularly network intrusion detection systems (NIDS), including the ability to analyze NIDS alert logs, read network packet captures, and write custom signatures
  • Experience in information technology strategy planning, information security program and administration, security architecture design and technology assessment
  • Strong IT/Technical skills (understanding of software, hardware, networks, etc), with a background in Unix/Linux is expected. Strong understanding of TCP/IP and experience in or familiarity with designing networks is required, and some familiarity with switches and routers a plus. Some background in programming, including scripting languages and ideally C or C++. Advanced written and verbal communication skills
  • Demonstrated integrity within a professional environment CISSP, GCIA, GCFW, GPEN, or GCIH certification - a plus
51

Security Assessment Manager Resume Examples & Samples

  • Bachelor's degree in Management Information Systems, Information Security, Computer Information Systems or commensurate degree
  • 5 years experience as a manager with emphasis on IT Security, IT Risk Management, or relevant experience specific to the role
  • Strong knowledge of information security policies, controls, and processes as well as infrastructure (networks, servers), databases, and Internet technologies
  • A working knowledge of information security related laws, regulations, and industry standards (e.g., FFIEC, GLBA, HIPAA, PCI DSS). Ability to translate these requirements into enterprise wide regulatory compliance and risk management processes in support of the Information Security program
  • Ability to manage supplier relationships
  • Proven abilities to deliver results using analytics and problem solving skills
  • Proven ability to assess risks and controls and to identify solutions to reduce risk
  • Demonstrated initiative and commitment for results and the ability to set priorities and manage multiple initiatives
  • A working knowledge of Microsoft Office Suite
  • Current designation and maintenance of a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC) or similar certifications is highly desirable
  • Ability to travel domestically or outside the country for 10-15 days annually with typical maximum single trip duration of up to 7 days
  • Experience in Financial Services industry
  • Experience with an IT GRC tool (i.e. Archer)
52

Security Monitoring Analyst Resume Examples & Samples

  • Unix
  • Database (Sybase)
  • Application Logs
  • Network device logs
  • Intrusion Detection Systems
  • Vulnerability Notification Services
  • Endless curiosity
53

IT Risk & Security Analyst Resume Examples & Samples

  • Preparing initial and in-depth vendor IT risk assessments
  • Participating in initiatives to improve Vendor Risk Management and Assessment processes across the company
  • Managing exceptions, identified issues and mitigations
  • Ensuring that risk assessment reports are delivered on time and to the UBS required standards
  • Leading regular project meetings
  • Acting as a mentor for junior colleagues; leading trainings and awareness presentations
54

Information Security Resume Examples & Samples

  • Liaise with related governance functions (such as Physical Security/Facilities, Risk Management, IT, HR, Legal and Compliance) plus senior and middle managers throughout the organization as necessary, on information security matters such as routine security activities plus emerging security risks and control technologies
  • Acts as a core within “APAC Centre of Excellence” for information security management, for example offering internal management consultancy advice and practical assistance on information security risk and control matters throughout the organization and promoting the commercial advantages of managing information security risks more efficiently and effectively
  • Provides direct training and oversight to all employees and affiliate alliances, ensuring proper information security clearance in accordance with established organizational information security policies and procedures
  • Perform information security risk assessments and serves as an internal auditor for security issues
  • Reviews system-related security plans throughout the organization's network, acting as a liaison to Technology Infrastructure
  • Leads the implementation of necessary information security policies, standards, procedures and guidelines, in conjunction with the Office Of Information Security
  • Information security management qualifications such as CISSP - ISSMP, SANs, CISM
  • Hands-on team leadership and management experience, ideally coupled with suitable management qualifications such as an MBA
55

Securities Processing Rep-cgmi Intl Security Lending Resume Examples & Samples

  • Recent College grad with Finance or related degree
  • One year of Financial experience
  • Strong communication skills and a team oriented approach are necessary
  • Good relationships with the Business unit are important to succeed in this role
  • Good understanding of Microsoft Office with focus on Microsoft Excel
56

Security Transaction Analyst Resume Examples & Samples

  • Performs and provides support to all operational processes and clients (executes complex transactions)
  • Participates or coordinates UAT implementation and training activities
  • Properly monitors errors to ensure adherence to audit and control policies and makes recommendations to correct errors
  • Performs and understands the procedures and controls
  • Participates in activities related to compliance
  • Coordinates BAU reports and projects
  • Coordinates and implements improvement solutions with the team/area
  • Supports team in unusual/non-standard situations requiring broad knowledge and experience
  • Provides self-reliant administration of the Investment Funds as a scope of team’s responsibilities
  • Understands all business connections and relations between teams/divisions within an end-to-end process
57

Security Capital Resume Examples & Samples

  • Reconcile institutional separate account holdings from portfolio management system (Advent) to the applicable custodial statements
  • Prepare performance reporting packages for Security Capital’s products
  • Serve as operations liaison for a block of institutional separate accounts
  • Respond to requests and inquiries externally from clients and internally from senior team members
  • Produce periodic client reports and ensure client reporting requirements are met
  • Compile product information for consultant databases and other inquiries from consultants
  • Maintain daily pricing and index data
  • Perform analyses and handle non-routine projects
  • Bachelor’s degree in Business Administration, Accounting or related educational background recommended
  • Strong record of academic achievement
  • One to three years of financial services experience
  • Attention to detail and commitment to excellence on many deadline-oriented projects
  • Well-developed verbal and written communication skills
  • Strong working knowledge of MS Excel (v-lookups, pivot tables), MS Word and Powerpoint desirable
  • Maturity and professionalism to work with confidential information and members of senior team
  • Experience using the Advent Software suite of portfolio management systems (e.g Axys, APX, Moxy) is a plus
  • No travel required
58

O&t-security Processing Analyst Resume Examples & Samples

  • Bachelor degree in Banking & Finance, Accounting, Commerce, relevant Business courses
  • Knowledge on how to operate Multifonds, Bloomberg, Interactive Data Corporation or Reuters will be advantageous
  • Strong computer competence (Microsoft Applications: Word and Excel)
  • Strong accuracy aptitude and detail orientation
  • Strong written, oral communication and interpersonal skills
  • Able to work on staggered hours and work on Singapore public holidays on a rotational basis
59

Security Team Member Resume Examples & Samples

  • Conduct patrols of assigned area of the facility
  • Exhibit exemplary conduct & appearance while on duty
  • Comply with & adhere to all the department's performance, conduct & attendance standards
  • Comply with all the legal & ethical instructions given by the Security Supervisors on duty and the VP of Security
  • Adhere to the Security department's Prime Directives. Investigate and compile accurate incident reports
  • Complete all assigned tasks within the guidelines and deadlines set by the Director of Security, Security Manager and Security Supervisors
  • Acting preemptively to address possible concerns, issues or situations
  • Interact in a professional manner when dealing with other building staff, clients, guests, supervisors and corporate staff
  • Neighborhood patrols should be conducted every hour and a half from doors until end of shift and noted in the patrol log located in the security office
  • Any neighbor complaints are to be reported immediately to the Security Supervisor and Operations Manager
60

Red Team / Attack Lead-cyber Security Resume Examples & Samples

  • Overall 10+ years of Information Security experience with one of the following
  • At least 5 years experience performing network penetration testing
  • At least 5 years experience performing application security assessments
  • At least 5 years experience with Cyber Red Team operations
  • At least 5 years experience performing and leading network exploitation operations
  • U.S. Intelligence Community background highly preferred
  • Demonstrated experience leading and managing cyber operations and personnel
  • Must be able to manage new and existing cyber security requirements, ensure personnel are fully trained and certified via internal JPMC standards, and implement control and risk procedures to insure all Red Team operations are conducted within strict accordance of JPMC Cyber Security standards and directives
  • Advanced knowledge of networking fundamentals (all OSI layers)
  • Advanced knowledge of the Windows and *NIX operating systems to include boot process through understanding of the execution flow of boot time processes
  • Strong knowledge of software exploitation (web, client-server and mobile) on modern operation systems
  • Masters Degree in Engineering, Business Management, or Technology related fields a major plus
  • Expert knowledge of networking protocols and packet analysis
  • Must have the ability to perform targeted penetration tests without use of automated tools
  • Well versed in multiple security technologies such as Firewalls, IDS/IPS, Web Proxies and DLP amongst others
  • Experience with building and operating Cyber Red Team programs
  • Ability to program in C, C++, C#, Objective C, Python, Java, PHP and ASM (x86)
  • Able to work either independently or in a team
  • Able to articulate and visually present complex forensic investigation and analysis results
  • Detailed knowledge of current international best practices in privacy
  • Ability to communicate effectively with business representatives in explaining forensic findings clearly and where necessary, in layman's terms
61

Information Security Resume Examples & Samples

  • Assist in the creation and tracking of business-specific outlier entitlement reports, and Andes related entitlement reports
  • Work with GISOs and managers to remediate identified SoD alerts, escalating where necessary
  • Ensure that reporting and data is accurate and timely following established cross check procedures or developing own methodologies
  • Must have intermediate MS Excel and basic MS Access skills
  • SharePoint knowledge a plus
  • Must have strong written/verbal communication skills
  • Must be a delivery-oriented person and be able to manage multiple projects simultaneously
  • Must have advanced analytical and problem solving skills
  • Background in information security, audit, compliance and/or operational risk a strong plus
  • CISSP, CISM or CISA certifications a strong plus
  • Spanish or Portuguese fluency a plus
62

Fs-itra Security Resume Examples & Samples

  • Lead and deliver ITRA engagements
  • Build strong internal relationships within Advisory and across other services
  • Develop people through effectively supervising, coaching, and mentoring staff
  • Security strategy and transformation / business change / programme management / target operating modelling
  • Strong academic record, 2:1 or above (or equivalent)
  • Team Leadership / Management experience
  • Security certifications such as CISSP, CISA or CISM
  • Track record with a Big 4 consulting firm and/or a blue chip organisation
63

Infrastructure Technology Security Analyst Resume Examples & Samples

  • Formulate security program frameworks to assess impacts and security risks associated with infrastructure technology
  • Develop and execute Information Security strategy to proactively identify risk and drive remediation
  • Provide oversight and governance to infrastructure technology engineering and operating processes
  • Act as point of contact to executive leadership for dimensioning, managing and driving remediation of information security risk within the context of legacy assets
  • Work with various risk and information security teams in presenting recommendations for improvement to technology subject matter experts and management
  • Experience with SQL Reporting Service and - SQL Integration Service
  • Prior experience includes ten years+ in information security or information technology management
  • Ability to work under pressure, meet challenging deadlines
  • Extensive technical background in Windows/Unix Operating systems, security technologies, and network architectures
  • Knowledge of security assessment methodology and risk management process
  • Must be proficient with Microsoft Office Suite, database experience
  • Professional Certifications Required or will be expected to acquire: CISSP, CISA, CISM
  • Strong knowledge of industry standards as they relate to information security management
64

Manager, Global Info Security Automation Resume Examples & Samples

  • Own and manage the process of identifying automation and orchestration opportunities, prioritizing those identified, and executing on those prioritized. This is a cyclical process requiring management as well as development. Priorities should be set for automation that increases efficiency, effectiveness, and/or coverage of security controls and tools in the Enterprise
  • Monitoring for intelligence improvement opportunities by passing Risk-relevant data and metrics through to the Risk Management Practice
  • 5 + years of experience in system automation and orchestration
  • 3 + years in Information Security or supporting Information Security tools and service
  • 7+ years scripting for automation – any language/platform including shell scripting for automation and orchestration
  • Information Security Concepts, principles, and common policies/standards
  • System-level scripting (shellscript, Perl, etc.) and customized automation for security
  • Process orchestration across multiple security services and information systems
65

As-security Analyst Resume Examples & Samples

  • Conducts background research on products and technology to proactively support projects
  • Performs follow-up on incident reports as requested or required to support IPC
  • Assists in the data classification and business impact statements to ensure the projects provide accurate information
  • Assists in the day to day security application and infrastructure support to ensure security compliance
  • Possesses basic communication skills, both written and oral
  • Displays high ethics and trust values
66

Security Access Analyst Resume Examples & Samples

  • Responsible for all access provisioning in the company including all user lifecycles (new hires, terminations, transfers, name changes, promotions, etc.) as well as access for applications
  • Uses knowledge of a wide range of technologies in order to properly assess authentication appropriateness for each individual or application
  • Analyzes each request and use judgment to make decisions around authentication and authorization based on experience, industry best practices, and company policies
  • Identifies security gaps and suggests solutions to mitigate the risks
  • Identifies process inefficiencies and works with all areas to implement process improvements
  • Minimum of a B.S. in Computer Science, MIS or related degree and two (two) years of related experience in information security, identity and access management, risk or a combination of education, training and experience
67

Data Center Control Technician Security Resume Examples & Samples

  • Utilize & maintain standard operating procedures, knowledge articles, etc. for security technologies to drive quick & efficient response to all calls
  • Proactively monitor health of security technologies to avoid loss of service, and impact to customers
  • Assist Information Security & Compliance team in various work queue items, eg: non standard requests for local workstation admin rights, firewall requests, creation & approval of security certificates to support secure transaction processing
  • 1 + years experience in a technical support position supporting security technologies (firewalls, Intrusion Detection, File Encryption, Anti-Virus, Web Application Firewall, etc)
  • Understanding of Windows security fundamentals, networking protocols and firewalls
  • Demonstrated technical documentation experience
  • Commitment to quality, customer service and team environment
  • Clear and effective written and verbal communication and strong interpersonal skills
  • Proficient analysis, troubleshooting, and technical skills
  • Ability to handle multiple tasks and set priorities
68

Security Master Manager Resume Examples & Samples

  • Addressing and researching security set-up and maintenance
  • Ensure security set-up for various product types are updated and accurate across systems for various products including equity, fixed income, swaps, bank debt, loans, futures, options, FX, mortgages and repos
  • Reviewing work prepared by others
  • BA in business/finance or related discipline
  • Prior experience working in a client service environment with various products including equities, fixed income, repurchase agreements, futures, FX, Mortgages, options
  • Experience in Corporate Actions and Ratings a plus
  • Ability to work under tight deadlines
69

Security Vulnerability Management Analyst Resume Examples & Samples

  • Review daily vulnerability reports and analyze new and updated findings for correlation to Barclaycard assets
  • Appropriately assess and define risk ratings for correlated vulnerabilities
  • Maintain vulnerability management database and reporting
  • Work with platform owners towards vulnerability remediation and/or mitigation
  • Maintain weekly vulnerability management meetings with platform owners to allow for discussion surrounding remediation updates and mitigating controls
  • Analyze and asset network vulnerability scans results and import into the vulnerability management program
  • Basic understanding of security techniques and technologies including Intrusion Detection, Threat Analysis and Malware & Trojan Research
  • Experience with Unix, Linux, and Windows based operating systems
  • Experience responding to information security incidents
  • Preferred experience in one or more of the following technologies
  • Decentralized logging infrastructures and automated log file analysis
  • Anomaly detection techniques and technologies
  • Security mechanisms surrounding firewalls, load balancers, switched networks, applications and databases
  • Understanding of networking and application protocols
  • Ability to exercise judgement and discretion in confidential matters with an understanding of appropriate timing and audience
  • Maintains effective communication to management and peers within a collaborative work environment
70

Fs-itra Security Resume Examples & Samples

  • Develop and maintain working relationships with client personnel
  • Security strategy
  • BCP/DR assessment, design, implementation and testing
  • Identity access management
  • Privacy
71

Manager, East Coast Security Resume Examples & Samples

  • Supervises Security Vendors and implements action plans for NBC Universal Corporate Events. Coordinates all Security vendors who operate at 30 Rockefeller Plaza and ensures that standard operating procedures are up to date and adhered to. Security Vendors responsibilities include physical security, screening of patrons for studio tours, audience members attending tapings and live broadcasts for NBC News, Cable and Entertainment shows
  • Oversight of Security vendor contracts, budgets and invoice processing
  • Establish guidelines and training requirements for Security vendors. Ensure patrol readiness by regular inspections and drilling
  • Develop and implement programs that provide for a safe and secure workplace for NBCU employees preventing unauthorized visitors, theft of property and other potential acts of criminal activity
  • Support Emergency Response Manager and Environment Health & Safety managers with all crisis table tops and emergency drills (i.e. evacuation; shelter in place scenarios) for 30 Rockefeller Plaza facilities
  • Assist corporate management (Human Resources, Legal, etc) with investigations when appropriate
  • Play an active role in representing the Security Department on Security and Crisis Management teams
  • Develops and maintains effective business relationships with Local\State\ Federal law enforcement and emergency response government agencies
  • Directs personal protection support for NBCU senior executives
  • 15+ years of law enforcement experience and/or as a Corporate Manager in a Security department
  • Prior experience in a supervisory role for staff or contracted employees
  • Financial acumen
  • Experience managing a budget and working with vendors
  • University degree. Preferred degree in police science or public administration
  • Experience working with the community
  • Strong public speaking skills
  • Demonstrated influencing and negotiating skills
  • Relationships with security vendors and consultants
  • Ability to work well in a team and with divisions external to Security organization (e.g. Human Resources, Legal, EHS, etc)
  • Strong leadership, management, and interpersonal skills, dealing effectively with all levels of management
  • Proven ability to build and sustain excellent relationships at multiple levels and across divisions
72

Americas East Security, VP Resume Examples & Samples

  • Oversee the Americas East security program including: physical security, access control, site risk assessments, local investigations and incident response / management
  • Partner with business leaders across the region to ensure that the security program is well socialized and designed to meet the needs of the business
  • Oversee efforts around investigations and anti-financial crime including leading investigations, overseeing investigations of other staff and coordinating efforts with key stakeholders in the firm
  • Represent Corporate Security at appropriate security meetings/forums internally and throughout the region
  • Maintain strong ties with Local and State law enforcement officials to ensure BlackRock is able to respond appropriately to events or crises
  • Ensure BlackRock remains abreast of industry trends and is continuously improving security and life safety processes and practices to mitigate associated risks
  • Assist with security risk assessments that are in line with our corporate policy to ensure that BlackRock assets are properly protected at sites within the region
  • Provide advice and support to CRSS management around documented risks
  • Provide security support and advice to the BlackRock Events staff for meetings and events within the region for the purpose of protecting the people attending as well as the protection of the firm’s reputation
  • Manage all aspects of guarding service to ensure that the guard force are both efficient and effective in their roles which include
  • Requires a minimum of 10 years in the public safety, law enforcement or security field
  • Requires experience managing staff including direct reports as well as stakeholders without direct reporting lines
  • The position is based in Wilmington, DE. No relocation assistance will be offered
  • Requires experience handling investigations
  • Requires experience evaluating and designing physical security measures
  • Requires strong relationships with law enforcement personnel at the local and state level
  • Requires strong network across security industry
  • Must be available during evenings and weekends to respond to unexpected emergencies and situations at any of Blackrock’s locations
  • Strong interpersonal skills and the ability to act with minimum supervision
  • Experience and skills managing staff
  • Excellent collaboration and interpersonal skills with ability to develop and maintain effective working relationships at all levels within the organization
  • Strong scheduling, prioritizing, and multi-tasking skills and able to work in a fast-paced collaborative team environment
73

Security Processing Rep Resume Examples & Samples

  • This position calls for a conscientious and self –motivated individual to join a team of experienced professionals in providing services to the domestic and offshore fund industry within the Fund Services Support department
  • Work with the end-user and the development team/vendor to identify and clarify business requirements
  • Work with the acceptance test team and the end-users to verify product quality
  • Provide business analysis of processes and systems in place to recommend changes and improvements
  • Maintain successful working relationships with each business unit to better understand and support their system needs
  • Co-ordinate and lead medium to large sized projects following project standards
  • Report to management on the progress and status of projects
  • Provide application support for software products used by the business units
  • Troubleshoot problems raised by the business units
  • Participate in the development of training programs where required
  • Participate/assist in performing fund/series launches, fund mergers and fund conversions
  • Complete other special projects as required
  • Post secondary education in accounting, business or systems applications
  • Minimum 2-3 years work experience in a fund accounting environment
  • Strong product knowledge of a fund accounting application
  • Experience with derivatives instruments such as futures, forwards and options
  • Experience as a business analyst within the financial services industry
  • Ability to work effectively as part of a team in a dynamic, fast paced environment
  • Strong time management and organization skills, with the ability to prioritize and multi-task
  • Experience using vendor software applications (including MS Excel and other MS Office applications)
  • Excellent interpersonal, written and verbal communication skills
74

Information Security Solutions & Engineering Resume Examples & Samples

  • Use the above to undertake and lead where appropriate a variety of IT Security activities and other related activities which together aid in ensuring that the organisation�s assets and IT systems are appropriately protected against unauthorised activities including deliberate or accidental loss
  • Work with client stakeholders and program managers to enable the business to operate within acceptable risk levels
  • Keep GIS Management informed of key risks and issues to enable informed decisions regarding security control implementation and risk management
  • 4+ years proven experience with securing information for cross-functional, cross-platform applications
  • Understanding of the implications, to Barclays , of the laws and regulations assocaited with IT security
75

Information Security Solutions & Engineering Avp Resume Examples & Samples

  • Use the above to undertake and lead where appropriate a variety of IT Security activities and other related activities which together aid in ensuring that the organisations assets and IT systems are appropriately protected against unauthorised activities including deliberate or accidental loss
  • Coordinate with Project Managers and Technical Teams to manage the clients� expectations and demands while maintaining good client relationships
  • 4+ years experience in the financial service industry
  • 4+ years experience with broad IT Security expertise
  • Awareness of the principles, practices, and techniques related to IT Security
  • Understanding of the implications, to Barclays, of the laws and regulations associated with IT security
76

Security Test Analyst for GSO Resume Examples & Samples

  • Provide subject matter expertise with reference to web application and vulnerability testing procedures
  • Provide expertise and experience in information and data collection systems; data acquisition; web exploitation technologies; web analysis/evaluation attack processes and systems dissemination methods and tools
  • Must demonstrate and maintain current knowledge of industry trends and technologies
  • This position is responsible for performing or assisting with configuring, integrating, supporting and administering all information security operations including application, database, desktop, network, server, remote device, network access and web security
  • Security Testing Analysts often take full responsibility for delivering projects by themselves, but also must be able to collaborate with larger teams as necessary
  • Penetration testing of web applications
  • Risk assessment of vulnerabilities
  • Vulnerability reporting
  • Development of internal tools useful for penetration testing
  • Experience in leading projects related to security application and security test analyses
  • Consults with management and reviews project proposals to determine goals, time frame, funding limitations, procedures for accomplishing project, and allocation of resources
  • Utilizes industry-accepted project management principles and firm-established project management tools and processes to direct project teams in the definition, planning and execution of complex long-term projects crossing multiple disciplines and geographies
  • Utilizes industry-accepted methodologies and processes to bring projects in on schedule, within budget, and to the customer's requirements
77

Tripwire Security Analyst Resume Examples & Samples

  • College degree in a technical field of study relevant to the position
  • Capability to operate in a highly technical environment
  • Two years of experience with Tripwire related software components and architecture including, but not limited, to Tripwire Enterprise Manager and the IP360 products
  • Experience creating and deploying customized Tripwire rules, policies and reports
  • Knowledge of networking and the basics of LAN administration
  • Experience working with both Unix, Linux and Windows platforms
  • Excellent oral and written skills to interface with all user/technical communities
  • Good time management/organization skills necessary to assist in developing IT processes/procedures and to manage own work queue, perform escalations, and assist in team projects $
  • Knowledge of Service Desk, Cloakware Password Authority and CyberArk
  • Knowledge of .Net or PERL
78

Certification Services Security Analyst Resume Examples & Samples

  • Verifies all security processes of the Certification Services Group conforming to the applicable industry and Bank’s security regulations, policies and standards
  • Ensures client’s concerns and questions on Certification processes, tools and reporting are adequately addressed with the provision of security standards, regulations and policies where applicable
  • Assists in producing, reviewing and updating of documentation and reports to ensure accuracy, completeness and compliancy to applicable standards and/or regulations
  • Understanding of the banks Change, Incident and problem management processes and the Remedy tool
  • Demonstrates basic knowledge of the evolving information security system and application environment, network concepts and protocols, and information security concepts/framework
  • Speaking knowledge of French
79

Perimeter Security Integrations Analyst Resume Examples & Samples

  • Years of Related Experience: 2-4
  • Demonstrated skills with computer networking and desirable to have Unix/Linux skills
  • ITIL certification preferred
  • Attention to detail – ability to interpret and implement standard
  • Team player with ability to work under pressure
  • Team player with the ability to work effectively with minimal supervision
  • Ability to work as part of a team with remote colleagues in other countries
80

Security Settlements Manager Resume Examples & Samples

  • Responsible for the processing and problem solving of all settlement and registration activities for the Hong Kong market
  • Required to work closely with marketing and services staff to provide quality service to our customers
  • Ad hoc project for new product or new system enhancement
  • Collect/deliver physical certificates & document from/to client's office for junior position
81

Cyber Security Resume Examples & Samples

  • Demonstrating a deep understanding of digital forensic skills, techniques and tools necessary for conducting live forensics on critical systems, and being able to produce detailed analysis of the root cause of any incidents
  • Leveraging practical experience to support complex fraud investigations
  • Significant prior experience working in the computer forensics, cybercrime investigation and other related fields with a combination of both public and private sector experience preferred
  • A proven track record in live forensics, log-file analysis, network forensics and financial malware reverse engineering
  • Knowledge of computer forensic best practices and industry standard methodologies for investigating to network threats (preferably familiar with EnCase, FTK and X-Ways forensic suites)
  • Bachelors Degree in Computer Science or other Technology related fields preferred
  • Ability to communicate with other industry forensic professionals to ensure solid partnerships with key external stakeholders to ensure that the forensic investigation process remains at a word class level
82

Infrastructure Technology Security Analyst Resume Examples & Samples

  • Define and execute a comprehensive infrastructure security assessment strategy for achieving excellent service quality, productivity and end-users experiences
  • Develop and manage security assessment service performance through tracking/reporting and active engagement with CATE/CTI stakeholders for continuous service improvement
  • Coach and develop staff to sustain a high standard of capability and foster an engaged workforce for Infrastructure Technology Information Security (IT IS)
83

Information Risk Lead-cyber Security Resume Examples & Samples

  • Well versed in all areas of application, network, and system security
  • An in-depth knowledge of data protection strategies, network and system vulnerabilities, and SIEM
  • Experience managing a team at a senior level
  • Ability to drive and craft senior level reporting and metrics
  • Desire to drive change and deliver creative solutions
  • Understanding goals beyond that of technology, and an ability to integrate security solutions with business processes
  • Strong analytical mind and approach to problem solving
  • Experience working in the financial services industry with knowledge of regulations such as GLBA, PCI, and SOX
  • 7 to 10 years of Technology, IT Risk/Security or Security Audit experience
  • Demonstrated ability to deliver results and work hard
  • BA/BS Degree
84

Security Infrastructure Technician Resume Examples & Samples

  • At least 1 year experience with utilizing, configuring, and installing software for connecting distributed software and services across heterogeneous platforms
  • At least 2 years experience within a total information technology (IT) environment
  • At least 2 years Linux server experience
  • Preferred Oracle WebLogic, Oracle Access Manager and/or Oracle Identity Manager experience
  • Oracle WebLogic
  • Oracle Access Manager
  • Capacity planning and management
  • Web trends and directions
  • Performance measures and tuning
  • Contingency and disaster recovery
  • Middleware
  • IT architecture
  • System and technical integration
85

Information Security Architecture Generalist Resume Examples & Samples

  • Provide specific security expertise to engineering teams. Areas include secure network design, database access, security testing, authentication methods,implementing encryption, entitlement design, logging, input validation, secure storage design, secure data transfer
  • Create documentation and guidance on the secure implementation of new technologies in the firm. This involves liaising with other technology subject matter experts to build consensus, outlining areas of improvement in written form and explaining concerns early on
  • Knowledge of the common mobile security vulnerabilities and security products available on the market
  • Ability to evaluate technical and functional specifications early within the software development process, identify possible threats or areas of weakness
  • Experience in taking part and contributing to design sessions
  • Platform: Although this role is not systems administration position, the candidate must have deep knowledge of at least one primary operating system(Unix or Windows), the configuration and management of that platform at an enterprise scale, the security risks to that platform, and how to mitigate those risks
  • Mobile: The candidate will be expected to understand thoroughly the basic architecture of mobile applications, how the Apple iOS works and the common threats that affect any mobile device
  • Knowledge of Single Sign On technologies such as SAML, Kerberos, and Siteminder
  • Some experience in testing tools, at least one of Fortify, OunceLabs,AppScan, WebInspect, Burp. The successful candidate will be able to explain the hows and whys of the tools, as well as being experienced in using them
86

Cyber Security Professionals Scotland Cyber Hub Resume Examples & Samples

  • Professional Information Security certification such as CISSP,CISA or CISM
  • Proven track record of delivery of large security improvement programmes
  • Experience in industry sectors: Financial Services, Pharmaceutical, Telecommunications and Utilities
  • Strategic IT planning / Information Security Strategy
  • Risk and Regulatory frameworks (ITIL, CobIT, ISO 27001, PCI-DSS etc)
  • Risk Based Information Assurance, IT Internal Audit scoping and planning for security configuration and controls assessments over OS/Database/Networks/Infrastructure, processes and organisations
  • Risk Assessment Analysis
  • Security Organisational Design
  • Scada industrial controls
  • Mobile payments
  • SOC/SIEMS
  • Privacy & data protection implementation
87

Windows Security Analyst Ayala Avenue, Makati Resume Examples & Samples

  • You should implement processes to capturing details of application installation and windows configuration across the Macquarie fleet of computers
  • Ongoing review and management of elevated access for the Macquarie Fleet of computers
  • Reporting, and analysis, and recommendation for action and follow of configuration and application drift from
  • Management of the processes and technologies supporting the provision of elevated access for applications using Avecto Privilege Guard
88

Information Security Enginr Resume Examples & Samples

  • Assists with overall responsibility of security design through the evaluation, creation, and monitoring of the Bank's security architecture and design models. Reviews application and systems development for security issues
  • Reviews the monitoring process of security logs and alarms; certifies that Security Analysts are reviewing logs, alarms following procedures and policies; escalates issues to management as appropriate
  • Produces reports and presentations for management including security recommendations on technology security vulnerabilities, both planned in place and future direction
  • Enhances or modifies security controls based on known or predicted exploits of technology deficiencies in regard to security principals
  • Performs other duties as assigned
  • Bachelor’s Degree in IT, Computer Science required
  • 2 years experience in developing and monitoring an information security function; 1 – 2 years of Banking/Finance Industry
  • Working knowledge and experience in n-tier network security architectures
  • Understanding of penetration techniques
  • Working knowledge of information security risks and counter measures for Windows and Unix/Linux platforms
89

Information Security Enginr Senior Resume Examples & Samples

  • Assists with security design by evaluating, creating/improving and monitoring the Bank's security architecture and design models
  • Conducts risk assessment to determine security vulnerability, and makes recommendations for application design, systems development and risk mitigation
  • Executes security controls to prevent unauthorized users from accessing or jeopardizing company information. Identifies potential threats, researches attempted efforts to compromise security controls, examines security violations to determine causes, possible solutions and remedial actions required to ensure data security, and presents findings to management. Enhances or modifies security controls based on deficiencies and violations as directed by management
  • Assists in designing and monitoring the Bank's firewall and intrusion systems, setting parameters for virus scanning, encryption technology, etc
  • Assists with the development, implementation, and monitoring of security policies, procedures, and processes, and educates users to ensure that users understand and adhere to them
  • Collects and compiles historical data on system access and generates reports and analyses. Prepares reports and presentations for management, including security findings and recommendations and penetration and vulnerability analysis of various security technologies
  • Performs technical reviews of documentation to ensure computer security integration and compliance with all banking regulations (FDIC, GLBA, CA SB1386, etc.)
  • Coordinate closely with Software Security Architecture Team and development teams
  • Understand application development and how web applications work as well as underlying communication and networking technologies
  • Bachelor’s Degree in Information Technology required
  • Required license(s) or certification(s) CISSP – Certified Information Systems Security Professional; CCSP – Cisco Certified Security Professional; GIAC – Global Information Assurance Certification; CISA – Certified Information Systems Auditor; CISM – Certified Information Security Manager preferred
  • 2 to 3 years of IT experience in banking or financial industry
  • 5 – 7 years of experience in monitoring, developing and implementation of info security systems
  • Hands-on experience assessing security controls and managing risk
  • Hands-on experience in the following areas: network and information system security, vulnerability assessments, penetration testing, SIEM tools, DLP solutions, IDS & IPS and Active Directory
90

Software Security Analyst Resume Examples & Samples

  • 1+ years of experience with STIG or application security checklist validation and IAVM software patching
  • 1+ years of experience with Windows-based server configuration
  • 1+ years of experience with network, domain, and Active Directory configuration
  • 1+ years of experience with the C&A process
  • Active Secret clearance
  • Experience with DoD and FSO security policy, regulations, and POA&M process
  • Experience with Vulnerability Management System (VMS), eMASS (Enterprise Mission Assurance Support Service), and Xacta IA Manager
  • Experience with DIACAP or DoD RMF for IT
  • Experience with Microsoft-based Web application configuration, including Windows Server, IIS, SQL Server, or WCF Web service
  • Experience with Linux or UNIX server configuration
  • Experience with the software development life cycle, including Agile, Spiral, or Unified
  • Experience with penetration testing or static code scanning tools, including HP Web Inspect and HP Fortify
  • BA or BS degree in Network Engineering, Network Security, CS, Computer Engineering, Systems Engineering, or a related field
  • DoD 8570 IAT level II Certification
91

Cyber Security Strategist, Lead Resume Examples & Samples

  • 5+ years of experience in a security role
  • Experience with information security program frameworks, including ISO 27001/2, COBIT, or NIST
  • Ability to support senior leaders in fostering positive client relationships, identifying new business opportunities with existing clients, and developing new intellectual capital
  • Ability to be a self-starter and thrive in a fast-paced consulting environment-Ability to travel up to 75% of the time-BA or BS degree
  • Experience with multiple market verticals, including financial services, healthcare, energy, consumer products, high-technology, and pharmaceuticals-Experience with data loss prevention tools, including McAfee, Symantec, Websense, or Verdasys preferred
  • Experience with industry leading APT detection tools, including FireEye and Damballa preferred
  • Knowledge of integrating data loss prevention, APT, and vulnerability management tools into SIEM and eGRC products-Knowledge of various risk management frameworks, including NIST 800-30-Ability to synthesize and analyze multiple views and data sets
  • IS Certifications, including CISSP preferred
92

Cyber Security Strategist, Senior Resume Examples & Samples

  • 3+ years of experience in a security role
  • Experience with Cloud security, application migration, and IDAM re-engineering-Ability to lead fast-paced delivery in challenging commercial environments
  • Experience with IAM risk analytics tools, including Securonix and Gurucul preferred
93

Information Security Intern Resume Examples & Samples

  • Internal and External Penetration Testing (including wireless security and social engineering)
  • Reviews of operating system security (including Microsoft Windows, Active Directory, and *NIX)
  • Reviews of network architecture and security of various industry accepted networking platforms
  • Physical Security and Workstation Configuration Reviews
  • Database, Virtualization, Mobile Device, and Web Server Security Reviews
  • Prepare client deliverables including reports or other necessary documentation to support the work performed
  • Microsoft Active Directory
  • Experienced with common firewalls and network controls
  • Wireless Networking
  • Management Information Systems
94

Vedoucí Týmu Information Security Resume Examples & Samples

  • Design, develop, test, implement and support BI systems within Enterprise Data Warehouse
  • Prepare documentations during different phases of the Software Development Life Cycle, ensuring internal standards and procedures have been adhered to
  • Solid experience in web development using HTML 5, jQuery and CSS3
  • Experience with server-sided scripting and building web services (ASP.NET, JSP or equivalent)
  • Knowledge on mobile app programming (phone/tablet devices) will be an asset, but not required
  • Good verbal and interpersonal skills
  • Web Design: HTML 5, jQuery, C#, VB.NET
  • Mobile App Design: WebKit, PhoneGap, BlackBerry WebWorks
  • BI Platforms: Cognos, Business Objects
  • Database environments: Microsoft SQL Server 2005, DB2
95

CO OP Audit Security & Investigation Control Functions Audit Resume Examples & Samples

  • Assist in audit planning by obtaining and reviewing background information relating to the units/processes to be audited
  • Execute (and if necessary, develop) detailed audit steps to evaluate the design and operating effectiveness of key controls
  • Validate exceptions and findings identified in executing the detailed audit steps
  • Document work papers and reporting to management
  • Assist in other duties as assigned
  • Strong accounting and/or business background with a desire to pursue an accounting designation
  • Ability to apply his/her understanding of accounting standards and principles
  • Working knowledge of Microsoft applications such as Word, Excel and Power Point, as well as with Lotus Notes databases
  • Good judgment and time management skills
96

Co Op Investigations Ontario Security & Investigations Resume Examples & Samples

  • Conduct investigative research and analysis on behalf of Senior Investigators and line management using the Bank‘s systems and Open Source research tools
  • Participate in and/or lead specific projects as assigned
  • Prepare reports using various MS Office programs and Adobe software
  • The successful candidate should have strong analytical skills
  • A keen interest in criminology and associated areas would be an asset
  • Strong communication and time management skills are essential
97

Co Op Investigations Ontario Security & Investigations Resume Examples & Samples

  • Monitor and collect real time and near real time information as it relates to security issues through alarm systems, access control, CCTV, internal reporting and media sources
  • Use established criteria to categorize and process low to medium complexity information of relevance to security risk
  • Conduct live monitoring and access control for global High Value High Risk facilities through CCTV, access control systems and internal reporting
  • Through the programming, monitoring and control of physical access control systems, ensure a safe and secure environment for staff in designated facilities
  • Support Scotiabank through the use of video retrieval systems to prepare images and video for use by internal and external stakeholders
  • Track and report on the international movement of designated Scotiabank staff worldwide, in order to provide them with detailed information on security threats that will allow them to mitigate risks
  • Provide administrative support to the Manager, Compliance & Operations as needed
  • The successful candidate should have strong communication and analytical skills
  • A keen interest in criminology, law enforcement and associated areas would be an asset
  • Ability to work in a team environment but comfortable executing independent projects
  • Proficient in Microsoft Office; Crystal Reports and Visual Basic an asset
98

Co Op Security Analysis Projects Resume Examples & Samples

  • Participate and/or lead various analytical projects within the Security & Investigation department
  • The successful candidate will have a strong grounding in international conflict studies, or a similar field, and be able to analysis security risks arising from political instability, internal or external conflict, and transnational crime
  • Strong analytical and writing skills will be key, as the successful candidate will be required to author documents that provide analysis of security risks affecting the bank internationally
  • French and/or Spanish language skills
  • Knowledge of banking operations
99

Database Security Analyst Resume Examples & Samples

  • The DSA is responsible for the operations and support of the Database Security Compliance Program within IS&C and across the Scotiabank Group
  • The DSA is responsible for developing and/or enhancing the strategies and processes to identify, analyze and communicate application vulnerabilities as per the published remediation and escalation process flow
  • The DSA is responsible for adherence to an established process flow that ensures development support teams, infrastructure support teams, and business risk owners implement control measures that effectively mitigate or eliminate the identified risk
  • The DSA is responsible for timely and accurate reporting of all findings to the development teams, appropriate levels of management and the business risk owner
  • The DSA must maintain currency in the database security space to ensure database security principles are implemented and integrated into the Bank’s database security assessment program
  • Must have 5 years of hands-on working experience in database security with a strong understanding of database security vulnerabilities and potentials threats
  • Must have an excellent knowledge of software development security principles and best practices
  • Must have strong analytical and diagnostic skills with a sound understanding of databases and database principles
  • Must have experience in performing database security compliance and vulnerability assessments
  • Must have a comprehensive understanding of the following relational & dimensional database types: 1) Oracle; 2) MS SQL Server; 3) Sybase; and 4) DB2 LUW (Linux, Unix, Windows)
  • Must have experience with database security testing tools and practices
  • Must have the ability to work successfully in a fast-paced deadline-oriented environment
  • Exposure to information provided by recognized organizations such as OSVDB (Open Source Vulnerability Database) and CVE (Common Vulnerabilities and Exposures)
100

Security Master Resume Examples & Samples

  • Enters data
  • Generates statements
  • Opens and closes accounts
  • Communicates with internal and external partners/mutual fund companies
  • Transfers bonds
  • Demonstrates ability to identify and resolve problems
  • Able to effectively communicate both orally and in written format
  • Effectively provide client service dealing with issues to internal clients, i.e..; Administrators, Admin Assistants, Trust Accounting, etc
  • Proficient with Microsoft Office products and programs
  • Able to multitask with minimal supervision
  • Good analytical and problem solving skills, including attention to detail
101

Intermediate Security Analyst Resume Examples & Samples

  • Support and coordinate all access request activities i.e. application and system access, ID set-up and removals
  • Maintain communication with customers regarding Access Management scope, key dates, troubleshooting updates and confirming of requirements
  • Maintain and monitor high-volume email inbox in accordance to established SLA
  • Liaise with our internal and external service partners for successful delivery of Access services
  • Effectively coordinate activity with any other team or provisioning partners where more are involved
  • Participate in projects and provide status to team and management
  • Re certification of Privileged accounts quarterly
  • Be a main contributor to audit
  • Update tools and systems where required e.g. ITIM, Asset Center, Stat Tracker, Remedy and Aveksa etc
  • Assist in creating/updating supporting documentation and Access activity reports
  • Strong technical skills and experience, Security background an asset
  • Knowledge of Mainframe, mid-range and Microsoft Exchange/Outlook
  • I.T. Education and Microsoft Certifications
  • ITIL Certification would be an asset
  • Strong communications skills. Both verbal and written
  • Strong Customer service orientation and focus
  • Strong process skills
  • Ability to multi-task with keen attention to detail, Quick learner
  • Demonstrates good communication and interpersonal skills
  • Exhibits good problem solving and analytical skills
102

Security Transfers Clerk Resume Examples & Samples

  • Processes transactions
  • Supports wire transfers
  • Provides support for bill pay
  • Enters trades
  • Generates reports
  • Demonstrate a willingness to learn and apply new concepts, accept change and grow within the position
103

Information Security Resume Examples & Samples

  • Security Analysis / Assessment - Analyzes and assesses vulnerabilities in the software products, services, and/or infrastructure. Investigates available tools and countermeasures to remedy the detected vulnerabilities, and recommends solutions and best practices. Tests for compliance against security policies and procedures. May assist in the creation, implementation, and/or management of security solutions
  • Incident Response / Intrusion Analysis Prepares for and supports rapid response to security incidents. Analyzes and assesses incidents using available analysis and forensics tools and processes. Performs Root Cause Analysis (RCA) to understand control break-downs and/or gaps and recommends enhancements to the existing security control portfolio
  • Security Incident and Event Management (SIEM) and Analysis Strong working knowledge of SIEM tools such as ArcSight or QRadar including new rule creation, rule modification, metrics/reporting and integrating new feeds and logs into SIEM platform. Experience with analysis platforms such as xpolog, Splunk, Tibco, Graylog2 is highly desirable
  • Scripting / Programming Strong working knowledge of scripting languages such as Python, Perl, regex, etc
  • Malware / Malware Defenses - Strong working knowledge of how both exploits and malware work as well as common delivery mechanisms. Knowledge of common mitigation steps and advanced innovative approaches to prevent and detect advanced attacks at the network and endpoint
  • A bachelors degree in a technical discipline and a professional certification, CISSP, CISM or related SANs certifications preferred
  • A minimum of 5 years of professional work experience in the information security realm
  • Willingness to learn, a desire to collaborate with others, and the drive to take on additional responsibilities when called upon
  • Pursue job-related growth and knowledge via higher education, certification, and training
  • Exposure to financial services systems and processes preferably in Investment Banking or from Consultancy
  • Self-motivated individual, comfortable working without close supervision and with an ability to work to deadlines
  • Computer Networking - A solid foundational understanding of TCP/IP and networks to include firewalls, routers, proxies, ACLs, etc. Ability to analyze packet capture data using common tools such as TCPView, Wireshark, etc
  • Security Technologies - Experience with technologies used as part of a toolset to prevent, detect, and/or identify security breaches such as Hadoop, NoSQL, IDS/IPS, Splunk, SIEM systems, as well as advanced network and endpoint solutions to detect and/or prevent advanced attacks
  • Support for Operation Workflows Ability to support existing operational workflows in a timely, effective and detailed manner
104

Global Cyber Security Audit Forensics & Investigations Resume Examples & Samples

  • Provide audit coverage of the key controls supporting cybersecurity with specific focus on cybersecurity forensics and investigation processes
  • Partner with colleagues, stakeholders and control community members to evaluate, test and report on the adequacy and effectiveness of controls in relation to associated cybersecurity risks. This may be achieved through specific audit reviews or direct participation in key cybersecurity projects
  • 10 or more years of total work experience, with at least 8 years IT Security, Cybersecurity or Audit with significant prior experience working in the computer forensics, cybercrime investigation and other related fields with a combination of both public and private sector experience preferred
  • Knowledge of Intrusion Detection System (IDS) tools and applications and common adversary tactics, techniques, and procedures (TTPs) in assigned area of responsibility (e.g. historical country-specific TTPs, emerging capabilities)
  • Knowledge of types of digital forensics data and how to recognize them plus skill in using binary analysis tools (e.g. Hexedit, command code xxd, hexdump), tuning sensors and detecting host and network-based intrusions via intrusion detection technologies (e.g.Snort)
  • Knowledge of computer forensic best practices and industry standard methodologies for investigating network threats (preferably familiar with EnCase, FTK and X-Ways forensic suites)
  • A proven track record in live forensics, log-file analysis, network forensics, financial malware reverse engineering and data exfiltration
  • Experience with investigating large data compromise events as well as online banking fraud
  • Expert knowledge of networking protocols and packet analysis and familiar with common cryptography algorithms
  • Ability to automate tasks using a scripting language (e.g. Python, Perl, Ruby, etc) and broad knowledge in a variety of programming languages (e.g. C/C++, Java, x86 Assembly, JavaScript)
  • Computer Science or related technical degree from an accredited institution
  • Memberships and participation in relevant professional associations
  • Ability to build strong partnerships across the technology and business teams
105

VP Global Cyber Security Audit Threat & Intelligence Resume Examples & Samples

  • Establish strong relationships with senior Global Cyber Security leadership, related controls groups and business auditors
  • Provide audit coverage of the key controls supporting cybersecurity with specific focus on cybersecurity threat and intelligence processes
  • Share knowledge, techniques and toolsets with colleagues within the team to build proficiency in the Cyber Security Audit Team
  • At least 10 years of total work experience, with at least 8 years IT Security, Cybersecurity or Audit with significant prior incident response and/or investigative experience plus knowledge of computer forensics both host and network based
  • Experience in network intrusion methods, network containment, and segregation techniques and technologies
  • Knowledge of IP Routing protocols and proficiency with Windows & UNIX
  • Ability to apply a knowledge of attacker capabilities, intentions, motives, and historical operations/targets to inform strategies
  • Experience conducting deep level research in international cyber threat issues and developing papers and presentation materials for distribution and briefings
  • Good understanding of national and international security issues and a thorough understanding of the related government, non-government and academic entities
  • Intelligence Community experience and/or experience at an international institution conducting cyber or security/intelligence related work
  • Thorough knowledge of United States Government entities, specifically understanding of White House, Congress, U.S. Military, and the Intelligence and Law Enforcement Communities
  • Knowledge of international bodies (ex: UN, EU, IEEE, ITU) that are involved in cybersecurity, as well as the academic and think tank entities involved in the discussion
  • Master degree in international relations or a cyber-relevant field
  • Enthusiastic, self-motivated, willing to be challenged and take personal responsibility
  • Ability to multitask and execute audit activities with minimal supervision
106

VP Global Cyber Security Audit Cybersecurity Operations Resume Examples & Samples

  • Participate in all aspects of audit activities including risk assessments, planning, testing, evaluation, report creation, documentation, and determining effectiveness of risk mitigation plans across the Global Cyber Security business
  • Provide audit coverage of the key controls supporting cybersecurity with specific focus on cybersecurity operations processes
  • Assist in the development and analysis of key metrics to identify trends in cybersecurity
  • Up to approximately 15% travel required
  • 10 or more years of total work experience, with at least 8 years in IT Security, Cybersecurity or Audit and significant hands-on experience within a cybersecurity operations environment
  • Extensive Technology, IT Risk/Security or Security Audit experience, IT Forensics, & ITIL (Incident, Problem, Change Management) methodology
  • A sound understanding of TCP/IP and networking concepts and experience performing in-depth packet analysis
  • Solid and demonstrable comprehension of data protection strategies, network and system vulnerabilities, Security Information and Event Management (SIEM), malware, emerging threats, attacks, and vulnerability management
  • Knowledge of the capabilities and functionality associated with various technologies for organizing and managing information (e.g. databases, bookmarking engines)
  • Understanding of system and application security threats and vulnerabilities (e.g. buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code) and understanding of source code, hex, binary, regular expressions, etc
  • Experience with reviewing raw log files, data correlation, and analysis (i.e. firewall, network flow, IDS, system logs) and use of IDS, IPS, and/or other signature matching technology
  • Familiarity with Linux and Windows operating systems and at least one scripting language (e.g. Python, Perl)
  • Minimum of one relevant professional certification- (CISA, CISSP, CISM, MCSD, GIAC, ITIL or CEH preferred)
  • Ability to present complex solutions and methods to a general community, effective verbal and written communication skills
  • Ability to build strong partnerships across the technology and business teams and able to multitask and execute audit activities with minimal supervision
  • Independent thinking, willingness to "step outside the box" and take reasonable, calculated risks and demonstrated ability to be reliable and flexible
  • Experience in a fast paced, high stress, support environment and able to follow detailed process and procedure documentation
107

Cyber Security Information Risk Lead Resume Examples & Samples

  • A subject matter expert in many information security disciplines
  • Experience managing complex program and project delivery at a senior level with both direct and matrix responsibilities
  • Ability to build a strong people network within a large organization - effecting change and communicating clearly
  • 7+ years of Technology, IT Risk/Security or Security Audit experience, IT Forensics, & ITIL (Incident, Problem, Change Management) methodology
  • Excellent communication skills (both written and verbal)
  • Flexible and adaptable in response to changing demands
  • Bachelor’s of Science Degree or related experience in Computer Science, Computer Engineering, Voice/Data Networking, Information Assurance or related fields
  • Master’s of Science Degree or related experience in Computer Science, Computer Engineering, Voice/Data Networking, Information Assurance or related fields
  • 10-15 years progressive experience including first-hand technical experience or front-line management in multiple disciplines (ie. System Administration, DBA, Incident Management, Network Engineering, IT Security Monitoring & Incident Response, IT Forensic investigations, etc)
108

CIB Cyber Security Resume Examples & Samples

  • Working with engineering teams to develop scope, planning, estimates and schedules
  • Lead on the delivery of requirements for authentication product integration
  • Lead operational impact analysis – Review proposed solutions, develop use cases to explain/demonstrate requirements/specifications to key stakeholders
  • Provide integration expertise to Internal Partner groups and Cyber Security teams
  • Lead all end to end privilege access integration efforts, ensuring quality, process and adherence to timelines
  • Develop and maintain integration best practices for Internal Partner groups
  • Partner with other organizations and technology functions to ensure solutions are designed for reliability
  • Assure conformance to compliance methods, standards and practices
  • Develop evergreen approach to monitoring compliance, with remediation processes well understood and automated where possible
109

Oracle Security DBA Resume Examples & Samples

  • Perform different security audits (i.e. DB, Application, NT/OS security audits)
  • Technical knowledge and concept of security controls (audits, logs, etc.)
  • Plan, coordinate, implement and drive different security initiatives including account clean up, policy enforcement, setting new security controls
  • Participate and work on different institutional audits and reviews like CSA, GSA, D&T
  • From time to time, develop/execute SQL codes for audit/cleanup purposes
  • Execute multiple parallel tasks
  • Communicate, Coordinate and drive audits/initiatives/meetings to different teams
  • Working knowledge using Oracle SQL or PL/SQL
  • Has basic Oracle database administration knowledge
  • Database security concept is preferred but not required
  • Experience in application and/or database audits is an advantage
  • Working knowledge using MS Office with emphasis on Excel
  • Comfortable using English language and working with different teams on different regions
  • Capable of working with less supervision
110

Security Analysts / Specialists Resume Examples & Samples

  • Monitor tools /consoles for respective accounts (SEPM, Snare, Tripwire, Symantec)
  • Update server/machine that out of dated definition
  • Malware Management
  • SEP installation
  • Machine health check
  • Run reports, objectives and generate audit logs
  • Investigate any changed elements
  • Analyze the logs to identify various Audit Logon Events, Audit Policy Changes, and Audit System Events, Analyze raw report for login / logouts, query on failed logins
  • Distribute daily/weekly/monthly reports
  • Escalate unexplained changes to SPGs or ASO
  • Investigate alerts in SEPM consoles if machine infected
  • Contact user/lab admin/site service to remediate
  • Quarterly Access review - Idle accounts, privilege accounts, terminated employees
  • Raise incident / request /change and follow ups
  • As Security Analyst you will be responsible for situational security awareness by gathering data from a variety of systems and normalizing/correlating the information. The SOC provides real-time (or near real-time) detection and reaction services for information security incidents within the organizations enterprise
  • Specialized in installation, configuration and troubleshooting on RSA enVision Appliance & NetWitness, DLP and Archer
  • This is a 24/7 Shift role
  • Identity Access Management in Microsoft Active Directory/Unix/Mainframe platform
  • Identity Access Management Microsoft Forefront Product
  • Technical Hands-on mentality to perform Level 1.5 to 2 support with limited supervision
  • Deliver daily, weekly and monthly reports on request
  • Audit & Compliance
  • Work through technical issues reported into Incident Management system by end-customers and HP Internal team
  • Degree or Diploma in computer engineering or related disciplines. (Fresh Graduates are welcome)
  • 1 year of experience in Security Field / Threat Management (Fresh Graduates are welcome)
  • 1 year operational outsourcing experience
  • Fluent spoken and written English proficiency
  • Must be able to demonstrate troubleshooting and documentation skills
  • Good knowledge of Enterprise Applications (e.g. operating systems, standard business applications, web-based applications, etc…)
  • General knowledge of industry regulations and compliance concerns (e.g. PCI, SOX, HIPPA)
111

Security Provisioning Analyst Resume Examples & Samples

  • Typically requires 1-3 years general experience, or equivalent combination of experience and college level education
  • Superior skills in both written and verbal communication
  • Experience in customer facing role either remote or face to face
  • Computer proficiency with applicable software applications (for example Microsoft Office, CAD, Adobe Suite, programming
  • Problem solving skills
  • Excellent fluency in language to be supported
  • Familiarity with computer technology
  • Knowledge of Knowledge Management Systems and appropriate documentation to the system
112

Security Intelligence Researcher Resume Examples & Samples

  • Leads multiple project teams of other researchers and internal and outsourced development partners responsible for all stages of intelligence practice including solution design, analysis, coding, testing, and integration
  • Manages and expands relationships with internal and outsourced development partners on software systems design and development
  • Reviews and evaluates designs and project activities for compliance with solutions design and development guidelines and standards; provides tangible feedback to improve product quality and mitigate failure risk
  • Provides domain-specific expertise and overall intelligence leadership and perspective to cross-organization projects, programs, and activities
  • Drives innovation and integration of new technologies into projects and activities in the Threat Intelligence team
  • Provides guidance and mentoring to less-experienced staff members
  • Minimum 6-10 years experience
  • Extensive experience in OSINT, HUMINT and/or SIGINT
  • Designing and integrating solutions running on multiple platform types
  • Deep experience and understanding of relevant OPSEC tradecraft
  • Ability to effectively communicate solutions, design proposals and negotiate at senior management levels
113

Security Intelligence Researcher Arcsight Resume Examples & Samples

  • Lead the efforts in advanced incident response and targeted threat hunting
  • Collaborate with teammates to develop focused security intelligence that improves our incident response capabilities, our proprietary technology and protects our clients
  • Serve as a top subject matter expert in key elements of the practice (e.g. Behavioral Profiling, Forensics, Malware Analysis, Security Technologies...)
  • Work as an internal subject matter expert for other departments, including marketing, product management, and the broader security research team
  • Develop tools to ensure quality and accuracy of ArcSight products applied to security scenarios
  • SIEM experience (highly desirable ArcSight ESM)
  • Network experience (Protocols, Ports, Router, Switch)
  • OS administration experience (Windows/Unix/Linux)
  • Basic Script language programming (desirable PERL)
  • Must possess excellent interpersonal and communication skills
  • Time/project management
  • Agile methodology (desirable)
114

HP Security Research Operations Analyst Resume Examples & Samples

  • Bachelor’s degree in Management Information Systems / Computer Science or equivalent experience
  • Minimum of 12 years of related experience or a Master’s degree and a minimum of 10 years of experience
  • Advanced verbal and written communication skills and leadership skills
  • Leadership experience with infrastructure environments (e.g. operating system, hardware, data center, security, network, voice, end user and server / web related applications)
  • Leadership experience with business Information Technology (IT) applications (e.g. supply chain, customer relationship management, Human Resources (HR), finance)
  • Strong experience in scripting and / or programming language
  • Preferred technology experience includes: Django/Python, Apache, Ruby on Rails, Encryption (pgp/gpg), grsecurity, Mongo, Hadoop, Vertica, ESX/VSphere
  • Leadership experience with implementation, problem analysis and solutioning of infrastructure and business application environments
  • Master knowledge and experience with Information Technology Infrastructure Library (ITIL) Advanced Web Technologies
  • Ability to translate business needs into technical requirements and solutions
  • Exhibits a high level of initiative and integrity
  • Good organizational and analytical skills
  • Possess creative ability, consulting skills, leadership qualities, credibility and self-confidence
  • Demonstrated ability to work with geographically dispersed teams
  • Demonstrated influencing skills, high level of technical and team leadership skills
  • Ability to adapt to a constantly changing environment, task, projects and demands
  • Training and practical experience in Windows Server, VMWare and Linux Administration
115

Offering Manager for Cyber Security Resume Examples & Samples

  • Advanced experience in several of the related disciplines of delivery, solution architecting or business planning prior to taking business management role
  • Candidate must have experience in offering development, costing and pricing, sales support, etc
  • High knowledge of Information Technology (IT) and services industry
  • In-depth and broad knowledge of company organization, functions, culture, HP Services (HPS) services portfolio, routes to markets, and end to end processes. Unique mastery and recognized authority in area of responsibility. Need solid technical, and state-of the- art functional, or business knowledge
  • Highly developed problem solving abilities
  • Demonstrated ability to lead and inspire teams, develop relationships across organizations and accomplish goals under pressure situations. Strong skills in exercising independent judgment
116

Software Security Research Resume Examples & Samples

  • Bachelors/Masters in Computer Science/Engineering
  • Proficient in multiple programming languages e.g. C/C++, Java, C#/ASP.NET
  • Strong technical communication skills
  • Demonstrated interest in security, especially software security, secure development lifecycle and common security software flaws
117

Security ID Administrator Resume Examples & Samples

  • 1 – 3 years of technical experience and an Associate of Arts/Science or equivalent degree (two year college program) in computer science or related area of study; without a degree, one additional year of relevant technical experience (2-4 years in total)
  • Has sufficient technical knowledge to assist with the completion of specific deliverables
  • Able to communicate concepts with team and to peers
  • Able to produce basic documentation to required standards
  • Demonstrates understanding of assigned discipline or technical area. Demonstrate fundamental technical knowledge
118

Director, Helion Security Product Management Resume Examples & Samples

  • Take product-level responsibility for security within the HP Helion portfolio
  • Work closely with the Helion Security team to ensure that security requirements are defined in alignment with product vision / strategy, customer needs, and security / compliance best practices
  • Track industry security developments and integrate into ongoing product planning process
  • Enhance and accelerate the adoption of our existing products, in close partnership with our security, engineering and GTM teams
  • Provide security perspective on market and customer use opportunities
  • Assist in definition of product vision and strategy for HP Helion portfolio, as product security SME
  • Ensure organization is aware and adheres to various product requirements, specifically focused on security policies and compliance standards
  • Maintains a deep understanding of government, industry, healthcare policies and product requirements, with a specific focus on security and compliance drivers
  • Define security- and compliance-focused product requirements and target customer segments for the HP Cloud portfolio products
  • Develop and continuously improve our portfolio offerings; knowledge of competitive portfolio solutions
  • Drive broader global programs as defined by product requirements
  • Develop and continuously improve our portfolio offerings
  • Effectively partner with our pan HP engineering teams to determine technical requirement
  • Ensure timelines are met and resources are managed aligned to our strategic roadmap
  • Ability to leverage other teams to support objectives and foster meaningful relationships
  • Strategic planning on a business development level; can build an effective business case reflecting the value of an appropriate strategy
  • Contribute to definition of and participate in product-specific security incident response and vulnerability disclosure processes
  • BA/BS degree in information assurance / information security, computer science, computer information or engineering related field
  • 10+ years product marketing and/or product management experience
  • Knowledge of and experience with security and compliance standards (e.g. ISO 27001, PCI DSS, HIPAA, FedRAMP)
  • CISSP, CCSK, or other relevant security certifications
  • Proven experience rolling out large scale, global programs with revenue at XXM
  • Customer-focused and passion for working at start-up pace
  • Excellent communication and negotiation skills
  • Analytical with understanding of platform, developer or cloud knowledge
  • OpenStack and/or Cloud Foundry experience a plus
  • Strong team player with a roll up the sleeves mentality
119

Cyber Security Resume Examples & Samples

  • Bachelor’s or Master’s degree in computer science, computer engineering, electrical engineering, information systems management, or related fields
  • Knowledge in server hardware specifics and troubleshooting
  • Problem-solving and root cause analysis skills
  • Effective time management and strong commitment to meeting deadlines
  • Ability to work in a virtual environment
  • Service-oriented behavior
  • Ability to coordinate complex changes involving several different support teams
  • Eager, quick learner with strong team-work spirit
  • Prior internship experience
  • Able to perform in a fast-paced, demanding environment
  • Recommend Cisco networking certifications
  • Knowledge or experience in network load balancing
  • Knowledge or experience with ITIL
  • Understanding of technology in direct responsibility
120

Global Cyber Security Resume Examples & Samples

  • Evaluating current and defining future architecture
  • Defining architectural and technology standards and helping define architectural governance processes
  • Making recommendations and providing solutions for the enterprise and operational business lines based on strategic business goals
  • Developing and maintaining strategic and technology roadmaps
  • Developing and maintaining a strategic vision for the delivery of projects based on key business drivers
  • Producing models of business, information and technical architectures
  • Modeling and assessing the organizations' baseline Architecture
  • Developing principles, strategies and frameworks for the business
  • Providing advice and consultancy on IT strategy to management team
  • Conducting meetings, and creating and presenting professional grade deliverables such as technical architecture documents, technical drawings, and presentations
  • Reviewing functional and nonfunctional requirements for new systems and enhancements to identify gaps and inconsistencies and translate these into requirements for infrastructure build-out
  • Guiding the evaluation of new technologies or vendors, their capabilities, their manageability
  • Leading new technology integration via requirements analysis, design, and implementation. Making recommendations and support implementations of new tools and technologies
  • Engaging with IT Infrastructure Operations, Engineering teams, and third party vendors on an as needed
  • 5-8 years of Solutions or Enterprise Architecture experience
  • 8 + years of information technology security engineering experience
  • 6+ years advanced enterprise experience engineering and architecting typical end point security solutions
  • 3 years advanced enterprise experience engineering of designing secure solutions to handle complex problems with a demonstrated ability to create security architectures that work for the business and enable success
  • Must be able to design solutions which can be managed at enterprise scale
  • Must be able to work already installed solutions to get more breadth to accomplish a solution with already spent dollars
  • Must be able to critically look at new technologies and work with HP product development teams as a partner
  • Must be able to work with minimal day to day direction and must be personally motivated to continually learn new, emerging technologies
  • Creative thinker with an understanding of what can really work in a large, distributed and complex environment
  • Expert at sizing systems and taking into account licensing, costs, business needs and all other aspects of large and small infrastructure designs
  • Capacity and performance and latency knowledge and understanding
  • Experience in designing infrastructure to meet the performance requirements
  • Strong Documentation experience and the ability to drive processes and procedures
  • Experience working with different standards and ability to practically apply them to improve our security posture - NIST 800, SAS70, ISO 27002
  • Certification in TOGAF, COBIT or ITIL desirable
  • Certification in PMP, CISSP, or ISC2 desirable
  • 2) Collaboration and Teamwork. The candidate must be able to work closely and credibly with a variety of highly technical teams as well as a variety of management. The candidate must be able to establish and maintain lasting relationships with people ranging from entry level engineers to VPs. The candidate must be able to accept proposals and opinions from this same range of people in an objective and analytical manner and incorporate appropriately
  • 3) Technical breadth and depth. The candidate must be as technically solid as anyone in the room
  • 4) Leadership. The candidate must be able to influence and guide decision making. The candidate must be able to defend proposed architectures on both technical merit and business merit. The candidate must be a consensus builder and a positive influence
  • 5) Business acumen. The candidate must be able to see the role of IT and of cyber security in the context of the enterprise as a whole and reflect this in proposed architectures. The candidate must be able to architect solutions that balance IT risk, business risk and business need
  • 6) Problem solving. The candidate must be able analyze a problem and associated set of constraints and propose potential architectures that satisfy both
  • 7) Ability to think and work at high scale. HP's IT environment is among the largest and most complex in the world; the candidate must be able to deliver architectures that scale to such an environment
  • 8) Self-motivation. The candidate must be able to work with minimal day to day direction. The candidate must be personally motivated to continually learn new, emerging technologies. The candidate must have a passion for security
121

Consulting Security Resume Examples & Samples

  • Understand and articulate Cisco's architectures and services within Security technologies
  • Create, present and document technical solutions
  • Perform in-depth and high-level technical presentations for customers, partners and prospects
  • Proven track record or managing and winning technical and high value IT security projects
122

Cisco Security Solutions Emear Bdm Resume Examples & Samples

  • Analyze, develop and present solutions to CXO level executives
  • Work with Cisco's senior execs, business entities and sales teams to formulate strategy and drive strategies and new solutions
  • Drive activities associated with strategic account planning and project management
  • Lead cross functional teams to complete projects and major initiatives
  • Aggregate and analyze account roadmaps, opportunities, business models, and solutions
  • Ensure a coordinated and consistent customer engagements within identified GET and Enterprise accounts
  • Facilitate collaboration and development of new products within accounts; manage large projects
  • Build and manage a team of people to scale and support ongoing programs
  • Must have demonstrated strong project management skills, including ability to manage virtual teams with members from a range of functions, skills, and reporting structures
  • Strong written and oral communication skills. Written communications include powerpoint presentations and vertical documents (word and email). Oral communication skills should be demonstrated in delivering presentations to C-level business executives and also facilitating more interactive business discussions with those executives (project scoping, deal negotiations, problem resolution, etc.)
  • Demonstrated client relationship skills. Record of developing collaborative working relationships with VP, and SVP-level executives in Fortune 500 accounts
  • Experience in security and services strongly preferred
  • Individual must have demonstrated the ability to effectively persuade sales, business and technical decision makers to make investment in new or emerging solutions or business models
  • Must have strong strategic and financial analysis skills. Demonstrated ability to characterize market dynamics, competitive dimensions, purchaser decision-making criteria, and extrapolate to derive unique insight. Financial analysis capabilities should range from overall corporate financial statement analysis to ROI/NPV calculations for specific projects and investments
  • Prior experience in consulting sales and consulting practice development
  • Requires BA/BS, MBA preferred and 15+ years related experience in strategy and/or business development, preferably in the security and services industries
123

Security Programs & Business Lead Resume Examples & Samples

  • Technology Intelligence, identification/understanding of key new technology and trends
  • Lead and develop technology strategy focusing on customer/end-user business pain points
  • Technology advisory, influence top executives
  • Correlates business issues around technology and processes and create a solution specific to a given stakeholder
  • Coach team members, lead virtual teams
  • 5+ years experience in understanding of key technology trends and their impact on the client´s business
  • 5+ years experience in leading and managing projects that deliver complex IT strategy and initiatives with tangible results, working across organizational boundaries, and interfacing with senior stakeholders
  • The individual should possess strong task management, presentation, communication, teamwork and collaboration skills
  • Great people skills is a must
  • Exceptional communication and interpersonal skills
  • 3+ years substantial experience within Cyber Security, in different verticals such as oil & gas, financial, etc
  • Experience in the analysis and formation of Cyber Security Risk scenarios
  • Experience in performing business cyber risk assessments and ability to identify and assess the impact of changes and / or new developments in Cyber threats on the business
  • Experience with cyber security incident handling and reporting
124

Manager, Corporate Development Security Resume Examples & Samples

  • Collaborating with business unit colleagues to develop and articulate segment or market strategies and define the role of investments and acquisitions vis-à-vis internal development or partnering to achieve these strategies
  • Sourcing investment and acquisition opportunities which align to the strategies or market theses
  • Analysis of investment and acquisition opportunities against defined criteria, and evaluation of key drivers and commercial assumptions
  • Financial modeling of structures and returns from investment and acquisition opportunities
  • Preparing and presenting investment and acquisition cases for review by relevant corporate review boards
  • Leading due diligence on investment and acquisition opportunities
  • Structuring and negotiating transactions
  • Monitor portfolio, identify potential issues, driving remedial actions, and assist in structuring exits. The Manager would hold observer seats on the boards of investment portfolio companies where appropriate
  • Experience in the high-tech industry, and at least 2-4 years of experience in strategy consulting, investment banking, equity research, venture capital, or corporate or business development
  • Security sector experience and knowledge preferred
  • Strong leadership and communication skills to work with senior executives across various business units and global theaters
  • Strong analytical and financial skills to work on complex financial transactions with minimal supervision
  • MBA from a top tier program
125

Security Engineer, Siem Resume Examples & Samples

  • Ensure that Blizzard Entertainment’s enterprise systems are secure
  • Take a leadership role in the development and enhancement of the enterprise wide SIEM in collaboration with different technology and operations groups
  • Perform security and privacy risk assessments on infrastructure components and submitted proposals
126

Security Engineer, Software Resume Examples & Samples

  • Develop and enhance new and existing security-focused tools and services
  • Create modules, middleware, and utilities for aggregating and analyzing different sources and types of logs and information
  • Continually iterate and improve upon existing applications to streamline security operations efficiency through enforcing consistent UI and UX across tools
  • Perform security and privacy risk assessments on internal and externally developed software
  • Maintain custom software documentation; provide training on developed systems to other employees
  • Portfolio link, PDF, or code samples
127

Security Applications Architect Resume Examples & Samples

  • Partner with Humana’s internal architecture team to develop an understanding of current implementations of web application standards, map existing applications to data sources, and identify problematic data issues
  • Map requirements of partner architecture, define technical solutions based on those requirements, and create and document a migration path for existing applications as they transition to a reference architecture implementation
  • Translate system requirements into technical architectures and designs
  • Assist in the creation of functional use-cases, participating in JAD sessions with business and IT stakeholders, developing supporting artifacts and constructing abstraction models
  • Create design models for web and data services and presentation components
  • Progressive experience as a senior developer in large IT projects
  • Strong knowledge/experience with Identity and Access Management
  • Prior project architect and/or team lead experience
  • Knowledge of relational databases, legacy systems integration, mainframes and design patterns
  • Practical experience with XML-based technologies and web services including SOAP, UDDI and MSXML
  • Bachelor’s Degree in Computer Science or a related field
  • Tivoli Tools
  • Working knowledge of Business Intelligence tools
  • Experience with LDAP
128

Security Center Operations Analyst Secure Works Resume Examples & Samples

  • Take ownership of, triage, and update tickets generated by a CRM ticketing system including English to Japanese translation assistance
  • Respond to inbound phone and electronic requests for technical assistance with Dell SecureWorks services
  • Respond to service requests and translate into Japanese language
  • Meet service level agreements regarding response time and customer notification as it pertains to Dell SecureWorks Managed Security Services
  • Perform accurate and precise real-time analysis and correlation of logs/alerts from a multitude of client devices with a focus on the determination of whether said events constitute security incidents
  • Generate and update technical documentation as required
  • Manage, participate in, or directly work on any additional projects, assignments, or initiatives assigned by management
  • Unix, Linux, Windows, etc. operating systems
  • Packet analysis tools (tcpdump, Wireshark, ngrep, etc.)
  • Regular expressions
  • GCIA, GPEN, GWAPT, GCIH, GSEC, OSCP, OSCE, OSCP, or similar certification preferable
129

Security Analysis Forensic Analyst Resume Examples & Samples

  • Review security-related events and assess their risk and validity based on network- and endpoint-generated information in light of global threat intelligence information
  • Perform network- and endpoint-based forensic analysis in order to provide accurate severity, root causes analysis, and remediation information for clients
  • Provide customers with understandable context around their security environment and threats
  • Interface with clients to address their issues, concerns, and questions, and drive to closure any issues that impact the service and its value
  • Work with client and internal Dell SecureWorks incident response teams to provide in an incident response model context
  • Provide mentorship to Dell SecureWorks team members and clients on security strategy, tactics, techniques, and procedures
  • Significant experience with and expert understanding of
  • Completion of a Master’s degree or equivalent program in Computer Science, Network Security, Information Security, or other applicable field and relevant work experience/research in the field
  • Completion of a Bachelor’s degree or equivalent program in Computer Science, Network Security, Information Security or other applicable field and 4-6 years of work experience in the field
130

Soc Security Analyst Secure Works Security Analysis Resume Examples & Samples

  • Manage all customer interactions in a professional manner with emphasis on customer satisfaction
  • Utilize internal guidelines in order to properly handle client requests and questions
  • Significant theoretical and practical knowledge in the following areas
131

UX\UI Design Engineer Web Security Resume Examples & Samples

  • Responsible for the design and development activities associated with software using a range of applicable technologies (e.g., programming languages, compilers, assemblers, debuggers, other tools) for products used in local, networked or Internet-related computer programs
  • Participates in product development in all stages including planning, design, development, testing, implementation and post deployment support
  • Manages or utilizes software that is built and implemented as a product, using best-in-class development process/lifecycle management
  • Drives idea generation for new software products, or for the next version of an existing product
  • Works with the team to develop, maintain, and communicate current development schedules, timelines and development status
  • Reviews requirements, specifications and designs to assure product quality; develops and implements plans and tests for product quality, scalability, performance assurance
132

Security Analysis Senior Consltnt Resume Examples & Samples

  • Consult with internal business teams and provide Industry expert level guidance and leadership on
  • Secure Development and Application Security
  • Infrastructure Architecture and Design Requirements
  • Dell Policies and Standards
  • Procedural guidance to facilitate project execution in accordance with Dell practice
  • Risk associated with initiatives and policy deviation requests
  • Vendor and Internal Customer Management Practices
  • Compliance implications of design decisions in application and infrastructure design
  • Mentoring to junior team members
  • Escalation point for resolving conflicts between other consultants and business unit stakeholders
  • Driving large, complex cross organizational initiatives and must possess the ability to influence stakeholders and drive such effort to successful conclusion with little to no oversight or guidance
  • Manage assigned key customer relationships and initiatives as point of contact for the CyberSecurity organization
  • Investigate complex, and sometimes historic practices/solutions to determine gaps and needed improvements and facilitate migration to a preferred state with a high degree of independence, often in high stress conditions and with Sr. Executives directly
  • Work with Sr. Management and Executives as required to facilitate resolution to challenging business problems/objectives in a secure way
  • Develop and maintain comprehensive documentation of engagements performed and risks identified
  • Develop and document risk and position papers and presentation for consumption by executive leadership
  • Maintain strong awareness of shifts in business structure and strategy and possess the ability to recognize the impacts potentially has to the CIS organization position and risk threshold
  • Broad understanding of security technologies and frameworks
  • Expert knowledge of application and/or network security concepts
  • B.S. Degree in IT or equivalent
  • Excellent practical knowledge of more advanced concepts of systems and network administration in a large enterprise
  • Proven record of balancing business need and benefit vs. security risk
  • Detailed understanding and practical experience of regulatory and compliance frameworks such as Sarbanes-Oxley, PCI DSS, HIPAA, GLBA, NIST800-53, ISO27001/2 etc
  • Basic understanding of secure coding practices and standard code defect issues such as un-validated input, SQL injection, X-Site Scripting, hard coded credentials, etc. and their implications to system security state
  • Expert at system Threat Modelling (preferably to STRIDE methodology)
  • Excellent written and oral communication skills with experience in creating and reviewing technical documentation
  • Must work well with others as part of larger team and be able to collaborate on cross functional teams. Direct experience owning a customer or business relationship on behalf of an organization a major plus
  • Understands, applies and may adapt fundamental concepts, practices and procedures for diverse engagement types
  • 10+ Years Information Security experience
  • 15 + Years of IT experience
  • CISSP or similar certification required
133

Security Center Operations Analyst Ii Secure Works Resume Examples & Samples

  • Work in a shift-based schedule within a 24X7 Security Operations Center
  • Manage all customer situations in a professional and courteous business manner with an emphasis on customer satisfaction. Assess and escalate to next level as needed. Keep customers abreast of problem status, set clear expectations and provide timely follow-up to customers on a daily basis
  • Document and/or translate all communications with customers and intradepartmental constituents related to outstanding technical issues in order to escalate to next level
  • Perform event stream tuning and validation using internal tools, metrics and your in-depth understanding of key security concepts
  • Fluency in Japanese and English languages is required
  • Completion of a Bachelors degree or equivalent program in Computer Science, Computer Engineering, Electrical Engineering, Network Security, Information Security, Information Technology, or Mathematics (or equivalent work experience)
  • 4+ years of experience as a network intrusion analyst
  • Exploits, vulnerabilities, network attacks
  • Database structures and queries
  • Demonstrate excellent communication and customer care skills by documenting all analysis work performed
134

Cyber Security Resume Examples & Samples

  • Assessments for perimeter and internal network related projects: Internet and extranet services, web hosting, email, proxy, FTP, Desktop Internet Access, DNS, new data centers, new major business partners and service providers, joint ventures and perimeter network upgrade initiatives
  • Assessments on new data center architectures, new major business initiatives and partners, as well as perimeter architectures and designs
  • Review external connectivity requests from a risk and control perspective applying principles outlined in Policies & Standards to ensure compliance
  • Provide guidance and requirements for strategic technologies and the establishment of new technology standards
  • Work with ET on new IP based technologies reviewing and ensuring security controls and objectives are achieved: Wireless LANs, Application Firewalls, Networking Technologies, Network Authentication, Desktop security, VoIP & Handheld technologies, etc
  • Define requirements for establishment and maintenance of reference Architecture and Security design
  • Develop standardized secure implementation Blueprint that describes JPMC Network Security Standards
  • Participate in the creation and maintenance of IT policies and network security standards, i.e. network perimeter security standards, Remote Access, etc
  • Serve as technical consultant to provide requirement for policy and engineering standards establishment, risk monitoring standards & activities
  • Previous experience in one or more of the following: Information Security, Technology Risk Management or Network Security within the financial sector
  • In-depth knowledge of Internal & External Network Security architectures, Firewall technologies, and knowledge of TCP/IP protocol suite, including secure protocols
  • Experience with firewall operations or firewall engineering experience or in depth knowledge with firewall platforms
  • Knowledge of Network, System, and Application monitoring technologies, i.e. antivirus products, personal firewalls, network and host intrusion technologies, as well as technologies that provide host based containment
  • Familiarity with IT Control Policies, Security Standards and Security Configuration setting for platforms and network infrastructure
  • Solid understanding of network security concepts
  • Solid experience with risk management practices & audit controls
  • Experience in assessing network security risk and ability to identify controls to prevent or detect activities
  • Ability to work in a team as a contributor to improving security controls on network and platform infrastructure
  • Communication, presentation, and influencing skills sufficient to represent the PIRA team across all levels of management and technical staff in various regions
  • Ability to provide secure solutions to technically challenging problems as well as towards describing available offered solutions to LOBs and technology resources
  • Education / professional qualifications: (eg. degree, CPA, etc) Degree Holder. CISM / CISA / CISSP certifications are preferred
135

Cyber Security Resume Examples & Samples

  • Set team objectives
  • Proactively identify process deficiencies, recommend corrective action plans and drive implementation of solutions
  • Provide training and guidance for new hires and ensure all team members follow consistent processes
  • Manage team’s attendance, vacation and administrative approvals
  • Provide mentorship to analysts
  • Work special projects or other duties as assigned
  • Provide regular monitoring, triage, and response to automated security alerts
  • Provide timely detection, identification, and alerts of possible anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities
  • Work with global teams to drive efficiencies
  • Provide regular feedback to enhance our security monitoring and controls
  • Conduct as needed ad-hoc incident analysis
  • Experience in one or multiple areas such as Windows, UNIX, mid-range, mainframe, firewalls, database, privileged access management, DLP, threat detection analysis, and/or information risk management
  • Ability to follow operational processes and workflows
  • Experience assisting the resolution of customer escalations, incident handling, and response
  • Understanding of networks, workstation, server and database design/operational principles mapped to effective control mechanisms
  • Must be reliable and adaptable
136

Cyber Security Policy Resume Examples & Samples

  • Relevant experience in the analysis, creation, and/or introduction of information/technology policies within a corporate environment
  • The ability to work in a federated environment, identify and engage stakeholders, and drive change
  • The ability to identify, specify and develop key information and security risk processes suitable for enforcing appropriate controls
  • The ability to work in a complex, highly regulated environment, to make or broker decisions in real time
  • Excellent written and verbal communication skills, working with all levels of Management and the ability to leverage the resources of a very large multinational quickly and effectively
  • Knowledge of Information Security pertaining to Vulnerability & Compliance management, Data Protection [DLP] and associated technologies
  • Good familiarity with productivity tools, including: MS Office, Sharepoint, workflow systems
137

Security Settlements VP-shared Services & Banking Operations Resume Examples & Samples

  • Maintain and develop a culture of excellence
  • Be a leader in the North American industry forums, with particular focus on the DTCC. Keep abreast of all market practice changes across all exchanges covered and be able to discuss the operational impact with the business units
  • Manage the daily risk, own KRIs and KPIs
  • Management of the relationship with TCS for work that has been outsourced
  • Work with management and I.T. to identify process improvement opportunities
  • Ensure internal control and external regulatory compliance policies and their impacts are understood and adhered to by the team, i.e., segregation of duties, money-laundering rules, exchange deadlines, etc
  • Take responsibility for the team’s SLA, Risk, RCSA and Sarbanes-Oxley sign offs
  • Being the Settlements point person in NA for interaction with external regulators
  • Be a point of escalation for your teams and the business unit; ensure further escalation of risk/process/IT issues to more senior Operations / IT management as appropriate
  • Support key ongoing business goals and initiatives including on-boarding of new products
  • Contribute to the overall running of the North American Settlement Team and the Baltimore office
  • Owning the people agenda, ensuring the development of individuals as well as succession planning
  • Continue to develop teams and infrastructure to optimize ongoing support and continuity of Equity & Fixed Income Settlements performance
  • Job Skills - HIGH
  • Business Product Knowledge - MED
  • Technology - MED
  • Organisational Ability - HIGH
  • Managing People - HIGH
  • Leadership - HIGH
  • Knowledge of the Financial Services industry and Operational Risk
  • A proven track record of achievement, preferably gained within the securities industry
  • Strong risk awareness and management skills gained within a financial services background
  • Ability to step back from the detail and provide strategic direction for immediate team
  • Can work well under pressure, lending control and order to a difficult or pressurised situation
  • Can deal easily with multiple issue and tasks
  • Proven management experience. Skills in delegation, organisation and people management to ensure the team can work effectively
  • Excellent communication skills (both verbal and written)
  • Ability to recognise risk issues and implications. Knows when to ask questions before taking action and when to refer problems or issues to the next level
  • Approaches all situations with positive outlook, energy and enthusiasm. Is a self-starter who takes individual ownership for work quality and improvement. Leads by examples working with drive and determination
  • Shows initiative and creativity, taking a long-term approach to improvement and resolution of issues
  • Is self-confident, demonstrates integrity and business-appropriate behavior
138

Cyber Security Resume Examples & Samples

  • Direct and control the activities of a Technology Strategy & Product Roadmap team responsible for coordinating with service managers, technology architects, and engineers to develop and introduce new technology products and features across Cyber Security in order to meet SLAs
  • Work with service managers to define their functional requirements needed to achieve desired results while ensuring functional specifications of technology products meet requirements
  • Identify functional gaps and conflicts in requirements and drive toward a solution
  • Design or adapt processes as the basis for gathering functional requirements
  • Develop Product Strategies & Roadmaps (inc. Operational Level Agreement (OLA), Key Performance Indicators (KPI), and Cost and Pricing Views (i.e. TCO))
  • Carry-Out Continuous Improvement and Optimization of Overall Costs
  • Perform Competitive Benchmarking of Product Performance
  • Define Requirements of Vendor Services / Manage Vendor Relationships
  • Provide visibility to the service manager, architects, engineers, and project team on any functionality-related changes or issues that impact them
  • Directly Influence the Development & Deployment Specs of each Product
  • Promote and Secure Investment Plans
  • Project Management Product-Related Initiatives
  • Conduct Product Research
  • Knowledge and experience with applying ITIL concepts to support service management
  • Experience with projects in multiple technologies—cyber security & information security technology is preferred
  • Experience managing a portfolio of technology products and/or projects and driving change from inception through delivery
  • Proven leadership and influencing skills, including experience managing a product/project management team
  • Excellent judgment and decision making
  • Ability to resolve conflict & facilitate decision-making
  • Strong interpersonal and talent management skills, including the ability to identify and develop product management talent
139

Director, Payment System Risk & Security Resume Examples & Samples

  • Coordinate Visa’s Authentication Strategy working cross-functionally with Product, Corporate Initiatives, Acceptance, Sales and Client Services
  • Lead key initiatives and policies to advance Visa’s authentication strategy
  • Promote understanding and adoption of authentication and secure technology solutions (i.e., EMV, Tokenization and Encryption) among clients including issuers, merchants, acquirers and processors
  • Progress EMV deployment among U.S. stakeholders through proactive outreach, reactive support, fraud analytics, best practices, and informational resources
  • Support the ongoing development and execution of Visa’s Authentication Strategy
  • Provide strategic insight and visionary direction in the development of next generation authentication solutions
  • Represent Visa at industry events, client meetings and EMV forums
  • Prepare reports, briefings and other written products for Executive Management
  • Provide EMV subject matter expertise for internal and external stakeholder and develop and deploy materials to support Risk staff in market (e.g., messaging, presentations, toolkits, best practices and presentations)
  • Partner with Country Risk Management teams to plan and achieve authentication objectives as part of the Country Risk Plan
  • Support planning and execution of Visa Risk meetings
  • Lead ad-hoc projects in support of overall risk and corporate initiatives
  • 5+ years of relevant experience in payments industry, financial services, management consulting, and/or previous strategy functional experience
  • Strong leadership skills with commitment to motivating team members contributing from various collaborative team-based projects
  • Ability to prioritize projects to meet timelines efficiently, to adapt to changes in priorities quickly, and to manage multiple initiatives simultaneously with focus on a drive to completion and tangible impact
  • The candidate must work independently and possess a high level of self-motivation while also being team oriented, collaborative, diplomatic and flexible
  • Ability to keep pace with demands of business by anticipating problems, proffering appropriate solutions and providing the leadership to effectively implement change
  • Superior written, oral and presentation skills and an ability to synthesize information and make clear, concise recommendations on course of action
  • Ability to effectively balance risk and security initiatives with business objectives
  • Experienced at presenting information to all levels, with ability to facilitate group discussions and proven ability to influence and communicate effectively across geographic, functional lines and levels
  • Demonstrated thought leadership and the aptitude to think creatively and identify new ways to approach common problems
  • Undergraduate degree required; graduate degree in business, economics or public policy preferred
140

Security Intelligence Software as a Service Technical Operations Resume Examples & Samples

  • Provide technical operations, as part of our Technical Operations Center, in order to resolve customer issues
  • Work with customer account teams to ensure total customer satisfaction by representing our customers’ needs and requirements to product management and engineering
  • Build software tools to enhance, optimize and evolve our SaaS offering to scale and expand seamlessly
  • At least 2 years experience in apply knowledge of Software Development Cycle
  • At least 1 year experience in Java, Python, SQL and Linux
  • Basic knowledge in Cloud and Software as a Service (SaaS) Environments
141

IT Applications Security Analyst Resume Examples & Samples

  • You have gained 6 to 8 years of experience completing similar duties as outlined above
  • You have technical training in IT and IT security, including a CISSP or CEH certification
  • You have 3 or more years of IT network knowledge/implementation experience (e.g., firewalls, secure topologies/architectures, intrusion detection/analysis, Microsoft/UNIX/OS security, vulnerability assessments)
  • You have 3 or more years of experience with administering firewalls and leveraging working knowledge of system administration for Mainframe, Unix, Middleware and Microsoft operating systems
  • You have 2 or more years of experience assessing applications for security issues and creating solutions
  • You are an analytical thinker who solves problems and develops continually more effective solutions to them
  • PERL and/or shell scripting knowledge
142

Plain Clothes Security Shopper Resume Examples & Samples

  • Willing to mitigate and thwart potential disruptions to our Show
  • Ability to work with a dynamic and diverse team
  • Maintain high level of detail and scrutiny for entire shift
  • Willing to make service recovery a priority
143

Cyber Security Business Resume Examples & Samples

  • Cross-referencing data from multiple, sometimes disparate sources, including infrastructure, PMO, inventory, product, and other corporate sources to create integrated views that can be used to drive goals
  • Working with several large and complex SQL databases
  • Designing and building mockup reports and analyses for review and validation with stakeholders
  • Plan and perform data analytics and continuous auditing procedures for data validation· Identify new data analytics opportunities by thinking of creative ways of combining new or existing data· Design and execute analytical audit tests based on identified risks· Demonstrate leadership within the team by enhancing the department's data analytics strategy· Provide training for other members of the department on basic data analytics techniques· Raise awareness of the data analytics program with key members of Management and Partners· Identify security process improvement opportunities· Solve complex analytical and data integrity problems while prioritizing and managing multiple tasks· Build relational data structures, including relationships between tables, grouping data, etc. to perform analysis· Assist with audits of IT security· Helps conduct interviews, review documents, compose summary memos and prepare working papers · Communicates analysis results via written reports and oral presentations to management and partners· Entrepreneurial spirit
  • Analytical, creative, and innovative approach to solving problems
  • May be responsible for overseeing and participating in data cleanup activities as needed
  • Extremely detail oriented· Bachelor's degree in computer science or related field· Proficient to Advanced competency with SQL, PL/SQL and Oracle databases· Minimum of 4 years experience working with relational databases· Minimum of 4 years experience writing standard queries and reports· IT Experience (Architecture, Networking, Database Administration, or Applications Development)· Can play a dual role of understanding of infrastructure and business needs· Infrastructure Knowledge (Linux, Unix, Windows, Vmware, Capacity Planning)· Security, Risk and Audit experience· Understanding of IT Finance· Versatile personality and skillsets· Highly analytical data junkie who enjoys coding - but doesn't want to be a software engineer
144

Cyber Security Resume Examples & Samples

  • Strong client relationship management skills at all levels with the business and technology. Facing off to Chief Technology Officers and Heads of Business functions with the ability to convey complex cyber security topics in a clear understandable manner
  • Maintain the risk posture of the business understanding the key cyber security risks facing the business with the ability to understand key technology controls and the maturity of those controls to mitigate identified risks
  • Extensive experience with evolving state-of-the-art information security technologies, technology policy and security administration
145

Business Management Lead-cyber Security Resume Examples & Samples

  • Establish cross functional workstream meetings to design firm-wide retention and recruiting solutions that incorporate LOB and regional practices; Identify system and process improvements based on key stakeholder feedback
  • Assist with the production of metrics and other presentations for Senior /Executive Mgmt
  • As needed this position will provide support in managing projects, initiatives and other change management efforts
  • At least 8 years Business Management &/or Technology experience, with at least 5 years in a Program Management/management-aligned role
  • Demonstrated ability to manage relationships at the Executive level
  • Excellent verbal and written communications, presentation, and facilitation skills
  • High degree of initiative and autonomy but must be able to function successfully as part of a team
  • Innovative and creative; able to generate new ideas; forward-thinker who can evolve the practice with the changing needs of the business; thought-leader
146

Business Management Lead Cyber Security Resume Examples & Samples

  • Partner with Cyber Security Training, Education & Awareness to align learning programs and materials to performance management activities across the firm and identify roles suitable for LOB or internal Cyber security team rotations
  • Drive establishment and roll out of the Cyber Security Job Family
  • Partner with HR and recruiting colleagues across the firm to understand line of business hiring plans, understand various roles within and across the LOBs; compare/contrast to roles in NAMR, APAC, EMEA
  • Partner with regional and LOB teams to define appropriate analytics and reporting to track firm-wide retention and recruiting progress and determine recommendations around rotation, mobility and performance management initiatives
  • Work with key Executives & HR to refine and execute performance management, compensation and other key program strategies and decisions
  • Demonstrated results and experience with direct and/or indirect people management, performance and talent management
  • Acute attention to detail, follow-through and results orientation
  • Able to successfully multi-task across tactical and strategic initiatives
  • Able to manage time effectively, prioritize and escalate appropriately
  • Honed consultative and influencing skills
147

Manager of Technology Security Resume Examples & Samples

  • 8+ years’ experience in a combination of security, risk management and technology jobs
  • 3+ years’ experience as a manager of technology security with job history demonstrating increasing levels of responsibility
  • 3+ years’ experience managing and leading high performing technology teams
  • Achievement of an advanced security related certification such as CISSP
  • Proven track record and experience in developing security policies, procedures and standards while successfully executing security projects
  • Knowledge and understanding of relevant legal and regulatory requirements, such as SOX, PCI, HIPAA, Data Protection, etc
  • Experience with information security frameworks such as COBIT, ITIL, etc
  • Strong conceptual understanding of information security theory
  • Strong project management skills and experience in creating and managing projects
  • Proficiency in performing risk, business impact and vulnerability assessments and defining risk mitigation strategies
  • Knowledge of security issues, techniques and implications across UNIX, LAMP stack, LINUX and Windows environments; experience with Active Directory, SAP and RSA. Knowledge of User Identity and Access Management (IAM) tools
  • Strong understanding of the business impact of security tools, technologies and policies. Ability to develop and articulate a compelling business case for recommended actions
  • Knowledge of the SAP security architecture a plus
148

Facilities, Culinary & Security Fp&a Analyst Resume Examples & Samples

  • Exceptional business partnering skills
  • Be the strategic finance partner to assist FC&S with strategic decision-making and financial oversight. Provide financial leadership across budgeting, forecasting, long-range planning, business continuity planning
  • Prepare and track project budgets, including supporting schedules for construction, change orders, payments, etc…
  • Identify opportunities to improve efficiency and accuracy and lead projects to deliver improvements in productivity and operating costs
  • Support the budget building of major real estate construction and tenant improvement projects
  • Collaborate with groups in finance and in operations including vendor management, fixed assets, accounting, and tax to support the infrastructure groups
  • Perform the monthly close process and review the full P&L during close periods to ensure financial data accuracy
  • Review monthly reports, trends and indicators with business partners, and provide suggestions for improvement. Ensure and maintain forecast data accuracy and integrity at all times
  • Work closely with the Infrastructure Accounting teams to ensure tight capital project finance controls and fulfill external audit requirements
  • Support building the bottoms-up budget, forecast and long-range strategic plan for headcount, operating expenses and capital expenditures. Develop budget review presentations, excel models and ad-hoc analyses for the business
149

Cyber Security Resume Examples & Samples

  • Provide expertise in the full range of technology controls practices: information risk management, business resiliency, IT control policies, etc
  • Experience supporting or troubleshooting information security applications and systems
  • Required - BS/BA degree or equivalent experience
  • Relevant Security or Windows certification(s) desired
150

Director of Information Security Resume Examples & Samples

  • Amend, implement and monitor a strategic, comprehensive enterprise information security and risk management program to ensure the integrity, confidentiality and availability of confidential company data
  • Leverage information security experts and technology to support a secure infrastructure, secure applications, and overall data security; lead strategic security planning with IT Operations, development teams, and users across the organization
  • Develop, communicate and ensure compliance with organizational security policies and standards; proactively work with business units to implement practices that meet defined policies and standards for information security
  • Provide support, guidance, mentoring and education, to other business units to ensure that appropriate monitoring and controls are in place for compliance with established security policies and procedures
  • Perform comprehensive security assessments for all organizational information systems and advise on mitigating vulnerabilities
  • Create and manage information security and risk management awareness training programs for employees, contractors and approved system users
  • Provide subject matter expertise to management on a broad range of information security standards, best practices, and compliance requirements
  • Work with developers and architects to ensure security is appropriately built into the software development cycle
  • Coordinate the performance of internal and external network and systems vulnerability assessments and penetration tests
  • Implement a process for appropriate internal testing of applications prior to deployment
  • Audit vendor compliance with security requirements as needed
  • Coordinate use of external resources involved in the information security program including negotiating vendor contracts and fees, and managing external resources
  • Develop business-relevant metrics to measure the efficiency and effectiveness of the program, facilitate appropriate resource allocation and increase the maturity of the security program
  • Build and lead the security function; manage hiring, training, staff development and performance
  • 7+ years of progressive IT solutions, compliance, regulatory experience
  • Expertise in IT development, integration, delivery, and maintenance experience in a global environment; Media industry experience strongly preferred
  • Managerial experience with demonstrated success in a leadership role
  • Demonstrated understanding of security requirements for Sarbanes-Oxley, ISO Certifications, Data Privacy laws, and PCI. Cyber security, including strategy creation and management of highly secure WWW environments experience a plus
  • Knowledge of risk assessment procedures, policy formation, role-based authorization methodologies, authentication technologies, and security attack pathologies
  • Excellent written, verbal communication and presentation skills
151

Xerox Security Delivery Manager Resume Examples & Samples

  • BA / BS in Computer Science or related field or an equivalent combination of education and / or experience
  • Ten (10) years of experience in information technology, with at least five (5) years experience as a security manager for a large, multi-service IT environment
  • Two (2) years experience as a security manager for a service delivery program in a client environment with intimate understanding of corporate and industry security policies and restrictions – experience and knowledge of government security requirements a definite benefit
152

Project Security Analyst Resume Examples & Samples

  • Ability to interact with representatives from different sectors, use a pedagogical approach and communicate technical and business concepts to all types of audiences
  • Analytical and synthesizing skills
  • Ability to make decisions quickly in a constantly changing environment and demonstrate capacity for innovation
  • Ability to draft documents that are clear and well-structured
  • Have a keen sense of observation
  • Capacity to proceed with diligence and a high level of responsibility
  • Bilingualism (French-English)
  • Ready to travel for work occasionally
153

Security Generalist Resume Examples & Samples

  • Provide telephone service and support in a call center environment to direct fire, medical, security responses and facility-related issues
  • Monitor Fire and Security Alarm Systems, Access Control System, Closed Circuit Television (CCTV), and radio communications systems
  • Perform Security/Fire dispatching to appropriate company and municipal emergency responses
  • Provide emergency notifications to all levels of management and key personnel
  • Review, maintain and compile daily activity logs, as required
  • Protect company classified and sensitive information with confidentially
  • Perform First Level support for end user and field technicians for card access, intrusion, or CCTV equipment problems
154

Security Cooperation Subject Matter Expert Resume Examples & Samples

  • 2+ years of experience with security cooperation and international affairs
  • Knowledge of security cooperation, international affairs, foreign military sales, including the processes, legislation, and players, US Air Force roles and missions, and SAF/IA role within and relationship towards the USG security cooperation community
  • Experience with military staff, including military or civilian capacity and professional military
  • BA or BS degree in International Affairs preferred; MA or MS degree in International Affairs a plus
  • Education through Intermediate Development (0-4/Major) level
155

Security Application Support Resume Examples & Samples

  • Minimum 5 years Information Security experience with focus on Identity and Password Management
  • Excellent oral and written communication skills are required
  • Must be highly flexible and adaptable to change
  • Performs weekly health check for all support applications
  • Assists in the implementation of vendor supplied application patches and upgrade projects
  • Develops quality deliverables including codes, unit tests, and support documentation
  • Assists architect in the technical design and other team members with their development efforts
  • Reviews documents, processes or procedures, and recommends where automation or improvements can be implemented
  • Operates independently; has in-depth knowledge of business unit/function
  • As subject area expert, provides comprehensive, in-depth consulting to team and partners at a high technical level
  • Carries out activities that are large in scope, cross-functional and technically difficult
  • Role is balanced between high level operational execution and development, and execution of strategic direction of business function activities
156

Security Controls Practitioner Resume Examples & Samples

  • Experience with collecting and documenting SCRP/ACR/ICR information at Ford Motor Company
  • Infrastructure System Engineering and/or Support
  • CISA, CISSP, CISM
157

Advisory Services Manager Financial Services Office Cyber Security Resume Examples & Samples

  • A bachelor's degree and a minimum of 5 years of related work experience; or a graduate degree and approximately 4 years of related work experience
  • A minimum of 3+ years of related work experience in developing, implementing or architecting information security systems
  • A minimum of 3+ years of relevant experience at a financial services company or comparable experience working as an advisor to a financial services company
  • A strong understanding of information security regulatory requirements and compliance issues
  • Knowledge of security concepts and methods such as vulnerability assessments, privacy assessments, intrusion detection, incident response, security policy creation, enterprise security strategies, architectures and governance
  • Solid existing relationships within the Information Security or IT executive ranks (e.g., CIO, CISO, Director of Information Security, SVP and VP of Information Security) of the financial services sector
  • Demonstrated ability to contribute to the development of client deliverables and technical content
  • Advanced written and verbal communications skills
  • Data Privacy and Protection
  • Security Governance Risk and Compliance products
  • CISA, CISM, CIPP, or GIAC certification is desired
  • Prior Big 4, advisory or system integrator experience
  • Working knowledge of relational database management systems such as Oracle, Sybase, and MS SQL Server
158

Director of Information Security Resume Examples & Samples

  • Develop, implement and monitor strategic, comprehensive enterprise information, cyber-security and IT risk management program to ensure that the integrity, confidentiality and availability of information is owned, controlled or processed by the organization
  • Manage the enterprise's information security organization, consisting of direct reports and indirect reports (such as individuals in the business and IT). This includes hiring, training, staff development, performance management and annual performance reviews
  • Define and facilitate the information security risk assessment process, including the reporting and oversight of mitigation efforts to address negative findings
  • Manage security incidents and events to protect the organization's reputation, good standing and corporate IT assets, including intellectual property and regulated data
  • Coordinate the development of implementation plans and procedures to ensure that business-critical services are recovered in the event of a security event
  • Develop Security and Risk Management Review processes and integrate these process into Avon's Comprehensive Delivery Process (CDP) to ensure new programs/projects are being assessed from a security and risk perspective at the appropriate inflection points. Security and Risk Management processes should also cover IT initiatives that may not warrant CDP oversight (i.e. Ad-Hoc Requests external B2B data exchanges)
  • Ensure Information Security assessment processes extend and integrate into the Vendor Assessment Process to ensure all new and existing vendors meet our Information Security requirements
  • 8-10 years of supervisory/management experience or a combination of training and experience
  • Minimum of 8-10 years of experience in a combination of risk management, information security and IT jobs. At least 4 must be in a senior leadership role. Employment history must demonstrate increasing levels of responsibility
  • Knowledge and understanding of relevant legal and regulatory requirements, such as Sarbanes-Oxley Act (SOX), Personally Identifiable Information (PII) Protection and Payment Card Industry (PCI)/Data Security Standard
  • Knowledge of common information technology management frameworks, such as ISO/IEC 27001, ITIL, and COBIT
  • Prior experience in the military highly preferred
159

Contract Security Concierge Snei La Resume Examples & Samples

  • Provides exceptional customer service skills for front desk operations
  • Answers calls, greets guests, maintains excellent relations with Employees
  • Maintains a professional appearance and work area at all times
  • Serves as key member of a site building/crisis response team
  • Superior written and verbal communication skills
  • Self-directed, minimal supervision required
  • High degree of integrity and ethics
160

Contract Security Concierge Snei Sf Resume Examples & Samples

  • Access control and visitor management
  • Internal and external customer relations
  • Ensures compliance with company policies and processes
  • Ability to work effectively under high stress situations
  • Advanced computer skills and experienced with the Microsoft Office suite of programs
161

Contract Security Intrusion Analyst Resume Examples & Samples

  • Bachelor's degree required, or equivalent experience (5+ years)
  • SANS GCIA certification required, or relevant intrusion analysis experience
  • Desired Experience
162

Security Capital Resume Examples & Samples

  • Oversee updating and distribution of client and consultant reporting and marketing materials, including: quarterly reports, questionnaires, market commentaries, consultant databases, etc
  • Coordinate JPMorgan compliance approval
  • Work closely with Security Capital’s Operations Team
  • Maintain and update master slide library
  • Coordinate and draft responses to client and consultant information requests, including “Request for Proposal"
  • Bachelor’s degree in Communications, Marketing or related educational background
  • Two to three years of client service and/or operations experience in the financial services industry
  • Advanced understanding of PowerPoint, Word, Excel
163

Cyber Security Resume Examples & Samples

  • Understand the project objectives and scope and to assess associated data requirements
  • Translate complex data requests into clear, business-oriented communications
  • Create Data Requirement Specifications and Technical Specification documents
  • Critically evaluate information gathered from multiple sources, reconcile conflicts, decompose high-level information into details, abstract up from low-level information to a general understanding, and distinguish user requests from the underlying true needs
  • Able to work well with virtual globally dispersed project teams, developers and other technology SMEs
164

Security Consulting Lead Resume Examples & Samples

  • Engage IT project teams throughout the Service Delivery Life Cycle to identify and prioritize applicable security controls and provide guidance on how to implement these controls
  • Ability to build strong relationships and influence decisions
  • Candidates are preferred to hold or be actively pursuing related professional certifications within the GIAC family of certifications or CISSP, CISM or CISA and or CISSP, CISM or CISA
  • Security Architecture experience with hybrid Cloud solutions (IaaS, PaaS, SaaS)
  • Security Architecture experience with hypervisor security, operating system, web technologies, multi-factor authentication, security services and application firewalls
  • Security Architecture experience with mobile applications and mobile enterprise application platforms
  • Experience providing and validating security requirements for Cloud based information systems
  • Experience providing and validating security requirements related to a broad range of operating systems, security services, web technologies and databases
  • Experience with methodology to identify security exposures and business risks
  • Familiarity with information system attack methods and vulnerabilities
165

Information Security Resume Examples & Samples

  • Provide advice and guidance to all areas of the business to ensure information security risks are identified and mitigated in accordance to the Information Security Standards and the Operational Risk Framework
  • Act as an advisor and Subject Matter Expert for information security related risk assessments, incident analysis and strategic initiatives as well as in the development and introduction of relevant business initiatives
  • Interpret and apply information risk related policy, principles and Standards. Contribute to the development and awareness of Standards
  • Liaise with the Information Security team as part of the Operational Risk Function
  • Deliver and contribute to the design and development of specialist Information Security Risk education and training to the IT community and all areas of the business
  • Contribute to the monthly Information Security awareness topic as well as the maintenance of the Information Security intranet site as part of the Information Security Risk awareness programme
  • Maintain an awareness of current developments in information security within financial services and the wider market place. Keep up to date with developments in information security by monitoring internet websites, reading security publications and by attending relevant courses and seminars
166

Cyber Security Resume Examples & Samples

  • Create an execution strategy that focuses on embedding security controls into existing database architecture to enhance effectiveness. Success will be measured by the ability to identify risk factors associated with various database solutions and develop a decision model which identifies acceptable vs unacceptable options
  • Lead a cross LOB working group to review and approve proposed database controls and support presentations to various leadership groups
  • Provide firm wide Cyber support for secure database initiatives
  • Significant previous secure database configuration, activity monitoring, access control, and data protection experience
  • Experience as a database administrator (Oracle, SQL Server, Sybase, DB2 UDB)
  • Previous experience with Data Encryption solutions (Database, NAS/Server File System, Data Transmission)
  • Strong industry awareness of various secure database solutions
  • Specialty certification a plus (MCDBA, OCA, etc)
167

Cyber Security Resume Examples & Samples

  • Designing SM policies, procedures and protocols for our clients
  • Assisting clients to build in-house capabilities in areas such as SM, Security Operations Center (SOC), Security Information and Event Management (SIEM), etc
  • Assisting to deploy SM-related technologies to clients’ networks
  • Assessing clients’ current SM capabilities
  • Communicate complex technical issues in a manner that is accessible to a non-technical client audience
  • Work to tight deadlines while delivering high quality work products
  • Provide proactive and regular status updates and deliverables to the engagement manager
  • Monitor and escalate engagement issues as they arise
  • SOC monitoring, design and architecture
  • Architecture, administration and deployment of security solutions such as firewalls, IPSs and vulnerability identification / management systems
  • Experience with Splunk and RSA’s security monitoring technologies a plus
  • A degree in a technical field such as computer science, mathematics, engineering or similar (a Master’s degree in a relevant field would be a plus)
  • GCED - GIAC Certified Enterprise Defender
  • GCIA – GIAC Certified Intrusion Analyst
  • GCIH - GIAC Certified Incident Handler
  • GSEC - GIAC Security Essentials
  • ISSAP - Information Systems Security Architecture Professional (ISSAP)
  • EMCTA - Technology Architect
  • Splunk Certified accreditations
168

Cyber Security Resume Examples & Samples

  • Cyber Strategy & Programme Assessment
  • Threat Intelligence
  • At minimum hold an honours degree in a technical field such as computer science, mathematics, engineering or similar
  • Have an understanding of web technologies such as client-server communications, HTTP, HTML, JavaScript, CSS and AJAX
  • Have experience (college projects or professional) in programming languages such as Java, PHP, Python, Ruby, Perl, ASP or shell scripting
  • Professional penetration testing experience, or practical knowledge of Pen Testing tools
  • Professional programming or IT administration experience
  • Internationally recognised technical certifications in relevant areas
169

Security Delivery Manager Resume Examples & Samples

  • Lead the team
  • Facilitate the successful delivery of Safer Planet solution go-lives
  • Focus is on large-scale, complex projects through delivery planning and execution
  • Support sales and delivery teams to achieve Safer Planet 2015 GCG revenue objective
  • Focus on areas of collaboration and consistency across Safer Planet
  • Support software services ecosystem activities with GBS & GTS partnerships
170

Information Security Resume Examples & Samples

  • Bachelor or Master Degree with a minimum of 10 years’ working in information security/ risk experience, preferably with 5 years in a business consulting role in a leading consultancy firm. Candidates with lesser experience will be considered at Associate Director Level
  • Led, developed & grown consulting teams
  • Board and C level presentations and engagement
  • Business development in target accounts
  • Market penetration and growth
  • Identity & Access Management (IAM) highly desirable, with a focus on internal user access governance and customer facing IAM as a secondary sub competency
  • Business process engineering advisory relevant to application & systems controls
  • Role Based Access Control assurance or advisory
  • Security strategy and framework development advisory
  • Major Technology & Process transformation project governance &/or management e.g. implementation of complex technology & process based IAM solutions
  • Excellent command of written and spoken English. Proficiency in another language will be highly advantageous
  • Strong communications skills and can evidence working with people and teams from different ethnic backgrounds. Experience of working within ASEAN would be desirable
  • Demonstrated trusted advisor with in-depth understanding of the industry and market
  • Ability to develop clients and identify market growth opportunities
  • Ability to travelling as required
171

Cyber Security Resume Examples & Samples

  • Designing IR policies and procedures for our clients
  • Assisting clients to build in-house IR capabilities
  • Assessing clients’ current IR capabilities
  • Analysing malware
  • Forensic data collection (evidence handling and data acquisitions)
  • Forensic analysis and reporting
  • Experience of malware analysis and reverse engineering
  • Computer and server hardware implementation and administration
  • Basic networking implementation and administration
  • Prior IR experience for a Big 4 or recognised boutique firm
  • GCFA - GIAC Certified Forensic Analyst
  • GREM - GIAC Reverse Engineering Malware
  • EnCE - EnCase Certified Examiner
  • CCE - Certified Computer Examiner
172

Security Administration Resume Examples & Samples

  • On Risk Mgt and Control
  • Minimum of 10 years Information Security and Risk Management experience in a leadership role
  • Experience working in information security at a large multinational company
  • Strong experience in SAP security, GRC systems and SAP-BASIS
  • Thorough understanding of security requirements of Sarbanes-Oxley, and Data Privacy laws
  • Strong project management, collaboration, communication and organizational skills
  • Audit experience required
  • Certifications (preferred): CISA, CISSP, CPA, CRISC
  • Good technical know-how in the SAP GRC module
  • Subject matter expertise on security, controls, compliance & risk for enterprise apps
  • Ability to ensure appropriate availability and reliability of GRC components (e.g., software, infrastructure and services) through day-to-day support and operations. Includes the ability to evaluate, recommend, install, test, maintain, troubleshoot, document and support GRC components; manage tactical system changes; and provide third level problem determination and escalation to all stakeholders
  • IT Operating Environment: Knowledge of operating environments and security processes used in solution design and development efforts. Includes knowledge of key organizational contacts and groups supporting TCCC operations to allow for information sharing and issue resolution
  • Production Support Methodology: Knowledge on production support methods including Service Level Agreements, incident monitoring and proper customer engagement
  • Program Management: Ability to provide oversight and management to synthesize/bring synergy to multiple initiatives by establishing courses of action for self and others to ensure that work is completed efficiently, adjusting priorities, establishing management routines to effectively track progress and identify issues; removing barriers and leveraging resources
  • Software and Infrastructure Change Management: Ability to use the tools associated with change management (e.g., change management documents/forms, change management log). Includes the management of cross-functional departmental change requirements and coordination of the implementation of complex change requirements of a broad scope
  • Vendor Relationship Management: Ability to manage all aspects of vendor relationship(s) (e.g., goal setting, governance oversight, conflict resolution and performance delivery). Includes knowledge of operational interfaces and ability to manage multiple suppliers
  • Application Development Methodology: Knowledge of the standard TCCC application development methods covering the full development lifecycle (e.g., project preparation, analysis, design, development, testing, deployment and support) to ensure solution quality and consistency of process
173

Cyber Security Resume Examples & Samples

  • Participate in and, as required, lead Information/Cyber Security engagements
  • Manage the financial aspects of client engagements and communicate significant issues, fees, and estimates-to-complete to partners and clients
  • Help Partners and fellow Directors generate new business opportunities and build client networks and relationships
  • Understand all Ernst & Young service offerings and actively identify opportunities to better serve clients
  • Build strong internal relationships within Ernst & Young Advisory Services and with other services across the organisation
  • Conduct performance reviews and contribute to performance feedback for all levels of staff
  • Maintain an educational program to continually develop personal skills
  • Understand, follow and communicate workplace policies and procedures to all levels of staff
  • Ensure compliance with our Global Audit & Advisory Methodologies and applicable regulations
  • Cyber/Information Security Strategy & Programme assessments & implementation
  • Security Operations Centers & Cyber threat intelligence
  • Cyber incident response
  • Identity Access Management (IAM)
  • Data protection and privacy
  • Government & Public Sector
  • Energy & Assets
  • Products & Services
  • Technology & Telecoms
  • Financial Services
174

Information Security Adm Resume Examples & Samples

  • Excellent English communication skill
  • Good IT skills is added value
  • Simultaneously if the candidate can speak Spanish is also an added value
175

Information Security Resume Examples & Samples

  • Support in Vendor Information Security Review processes
  • Review of security posture of external vendors and vendor services
  • Identification of security risks and gaps
  • Risk evaluation and business impact analysis of the identified gaps
  • Comprehensive documentation of the identified gaps and related risk from the technical as well as from the business perspective
  • Review of vendor policies related to Information Security, comparison and gap analysis to the bank's security requirements
  • Review of implementation of the bank's security requirements by the vendor
  • Extensive communication with the project managers responsible for the outsourcing and service relationship owners as well as vendor security experts
  • Actively work with vendors and project managers on IS related findings to resolve issues as quickly as possible to help build and strengthen the relationship
176

Intermediate Security Analyst Resume Examples & Samples

  • Conduct Real-time analysis of events of interest with a focus on identifying suspicious activities, security incidents or false positives
  • Perform escalations as necessary for further treatment
  • Manage intake of security reports and potential security incidents from internal customers through internal ticketing system in a timely and accurate manner in order to resolve a multitude of information security related situations
  • Completion of a Bachelor’s degree or equivalent program in Computer Science, Management Information Systems, Information Security specializations preferred
  • Linux, Windows and Apple Operating Systems
  • Mobile Operating systems such as Android, iOS, and BlackBerry OS
  • Common Networking Protocols, TCP/IP, UDP, ICMP, etc
  • Common Attack exploits and techniques
  • Vulnerability identification and remediation techniques
  • Strong written and verbal communication skills and extensive
  • Displays basic technical currency in PKI, Access/Identity Management, secure authentication, change management and incident management
  • Illustrates basic problem diagnosis and resolution techniques in the IT environment
  • Exhibits basic knowledge of IT development processes and techniques
  • While not a requirement, nice to have certifications include CompTIA Security+, CompTIA Network+, EC-Council Certified Incident Handler (E|CIH), EC-Council Certified Security Specialist (E|CSS), or SANS GIAC Security Essentials (GSEC)
177

Intermediate Security Analyst Resume Examples & Samples

  • Access Certification Management
  • Privilege user of the Bank’s mainframe platform
  • Participates in and oversees the front line support to customers’ inquiries, complaints and problems, ensuring that customer needs are met or exceeded by resolving complaints and problems in a timely and effective manner
  • Ensures that the Department’s Service Level in the fulfillment of access, and customer requests through delivery of secured, trusted and professional services. Requests include but may not be limited to MACD of platform access profiles, remote authentication device life-cycle management
  • Verifies all security processes and procedures of the Identity and Access Management group on governance, access management and access certification conforming to the applicable industry and Bank’s security regulations, policies and standards
  • Participates in internal and external audits on all required operational evidences for auditors
  • Ensures client’s concerns and questions on security operations of Identity and Access Management, are adequately addressed with the provision of security standards, regulations and policies where applicable
  • Produces, reviews and updates documentation and reports to ensure accuracy, completeness and compliance to applicable standards and/or regulations
  • Maintains continuity of critical processes event by participating in contingency exercises and off-hours support as needed
  • Represents the team in projects requiring access or security arrangements
  • Provides training and consultancy to internal customers in areas all areas across the Enterprise
  • Provides Leadership to Certification Services and customers across the bank
  • Provides support, planning and co-ordination for IAM Education and training
  • Performs security knowledge transfer to assist making security part of normal IT and business activities to different audiences across the Enterprise
  • Possesses a university degree/college diploma in the field of Computer or Information technology or equivalent work experience, Corporate Communications and/or 3+ years of working experience in a customer oriented IT environment, exhibiting good problem diagnosis and resolution techniques
  • Demonstrates good experience in a leadership role
  • Displays good knowledge of the evolving information security system and application environment, network concepts & protocols, and information security concepts/framework
  • Illustrates good knowledge of security processes, requirements and industry standards in relation to one of the following: - Access and authentication controls in relation to add, change, delete of user id’s, Access Certification and Governance
  • Possesses 3+ years working knowledge in Identity & Access Management- Knowledge of the following: - Access Governance, Remote Authentication administration; or - User id and access management with knowledge of TSO, RACF, Vanguard, Aveksa, ITIM and/or other Identity and Access Management tools
  • Exhibits good computer skills including MS Office Excel, Word and Access
  • Demonstrates good problem identification skills and the ability to handle problems at times of a complex nature
  • Is analytical with good organizational skills
  • Displays a good commitment to continuous learning in a dynamic environment
178

Cyber Security Resume Examples & Samples

  • Works with the larger team identify exposure, vulnerability assessment, and root cause of systemic issues leading to presence of vulnerabilities/hygiene issues
  • Creates and maintains sustainable processes to track and communicate status of remediation
  • Previous exposure to the Software Development Life Cycle [SDLC] from design, build and production
179

Cyber Security Resume Examples & Samples

  • Works with multiple data sources and inventory to assess impact
  • Articulates exposure and coordinates Mitigation solutions
  • Works with Cyber Engineering and Security Operations to implement Mitigation solutions and establish monitoring
  • Provides constant situational awareness
  • Solid and demonstrable comprehension of Information Security including vulnerability & compliance tools and processes, associated vulnerabilities, awareness of emerging threats and attacks mapped to effective controls and/or Mitigation solutions
  • Ability to assess and mine using data with correlation and analysis
  • Solid and demonstrable comprehension of end to end Vulnerability Management to include industry standards such as CVE, CPE, CVSS
  • Sound awareness of leading vendor products/applications from Oracle [Java], Adobe and Microsoft to include product lifecycle & release schedules
  • Subject matter expert (SME) in one or multiple areas such as Windows, UNIX, mid-range, mainframe, database,
  • Design and implementation experience of Operational process/workflow
  • Experience in large scale Enterprise technology environments
  • Exposure to Regulatory & Audit compliance management
  • Previous experience with remote team management
180

Cyber Security Resume Examples & Samples

  • Assesses Security Advisories from multiple sources
  • Determines appropriate CVSS scoring
  • Serve as a technical escalation point for VM analysts
  • Owns the end to end process and works with engineering
  • Multiple event correlation/analysis
181

Director of Information Security Resume Examples & Samples

  • Establishes trusted relationships with AirWatch & End-User Computing executive leadership across all aspects of the business unit
  • Identifies and brokers core information security capabilities from IT Security into mobile service and solution portfolio
  • Sets appropriate success metrics and consistently drives execution
  • Partners with other engineering teams and executives to develop short- and long-term security, product and service strategies
  • Collaborates with other teams to solve security problems with minimal disruption to other business functions
  • Oversees all security hardware solutions in production for AirWatch
  • Manages the investigation and troubleshooting of security issues to determine root cause and drive solutions
  • Bachelor's in Engineering/Computer Science or related industry (or equivalent experience)
  • 7+ years of experience in Information Security, Infrastructure and Security Engineering/Operations
  • Experience with distributed systems and architecture knowledge
  • Experience in 24/7 environments with strict change control
  • Proven success in a progressive workplace
  • Capable of influencing and motivating a team of security staff in a challenging, dynamic and global environment
  • Masters in Engineering, Computer Science
  • Solid hands-on technical background particularly in understanding highly complex, multi-platform environments (servers, storage, networks, security, virtualization, systems monitoring and management)
182

Information Security Resume Examples & Samples

  • Design, develop and deploy GIDA’s global processes across all GIDA sites
  • Deliver standardization benefits to the bottom-line – in terms of control enhancement, user experience and efficiency saves
  • Responsible for all migrations into GIDA – apps transition from business as well as movement of activities from CTI and country O&T where GIDA activities are fragmented across entities
  • Own and deliver CMP products to all Citi users and rationalize products for better user experience and stronger control
  • Provides thought leadership and subject mater expertise in the IS community on committees and cross-business /functional opportunities
  • Develops and manages security solutions for multiple functional areas in partnerships with business or program coordinators in other disciplines utilizing a global risk management model to analyze emerging security threats and potential impact to business or programs and defines solutions to mitigate exposure by leveraging expert analytical and technical skills
  • By partnering with GIDA Risk & Control Lead, ensure adequate Risk and Control processes are in place in all Regions and support the audit process
  • Own the process control manual and ensure the adequacy and relevance of the PCMs
  • Advances discussions about strategic solutions for the program or business
  • Determines approach to implementing functional strategy. Accountable for end results, budgeting, planning, policy formulation and contribution to future strategy of the area(s). Impact reflects size of team managed, strategic influence on the business and interaction with other functions or businesses
  • Full management responsibility for the GPO – Ops Management team globally, including management of people, budget and planning
  • Support GIDA Head in meeting any ad hoc requirements from CSS and IS related to process design
  • Work closely with the GIDA Senior Management Team to coordinate and support overall execution of GIDA priorities and initiatives
  • Bachelor's degree or higher with a concentration in Information Technology, Computer Science or Cyber Security or a related discipline
  • 15 + years of relevant experience, to include experience in operations functions globally
  • Experience in process reengineering, transformation initiatives and driving standardization, often by pushing back against the businesses
  • Keen sense of numbers to most effectively design and use metrics to measure performance of GIDA processes
  • Knowledge or Risk and Control and experience of assessing processes from risk & control perspective
  • Knowledge of key government regulations and local laws
  • Advanced conceptual thinking in complex and/or completely new situations
  • Experience managing in a matrix global environment
  • High degree of comfort to manage and drive changes through influencing vs direct people ownership
  • Strong communications skills to influence and shape the views of GIDA site heads and GIS partners
  • Experience working in shared services environment AND / OR knowledge of the dynamics of work migration and project management
  • Excellent Excel and PowerPoint skills - advanced skills needed
  • Prior experience of dealing with senior leaders in the company
  • Strong leadership and people management skills focusing on development and growth of the team
  • Ability to travel, approximately 20-30%
183

Security Master Pricing Analyst Resume Examples & Samples

  • Responsible for the set-up, maintenance, review and reporting on approximately 30,000 cusips on the Private Bank platforms
  • Ensure timely set-up of all new security set up requests from Business and Operational partners and coordinate requests for user cusips with ICG partners to support Trust and Custody Business
  • Compile and process manual daily pricing files of non-automated vendor supplied pricing into Citi’s platform
  • Ensure execution and demonstrate evidence of daily quality control checks on all asset set-up and maintenance activities
  • Conduct regular quality checks, review data discrepancies and resolve issues for pricing rejects, price changes, etc
  • Compile and track issues with Third Party data service providers and participate in regularly schedules calls
  • Ensure all maker checker processes are followed and properly evidenced
  • Responsible for all metrics and MCA reporting as required
  • Ability to handle high volumes and ability to prioritize work flow to ensure delivery against global market cutoff times
  • Knowledge in the use of Bloomberg, Reuters and Interactive Data Corp systems with respect to extraction of security reference data
  • Familiar with calculation and components of U.S. Cost Basis Tax reporting requirements with focus on Bond Amortization, Accretion, OID, etc. and relevance to certain security types
  • Strong written and verbal communication skills; ability to communicate with all levels of management and various groups within Citi (Bankers, Account officers, Operations Managers, Technology teams and Third Party Service Providers)
  • Strong understanding of Tax and Client Reporting with focus on Bond Amortization, TIPS, OID and Cost Basis calculations and reporting)
  • Client Service oriented with the ability to create relationships throughout Operations, Technology and various business lines
  • Detail-oriented with a demonstrated ability to produce high quality and accurate work
  • Excellent MS Office skills with focus on Excel, Access, PowerPoint, etc
184

Security Master Pricing Analyst Resume Examples & Samples

  • Ensure timely set up of all new security set-up requests from Business and Operational partners and coordinate requests for user cusips with ICG partners to support Trust and Custody Business
  • Responsible for all Metrics and MCA reporting as required
  • Strong written and verbal communication skills; ability to communicate with all levels of management and various groups within Citi (Bankers, Account officers, Operations Managers, Technology Teams and Third Party Service Providers)
185

Information Security Resume Examples & Samples

  • Bachelor's Degree or equivalent work experience
  • 5+ yrs business experience (preferably in Ops or an Info Security environment)
  • Previous Leadership experience, Team Leader, Supervisory experience desired
  • Security administration experience preferred, supporting a large user environment
186

Information Security Resume Examples & Samples

  • In depth knowledge in source code review tools such as HP Fortify, IBM Source scan, Checkmarx etc
  • Should have experience in source code review of various languages such as Java, Python, C, C++ etc
  • Perform manual source code review
  • Should have experience in integration of security tools with build environments to ensure iterative scanning during the Secure-SDLC
  • Communication and presentation skillsExecute Network vulnerability assessments, attack and penetration testing and web application security reviews, network device configuration reviews, OS/DB security reviews
  • Develop and test exploits which will be used for Attack and Penetration testing
  • Develop advanced custom security scanning tools / customize the existing tools
  • Use of various security tools and methodologies
  • Interface with both external internal clients
  • Should come up with innovative and smart ways of doing work, without compromising on quality
  • Should prioritize and manage multiple tasks
  • Should be capable of leading and guiding junior resources
  • MCA/Bachelors in Engineering in Computer Science and Engineering or equivalent /BCA
  • Strong knowledge of TCP/IP, Basic Concepts of OSI layer and protocols, Basic knowledge of networking and security concepts, Knowledge of OS (Windows / Linux)
  • Knowledge in Scripting - Perl / Bash
  • Knowledge on tools like Nessus, BackTrack etc. is a definite plus
  • Knowledge virtualization security solutions and tools
  • In- depth Knowledge TCP/IP, Network Security and application security
  • Knowledge of IT Infrastructure, security devices, OS, Databases etc
  • Good understanding of networking protocols and application communications
  • Good Presentation and customer interaction skills
  • Good analytical capability
  • Should be able to deliver and work with challenges in the market
  • Ability to build and maintain relationships with a diverse group of clients and internal teams
  • Preferred certifications : CISSP, OSCP, OSCE, GPEN, CEH
  • Similar experience in any BIG 4 companies prefered
187

Security Resume Examples & Samples

  • Sort Night Audit packet. Review and balance all daily receipts and payments from departments within the resort. Correct any discrepancies
  • Print and copy all reports to the accounting department and copy hotel mgr
  • Print protobase/Webvu reports and look for duplicate or missing charges. Correct any discrepincies before transmitting to the bank
  • Run night audit / ADR Report / Invoices for accounting
  • Perform duties of Guest Service Agent as dictated by business (i.e. check in, check out, various guest services
188

Security Processing Rep Resume Examples & Samples

  • Having 4-5 years of work experience in Financial and investment banking operations
  • Must have knowledge and experience of Trade settlements, Corporate actions and Paid income and Fee reconciliations
  • Good working attitude and communication skills
  • Ability to backup team and perform during high transaction volumes
189

Security Resume Examples & Samples

  • Bilingual (Spanish, Portuguese, French and/or Japanese)
  • Florida Class "D" Security license
  • Associates Degree or higher in Criminal Justice or security related field
190

Security Resume Examples & Samples

  • You must have a valid California Driver License to be considered for this role
  • Prolonged standing for two to three hours at a time and heavy lifting may be required
  • Willing to work at various heights is required
  • Demonstrated strong computer proficiency, including typing skills and the ability to navigate through multiple computer systems
  • Must be flexible and able to work a variety of shifts, including days, nights, weekends, holidays and special events
  • This role is Part Time and requires full availability for any shift, a MINIMUM of three (3) days per week, including nights and holidays
  • Full availability for any shift, seven (7) days per week, including nights, weekends, and holidays is preferred
191

Intermediate Security Analyst Resume Examples & Samples

  • The IPC Intermediate Security Analyst will have a basic understanding of
  • Strong written and verbal communication skills and extensive attention to detail
  • Completion of a Bachelor’s degree or equivalent program in Computer Science, Management Information Systems or similar field is preferred
192

Cyber Security Resume Examples & Samples

  • Must have prior experience supporting or troubleshooting applications and systems
  • IT experience with the ability to articulate and document support and operational processes, various tools and monitoring agents
  • Other complimentary skills include: Business knowledge regarding banking and financial services
  • Available to work in an on-call weekend rotation roughly every 8 weeks
  • Experience with 1 or more of the following systems: Symantec DLP, Symantec Endpoint Protection (SEP), Tanium, Bromium, Qualys, CAP/Skybox, Tripwire, or Symantec Enterprise System Manager (ESM)
  • The knowledge of 1 or more scripting or programming languages (Shell, Perl, PHP, VBScript, Python, etc.)
  • Relevant security or industry certification(s) desired (Red Hat, Microsoft Windows, CISSP)
193

Database Security Analyst Resume Examples & Samples

  • Monitoring of the Database Security infrastructure and capacity planning
  • Support forecasting infrastructure requirements and managing deployments to relevant data centres
  • Providing reports/extracts of audit data as required to meeting regulatory requirements and historic evidence
  • Follow up on security events to ensure database privileges are not abused
  • Monitoring impact to application owned database hosts to ensure that the local agents are not impacting other services
  • University degree (optional)
  • IT related experience/exposure (optional)
  • Good communications and skills – English specifically
  • Ability to be flexible to an every changing environment
  • Enthusiasm and keenness to learn new skills
194

Security Resume Examples & Samples

  • Lead successful implementation of security strategies through onstage supervision
  • Constantly evaluating security operations and developing strategies to evolve and improve
  • Act as First Responder as needed
  • Communicate trends and other significant information with senior leaders, peers or other teams
  • Provide daily leadership that inspires and develops Guest Service Managers as well as Cast
  • Performance manage Guest Service Managers, coaching/counseling and issuing disciplinary action as necessary
  • Ensure required documentation of incidents/situations is completed
  • Ensure required operational paperwork and administration is completed (e.g. Workbrain, etc.)
  • Support senior leaders with implementation of Security Special Services and/or Security & Emergency Services strategies as directed
  • Minimum of 3 years Leadership experience
  • Minimum of 3 years operational/onstage experience
  • First Responder skills/experience
  • Assertive and proactive in identifying and resolving issues and concerns
  • Strong organization skills and attention to detail
  • Builds strong relationships – works with others in collaborative, integrated manner
  • Strong computer literacy – familiarity with Microsoft office and aptitude to easily learn other software programs
  • Prior security, law enforcement, military or comparable experience
  • Bachelor’s degree in law enforcement or related fields
195

Cyber Security Resume Examples & Samples

  • Participate in project planning sessions to analyze business requirements
  • Create technical requirements, technical designs, coding unit testing and supporting user testing
  • Work with a team of developers on global initiatives
  • Provide estimates and updates to project managers
  • Learn and employ the bank’s IT Control Policy and Corporate Architectural Standards when designing and building application workflows and create appropriate project documentation
  • Debug application issues and provide 3rd level support for resolution of production issues
  • 5+ years of experience as an Application Developer
  • 4+ years of experience with Pega Systems PRPC (7.x preferred, 6.x required)
  • 3+ years’ experience of enterprise level systems development with strong knowledge of industry standard interface protocols (i.e. SOAP, MQ, HTTP, EJB, etc.)
  • In depth knowledge of design, development, testing and debugging skills in PRPC
  • Proficient in explaining application architecture and design
  • Strong working knowledge or Pega Standards and Guardrails
  • Strong knowledge of PRPC optimization, profiling, and trouble shooting
  • Familiarity with Object Oriented Concepts and how it applies in PRPC
  • Experience in creating technical design documents and performing code reviews
  • Working knowledge of SQL
  • Ability to effectively manage multiple projects simultaneously
  • Ability to rapidly create prototypes
  • Ability to identify reuse patterns
  • Exposure to version control tools and processes
  • Knowledge of agile/scrum methodology
  • Strong skills in project management methodologies and tools
  • Exposure to Direct Capture of Objectives (DCO) would be a plus
  • Exposure to BIX is desirable
  • 2+ years of programming and design experience utilizing JAVA/
  • Experience working in Linux/Unix environment is desirable
  • Exposure to webserver/app server setup and PRPC setup is a plus
  • CSSA/CLSA certification is a plus
  • Excellent verbal and written communication skills are required
  • Ability to communicate to business in their language and translate business requirements to technical requirements
  • Ability to identify and clearly communicate problems/support requests in order to influence the prioritization of production defects and/or enhancements
  • Ability to work well in a team oriented, agile environment
  • Leadership skills and ability to collaborate with and influence other technology teams to deliver end to end solutions to the business in a constantly changing environment
196

Information Security Resume Examples & Samples

  • Lead the Application Security Management (ASM) – Suspicious Activity Detection global program to provide “layered security” in response to FFIEC regulatory guidelines
  • Perform application risk assessments and manage gap remediation across different channels – web, mobile, tablet, Automatic Teller Machines (ATM) and Interactive Voice response (IVR) applications
  • Assess user interdiction options by coordinating with business and technology teams based on multi-factor authentication and risk-based authentication guidelines
  • Prioritize program deliverables and manage the day-to-day workflow of a global team
  • Enforce program policies on scoping parameters, application assessment requirements and remediation timeframes
  • Support internal and external audit responses by gathering artifacts and evidence to support compliance
  • Create/review data and process documentation to educate business/technology owners on the program
  • Select and tailor approaches, methods and tools to support the program and related sub-projects
  • Bachelor’s degree in an accredited educational institution (Computer Science, Engineering, Information Systems and Technology is preferred)
  • 5+ years of experience in IT Risk Management and/or Information Security
  • 5+ years of experience in Software Development Lifecycle (SDLC) including Agile methodology
  • 2+ years of experience in management reporting and metrics
  • Demonstrate strong knowledge of application security including experience in code development, architecture design, web session management and multi-factor authentication/authorization methods
  • In-depth knowledge of security concepts such as cyber attacks and techniques, threat vectors, risk management, incident management and such
  • Working knowledge and exposure to following tools – HP-ArcSight (or other SIEM tools such as RSA Envision, IBM Qradar), RSA – risk-based authentication and Archer
  • Strong communication and presentation skills with ability to interact with different levels of management
  • Financial services experience is strongly preferred
  • Certified Information Systems Security Professional (CISSP) is strongly preferred
197

Information Security Resume Examples & Samples

  • Manage assessments of new or existing applications and guide the business app dev teams through initial or modified data mapping files for both Category 1 & 2
  • Setting up meetings and conference calls with Development teams, ISO’s, application managers, members of Fraud and the GIS, CTI and CATE (where necessary) orgs
  • Provide businesses with full description of the SAD Program in as much detail as is necessary, when needed
  • Extensive use of the Archer to archive status of compliance, actions, deliverables and to manager the queue for follow-up tasks
  • Manage various outputs as needed including reports directly from Archer or other spreadsheets, Power Point decks….etc. when needed
  • Coordinate with MFA, the ArcSight onboarding team or SECOPS where data or applications need to be clarified or reviewed for additional clarification or updated status
  • Prepare slides for the weekly MFA/SAD Committee reviews
  • Bachelor’s degree in Computer Science/Technology or equivalent work experience
  • 3+ years of experience in IT Risk Management/Information Security specifically performing IT Risk Assessment for web applications/infrastructure
  • 2+ years of experience in IT program management
  • 2+ years of experience in reporting and metrics
  • Strong MS Excel and PowerPoint skills
  • Experience and knowledge of Archer is a bonus
  • Thorough understanding of Software Development Lifecycle (SDLC) including Agile Methodology and Cloud sourcing
  • Thorough understanding of web application design and architecture as well as application and network level nomenclature and models, including Mobile technology channels, API’s, SDK’s, middleware, authentication protocols and more
  • Financial services experience is strongly preferred; including familiarity with FFIEC guidelines (Authentication in an Internet Banking Environment)
  • A confident, dynamic individual capable of defining, building and matrix managing a global program across technology and business organizations in a constantly evolving global enterprize
  • Excellent interpersonal communication and presentation skills (Soft Skills); bi-lingual Spanish is very preferred
198

Global Cyber Security Audit Forensics & Investigations Resume Examples & Samples

  • Participate in all aspects of audit activities including risk assessments, planning, testing, evaluation, report creation, documentation, and determining effectiveness of risk mitigation plans across the Global Cybersecurity business
  • Establish strong relationships with senior Global Cybersecurity leadership, related controls groups and business auditors
  • Share knowledge, techniques and toolsets with colleagues within the team to build proficiency in the Cybersecurity Audit Team
199

Security Resume Examples & Samples

  • Includes but not limited to the following positions: Land Officer Position, Gate and Entrances, Dispatch
  • Conduct foot patrol of interior and exterior of the resort to identify security and safety risks or undesirable conditions. Evaluate situations and make logical decisions on how to proceed and direct work
  • Maintain order in the resort, dealing with the welfare of Guests, assisting with door lock challenges, coordinate expedient response to emergency conditions such as fire, fire or safety hazards and threats to life and/or property in a calm, rational and persuasive manner. Handle undesired conduct, violations of resort policy and civil laws as warranted for the security and safety of resort Guests, cast members, patrons and property
  • Answer security telephone and safety hotline calls and respond in a timely manner based on priority
  • Provide cash escorts for all cashiers to/from cash room to their work station
  • Uses moderately complex console to receive calls from Guests, vendors and cast members etc., requiring assistance and dispatches security host/hostess to resolve situation; Maintain logs of all requests
  • Assists cast members, visitors and vendors who request assistance or ask a question Issues Contractor and Visitor Badges upon arriving on property
  • Memorize and monitor life safety system including accurate layout of entire resort building, locations of stand pipes, fire extinguishers, complete alarm reports and checks and report any pertinent information from each shift
  • Observe Closed Circuit Television (CCTV) monitors for any unusual activity and in the case of suspicious behavior/alarms report directly, via two-way radio, to Lead on duty
  • Administer AED, CPR and First Aid as needed
  • Security Cast Members may also be trained in Cardiopulmonary resuscitation (CPR) and Automated External Defibrillator (AED) procedures to respond to Guest and Cast emergencies as needed
  • You must have a valid Driver License to be considered for this role
  • Possession of or in the process of obtaining the State of Hawaii Guard Card required
  • This role is Full-Time role and requires full availability for any shift, seven days per week, including nights, weekends, and holidays
200

Security Resume Examples & Samples

  • Call police or fire departments in cases of emergency, such as fire or presence of unauthorized persons
  • Circulate among visitors, patrons, or employees to preserve order and protect property
  • Operate detecting devices to screen individuals and prevent passage of prohibited articles into restricted areas
  • Warn persons of rule infractions or violations, and apprehend or evict violators from premises
  • High school diploma or equivalent required plus any Security/Law Enforcement experience preferred. Guard Card a plus
  • Ability to communicate effectively both orally and in writing with staff and the public, to understand and follow standard operating procedures
  • Ability to perform duties in a professional manner and appearance, to write and investigate required reports; to make independent and good judgment decisions within proper policy and procedures
201

Security Resume Examples & Samples

  • Demonstrate Safety as a primary focus
  • May perform key service requests
  • Handle, or assist with, intoxicated Guests
  • Able to perform hotel evacuation procedures
  • Operate automatic and manual vehicle deterrent systems such as bollards
  • Ensure authorized personnel enter on site using a computer to verify approved access
  • You must have a current California Driver License to be considered for this role
  • Must meet the physical demands, including but not limited to
202

Security Resume Examples & Samples

  • Exhibit exceptional Guest Service skills
  • Continuous positive interaction with all individuals (e.g. Guests, Cast Members, Vendors, Op Participants, etc.)
  • Maintain situational awareness at all times
  • Perform bag checks and other inspections to verify no unauthorized items enter or leave property
203

Security Resume Examples & Samples

  • Initial implementation of IBM BigFix
  • Developing unique and reusable solutions on the IBM BigFix platform
  • Integrating IBM BigFix into other products (representational state transfer (REST)Simple Object Access Protocol (SOAP)
  • Basic project management
  • Providing training on IBM BigFix
  • Scoping of new services delivery projects
  • Giving and receiving mentoring to IBM Employees and Partners in IBM BigFix skills
  • Providing technical team leadership to junior consultants
  • Receiving exposure and training on the latest IBM BigFix solutions
  • Interfacing and collaborating with IBM BigFix development, support, offering management and sales teams
  • Familiarity or experience with mobile device management skills, either in application development or managing device security on iOS or Android
  • Familiarity or experience with patching, security management or operations of Oracle database server, IBM Websphere Application, IBM DB2
  • Domain expertise in Software Asset/License Management
  • Recent Node.js application development
  • User Interface (UI) or web development
  • Comfortable with conversations and deliverables to corporate information technology (IT) operations techs and managers, IT security teams, network teams, application developers and executive stakeholders
  • Comfortable with Microsoft Windows and one of these operating systems: AIX,Red Hat Enterprise Linux (RHEL),Ubuntu, Suse, Solaris and OS X
  • Familiarity with database functionality, especially Microsoft Structured Query Language (SQL) or IBM DB2 databases. Build queries, tune performance, adjust security
  • 4 years recent experience in server or desktop systems management activities such as OS or application security hardening, license management software distribution, imaging/operating system deployment, BigFix, Puppet, Chef, System Center Configuration Manager, Landesk, Kace, YUM
  • 1 year experience with at least one scripting or formal programing language such as JavaScript, Java, c variants, .NET, Perl or similar. Write integrations with this language
  • Basic Project management including kickoff, requirements gathering, scope management, work plan, status reporting, issues tracking, project closure
  • Comfortable with conversations and deliverables to corporate IT operations techs and managers, IT security teams, network teams, application developers and executive stakeholders
204

Information Security Enginr Resume Examples & Samples

  • Performs IT Security Investigations - CIRT and makes recommendations to management on findings and solutions
  • Performs detailed technical reviews of documentation to ensure computer security integration and compliance to all banking regulations (FDIC, GLBA, CA SB1386, etc.)
  • CISSP - Certified Information Technology Security Professional; CCSP - Certified Cisco Security professional; GIAC - Global Information Assurance Certification; CISM Certified Information Security Manager
  • 3 – 5 years experience in developing and monitoring an information security function
  • 1 – 2 years of Banking/finance Industry
205

Manager of Security Resume Examples & Samples

  • Provides vulnerability assessments, conducts and coordinate security/safety training, and consulting related to security matters
  • Supports News Directors and other managers with issues of personal security of employees and safeguard of AP facilities and proprietary assets
  • Leads/coordinates investigations and conducts security reviews, as required
  • Participates in the development and maintenance of emergency response and crisis management and business continuity plans
  • Supports all internal investigations, in conjunction with the AP Audit Team when appropriate, including fraud, loss, damage or other incidents affecting property, visitors or staff
  • Responsible for maintaining uniformity and consistency of Global Security policies and best practices and ensuring compliance
  • Manages the collection, analysis and dissemination of critical information to those that have a need to know
  • Strong leadership skills with the ability to influence, develop and motivate others required
  • Experience in investigation and international security issues required
  • Experience with the management of a security service, either as an in-house service or with an outsourced provider required
  • Prior experience with police forces or law enforcement agencies, an asset
  • Excellent communication skills with the ability to effectively deliver information to a diverse range of audiences required
  • Fluency in spoken and written English required
  • Proficiency in African languages highly desired
  • Analytical skills necessary for the collation of intelligence information required
  • Inter-cultural sensitivity is essential
  • High integrity and work ethic required
  • Available for frequent travel, including high risk environments required
  • Legal authorization to work Egypt is required
206

Security Monitoring Analyst Resume Examples & Samples

  • Review the alerts and security incidents upon identification of any issues/process violation
  • Track and report the related security incidents
  • Coordinate and post responses, provide related reporting and maintain procedure documents
  • Identify, document and flag the incidents where investigation cannot be progressed further due to missing or insufficient information
  • Knowledge of operating systems such as Windows, UNIX, Databases Oracle, MS SQL, Sybase & DB2 (preferably administration) (minimum one)
  • Confidence and ability to communicate effectively different levels of technical understanding
  • Self-motivation, discipline and ability to work well in a team environment but also on an individual basis to ensure tasks/actions are completed
  • Ability to work in shifts
207

Cyber Security Resume Examples & Samples

  • 5+ year's intelligence or cyber operations experience
  • 5+ year's experience in a large, mission-critical environment
  • 7+ total years technology experience
  • Experience in network intrusion methods and network forensics
  • Ability to apply a thorough knowledge of attacker capabilities, intentions, motives, and historical operations/targets to inform JPMC Cybersecurity strategies quickly, clearly and effectively
  • Strong written and verbal communication skills; ability to understand complex problems while formally presenting them simplistically
  • Extensive knowledge of the cyber threat landscape within the Asia-Pacific region
  • Bachelor's Degree in Computer Science or related field, or equivalent experience
  • Significant malware analysis, virus exploitation and mitigation techniques experience
  • Coding (scripting) experience e.g. Perl, VB Script, Python etc
  • Experience with Lockheed Martin’s Cyber Kill Chain TM and Intelligence Driven Defense
  • Experience with researching and tracking Advanced Persistent Threat (APT) campaigns
  • Conducting malware analysis and reverse engineering on suspicious code, and producing detailed findings reports
  • Experience of the financial industry
208

Information Security Resume Examples & Samples

  • Responsible for working with the companies BCP Manager in the daily coordination and support of the BCP activities and assigned projects as needed
  • Maintain and continue the functions of the BCP department and the BCP program, during normal and abnormal circumstances
  • Work with technology owners to coordinate Disaster Recovery activities and provide guidance and feedback to assure BCP framework is addressed
  • Conduct vendor due diligence and annual vendor reviews to ensure partnering vendors are properly addressing business contingencies
  • Must be a great team player and a Self-Motivator
  • Assist with activities related to the FFIEC exams, SSAE 16, Internal and PCI audits
  • MS Office skills with particular strengths in Excel
  • Basic understanding of using SunGard’s LDRPS
  • Basic understanding of IT data center recovery methodologies in order to effectively consider those in the business are plans
  • Ability to coordinate with BCP leaders and coordinators to develop and maintain plans and to conduct training, exercising and testing programs for each business unit
  • Ability to understand (or learn) the vendor business functions as well as the IT functions relating to the vendor business functions and services required
  • Understanding of the BCP regulatory requirements that are applied to the financial industry along with those that relate to vendors and service providers as well as training, exercising and testing
  • Knowledge of IT controls to meet PCI, SSAE 16 and FFIEC compliance requirements
  • Solid project management skills, especially in a cross-functional environment
209

Cyber Security Resume Examples & Samples

  • 2+ years cyber intelligence experience
  • 3+ years experience in a large, mission-critical environment
  • 5+ total years technology experience
  • Working knowledge of the intelligence lifecycle and current cyber threat landscape
  • Experience determining source information accuracy
  • Experience with Lockheed Martin’s Cyber Kill ChainTM and Intelligence Driven Defense
  • Experience with Splunk Enterprise
  • Experience with Threat Intelligence Platforms
210

Cyber Security Resume Examples & Samples

  • Cloud security and risk management
  • Cyber Strategy, Programme Assessment, Mobilisation and Execution
  • Cyber security architecture
211

Director of Information Security Resume Examples & Samples

  • 6+ years of information security experience in increasingly responsible roles
  • Professional certification in information security (for example, CISSP, CISM or CISA) desired
  • Ability to effectively work across organizational boundaries to build a case for change
  • Experienced in, and able to formulate, the cost effectiveness benefit of security initiatives in the context of overall business risk mitigation and the company’s operational objectives
  • Demonstrated understanding of recognized security industry standards and leading practices such as the NIST Cybersecurity Framework
  • Knowledge of technological trends and developments in the areas of information security, risk management, web architectures and cloud computing
  • Experience managing teams
  • Share
212

Cyber Security Resume Examples & Samples

  • A bachelor's degree and approximately 4+ years of related work experience in IT Security
  • A degree in computer science, engineering or a related field
  • CISSP, CISSM preferred
  • Previous work experience in big 4 or large global consulting firms
  • Good understanding of various security domains
  • Strong written and verbal communication, presentation, client service and technical writing skills, coupled with a strong interest in further developing Cyber Security consultative skills
  • Ability and comfort level researching client inquiries and emerging issues, including regulations, industry practices, and new technologies
213

Cyber Security Resume Examples & Samples

  • Drive the identification & classification of technology assets
  • Execute to strategy, framework and program schedule for technology control assessments
  • Review action plans and resolution of control issues/breaks
  • Ensure the implementation of firm-wide risk management policies
  • Monitor the control environment with respect to all technical, financial and operations processes
  • IT and cybersecurity policies and standards
  • Incident management
  • Application security and secure systems development lifecycle
214

Information Security Intern Resume Examples & Samples

  • Engagement: Working on creative, innovative, and thought-provoking projects within various business units at Comcast and one other startup company during a 10-week summer internship
  • Exposure: An inside look into the day-to-day operations of an organization at the cutting edge of media and technology
  • Professional development: You will be exposed to a variety of professional development topics facilitated through our partners at Comcast University and senior leaders within the organization
  • Mentorship: Mentoring from fellow colleagues through the Empowering Future Leaders Program (EFLP) to help you navigate your summer experience, provide coaching, and expand your professional network
  • Fun: Continuously develop relationships with fellow interns through social activities, community building, and networking
  • Individual and collaborative taks for Comcast's Information Security Team
  • Currently enrolled and pursuing a Bachelor's degree from a United States-based college or university with the Grad year of 2019
  • Major(s): Computer Science, Computer Engineering
  • Minimum 3.0 GPA
  • Originally from the Philadelphia area
  • Possess strong Microsoft Excel skill set
  • Strong technical written and verbal communication in English
  • Willingness to learn and work in a fast-paced environment
  • Strong interest in the telecommunications, cable and media industries
  • Effective communication and interpersonal skills (both written and verbal)
  • Technical Proficiency (Particularly with Microsoft Office applications)
  • Strong analytical skills and ability to interpret
  • Ability to work on a team
  • Authorized to work in the United States of America
215

Cyber Security Resume Examples & Samples

  • Minimum of 2 years' prior experience conducting collection and preservation of electronic evidence in a corporate environment
  • Prior experience of at least two years working in a corporate or enterprise consulting role preferred
  • Ability to conduct evidence collection using network and physical collection protocols in a forensically sound manner while maintaining chain of custody throughout the collection and preservation process
  • Strong attention to detail in conducting forensic preservation and analysis combined with an ability to accurately record full documentation in support of an investigation
  • Proficiency in languages other than English is a plus
  • Ability to communicate effectively with business representatives in explaining forensic findings clearly and where necessary, in layman’s terms
216

Information Security Resume Examples & Samples

  • Support Federal Financial Institutions Examinations Council (FFIEC) compliance projects as required including managing projects, interacting with application managers, ISOs and LOBs to communicate requirements, perform application risk assessments and track compliance
  • Enforce program policies on scoping parameters, testing requirements and remediation timeframes
  • Prioritize program deliverables and manage day-to-day team workflow
  • Confirm the scope of applications in the lifecycle phases of Planned/Development/Production that meet the following criteria
  • Experience in the use and knowledge of Archer is a bonus
  • A confident, dynamic individual capable of defining, building and matrix managing a global program across technology and business organizations in a constantly evolving global enterprise
  • Excellent interpersonal communication and presentation skills (Soft Skills)
  • Ability to understand end to end processes
217

Intermediate Security Analyst Resume Examples & Samples

  • Completes research, development and implementation of straightforward information security initiatives, including review of policy, program, process, procedural and technology improvements and solutions to ensure they are current and meet business needs
  • Gather research covering latest security threats and vulnerabilities. Identifies weaknesses and exposures. Drafts and presents protection and mitigation strategies for peer review, input and feedback
  • Supports and maintains BCM activities, such as creation and subsequent updates to plans and procedures; coordination and participation of tests and exercises, including documentation of results; may perform tasks during a crisis as requested by Crisis Management Team
  • Provide input, creates awareness and training materials and leads certain activities, such as hardcopy and online learning content, presentations, pamphlets, electronic communications (e.g., internal blogs)
  • Perform and lead certain procedural tasks found within cyber threat management processes, such as gathering and reviewing threat intelligence, supervises vulnerability data and actions, reviewing consolidated data from security monitoring technologies, supporting countermeasure planning
  • Perform and lead certain procedural tasks found within event and incident response processes, such as identifies issues and actions, reviews artifacts and evidence, supervises coordination of tasks
  • Perform and lead certain procedural tasks found within control self-assessments and security exception/waiver processes, such as entering and reviewing critical assets and associated ratings, recommending action plans, submitting and reviewing security exception/waivers to asset owner
  • Perform and lead certain procedural tasks found within third-party assessments, such as reviewing due-diligence artifacts, supervising tasks, reviewing results and recommending outcomes
  • Perform procedural tasks found within other security processes, such as information management, classification and protection; policy management
  • Ability to help employees and contractors understand their role in safeguarding information, technology and services by being an ambassador. Assist and show where policies, processes and procedures can be found and explain why they should be followed
  • Tracks current and impeding laws, regulations and industry requirements and best practices, such as data protection, data privacy, cyber security and information security. Is able to translate requirements into practical solutions
  • Gathers data, analyzes and drafts reports, including department, project, key indicators and dashboards. Assists with requirements and improvement plans
  • Conforms with and abides by all regulations, policies, work procedures, instruction and all safety rules
218

Cyber Security Resume Examples & Samples

  • Fill the role of subject matter expert (SME) for products assigned to the team which you are aligned
  • Resolve L2 Escalations for aligned products; determine resolution and required enhancements to improve products and support model
  • Identify inadequacies within the environment and implement solutions to resolve them
  • Provide expertise in the full range of technology controls practices: Information Risk Management, Business Continuity and Disaster Recovery, IT Control Policies (i.e. Identity and Access Management), and Problem, Incident and Change Management Processes
  • Provide high level support and escalations for Cyber Tech Operations team
  • Drive client service improvements, automation, designing and development of dashboards and implementation of monitoring solutions
  • Project implementation and execution; Data mining, analysis and reporting
  • Coordination and evidence gathering for Audits / RCSAs (Action Plans)
  • Must have 2-4 years’ experience supporting and troubleshooting information security applications and systems
  • 4-6 years of overall IT experience with the ability to articulate and document support the operational processes
  • Excellent written, interpersonal planning and organizational skills with the ability to communicate at all levels of the organization
  • Technical understanding of large enterprise environments and system integration and design
  • Must have 2-4 years’ experience with Linux and/or Microsoft Windows Servers Operating Systems management
  • Hands-on experience with security or monitoring products, with in-depth knowledge of 2 or more of the following systems: Symantec DLP, Symantec Endpoint Protection (SEP), Tanium, Bromium, CAP/Skybox, Tripwire, Symantec Enterprise System Manager (ESM), Splunk, ArcSight and/or Qualys Guard Enterprise Scanner
  • 5+ years experience of scripting / programming desired (Shell, Perl, PHP, VBScript, Python, etc.)
  • Understanding of defense-in-depth and layered network security architectures. Web Servers, Encryption
  • Administrative and functional understanding of relational database systems such as MSSQL, Oracle, MySQL
  • Vendor certifications such as MCSA, MTA, MCSE, RHCSA, RHCE, CCIE, CCNA, CCNP, and CCSP etc. preferred
  • Security certifications such as CISSP, CEH, CISA, SANS GIAC, etc. desired
219

Cyber Security Resume Examples & Samples

  • Provide support for security applications assigned to the team as part of a 24x7 operational support model
  • Identify inadequacies within the environment and construct solutions to resolve the problem
  • Provide expertise in the full range of technology controls practices: information risk management, business resiliency, IT control policies, problem, incident and change management processes, as identified
  • Coordination with other teams for ongoing maintenance, patching and reboots cycles for related system
  • Assuring compliance with Rules of the Road for Global Technologists: (Security, Stability, Standards)
  • Participate in the on-call rotation of the team
  • Ability to work as part of a team of technicians and contribute to the overall success of the organization
  • Must have prior experience supporting and troubleshooting applications and enterprise systems
  • IT experience with the ability to articulate and document the support and operational processes performed
  • Excellent written, interpersonal, planning, and organizational skills with the ability to communicate at all levels of the organization
  • Technical understanding of large enterprise environments and system integration
  • Other complimentary skills include: Business knowledge related to banking and financial services
  • Experience with Linux and Microsoft Windows Server Operating system administration
  • Hands-on experience with security or monitoring products with knowledge of 1 or more of the following systems: Symantec DLP, Symantec Endpoint Protection (SEP), Tanium, Bromium, Qualys, CAP/Skybox, Tripwire, Symantec Enterprise System Manager (ESM), Splunk, ArcSight, Network Vulnerability Assessments
  • Functional understanding of relational database systems, i.e. MSSQL, Oracle, MySQL
  • Functional understanding of web servers, SSL certificates, TCP/IP and related processes and services
220

Information Security Resume Examples & Samples

  • Bachelor or Master Degree with a minimum of 8 years’ working in information security/ risk experience, preferably with 3 years in a business consulting role in a leading consultancy firm. Candidates with lesser experience will be considered at Senior Associate Level
  • Led small engagement based consulting team
  • GM level presentations and stakeholder engagement
  • Identification of engagement based on-sell opportunities
  • GC experience desirable
  • Technical delivery lead experience in implementation of Identity & Access Management (IAM) solutions, with a focus on implementation of internal / employee user access management solutions
  • Must be very familiar with at least one of the following IAM technologies such as SailPoint, RSA Aveksa / VIA & Oracle (OIM, OIA)
  • Team management
  • Some project management
  • Architecture & design lead experience in implementation of Identity & Access Management (IAM) solutions highly desirable, with a focus on implementation of internal user access management solutions
  • Regulatory advisory as relevant to information security regulatory guidelines or mandates
  • For internal staff application, please note that you must have been in your current role for at least 12 months
221

Information Security Resume Examples & Samples

  • Bachelor or Master Degree with a minimum of 5 years’ working in information security/ risk experience, preferably with 2 years in a business consulting role in a leading consultancy firm. Candidates with lesser experience will be considered at Associate Level
  • GM/ Manager level presentations and stakeholder engagement
  • Solution design and build up of Identity & Access Management (IAM) solutions highly desirable, with a focus on implementation of internal / employee user access management solutions e.g. SailPoint & Oracle (OIM, OIA)
  • Solution design of Threat & Vulnerability Management solutions such as implementation of SIEM (e.g. ArcSight) & Security Analytics (e.g.RSA Security Analytics) within the context of a Security Operating Centre framework
  • Business process analysis and design for Identity & Access Management (IAM) solutions, with a focus on implementation of internal / employee user access management solutions
  • Change management design and delivery
  • Must be very familiar with at least one of the following IAM technologies such as SailPoint, RSA Aveksa / VIA & Oracle (OIM, OIA), IBM Tivoli
  • Assurance or advisory relevant to application and system user controls or Threat & Vulnerability Management at the systems layer
222

Information Security Intern Resume Examples & Samples

  • Review and provide reporting on malware status
  • Inventory forensics cabinet (create document library in SharePoint for inventory)
  • Conduct media sanitization
  • Assist with running systems vulnerability scans
  • Search for unauthorized security related/risk software on workstations and create report
  • Create specific process documentation (e.g. forensic inventory process and labeling)
  • Participate in technical discussions with Info Sec team
  • Exposure to light HTML, Java Script coding, or other development tools
  • Strong desktop Windows operating system experience
  • Knowledge of computer hardware
  • Familiar with the MS Office suite
  • Work well independently as well as part of a team
  • Successful candidate should have strong desire to grow their technical knowledge
223

Cyber Security Resume Examples & Samples

  • Coordinating and conducting event collection, log management, event management, compliance automation, and identity monitoring activities using the ArcSight ESM and Splunk platforms
  • Integration and normalisation of disparate asset information into a centralised asset model
  • Overall responsibility for being the subject matter expert on ArcSight ESM and Splunk software for the customer
  • Use of ArcSight ESM and Splunk in the daily operational work and workflow of the end customer
  • Advising SOC Manager on best practices and use cases on how to use ArcSight and Splunk to achieve end state requirements
  • Meet with business users to gather requirements and make recommendations for meeting customer requirements within the SIEM and Log Management solution
  • Work with systems owners to establish how best to leverage ArcSight ESM and Splunk (and associated products) to meet the strategic goals by defining Use Cases Technical administration of the ArcSight ESM, Splunk, and Connector software platform
  • Ability to modify configuration files (under the covers, not exposed at Console level)
  • Distributed Multi-Manager architecture and deployment
  • Troubleshoot and configure networking devices, various platforms and databases
  • Integration with 3rd party systems including configuration management, network management, vulnerability scanners and trouble ticketing applications
  • Upgrade and patch all components of the ArcSight and Splunk platforms
  • Project Management, Customer Service and Technical Writing duties
  • 3+ years security engineering experience in mid-sized to large organizations, with emphasis on security operations, incident management, intrusion detection, firewall deployment and security event analysis
  • 2+ years with SIEM and Log Management technologies
  • Experience with some or all of the following security technologies including host and perimeter firewalls, host and network intrusion detection systems, logging and monitoring tools, antivirus or end-point security, data loss prevention, privileged access management, identity and access management, database access monitoring, NetFlow/SFLOW, vulnerability scanning and network full packet capture
  • In depth hands-on experience with security features and system administration of Linux, Unix, and Windows operations systems
  • Experience of mainframe and mid-range platforms an advantage
  • Understanding of security vulnerabilities in common operating systems, web and applications, including knowledge of remediation procedures
  • Experience analyzing new technologies and making security recommendations based on business objectives
  • Implementation of security controls and best practices including ISO 27001 and 27002, NIST CSF and SP800-53
  • Good communication and negotiation skills and ability to work cooperatively with other business functions
  • Custom development of Connectors (Agents) using ArcSight FlexConnector
  • BSc of Computer Science, Engineering, or Mathematics preferred
  • Industry Certifications (CISSP, CISM, CISA, PMP, GIAC) preferred
  • ArcSight ESM Administrator, ArcSight ESM Use Case Foundations, ArcSight SmartConnector Foundations & Tool Kit, ArcSight FlexConnector Configuration and Splunk Certified Architect certifications preferred
224

Information Security Resume Examples & Samples

  • Drive application security assessments by analyzing the current application architecture to determine the nature of risk and requirements (exhaustive list of events and data elements) for onboarding on to SAD monitoring tools
  • Based on the SAD assessment advise the application team on the controls necessary to achieve SAD compliance and help build a plan for the same
  • As SME, provide inputs for resolution of pending technical issues during SAD assessment and onboarding of in-scope applications on to monitoring tools for both Category 1 and 2
  • Coordinate with MFA, the ArcSight onboarding team or SecOps where data or applications need to be clarified or reviewed for additional clarification or updated status
  • Extensive use of the SAD Tracker in Archer to archive status of compliance, actions, deliverables and to manager the queue for follow-up tasks
  • Prepare slides/MIS for the weekly MFA/SAD Committee reviews as well as for other management, audit or regulatory reviews
  • Complete all tasks in connection with the organization’s activity but not detailed in the current job description, charged by the direct manager, supervisor or the functional head
  • Bachelor’s or Master’s degree in Computer Science/Technology or related field, or
  • 5+ years of experience in IT Risk Management/Information Security specifically performing IT Risk Assessment for web applications/infrastructure
  • 5+ years of experience in IT program management
225

Cyber Security Resume Examples & Samples

  • 10+ years of relevant experience in Technology, Audit, and Risk
  • Experience in process improvement projects and/or re-engineering
  • Ability to build strong partnerships across the Cyber technology teams
  • Manage a team of 10+ analysts with direct responsibilities of supporting Cyber Products
  • Posses the ability to set expectations for employees through performance evaluations and set challenging objectives
  • Interface with Cyber engineering and vendors to provide process improvement practices
  • Develop, or enhance existing operational documentation for Operate Teams
  • Establish requirements, priorities, and deadlines for Tech Operate book of work
  • 4-6 years of overall IT experience with the ability to articulate and document support and operational processes, various tools and monitoring agents
  • Must have 5+ years’ experience with Linux and/or Microsoft Windows Servers with relevant certification(s) desired (i.e. Red Hat, Microsoft Windows)
  • Experience of security or monitoring products, with in-depth knowledge of 2 or more of the following systems: Symantec DLP, Symantec Endpoint Protection (SEP), Tanium, Bromium, CAP/Skybox, Tripwire, Symantec Enterprise System Manager (ESM), Splunk, ArcSight and/or Qualys Network Vulnerability Assessments
  • Administrative and functional understanding of database structures such as SQL and Oracle
  • 5+ years experience in health and performance monitoring, as well as dashboard technologies
  • Vendor certifications such as MCSP, CCIE, CCNA, CCNP, and CCSP etc. preferred
226

Cyber Security Resume Examples & Samples

  • Understand the project objectives and scope, and to assess associated data requirements
  • Provide consultation to application developers connected to password control of app2app accounts
  • Formulate and document enrichment and usage needs and make recommendations for quality or process improvement where identified
  • Perform complex data analysis received from numerous systems
  • Identification of data specific issues and work with key technology partners in resolving them
227

Active Directory Security Analyst Resume Examples & Samples

  • Knowledge of Cyberark desired
  • Must be self-motivated and able to work independently, often unsupervised
  • Responsible for oversight of some projects assigned
  • Assists management in the selection and retention of software applications, support staff, and on-going maintenance
  • Provides project management assistance to the Project Manager for any size project
  • 3+ years’ experience in one or more of the following
  • Experience with programming languages such as Java, Java script, C, C++, C#, ASP, .NET, Visual Basic and is a plus (perl, python as well)
228

Cyber Security Resume Examples & Samples

  • Scanning customer source code, auditing results with development and/or security teams and offering plans for remediation of vulnerabilities
  • Installing and configuring industry standard static code analysis products, such as HP Fortify and IBM AppScan Source, onsite for customers
  • Training customer staff on application security and remediation of application security code defects
  • Assessing and scoping of customer's application security needs
  • Collaborating with Product Management and Engineering to enhance products
  • Representing Deloitte’s technical, business, and professional values to customers, partners, and peers
  • A technical bachelor's degree
  • 5+ years experience in software or security consulting
  • Experience using build tools (e.g. ant, make, maven, msbuild, nant, etc.)
  • Fundamental understanding of software, computer, and network architectures
  • Able and willing to travel 75%
  • Is highly motivated, competitive, entrepreneurial and attracted to challenging opportunities
  • Has strong problem solving, analytical, interpersonal, and ownership skills
  • Possess strong written, verbal and presentation skills
229

Cyber Security Resume Examples & Samples

  • Ability to read, write and modify scripts
  • Experience with network reconnaissance
  • Experience with OWASP
  • Experience with wireless penetration testing
  • Experience with password cracking
  • Ability to read and analyze network packet captures
  • Experience with security forensic analysis
  • Knowledge of security best practices: NIST, CIS, Cisco, Juniper, Checkpoint, Microsoft, Unix/Linux, etc
  • Experience with virus analysis, malware analysis and honeypots
  • Management Experience required
230

Cyber Security Resume Examples & Samples

  • A technical bachelor's degree, MS preferred
  • 8 + years experience in software or security consulting
  • 8 + years experience in software development using Java, Microsoft .NET, or C/C++
  • Experience with application security tools such as HP Fortify and IBM AppScan
231

Cyber Security Resume Examples & Samples

  • Experience with network reconnaissance and open source intelligence (OSINT) gathering
  • Excellent communication skills (oral, written and listening)
  • Strong presentation and public speaking experience
  • Comfortable working outside their comfort zone with a willingness to learn
  • Willingness to travel 80%
  • Penetration Testing: Kali Linux, BackTrack 4/5, SET Toolkit, War Dialing, VOIP testing, SQL Injection, Web Application Testing, Onapsis, Metasploit, Wireless tools, etc
  • Vulnerability Assessment: Nessus, Qualys, Foundstone, Nexpose, Metasploit, Core Impact, OpenVAS, Kismet, etc
  • Web Application Testing: App Scan, Hailstorm, Nikto, Grendel, Burpsuite, Acunetix, Qualys, etc
  • Database Testing: Scuba, SQLninja, AppDetectivePro, Havij, Mysqloit, SQLmap, Onapsis X1 etc
  • Network Assessment: NMAP, Nipper, Wireshark, TCPdump
  • 1+ years system security and testing experience
  • BA/BS in information technology or related field, MS preferred
  • Industry experiences in financial services, high-tech, and /or healthcare a preferred
232

Information Security Resume Examples & Samples

  • Independently, or through leading other staff, design, recommend, plan, develop and support implementation of project-specific security solutions to meet tactical, and control requirements
  • Develop reports using data that is hosted in multiple sources (e.g. spreadsheets, databases) and communicate clearly to management and other team members
  • Monitor security blogs, articles, reports, as well as other sources to keep up to date on the latest security threats and trends. Report significant threats to management for analysis and action
  • Application development experience, preferably in areas related to web applications
  • Familiar with and able to apply time-proven, generally-accepted security methods, concepts and techniques as they relate to the Deloitte U.S. Firms
  • Ability to learn and retain new skills as required meeting a changing technical environment
  • Ability to travel occasionally (up to 25%), including international travel
  • Ability to occasionally work non-standard shifts and/or on-call to support the requirements of the organization
  • Ability to effectively network, participate in and lead matrixed teams, and develop key working relationships
233

Information Security Resume Examples & Samples

  • Interpret results of security testing and devise remediation strategies for clients to address discovered vulnerabilities
  • Respond to client inquiries and assist them in overcoming technical challenges or business constraints, which includes being able to communicate complex information to both knowledgeable and inexperienced audiences
  • Research vulnerability management and information security tools, exploits and fixes, which includes being able to summarize the details to share internally and with clients
  • Collaborate with our development team to provide feedback and ideas on how to continually improve our client web portal, where we deliver these services and support
  • Collaborate with our consulting team on projects, including assessing environments, applications, policies and other documentation
  • Contribute to public content (e.g., blog posts, social media)
  • Continue to foster a collaborative, professional work environment
  • Oversee daily operations of the Support and Research team
  • BA/BS in Management, Computer Science, Information Technology or related technical field
  • Previous supervisory experience and demonstrated ability to lead a team
  • Experience in customer service or consulting, preferably technical support or help desk work, though other experiences will be considered
  • Familiarity with the payment card (PCI DSS, PA-DSS, P2PE, PFI), financial (GLBA, SOX, SSAE 16) or health care (HIPAA/HITECH) industries
234

Cyber Security Resume Examples & Samples

  • Prioritize, create, review, present and socialize Threat Models in various firm-wide public forums
  • Develop and maintain metrics for Threat Models adoption
  • Application Penetration testing background is the must. Must have knowledge of application penetration testing principles, tools, and techniques
  • Subject Matter Expert in Application Security with 5+ years of experience in the following
235

Cyber Security Resume Examples & Samples

  • 3+ years of recent operational security experience (SOC, Incident Response, Malware Analysis, IDS/IPS Analysis, etc.)
  • Experience with several of the following topics
  • APT/Crimeware ecosystems
  • Exploit kits
  • Software vulnerabilities & exploitation
236

Cyber Security Resume Examples & Samples

  • 8+ years experience of information security experience with a focus in Identity Manager development and integration with SUN/CA or comparable product
  • Understanding of business processes associated with user management lifecycle and ability to design and implement work-flow and rule-based provisioning solutions that meet complex business requirements preferred
  • 8+ years of experience with troubleshooting issues with Identity Management solutions, and n-tier Web applications
  • 3+ years experience with Directory Server; preferably development experience with LDAP via JNDI preferred
  • Working experience with building and using ANT scripts
  • Infrastructure experience with supporting idM solution on Linux platform
  • Demonstrated project leadership experience handling multiple work-streams simultaneously
237

Information Security Resume Examples & Samples

  • Working with Identity Access management team
  • End-user support and provisioning , provide daily support of the identity and access management solution and supporting applications (AD, VPN)
  • Daily trouble ticket resolution and operational support
  • Interface with end-users to address intermediate to complex questions and problems related to user access management across business applications
  • Work with cross functional teams to understand and support data processes
  • Able to work and communicate with all levels of users globally with support teams (technical and
  • Partner with HR for employee lifecycle
  • Reporting on identify data
  • Provide timely and accurate support for HR processes, reporting, to enable and ensure daily updates of idM request processes
  • Utilize an in-depth knowledge of available data sources for multiple HR systems as well as platforms (AD, UNIX, Database); utilize reporting capabilities of all relevant ISG current and new tools (myidM, PowerBroker, Password Safe, PIM, TPAM, TripWire etc.) to enable quality support of processes based on all available data
  • Analyze raw data with an understanding to the level that ensures accuracy of dialy reports
  • Recognize and drive the correction of faulty information
  • Communicate expectations regarding requirements response timelines based on the information provided
  • Summarize key pieces of information for senior leaders in ISG
  • Monitor and support scorecards and dashboard style reporting and produce daily status of assigned reports on time per the agreed upon schedule
  • Provide data as needed to assist in PepsiCo wide outages and root cause analysis
  • Advocate myidM Access request processes in compliance with security policies and audits
  • Excellent work item follow-up skills with attention to details
  • An understanding of business needs / commitment to delivering high-quality, prompt, and efficient service within the scope of this position
  • An ability to work on several tasks simultaneously and pay attention to sources of information from inside and outside one's network within an organization
  • Excellent communication skills with peers and partners. Ability to work in a team. Excellent work item follow-up skills with attention to details. An understanding of organizational mission, values, goals and consistent application of this. Ability to apply original and innovative thinking to produce new ideas and create innovative results
238

Director of Information Security Resume Examples & Samples

  • Develop and implement a strategic, comprehensive enterprise information security and IT risk management program to ensure that the integrity, confidentiality and availability of information
  • Provide oversight and accountability of day-to-day security operations
  • Oversees security projects, contributes to essential business planning and operating procedures, and promotes security awareness throughout the entire organization
  • Oversees ongoing analysis of information security threats, vulnerabilities, and market trends; determines and articulates potential impact to the organization’s risk profile
  • Plans and conducts all information security and privacy audits and assessments
  • Responds appropriately to investigations and other requests
  • Advises management on risk issues related to information security and recommends actions
  • Participates in key CIO operating discussions to drive information security risk strategy
  • Work with multiple technology teams that research, engineer, develop, implement, communicate, monitor, and maintain the information security (authentication, perimeter security, security & compliance tools, etc.), directory technology systems (software & hardware) and security policies and procedures
  • Advanced understanding of Information Security and knowledge of common information security management frameworks, such as ISO/IEC 27001, ITIL, COBIT and ones from NIST
239

Cyber Security Resume Examples & Samples

  • Collects and analyzes requirements for security enhancements/projects and provides project estimates
  • Designs, recommends, architects and documents security solutions to mitigate risks; ensure documentation from team members meets quality standards
  • Manages multiple project efforts, providing timeline, budget and estimates for work, tracking and escalating issues, defining risks and ensuring integration between various systems
  • Develops solutions and ensures performance requirements are met
  • Remains current with new security vulnerabilities and key technologies and recommends changes or actions to management as appropriate
  • Serves as an advocate for secure computing practices and procedures, communicating Information security best practices throughout the company
  • 8+ years of information security experience with foundational knowledge in multiple areas including SOC operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS) and SIEM technologies
  • Hands-on experience deploying security solutions with expertise in hardware, networking, operating systems, and architecture
  • Experience with big data solutions (Hadoop) and integration with existing security data feeds
  • Fundamental understanding of application protocols (HTTP, DNS, FTP, etc.) and networking protocols (TCP, UDP, ARP, ICMP, etc.), and be comfortable analyzing packet capture (pcap) files in tools such as Wireshark
  • Substantial combination of relevant education, training, and experience in the Cyber Intelligence discipline
  • Knowledge in data correlation techniques
  • Designs, recommends, and architects and documents security solutions and procedures to mitigate risks; ensure documentation from team members meets quality standards
240

Cyber Security Resume Examples & Samples

  • Strong research, analytical and problem solving skills
  • Ability to write and debug administrative and reporting tools in some programming languages (Shell/Perl or Python, Scala/Java/R, C/C++, HTML5, Java, Scala or other experiences acceptable)
  • Comfortable with most aspect of operating system administration such as tweaking, hardening and configuring services
  • A solid understanding of Unix-based operating systems, including paging/swapping, IPC, drivers and filesystem (inode, partitions, etc.)
  • Experience with host and network security (identity/password management, ACLs, file permissions and integrity)
  • Strong interpersonal and communication skills; capable of writing documentation, training users in complex topics, making presentations to junior and very senior audience
  • Ability to work under pressure in a fast-paced environment while remaining productive and professional; exercise patience and ability to multi task
  • Having skills in the below areas is a major plus that will help the candidate integrate within the team and environment but is *not a requirement*
  • Experience with hadoop ecosystem: Hadoop, Map/Reduce, YARN, Spark/h2o, Hive/Pig, Impala/Drill, etc
  • Experience with Data Science: MLlib, Scikit, h2o, TensorFlow, Caffe, Singa, etc
  • Experience with NoSQL stacks: Elasticsearch, MongoDB, etc
  • Experience with SIEM products: Qradar, Arcsight, Splunk, etc
  • Experience with messaging and data transport tools: Kafka, LogStash, Syslog-ng, rsyslog, etc
  • Experience with data visualization tools: Hue, Kibana, Qlikview, Tableau, etc
  • Knowledge in RIA: HTML5, node.js, bootstrap, angular, extJS, etc
241

Cyber Security Resume Examples & Samples

  • Bachelor’s degree in Computer Engineering, Electrical Engineering, Information Technology, or a related technical field with 7 years of appropriate experience or 12 years combined education and applicable experience
  • Experience managing projects and budgets
  • Experience developing project plans and schedules and providing status reports
  • Experience and/or familiarity with security configurations for switches, firewalls, intrusion detection systems, intrusion protection systems, and other network-attached devices
  • Experience and/or familiarity with vulnerability assessments and methodologies, information gathering tools such as Nessus, Wireshark, nmap, and equivalents
  • Previous experience with Enterprise Mission Assurance Support System
  • Demonstrated ability to work on assigned projects with minimal supervision
  • PMP and/or CISSP certifications (additional certifications such as CCNA, Cloud+ and CCSP are a plus)
242

Information Security Intern Resume Examples & Samples

  • Review security operations web portals for flagged events and evaluate for security incidents
  • Escalate potential security incidents for review by SOC personnel
  • Review, update, or generate new work instructions to document repeatable tasks
  • Generate security reports to provide executives and system administrators with an understanding of risks and recommendations for known security vulnerabilities
  • Assist with engineering tasks to maintain and augment SOC infrastructure
  • Assist with the deployment and maintenance of SOC server and application infrastructure
  • Assist with incident response efforts
  • Assist with the evaluation of network and system events pertaining to a security incident
  • Conduct additional searches and evaluation of remote systems to identify attacker actions or insecure servers and services
243

Cyber Security Resume Examples & Samples

  • Keep abreast of security incidents and act as primary control point during significant information security incidents
  • Convene Ad Hoc Security Committee as appropriate and provide leadership for breach response and notification actions within the region
  • Provide leadership, direction and guidance in assessing and evaluating regional information security risks and monitor compliance with security standards and appropriate policies
  • Examine impacts of new technologies on the region’s overall information security. Establish processes to review implementation of new technologies to ensure security compliance
  • Working with the Cyber Security Engineering team in the identification, design and implementation of new tools as requirements arise, consolidating and rationalizing the various vulnerability data from different scanning tools to remove duplicates, apply additional context to provide meaningful information for metrics that help prioritize and drive remediation activities
  • Technical knowledge of desktop and server hardware and software architectures and operating systems including Windows, UNIX, and Mac
  • Technical knowledge of web application server like Apache and databases like SQL, Oracle, etc
  • In depth knowledge of LAN/WAN architectures, principles, operations, and protocols
  • Understanding of vulnerabilities, their impacts and mitigation techniques, and the ability to document and articulate this understanding to a variety of audience using standards like CVE and CVSS
  • Exceptional interpersonal, customer service, communication skills and the ability to ascertain, disseminate information quickly through a variety of channels
  • Experience with network troubleshooting tools and port scanners such as trace route, ping, and nmap
  • Bachelor’s Degree or Military Experience
  • At least 2 years’ experience with Information Technology
  • At least 1 year experience in operating system patching and vulnerability scanning
  • Bachelor’s Degree in Information Technology or Military experience
  • At Least 1 year related work experience in financial services and security industry
  • At least 3 Years Experience with Information Security theory and practices
244

Information Security Resume Examples & Samples

  • Work with both internal and external auditors to ensure compliance with all industry-mandated regulations
  • Manage compliance initiatives to ensure operational effectiveness with applicable laws and Regulations, as well as internal policies and procedures
  • Participate in the development and implementation of new business initiatives involving security to ensure compliance with established policies. Provide guidance to business functions on compliance/security-related matters
  • Coordinate audit-related tasks to ensure the readiness of managers and their teams for audit testing and facilitate the timely resolution of any audit findings
  • Initiate improvement activity to reduce risk, ensure compliance, lower cost, and improve quality within IT processes
  • Conduct/support periodic risk assessments and develop appropriate mitigation plans in support of
  • Refine and revise existing policies and procedures to support internal and external compliance programs. Author new policies and procedures and ensure adequate training for adherence by employees
  • Support additional internal and external compliance activity as required
  • Perform periodic security risk assessments and advise business stakeholders on best practices to reduce risk and overall breach profile
  • Bachelors degree in the field of Computer Science , Information Security or Information Assurance; equivalent work experience is acceptable
  • Experience performing audits in PCI DSS and SSAE 16 frameworks
  • A solid understanding of OS’s, IP networks, and database and application functionality are critical
  • Desired certifications: PCIP, ISA/QSA, CISSP, CISA, related GIAC
  • Strong background in security controls, auditing, network and system security
  • Strong understanding and experience with ISO 27001 & PCI DSS
245

Cyber Security Resume Examples & Samples

  • Audit & Regulatory – Align Audit & Regulatory Commitments to Products: Ensure all commitments are mapped to Product book of work and prioritized
  • LOB Engagement – Engage with exec stakeholders in the LOB teams to identify needs and map it to network product roadmap to reduce risk for JPMC
  • Ability to provide leadership across multiple teams to illustrate strategy is reducing risk and meets needs of JPMC customers. Partner with other product leads, architects, and engineers to reduce risk
  • Ability to develop and analyze product architecture
  • Ability to provide product management artifacts and deliverables such as roadmaps, product overviews, reports, backlog and documentation. Help bring to life the product organization construct
  • Proven experience in leading strong change in how work is organized, executed and measured
  • 10+ years of technical experience within network technology
  • Undergraduate or graduate degree preferred
246

Information Security Resume Examples & Samples

  • Act as lead and support other ArcSight team members/
  • Administration of ArcSight SIEM environment
  • Capacity planning
  • ArcSight Architecture
  • Perform day-to-day analysis on ArcSight servers and associated components to verify stability and optimize performance
  • Deploy ArcSight devices (connectors, Loggers, ESM)
  • Testing, implementation and configuration of patches and upgrades
  • Research, analyze and understand logs source from various devices in the network for acquisition and integration in ArcSight
  • Smart connector management and Flex connector development
  • Troubleshooting and break fix
  • Write scripts and automation to optimize various processes involved
  • Provide support in researching, designing, testing, and implementing new technologies that will enhance the organizations capabilities
  • Excellent communication skills, both written and oral
  • Work with external teams to move projects along
  • Processes and procedure documentation
247

Cyber Security Resume Examples & Samples

  • Ensure timely execution of Cyber Security and Information Security risk management process execution including analysis, aggregation and reporting of material risks related to HP’s third party risk management
  • Identify issues and root causes including facilitation of risk mitigation plans including security concepts, controls, and awareness & training in alignment with HP Policy & Standards
  • Partner with peer analyst stakeholders (including at minimum: Supply Chain, Factory Chain, IT, Enterprise Risk Management, Procurement) to effectively coordinate execution of security concepts & controls
  • Review key metrics and overall performance with internal stakeholders and appropriate-level third parties
  • Support internal & external audit readiness related to 3rd Party risk management
  • Support the implementation of HP Policy, standards, guidelines, tools, and documentation for consistent execution of third party management activities
  • 2-3 years of relevant experience in Risk Management, Governance & Compliance, Cybersecurity, Information Security or IT domains that have relatable experience
248

Cisco Security Solutions Emear Bdm Resume Examples & Samples

  • Strong written and oral communication skills. Written communications include PowerPoint presentations and vertical documents (Word and email). Oral communication skills should be demonstrated in delivering presentations to C-level business executives and also facilitating more interactive business discussions with those executives (project scoping, deal negotiations, problem resolution, etc.)
  • Demonstrated client relationship skills. Record of developing collaborative working relationships with VP, and SVP-level executives in Fortune / FTSE 500 accounts
  • Must have Experience in security and services
249

Information Security Resume Examples & Samples

  • Minimum of 7 years work experience
  • 3 years security management experience desired
  • Relevant certifications such as CISSP (Certified Information System Security Professional), CISM (ISACA Certified Information Security Manager) or CISA (ISACA Certified Information Security Auditor) are preferred
  • Experience with some or all of: application data security, business continuity, computer forensics, disaster recovery, incident response, mobile security, network security; risk assessment; vendor management
  • Familiarity with audit standards such as ISO, SOC, and SSAE
  • Demonstrated technical aptitude
  • Excellent communication, documentation, and presentation skills
  • BA/BS; MS preferred
250

Security Resume Examples & Samples

  • Bachelor’s degree in Accounting or Finance required; CPA license preferred
  • At least four years of related work experience in SOX, Audit, Compliance and/or Technical Accounting with some Big 4 public accounting experience preferred
  • Detailed knowledge of Sarbanes-Oxley, SOC1, SOC2 requirements and ISO 2700X framework
  • Demonstrated written and oral communication skills and ability to communicate with all levels of management
  • Ability to build strong relationships and work cross functionally with internal and external constituents