Security Risk Resume Samples

4.7 (98 votes) for Security Risk Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security risk job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
RB
R Bernhard
Roberta
Bernhard
1671 Zane Fall
Phoenix
AZ
+1 (555) 959 4339
1671 Zane Fall
Phoenix
AZ
Phone
p +1 (555) 959 4339
Experience Experience
Houston, TX
Info Security Risk Splst
Houston, TX
Haag-Metz
Houston, TX
Info Security Risk Splst
  • Technology Risk Management (Application Assessments, Infrastructure Assessments, Service Provider Management & Risk Strategy)
  • Service Provider Management (SPM)
  • Juniper/Checkpoint/CISCO firewall management
  • Tufin Operations Management
  • Archer Technologies SmartSuite Framework
  • Network Security Assessments
  • Technology Infrastructure and Network Security Assessments (35%)
Chicago, IL
Security & Risk Management Architect
Chicago, IL
Zieme, Hegmann and Collins
Chicago, IL
Security & Risk Management Architect
  • Responsible for client delivery, business development, and assisting the Modern Data Center practice knowledge management
  • Demonstrate mastery within domain of Cybersecurity, Risk Management, and IT Compliance
  • Demonstrates mastery in spearheading projects within domain of Cybersecurity, Risk Management, and IT Compliance
  • Serve as subject matter expert and primary contributor in the areas of Security and Risk Management
  • Shares content expertise with Slalom practitioners through development and delivery of case studies, white papers, learning materials, and other resources to elevate internal knowledge of solutions
  • Expected to drive towards results in both a primary contributor and project manager capacity
  • Contributes to the development of Slalom best practices and knowledge assets
present
Detroit, MI
Security Risk Manager
Detroit, MI
O'Reilly LLC
present
Detroit, MI
Security Risk Manager
present
  • Develop and maintain an effective internal IT control framework that can demonstrate proper design and operation of the controls
  • Manage and maintain data quality associated with all risk management tracking and reporting
  • Work with others to build security controls, secure processes, and write security standards to ensure compliance with legal regulations, corporate policies, and customer commitments and to help raise the bar for data protection in the Services division
  • Manage the implementation of all aspects of the risk function, including implementation of processes, tools and systems to identify, assess, measure, manage, monitor and report risks on an enterprise-wide basis
  • Drive a comprehensive risk assessment and management program focused on the identification, treatment and management of key business risks
  • Liaise with and offer direction to related corporate functions (Compliance, Risk Management, IT, Operations, HR, and Legal) plus senior and middle managers throughout the organization on the management & treatment of identified risks
  • Work with third party auditors to measure and improve Security and Risk Controls
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Seton Hall University
Bachelor’s Degree in Computer Science
Skills Skills
  • A keen eye for an opportunity to improve existing process and take the initiative to promote such an enhancement
  • Able to co-operate and work well with others adopting an approachable style Important as we work closely with a large and diverse set of suppliers and customers
  • Understands their own shortfalls and knowledge gaps. Not afraid to acknowledge a gap and work on strategies to address them
  • Adapts personal approach to suit situations, individuals, groups and cultures. Is flexible in relation to getting the job done
  • BNY Mellon often goes through periods of change and it is therefore critical that this person adapts to changes in the organisation and job responsibilities and displays a positive attitude
  • Able to express clearly and fluently, both orally and in writing. Considers the audience, avoiding technical jargon wherever necessary and appropriate
  • Good at listening and analysing a situation or the information provided
  • Works well with others or individually. Supports the development of the team as a whole, places team before personal interests
  • Shows respect for others and recognises their concerns and interests
Create a Resume in Minutes

15 Security Risk resume templates

1

Cyber Security Risk Management Specialist Resume Examples & Samples

  • 4 years substantial experience within Cyber Security, ideally in the Financial Industry
  • Solid understanding of Cyber Threats, Cyber Security, Information Technology, Information Security, Operational Risk Control Frameworks, Risk Management, and IT Security
  • Ability to monitor and review results, trend data, changes in risk profile and developments in specific business areas to facilitate ongoing planning and the changing risk posture
  • Ability to develop and maintain an effective network of relationships both within Compliance & Operational Risk Control and across the Business Divisions and Functions
  • Candidate must be detail-oriented, diligent and organized /structured to ensure appropriate record-keeping, correlation and that tasks are kept on target
  • Effective oral, listening, and written skills
  • Bachelor's degree or international equivalent
2

Security / Risk Assessment Analyst Resume Examples & Samples

  • 3+ years of risk management and/or internal controls
  • Big 4, Consulting or IT internal audit experience
  • Demonstrate professional skepticism to ensure evidence is sufficient when assessing the relevant controls
  • Communicate and present concisely and effectively based on the appropriate level of management
  • Develop and teach less experienced staff
  • Work both independently and as part of a team at all levels and across departments
  • Open to travel 5-10%, if needed
3

Security Risk Project Manager Resume Examples & Samples

  • Scheduling meetings and documenting meeting minutes
  • Collecting, organizing, and posting to centralized repository various files and documents
  • Preparation of various files for review by internal and third parties, including review of file attributes (such as document classification), organization and indexing of files, and retention of official record of documentation
  • Tracking tasks, deliverables and due dates and providing summary reporting to ensure work is on track
  • Escalate potential and actual misses of project deadlines
  • Preparing meeting agendas and documenting actions and results
  • Ensuring follow up items are identified, logged, reported and tracked
  • Coordinate with all levels of the organization and external parties on assigned projects
  • Review various reports and logs for upcoming due dates, deliverables, etc. and ensure they are escalated to the Security Risk Manager
  • Provide follow up and support, as directed, for obtaining and documenting security risks and decisions
  • Maintain ongoing communication and notification of project and task status. Qualifications/Requirements
  • Strong project management skills, including use of project management tools, such as MS Project
  • Ability to manage multiple tasks concurrently with high degree of accuracy and timeliness
  • Knowledge of IT and/or information security is a plus, but not required
  • Minimum 18 months of experience in GE and at least 12 months in current role
  • Should not be on active corrective or Performance Improvement Plan (PIP) Additional Eligibility Qualifications: Desired Characteristics
4

Info Security Risk Splst Resume Examples & Samples

  • Technology Risk Management (Application Assessments, Infrastructure Assessments, Service Provider Management & Risk Strategy)
  • Information Security
  • Service Provider Management (SPM)
  • Consultancy Requests (15%)
  • Duty Officer Role - Firewall/URL change request approval, Reconciliation of firewall changes (15%)
  • Firewall Policy Compliance & Rule Usage Reviews (15%)
  • Issues and Exceptions processing and tracking (10%)
  • Firewall change reconciliation
  • Assess URL access requests with a view to approval
  • Ad-hoc requests for TRM support/guidance
  • Strong experience in a Technology Risk, Information Security or an IT Audit role
  • Thorough understanding of the ISO 2700X series of standards and guidelines; and
  • Some or all of the following will be of advantage
  • Knowledge or practical experience of one or more of the following products
  • Archer Technologies SmartSuite Framework
  • Algosec Firewall Analysis Tool
  • Tufin Operations Management
  • Juniper/Checkpoint/CISCO firewall management
  • URL Filtering products
  • Must take accountability for their actions and be open and honest when things have gone wrong, and celebrate successes when things have gone well
  • Able to co-operate and work well with others adopting an approachable style Important as we work closely with a large and diverse set of suppliers and customers
  • Must be rigorous and thorough especially when logging and tracking issues through to conclusion
  • Demonstrates a calm professional approach, with a good understanding of time constraints and the need to escalate/inform departmental management as appropriate
  • Adapts personal approach to suit situations, individuals, groups and cultures. Is flexible in relation to getting the job done
  • Must be able to see the customer perspective, i.e. from a business point of view, the most secure solution is not always workable or realistic considering costs and benefits
  • Good at listening and analysing a situation or the information provided
5

Info Security Risk Cnslt Resume Examples & Samples

  • Bachelors degree in IT related field. Equivalent experience would be acceptable in lieu of education
  • Security Certification (CISA, CISM, CSSM, CISSP) or related security work experience required
  • 7+ years of related IT experience. Security Certification (CISA, CISM, CSSM, CISSP) or related security work experience required
  • Advanced knowledge and understanding of the many threats / risks associated with all systems used within the enterprise
  • Keeps abreast of and information rest of the team of new and emerging risks that may affect systems. Good communication, interpersonal, and organizational skills
6

Security & Risk Management Technical Director Resume Examples & Samples

  • 10+ years of progressively responsible experience managing security teams and matters
  • 8+ years in technical hands-on in an IT related field
  • Experience communicating and handling matters with executives/stakeholders
  • Extensive knowledge base in IT operations, architecture, security solutions
  • Proven track record in a similar position (risk management, technical security leadership in large-scale technologic-centric environments)
  • Effectively collaborate with a variety of stakeholders, including technical and non-technical teams
  • Consensus-builder and commitment focused
  • Project and budget management skills
  • English and French language is required (oral/written)
  • Advanced knowledge of key technical concepts: TCP/IP, Network & Application security
  • Advanced knowledge of security architecture and solutions
  • Advanced knowledge of security governance and industry best practices (NIST, ISO2700x, ISO22310)
7

Cyber Security Risk Regional Lead ED / VP Resume Examples & Samples

  • Provide baseline MIS and reporting, both during impact analysis and on-going execution of risk-driven projects, organize and deliver clear and accurate data for Technology and Executive Management
  • Assist with the planning and implementation of Education and Awareness campaigns to technical and business audiences within the CIB
  • Liaise with members of the Enterprise Risk Management team to ensure alignment with their strategies and processes
  • Information security certifications (such as CISSP, CISA related certifications) would be preferred
  • Exposure to financial services systems and processes preferably in Investment Banking
  • Exposure to information security vulnerability concepts, issues and mitigation method
  • Working knowledge of software penetration testing, secure code review, architectural risk assessment, static code analysis
  • Must have a solid Information Security background, including information and cyber security assessment, risk analysis, privacy, data protection and security architecture
  • Significant experience with evolving state-of-the-art information security technologies and approaches
  • 5+ years of experience with evolving state-of-the-art information security technologies, technology policy and security administration
8

Info Security Risk Manager Resume Examples & Samples

  • Serving as information security Risk Manager assigned to one of Visa’s technology organizations
  • Building an extensive network of relationships throughout Visa and the technology organization that can be leveraged to accomplish the broad requirements of this position
  • Contributing unique mix of skills and experience to further development of the Risk Management program
  • 5+ years of technical IT security experience, in one or more of the following areas: application level, server operations (system administration) level, and/or network security level – experience in multiple areas is strongly preferred
  • Strong ability to lead, coordinate, and motivate other people, especially those outside of a direct reporting relationship
  • Proven history of being a self-starter: proactively identifying problems, determining pragmatic solutions, identifying and obtaining needed resources, and executing with little or no supervision
9

Security / Risk Control Analyst Resume Examples & Samples

  • Be responsible for establishing strong working relationships with Application Development, Information Security, Continuity of Business, as well as other Business/Operations/Infrastructure Risk Management teams
  • Coordinate Business As Usual (BAU) activities, overseeing Risk and Control activities. Provide assistance to application owners/management team to ensure Risk and Control issues and initiatives are addressed timely
  • Coordinate or manage technology components of Internal and External audits. Assist development teams in responding to audit requests, perform review of deliverables for completeness and accuracy as needed
  • Proactively identify control deficiencies through technology self-assessment testing, risk and control initiatives, and BAU meetings/discussions. Monitor progress of corrective action plans
  • Work with the Risk and Control teams to analyze latest program and project scorecards, preparing execute summary reports for IT management
  • Perform Managers Control Assessment (MCA) testing of IT General Controls. Analyze test results and open corrective action plans as needed. Identify emerging risks and prepare Quarterly Risk Assessment (QRA) documents to summarize overall MCA results
  • Facilitate compliance with Citigroup Policies, Standards and Regulations
  • Perform and report on trend analysis, identifying opportunities for process improvements
  • Experience performing IT Business Analysis, Project Management or similar work required
  • Minimum of 3 years of experience in Audit, Information Security or Risk Management
  • Awareness and execution of the Risk and Control Self-Assessment (RCSA), Managers Control Assessment (MCA), or other technology self-assessment processes is an advantage
  • Knowledge of service management (ITIL) with previous working experience in process improvements is an advantage
  • Previous experience performing Internal and/or External Audit coordination is an advantage
  • Previous experience in Production Support and Application Development roles is an advantage
  • Good organizational skills, ability to work under pressure and prioritize within tight deadlines while maintaining total accuracy
  • Ability to influence others and quickly earn the confidence of others
  • Quick learner and able to work in a diverse, global environment
  • Ability to analyze large amounts of data, decipher items relevant to the development unit covered, and determine corresponding risk
  • Ability to work as part of a team, and also independently under own supervision
  • Possess the ability to develop and maintain good working relationships with various levels of management
  • Ability to coordinate/manage initiatives from end-to-end with minor supervision
  • Strong knowledge of Microsoft Office with Excel, Outlook, and PowerPoint skills
  • Strong affinity to manage Control practices demonstrating a pragmatic risk-based approach
  • Industry certifications, such as CISA, CISM, CRISC, CISSP would be an advantage
10

Security / Risk Assesor Resume Examples & Samples

  • Perform security risk analysis and compliance assessments as necessary in accordance with industry "best practice" to deliver comprehensive, contextualized, actionable information
  • Execute, examine and test procedures in accordance with industry, regulatory, and corporate requirements
  • Serve as a subject matter expert on information security within one or more of Visa's technology organizations
  • Affirm and advance various stakeholder's understanding of, and their responsibilities with respect to, the Payment Card Industry (PCI) Data Security Standard (DSS)
  • Assist remediation planning, governance, and risk treatment activities as required
  • Manage multiple SAs and other consulting projects in fast-paced environments
  • Contribute "best practices" in terms of findings, checklists, templates, testing methods, and techniques to support and advance a "best of breed" Security Assessment program
  • Provide task-oriented supervision of select Security Analysts and Security Associates
  • Act as an embedded, trusted advisor to Visa verticals on SAs and consulting engagements for Visa's Key control policy (primary security controls) and Visa's technical Security Policy (extended security controls0 with respect to the Payment Card Industry (PCI) and other regulatory bodies such as ISO, NIST, FFEIC, etc
  • Provide periodic, dynamic updates on security assessment analysis and security posture with an emphasis on deliverables
  • Provide both generalized and discrete input about security standards and policy for IT plans, roadmaps, and prioritization of projects
  • Build an extensive network of positive relationships throughout Visa and its technology organizations to be leveraged to accomplish the broad requirements of this position
  • Promote information security as an enabler of the organization's core business processes
  • Support implementation and enforcement of Visa's information security programs and policy
  • Prescribe security improvements for Visa's environment which resolve or mitigate SA findings or otherwise enhance security posture to achieve compliance with PCI, NIST, and corporate control policy
  • Provide input to corporate initiatives to establish security criteria or specifications for Information Security as required
  • Contribute individual skills and experience to advance development of the Security Assessment program
  • Respond to urgent security-related issues at any time and escalate urgent security-related issues as required
  • Perform detailed reviews of subordinate's work product and provides appropriate feedback and mentorship
  • Uphold the maxim of “Accuracy, Consistency, and Alignment” for all deliverables
  • 8+ years of IT experience in large, highly-regulated organizations
  • 5+ years of IT security experience, in security risk and compliance assessments for applications, infrastructure, and vendor / third parties, review of technical security requirements, review, approve and track security exceptions and remediation
  • 2+ years of supervisory experience
  • Mature knowledge of industry-relevant regulation including Payment Card Industry (PCI) Data Security Standard (DSS), NIST, and FFEIC
  • Understand and be well-versed in common Cyber Threat terminology, vulnerability and penetration test methodologies; possess basic knowledge of cyber incident and response, and related current events
  • Mature or advanced understanding of business, finance, and management concepts
  • Preferred undergraduate degrees include computer science, management of information security, etc
  • Advanced Information Security certification (CISSP or equivalent is preferred, but CISM, CEH, or similar certifications are also useful)
  • Advanced Auditing certification (CISA, etc.)
11

Payment Security Risk Manager Resume Examples & Samples

  • Detailed and proficient understanding of the PCI DSS legislation and requirements
  • Ability to absorb and understand highly technical governance documentation
  • Excellent presentation and influencing skills
  • Ability to deliver high quality work whilst working in a fast moving sometimes pressured environment
12

Information Technology Security Risk Specialist Resume Examples & Samples

  • Manage data feeds from Information Security tools, administer Risk Fabric, Configure Metrics presentation (dashboards, visualization, etc.)
  • Assists in the continuous improvement of the Risk Data Aggregation Solution – targeting new data feeds, new analysis tools, enhancing reporting and performance
  • Assist in the creation of customized reporting and analytics mechanisms when necessary
  • Develops knowledge of the Information Security industry, tools, technologies, techniques, frameworks, etc. by partnering with GIS experts in each of those spaces
  • Minimum 4 years in technology organizations , preferably in a Information Security
  • Strong aptitude for reporting tools coupled with advance analytical and data management skills
  • Professional communications and efficient organization skills are a must
  • Experience with administration and design of SQL Server-related suite of tools is a must
  • Bachelor's degree or equivalent in Data Management, Computer Science, etc
13

Cyber Security Risk & Controls Metrics Analyst Resume Examples & Samples

  • Good cross-discipline knowledge of technology, preferably from a major financial services institution
  • A demonstrated ability to identify, articulate and design robust, effective Technology Controls and to design and deliver appropriate KPI/KRI Metrics able to accurately articulate a risk posture based on those controls. Knowledge of the JPMorganChase ITRisk Policies, Standards and Controls framework is an advantage but not essential
  • A demonstrated excellence in written and verbal communication skills. You are clear, precise, detailed and able to convey complex topics or requirements in simple terms, without losing necessary accuracy. You possess excellent presentation skills and use of tools (i.e. Powerpoint) to all levels in an organisation, including senior management
  • A mature, pragmatic outlook, with the ability to balance the conflicting needs of compliance, risk management, expediency and business objectives, to ensure that the Firm’s ITRisk Standards Metrics are Applicable, Appropriate and Actionable by our Technology & Operations communities
14

Security Risk Management Specialist Resume Examples & Samples

  • Support the Regional Head in maintaining regional key relationships and in their role as control manager and risk advisor to business and infrastructure units
  • Review and challenge physical assets, building environment and people / workplace environment risk mitigation at 1st Line of Defence (LoD), engage with 1st LoD management, Divisional Control Officers (DCOs) across businesses and infrastructure functions, and regional / global business managers
  • Advise 1st LoD to develop and execute a risk-based mitigation strategy for their own processes as well as for all of their outsourced processes to achieve continuous improvement by proactively adapting to the changing risk environment, business requirements & technical changes
15

Global Technology Security Risk Management & Assessment Lead-global Technology Infrastructure Resume Examples & Samples

  • Partnership with the Cybersecurity & GTI management teams, and other LOB BISO teams
  • Drive ad hoc security assessments and leverage results of security scanning, penetration testing, and Cyber Exercise team assessments
  • Understand and convey the risk posture of the business, understanding the key cyber security risks facing the business with the ability to understand key technology controls and the maturity of those controls to mitigate identified risks
  • Project Engagement – The ability to engage in affective manner with Technology, TCOs and Cyber Security teams to assist in platform assessment to identify and verify exposure to common security vulnerabilities, providing remediation guidance at a business process level
  • Impact Analysis – Review proposed solutions across CTR, develop use cases to explain/demonstrate requirements/specifications to key stakeholders
  • 8+yrs of Information Technology experience
  • Extensive specific Cyber / Information Risk Management/Vulnerability Assessment experience
  • Exceptional data analysis, both quantitative and qualitative
  • Strong reasoning and logic, problem solving skills
  • Experience in working with diverse cross geography teams
  • Self motivated individual, comfortable working in a leadership position without close supervision and with ability to work to deadlines
  • Must have a solid Information Business Risk background, including risk analysis, privacy, data protection
16

Cyber Security Risk Management Project Manager Resume Examples & Samples

  • Working understanding of software development life cycle models as well as knowledge of both Agile and traditional project management principles and practices is required**
  • Extensive experience with specific methods, tools and techniques for clearly defining and documenting client needs and associated requirements
  • Previous experience with shared technology services initiatives and the ability to contribute to the effectiveness of security-related operations would be a plus, although not required
  • Must be able to analyze client requirements, monitor project progress, identify potential roadblocks and keep projects on track
  • Must also have prior lead experience producing detail-level functional or operational requirement documentation and conducting inspections of required documents and quality reviews
  • Proficient / advanced user of Microsoft Office products
  • Experienced in compiling large and complex spreadsheets including reporting (e.g. pivots, charting etc.)
  • Highly organized with the ability to understand and communicate information
  • Experience of technology risk management is a plus
17

Csis Security Risk Assessment Manager Resume Examples & Samples

  • Training Regional Directors of Security on the elements of the enhanced program and risk assessment form
  • Serve as subject matter expert in Citi’s 5,000 facilities globally
  • Liaise with other Citi support units to ensure a multi-faceted risk assessment (e.g. Citi Realty Services (CRS), Citi Technology Infrastructure (CTI))
  • Ensure re-assessments are conducted following triggered events
  • Bachelor’s degree required; degree in Law Enforcement, Homeland Security, Emergency Management, Political Science, International Studies, or similar fields preferred, although proven work experience in these fields is qualifying with another degree
  • Minimum 5 years’ of leadership and project planning experience in complex, dynamic environments
  • Minimum 5 years’ years of hands-on operational experience (e.g., tactical, first responder, on-scene type roles) in a military, law enforcement, emergency services, intelligence, diplomatic, or non-governmental organization. Similar experience in a logistical, services, or customer-facing business role in an international environment will be considered
  • Have advanced proficiency with Microsoft Office products, Access, and SharePoint
  • Have experience in managing/influencing organizations without influence across business lines and regional jurisdictions/locations
  • Be a poised team player and confident leader who can instil confidence and gain support from all levels of the organization, including senior executives
  • Knowledge of standard Risk Management Control frameworks including COSO, COBIT, ITIL, NIST, ISO and regulatory guidelines including OCC and FFIEC are a plus
  • Experience dealing with International regulatory bodies and there requirements are a plus (e.g. MAS,etc)
  • Excellent follow-up skills with attention to detail and ability to multi-task, have leadership presence, strong team-orientation and interpersonal skills, flexibility, and strong analytical skills
  • Proven ability to work independently and effectively in a complex environment with multi-location team structure
18

Manager of Security Risk Resume Examples & Samples

  • Highly collaborative with ability to articulate ideas amongst peers and senior leaders
  • Experience in developing enterprise security standards, structuring risk assessments and driving mitigation with business and technology risk owners
  • Experience with developing executive communications and coordinating with enterprise communications functions
  • Ability to develop an enterprise awareness and training program strategy
  • Strong analytical and critical thinking skills, and excellent written and oral communication & presentation skills
  • 4-7 years of related experience
19

Manufacturing Cyber Security Risk Resume Examples & Samples

  • Conduct information security risk and vulnerability assessments (functional/technical) of PepsiCo's manufacturing and distribution plants to identify vulnerabilities, risks, and protection needs in order to generate a risk rating and potential functional and technical mitigations
  • Apply technical expertise to drill deep down into a wide variety of OT technologies/architectures utilized within the manufacturing and distribution plants. This includes SCADA (Supervisory Control and Data Acquisition) systems and other ICS (Industrial Control Systems) to understand impacts/risks to PepsiCo
  • Determine information security requirements/leading practices for new technical/functional areas of assessments
  • Contribute to the development of information security standards and policies applicable to our manufacturing and distribution plants that meet the business requirements while ensuring compliance with PepsiCo guidelines and industry leading practices
  • Present findings (functional/technical) to various stakeholders and levels throughout the organization
  • Partner with Plant Engineering, OT, and IT organizations to suggest/recommend potential mitigation solutions for risk areas
  • Strong verbal and written communication skills that positively impact relationships with key personnel from manufacturing and distribution plants
  • Effective ability to identify and assess the severity and potential impact of risks, and communicate risk assessment findings to risk owners outside Information Security. Communication should consistently drive objectives, relying on fact-based decisions about risk that optimize the trade-off between risk mitigation and business performance
  • Bachelor's degree, master's degree preferable (in a technical area)
  • Understanding of tools and technologies used for Industrial Control Systems and enterprise security
  • Familiarity with the critical tools used in security event analysis, incident response, computer forensics, malware analysis, penetration testing, and other areas of security operations
  • Fundamental knowledge of common security industry standards and frameworks such as: ISO 27001/27002,NIST (SP-800-53 or SP-800-82),COBIT,HIPAA /HITECH,FISMA,FIPS, orNERC. especially as it relates to the following
20

Manufacturing Cyber Security Risk Resume Examples & Samples

  • Building an Information Security Management System and/or Program
  • Managing internal controls, risk assessments, business process and internal IT / OT control testing or operational auditing
  • Proven ability and understanding of the components that comprise a successful Industrial Control Systems security program
  • 5+ years of experience in Cyber (Information) Security
  • 5+ years of experience on OT (Operations Technology) environments in manufacturing and distribution plants dealing with ICS (Industrial Control Systems) such as SCADA (Supervisory Control and Data Acquisition), DCS (Distributed Control Systems), and PCS (Process Control Systems)
  • Knowledge of RTU (Remote Terminal Unit) and PLC (Programmable Logic Controller) systems
  • 5+ years of technical experience across various technologies and architectures including network switching and routing (TCP/IP, UDP, DNP3, Modbus, IEC 61850, OPC, OPC UA, PROFINET, etc.), firewall and gateway configurations, mobility and wireless knowledge including WiFi and Radio Frequency (RF) networks, Internet of Things, and network data/packet capture and analysis
  • Active professional information security certifications (e.g., CISSP, CRISC, GICSP, GIAC, CHE, OSCP)
21

VP Cyber Security Risk Management Resume Examples & Samples

  • Participate in regulatory assessments & audits (FFIEC, GLBA, SOX, PCI)
  • Manage and coordinate Cyber Security initiatives including External Penetration Tests, Table Top Exercises, and Cyber War Games
  • Collaborate with IT Security teams to develop actionable metrics as a result of the Threat & Vulnerability Management program
  • Provide guidance and governance to Information Technology (IT) teams to drive a risk aware culture
  • Coordinate for Incident Response, pulling in and working with appropriate support groups (Legal, IT Security, HR) as needed
  • Development of Cyber Risk metrics and reporting, focused on active Cyber Risks as well as the efforts and results of the team
  • Bachelor’s Degree in Management Information Systems, Information Systems Auditing, other related fields; or equivalent work experience
  • Minimum of 5 years of professional experience in Information Security, Regulatory Compliance, Risk Management or other related fields
  • Effective organizational skills including attention to detail and the ability to drive change
  • Ability to multitask and prioritize work assignments in a time sensitive environment
  • Familiarity with the Common Vulnerability Scoring System (CVSS) and other Vulnerability Management Databases (e.g., CVE, CWE, NVD)
  • Working knowledge of IT Security Technology is preferred but not required (e.g., firewalls, proxies, IDS/IPS, DLP, Vulnerability Scanning Tools)
  • Prior experience working directly with Internal Audit and external regulators (e.g, OCC, FRB) is highly preferred
22

Security Risk Framework Expert Resume Examples & Samples

  • Measurement of IC element risk maturity and ability to use the Risk Management Framework (RMF), NIST 800-37
  • Provide expert instruction to the IC community on security risk management best practices, including but not limited to the RMF
  • Oversight and analysis of progress against identified risks (e.g. mitigation against known risks)
  • Expert consultation and review of Bodies of Evidence to support documentation of risks into a Risk Assessment Report (RAR)
  • Familiarity with NIST Special Publications, including the 800-37 (the Risk Management Framework (RMF) and 800-53 (Security controls catalog)
  • Experience preparing risk authorization packages
  • Experience with the application of cyber security standards and risk management in cloud computing environments
  • Professional Information Assurance certifications; CISSP, CISM, CISA, CRISC, etc
  • Experience / familiarity with strategic planning and high-level coordination with IC agencies and partners
  • Experience with Information Assurance Risk Management tools, techniques and mitigations
  • Experience facilitating comprehensive risk assessments including end-to-end system security risk and control reviews
  • Familiarity with security risk management governance processes, risk assessments, and prioritizing risk mitigations
23

Information System Security Risk Analysis Senior Resume Examples & Samples

  • Ability to get and maintain a security clearance, and customers' acceptance
  • Must have had a security clearance review within the past 5 years
  • Must have Security+, CISSP, or other IAT Level II/III security certification
  • Knowledge and experience with system administration Windows 7/10, Windows Server/Active Directory, or Linux
  • Strong organization and interpersonal skills to provide customer support and support the team
  • Active Top Secret security clearance (investigation within the past 5 years)
  • Experience configuring and maintaining Active Directory domains and/or NIS domains
  • Experience configuring and maintaining DNS (Unix and/or Windows)
  • Scripting ability to support system administration (Perl, Python, WinBatch, VBScript, PowerShell, etc.)
  • Strong troubleshooting and problem solving skills
  • Experience managing McAfee anti-virus updates on Windows and Linux/Unix
  • Windows certification (MCSE, etc.)
  • Linux certification
  • Technical documentation creation and management
  • Experience developing and maintaining Windows baselines, including security settings and Windows hardening
  • Ability to identify application related configuration details for optimized performance
  • Intuitive thinker that can contrive and implement new solutions to technical problems
  • Knowledge and experience implementing Technical Requirements on multiple operating systems for NISPOM Chapter-8, JAFAN, JSIG, and other protection level caveats
  • Knowledge of real-time embedded processor cross-development environments (VxWorks, Greenhills, Mercury)
  • Familiarity with mass storage technologies such as NAS, SAN, and HSM
  • Familiarity with software mechanisms, particularly FlexLM
24

Security & Risk Management Architect Resume Examples & Samples

  • Serve as subject matter expert and primary contributor in the areas of Security and Risk Management
  • Responsible for client delivery, business development, and assisting the Modern Data Center practice knowledge management
  • Defines, designs, builds, deploys, and fine-tunes solutions that are scalable, reusable and highly available across the Security practice
  • Expertise should include experience with NIST standards, including the Cybersecurity Framework and SP-800 publications, CoBIT or ISO27000 standards; technical skills including familiarity or direct technical experience with Identity and Access Management or Logical Access Control Systems a plus
  • Contributes to the development of Slalom best practices and knowledge assets
  • Bachelor’s Degree in Management Information Systems (MIS), Computer Science, Computer Engineering, or closely related field, or foreign degree equivalent
  • 8+ years of Cybersecurity, Information Systems, IT Risk Management expertise
  • Project lead and team management experience
  • Must be flexible self-starter with an entrepreneurial spirit
  • Big 4 experience preferred
  • CISSP required; PCIP, PMP and Lean Six Sigma a plus; other certifications welcomed (CIPP/IT, CISM, CISA, etc)
25

Security Risk Architect Resume Examples & Samples

  • Responsible for client delivery, business development, and assisting practice knowledge management
  • Delivers on the vision, architecture, execution and quality assurance of Security projects for Slalom clients
  • Shares content expertise with Slalom practitioners through development and delivery of case studies, white papers, learning materials, and other resources to elevate internal knowledge of solutions
  • Expected to drive towards results in both a primary contributor and project manager capacity
  • Expertise should include experience with NIST standards, including the Cybersecurity Framework and SP-800 publications, CoBIT or ISO27000 standards; additional skills including familiarity or direct technical experience with
  • Identity and Access Management or Logical Access Control Systems a plus
  • Expertise with compliance frameworks such as PCI and HIPAA preferred
26

Senior Security Risk Specialist Resume Examples & Samples

  • Working across all 3rd Parties, Business Partners and Outsourced Service Providers
  • Strong Stakeholder Management especially across Procurement and Compliance teams
  • Identifies all TalkTalk Data held and managed by our Suppliers
  • Creates and manages a Risk based Supplier Data Catalogue
  • Manages Suppliers Risks such that they are remediated or accepted by the appropriate Business Owners
  • Ensures TalkTalk Security Policies, Standards and contractual requirements are embedded across our Suppliers
  • Agrees and manages a Supplier Audit schedule
  • Manages remediation of any Audit non-conformities
  • Embeds a robust governance framework across the TalkTalk interfaces and suppliers
  • Assure Supplier Data Security at all times. (Service Assured)
  • Manage and embed secure Access Management including connectivity, JML, Roles Based Permissions
  • Identify correct Supplier Business owners ensuring they are trained, aware and able to manage the suppliers in line with security needs
27

Head of Security Risk Management Resume Examples & Samples

  • Accrediation such as CISSP, CISM and ISO 27001 experience
  • Ability to attain and retain security clearance
  • As per personal and applicable corporate objectives
  • Operate the security Governance process producing weekly and monthly management information on security risks, controls effectiveness and compliance status
  • Assist Chief Security Officer in leading the security strategy
  • Act as subject matter expert and provide information security guidance to all areas of TalkTalk through integration of security into TalkTalk's processes
  • Maintain security risk register, identifying priorities for remediation and influencing resolving groups
  • Manage the identification and effectiveness of the security controls and provide regular status of our compliance to internal and external requirements
  • Define, implement and manage the Information Security Management System (ISMS)
  • Supporting on-going internal/external information security audit
28

Cyber Security Risk Manager Resume Examples & Samples

  • Manage various security strategy, risk, and compliance including HIPAA related projects
  • Have experience in managing risk assessments, risk register, and risk exceptions
  • Interface with business, technology, security, legal and other stakeholders to capture the current state of security controls and risks
  • Perform Gap analysis and propose future state for security and risk controls by business
  • Facilitate Security Control Assessment (SCA) and possibly other advanced-level Continuous Monitoring Activities
  • Develop resultant SCA documentation, including but not limited to the Security Assessment Report
  • Familiarity with NIST requirements, particularly 800-66 and 800-53 revision 3 and revision 4
  • Author recommendations associated with your findings on how to improve the customer’s security posture by NIST controls
  • Ability to lead small, less complex system assessments independently
  • Candidate must have solid knowledge of information security principles and practices, as well as an advanced understanding of security standards
  • Expertise in HIPAA is and other Security Frameworks (ISO, NIST, COBIT, HIPAA/HITECH, etc.) and regulatory requirements is a plus
  • Preferred that the candidate has either of CISSP, CISA, CRISC, CISM, OSCP & PMP but it is not required
  • Flexibility to adjust quickly to multiple demands, shifting priorities, ambiguity, and rapid change
29

AD, Security, Risk & Crisis Management Resume Examples & Samples

  • Development, lead implementation, and ongoing management of comprehensive programs, systems and plans for crisis and significant incident management for BIPI. Coordinate all activities for multiple departments including plan development, training and exercising, and continuous improvement to ensure the company's ability to respond and recover from crises and significant incidents. This position leads the BIPI/BIUSA Incident Management Team
  • Development, lead implementation, and ongoing management of risk and threat assessments, impact analyses, and identify and implement preventative measures where necessary to avoid situations with business-critical impacts including close collaboration with appropriate IT risk management personnel. Support other business areas and operating units to develop and implement similar processes
  • Develop medium and long term security strategies, and build systems and processes to realize the strategies. This includes demonstration of the value proposition of all proposed strategies. Provide regional security coordination to ensure security is maintained throughout the HP value chain, from the Innovation Unit through to the HP Business Unit, and provide assistance to all business units in the Region
  • Auditing internally and externally to ensure continuity and security of BI sites, and of BI developmental and marketed products including intellectual property through the value chain
  • Collaborate with the Security function at other Operating Units to enhance security of their sites and their businesses. Network with Corporate Security to ensure initiatives are appropriate for the Region Americas. Assist with the implementation of global security programs throughout the U.S. Provide support and backup to local security operations at the BIPI location
  • Other duties as required. This position will also serve as a backup to the BIPI Ridgefield Security Specialist
  • Spanish language capabilities, verbal and written, are an advantage
  • Six Sigma experience is preferred
30

Senior Security & Risk Management Architect Resume Examples & Samples

  • Serve as subject matter expert and primary contributor in the areas of information security
  • Build, deploy, and fine-tune solutions across the security practice
  • Deliver on the vision, architecture, execution and quality assurance of security projects for Slalom clients
  • Demonstrates mastery within domain of Cybersecurity, Risk Management, and IT Compliance
  • Contribute to the development of Slalom best practices and knowledge assets
  • Bachelor’s degree (or foreign degree equivalent) in Management of Information Systems (MIS), computer science, computer engineering, or closely related field, or equivalent technical experience
  • 5+ years of information systems experience, of which 3 or more years within information security
  • Big 4 consulting experience preferred
31

Security Risk Consulant Resume Examples & Samples

  • Perform Technical and Security Compliance Assessments and other client work related to SecureWorks professional services offerings
  • Create and recommend remediation for components of security policies, procedures, processes, and standards
  • Provide guidance and recommendations for technical security controls
  • Provide specific recommendations for business or technical issues
  • Create detailed, professional documentation to be delivered to customers both in written and verbal formats
  • Work on multiple projects concurrently, manage time effectively, and require minimal supervision in the execution of projects
32

Senior Manager, Account Security Risk Resume Examples & Samples

  • A master degree or equivalent in quantitative or engineering disciplines
  • 8+ years of experience in managing account security risk, familiar with latest fraud trend and industry best practices
  • Strong leadership with 5+ years of people management experience
  • Advanced analytical skills coupled with strong business instincts to “connect the dots”
  • A high bar across the board - from your own contributions to the people you work with to the products you work on
  • A “driver” personality - biased toward action, great collaborator and master disambiguator/simplifier - constantly pushing toward clarity and delivery
  • Grittiness. You never hesitate to roll up your sleeves and tackle something hands-on, you persevere when others fall away
  • Finger-tippiness with data: you just go get the data you need with no muss/fuss and can whip it into an insightful story with no help. You know how to leverage data to make decisions without getting stuck in analysis paralysis
  • User-focused - examples from your past of tough product challenges that you powered through because you were unwilling to make your problems your users’ problems
  • True passion for Uber’s mission and the company’s hybrid technology / operations nature
  • A never-ending desire to grow and learn
33

Senior Security Risk Strategist Eu-information Security Resume Examples & Samples

  • Support an overarching management framework through which the organization identifies, analyzes and addresses its information security and compliance risks
  • Participate in process improvement, identifying and implementing best practices in effective and innovative ways
  • Act as a key EU Risk and Compliance advisory capacity and security evangelist role
  • Responsible for building and influencing security and privacy as a core competency throughout our relationships with our internal teams/partners/vendors
  • Establishes credibility and maintains strong working relationships with groups involved with information security and compliance matters (Information Security, Legal, Privacy, Internal Audit, Fraud, Physical Security and Software Development Community etc.)
  • Responsible for continual process improvement and innovation in assessment process, process and control documentation, enabling information security and business teams to be on time, on budget, and on quality
  • Delivers findings, recommendations and remediation steps for all activities, in a clear, concise and audience-specific format
  • Responsible for conducting internal investigations and assessments
  • Minimum 6-years of information security background, audit, risk management or related consulting experience
  • Knowledge of the European Security Compliance and Regulatory space
  • Required to be fluent in many European Languages
  • Security Assessment Experience (Application Security, IT Audits, Penetration Tests, Risk Management)
  • Experience in Risk Assessment Methodologies and skilled in making complex business/risk trade-off recommendations and decisions
  • Technical knowledge in at least one security domain such as Application Security, System and Network Security, Cryptography or Security Protocols
  • Ability to multitask in a fast-paced, technical environment
  • Occasional domestic or international travel is required
  • Broad European security compliance and standards experience and throughout knowledge. (BSI, ANSSI, CESG ...)
  • Broad understanding of Data Protection requirements and nuances across Europe
  • Experience and knowledge of specific european regulations: E-privacy, NISD, GDPR, SecurePay, PSD2, E-commerce
  • Knowledge of COBIT, ITIL, PCI-DSS, COSO
  • Experience with normative frameworks such as ISO27002, ISO27005 and ISO31000
  • CISSP, CISM and/or other comparable certifications preferred
  • Knowledge of Software Development Practices and associated Security controls in DevOps, Continuous Deployment, Agile Development.Experience with service-oriented architectures and web services security
  • Executing and managing fieldwork for assessing the aforementioned
  • Experience in analyzing large data sets.Have experience in generating automated metrics to measure information security control effectiveness and consistency
34

Account Security & Risk Program Lead Resume Examples & Samples

  • Bachelor’s degree from top university; MBA highly preferred
  • Experience with investigative processes and planning across multiple incident types
  • Executive presence and the ability to influence leaders across the organization
  • Analytical mindset with the ability to present and execute on actionable, data driven findings
  • 5+ years of professional experience in a high-volume and extremely fast-paced environment
  • Prior professional experience with process optimization, systematic organization, program/project management
  • Performance management of large teams, creating and implementing policy, as well as stakeholder management and communications about high visibility and time sensitive issues
  • Optimistic leadership: You have an enthusiastic attitude and are passionate about making magic for our Community. You view every support interaction as a chance to impact our riders and driver partners in a positive way
35

Head of Security & Risk Management Resume Examples & Samples

  • Responsible for Line Management of the Security Management organization
  • Responsible for day to day delivery execution and delivery performance
  • Responsible for competence and capability build through hiring, training and coaching according to dimensioning
  • Responsible for financial forecast and budget fulfillment
  • Responsible for adherence to GSC Romania and Delivery Flow Ways of Working, Processes and Tools
  • Responsible for implementing service delivery quality strategy and culture
  • Responsible for adherence to country/local policies (e.g. security, trade, travel, OHS)
  • Responsible for ensuring that security, privacy and Business Continuity activities are performed effectively and efficiently and drive agreed improvement plans within GSC Romania
  • Responsible for driving the Local Security Management Board (LSMB) and to participate in the management team meetings to ensure security topics are addressed
  • Responsible for coordinating and follow up with the Line Managers that appropriate security controls are effectively and efficiently implemented by the operational teams in their ways of working
  • Responsible for ensuring compliancy to Ericsson Security Steering documents and Customer’s Security and Privacy requirements by deploying specific internal processes (MSTOP Security Management)
  • Responsible for ensuring compliancy to the Business Continuity Management framework by deploying specific internal processes
  • Responsible for applying, creating or customizing, and managing any local security steering documents after prior approval from Global Services Security
  • Responsible for supporting GSC Romania in defining the customer specific Security, Privacy and Business Continuity Management requirements or related activities in the internal contractual documents (e.g. WLA, OLA)
  • Responsible for supporting customer pre-sales activities during tendering process
  • Responsible for delivering security presentations to customers when requested by the organization
  • Responsible for proactively supporting internal product/service development projects in order to ensure that the applicable information security aspects are considered
  • Responsible for ensuring the information security is properly addressed in the Transition & Transformation projects
  • Responsible for ensuring via demand management that security related deliveries from the hosting organization and/or region are compliant with GSC Romania requirements (Crisis Management, Physical Security etc.) and in line with the risk level accepted by the GSC Romania Leadership Team
  • Responsible for being the driver for setting up the local crisis response and connecting it in the regional crisis management structure
  • Responsible for driving global or Business Unit security related initiatives upon request
  • Telecoms / ICT Operational experience, from either Ericsson or external company
  • Minimum 5 years’ experience in management roles at Region/Business Unit/Group Function or relevant equivalent experience in an external company
  • Highly developed leadership and change management skills, influencing and leading by example. Self-motivated and works well under pressure
  • High degree of accountability and integrity
  • Ability to simplify, good sense for details as well as high level thought leadership
  • Performance and Results oriented with good skills in leading and motivating people and conscious of responsibility and empowerment
  • Highly developed skills in Interpersonal communication and ability to communicate effectively
  • Customer oriented and business minded – has a consultative approach and focus on profitability
  • Analytical with strong problem solving capability and strategic thinking
  • Good conflict management skills
  • Knowledge and experience (minimum 10 years) covering at least four of the following areas
36

Security Risk Assessment Analyst Resume Examples & Samples

  • Evaluate the information security programs of external parties and internal departments to determine their adherence to Equifax Policies, Standards and industry best practices
  • Collaborate with other teams within Global Security to gain an understanding of processes and procedures in order to better represent the Equifax security program to customers and vendors
  • Participate in Security and Team project work including, analysis of findings, proposing recommendations, documenting and communicating results
  • Ability to communicate security concepts to technical and non-technical audience and able to interact with all levels of the organization in culturally diverse locations
  • Knowledge of ISO 27001, PCI and other security frameworks
  • 2-4 years experience with information security, compliance, risk management/assessment or technology management programs
  • Security Certifications such as CISSP, SSCP, CISA, CRISC,CISM, or Associate of ISC2 is preferred
  • Ability to formulate decisions based on business and technical knowledge
  • Experience documenting business processes or technical procedures preferred
  • Ability to travel up to 20% , domestically and internationally
  • Excellent written and verbal English skills are required. Spanish communication skills are preferable, but not required
37

Senior Specialist Security & Risk Resume Examples & Samples

  • Provides expertise in managing IT-related risk activities; overseeing and coordinating technical, regulatory, industry and contractual obligations; and influencing related priorities and decisions across the organization. Identifies documents and elevates visibility to information risk. Builds relationships and works directly with system, application and business process owners to achieve this
  • Is a trusted advisor and partner in risk-based decision making with business, IT and information security stakeholders. Drives effective IT Risk Management throughout the organization. Assists stakeholders in the maintenance and preparation of clear, detailed and accurate documentation to advise business and IT leaders on the IT security risks of initiatives. Must be responsive to questions and assistance requests from system and application owners and other key stakeholders. Performs formal risk assessments on partner and vendor connections and ensures the business objectives align with risks identified. Utilizes sound judgment to identify and assess risk, materiality, and adequacy of system or application modifications or mitigating controls
  • Works with the Director of IT Security and Risk Administration to define, develop and execute a Third Party/Vendor Information Security Risk Assessment program based on the management of information risk, and utilizing mechanisms to track the identification, remediation or acceptance of risk decisions
  • Provides regular business updates of risks and security controls for senior leadership and external stakeholders. Produces metrics showing operational compliance with best practices and risk controls and exceptions. Maintains the risk dashboard and monitors risk status. Documents and reports status of agreed upon risk remediation plans, owners and commitment dates
  • Provides enforcement of security policies, standards and procedures by working cross-functionally with Compliance and Governance functions within the Macy’s organization
  • Assists in the implementation of cybersecurity training, education, and awareness
  • Minimum 5 years’ experience in managing IT risk-related work
  • Proven experience identifying solutions for complex problems in enterprise environments
  • Working knowledge of IT systems – on-line retail experience helpful
  • Industry Certification required, e.g. CISSP, CISA, CISM or equivalent designation
  • The ability to appropriately communicate complex security risks to non-technical staff
  • Comfortable coordinating multiple projects concurrently and dealing with rapidly changing priorities in conjunction with day-to-day activities
  • Highly organized, able to address highly detailed technical issues, and to work effectively with multiple application and system teams and stakeholders, in multiple time zones
  • Superior interpersonal abilities. Ability to interact positively with diverse personalities; tactful; mature; flexible. Proven persuasion skills
  • Must be trustworthy in keeping sensitive data confidential
  • Should have a working knowledge of common OS and domain structures, servers, services, and associated vulnerabilities, experience with Windows, Linux, UNIX, etc. hosts, operating systems and applications, and a working knowledge of network engineering and local and wide area (LAN/WAN) technologies and topologies
  • Knowledge of cloud deployments and associated risk considerations is highly desirable
  • Demonstrated experience using and managing Risk Management tools is an advantage
38

Cyber Security Risk Management & Information Protection Resume Examples & Samples

  • Ensure timely execution of Cyber Security and Information Security risk management process execution including analysis, aggregation and reporting of material risks related to HP’s third party and information assurance risk management
  • Identify issues and root causes & facilitation of risk mitigation plans including security concepts, controls, and awareness & training in alignment with HP Policy & Standards
  • Provide consultation on risk management controls to involved stakeholders and partners to effectively manage third party risk
  • Provide consultative advice to internal customers that enables them to make informed risk decisions and develop acceptable risk mitigation strategies for highly complex application development programs
  • Review mitigation plans at a technical level to ensure mitigation will produce acceptable residual risk
  • Partner with peer analyst stakeholders (including at minimum: Supply Chain, Factory, IT, Enterprise Risk Management, Procurement) to effectively coordinate execution of security concepts & controls
  • Assess maturity and effectiveness of controls
  • Prepare and present risk management reports, scorecards, and briefings
  • Support internal & external audit readiness related to 3rd Party and Information Assurance risk management
  • Provide deep technical leadership for Information Protection technologies, such as Data Loss Prevention tools
  • Bachelor's Degree in Information Security, Cyber Security, or related
  • At least 5 years of related experience in Risk Management, Governance & Compliance, Cybersecurity, Information Security or IT domains that have relatable experience
  • Understanding of PCI DSS, ISO 27001/27002, and/or NIST Cybersecurity Framework
  • Security Certifications, such as CCSP, CISM, CISSP, CRISC, CISA or other Information Security or IT disciplines helpful
  • Demonstrated experience in engineering cyber security solutions for large organizations
  • Strong domain expertise and technology implementation/ integration experience in Data Security / Protection, Encryption & Key Management and one or more of the following areas
39

Cyber Security Risk Management Analyst Resume Examples & Samples

  • Merchant ID Process
  • EGRC Tool
  • Process House
  • Business Continuity
  • Prepare and present reports, scorecards, and briefings
  • As needed, participate in risk assessments in other cyber security and information security areas of focus
  • Bachelor's Degree in Information Security, Cyber Security, or related field
  • 2-3 years of relevant experience in Governance Risk Management & Compliance, Cybersecurity, Information Security or IT domains that have relatable experience
40

Dir Info Security Risk Mgmt Resume Examples & Samples

  • Serving as an advisor to management regarding information security and technology risk, regulation and best practices
  • Developing and implementing processes, policies, standards or procedures to help manage the risk associated with an information security incident
  • Providing input to UMB's comprehensive information security strategy
  • Monitoring and facilitating remediation of control vulnerabilities identified through risk assessments
  • May lead teams comprised of one or more associates or managers to perform the responsibilities above. May coach and provide feedback in many forms to department associates including providing quarterly and annual evaluation/feedback of assigned associates, as applicable
  • Demonstrates in-depth knowledge of information security and technology frameworks, best practices and regulation
  • Demonstrates advanced understanding of cyber security and technology risks, processes, and controls
  • Demonstrates strong and clear analytical/quantitative skills
  • Demonstrates ability to persuade and influence management decisions and efficiently address risk
  • Demonstrates ability to translate technical requirements into business practice
  • Demonstrates strong organizational / planning skills
  • Demonstrates ability to thrive in a team environment or work independently
  • Demonstrates ability to think and plan strategically yet comfortable with tactical tasks
  • Demonstrates excellent written and verbal communication, organizational, problem solving, and decision-making skills
41

Cyber Security Risk Management Analyst Resume Examples & Samples

  • Present security recommendations for complex programs & sourcing decisions
  • Perform system security evaluations on suppliers and vendor products by following prescribed security evaluation criteria
  • Provide input to regularly scheduled platform and project specific meetings
  • Produce quality system security risk assessment reports
  • Education: Bachelor's Degree in related field and minimum 8-10 years related experience Professional Security Certifications through DoD, ISC2, ISACA or Comp TIA preferred Must have solid work experience with successful teaming environments
  • Self-starter with proven initiative and developed listening skills
  • Possess strong technical writing, verbal and presentation skills
  • Demonstrated success leading and conducting senior level security risk analysis--Specifically Threat Modeling involving system decomposition, threat and vulnerability discovery and mitigation
  • Worked with Secure Development Life Cycle
  • Active Directory-Domains and Forests o Securing common services (Domain Controllers, DNS, Terminal, DHCP, WINS, Routing and Remote Access)
  • Strong knowledge of protocol design, network topologies and perimeter security devices (proxies, IPS, IDS, Firewall and packet analyzers) and network security design Implementing Group Policy
  • Rights Management Services
  • Oracle and MS SQL database security architecture
  • Working knowledge of Security Standards/Controls specified under various IT governance and compliance models (NIST, ISO 27001&27002, ITIL, COBIT): Applications and Systems Development Security
  • Security Management Practices o Access Control
  • Security Architecture and Modeling
  • Telecommunications o Network Security o Cryptography (PKI)
  • Physical Security Controls
  • Business Continuity Planning and Disaster Recovery
  • Incident Reponses
  • Governance/Law (SEC, HIPPA, PCI, SOX, FISMA, DFAR, NIST 800-171) , Investigation, Ethics
  • Individual contributor-Must perform with limited supervision
  • Technical writing-comfortable writing reports for senior management
  • Organizational-understanding of corporate enterprise IT solutions
  • Knowledge of IT governance and compliance models
  • Knowledge of IT Security Controls
  • Knowledge of IT Security provisioning (ISC2/ISACA/Comp TIA certs are a plus)
  • Experience in the Windows, Linux, Database or Application environments
  • Knowledge of any ERP security architecture, features and functionality
42

Security Risk Manager Resume Examples & Samples

  • Audit related experience
  • Experience in relation with internal control bodies (Audit, compliance, operational risks, …)
  • Experience of Information Security governance
  • Good overall Information Security competences
43

Security / Risk Manager Resume Examples & Samples

  • Financial Asset Management
  • Masters’ Degree in Information Systems or Computer Science
  • Expert information systems security certification such as CISSP or CISM
  • 10+ years of experience in information technology with 6-8 years of experience with security, compliance, management, budgeting, and leading teams
  • Expert at data analysis and solutions design for abstract problems
  • Broad and deep technical knowledge in security engineering, systems and network engineering, authentication and security protocols, cryptography, SQL, and .NET
44

Senior Security & Risk Management Architect Resume Examples & Samples

  • Serve as a subject matter expert and primary contributor in the areas on information security
  • Demonstrate mastery within domain of Cybersecurity, Risk Management, and IT Compliance
  • Contribute to the development of Slalom best practices and security knowledge assets
45

Info Security Risk Lead, VP, Auburn Hills Resume Examples & Samples

  • Work with clients and technical resources to create Design specifications for a multi-function system
  • Create estimates for Design, Development, Testing and Implementation tasks for self and/or other Developers
  • Identifies potential issues in projects/assignments and leads to a resolution
  • Perform the programming development, unit and integration testing and defect resolution
  • Utilize software development tool(s)
  • Conduct unit testing as defined in department standards
  • Provide accurate development project schedule dates
  • Drive high quality code by conducting code walkthroughs with development team
  • Create technical documentation for transition to production support team
  • Perform technical analysis and make recommendation on medium to large initiatives with medium complexity
  • Explain technical solution to client and technical resources
  • Train other Developers
  • Participate in interview process of Developers
46

Security & Risk Management Architect Resume Examples & Samples

  • Demonstrates expertise in completing projects within the domain of information security
  • Hands-on experience with network technologies (routing, switching, firewalls, etc.) required
  • Experience with compliance methodologies such as PCI, HIPAA, FFIEC, or ITCS104
47

Cyber Security Risk Manager Resume Examples & Samples

  • Build a robust and sustainable Cyber Security Risk program
  • Partner with Chief Information Security Officer (CISO) to establish standards, policies, and develop KRIs for measuring and monitoring data risk
  • Provide independent assurance over Cyber Risk
  • Assess the accuracy, completeness, and sufficiency of the processes, risks and controls
  • Identify and define threats and risks to SG’s
  • Perform effective challenge of all critical and highly sensitive processes & controls, and business continuity
  • Develop cyber security risk scenarios for stress testing and capital planning activities
  • Lead or support selected cyber security remediation efforts
  • Strong foundation in information technology and information security principles
  • Requires broad and deep understanding of technical security concepts and familiarity with related technologies and infrastructure, as well as a solid conceptual knowledge of enterprise IT system operations
  • Ability to analyze root causes of cyber security issues and documenting remediation
  • Understanding of financial services specifically within risk and regulatory domains
  • Interpersonal and collaborative skills and the ability to communicate security and risk-related concepts to technical and nontechnical audiences
  • Professional certifications in information security such as a CISSP, CISM, CRISC
  • Strong leadership skills with ability to lead by influence
  • Proficient in Excel, Word, Access, PowerPoint, Outlook, Sharepoint
  • Previous work within Risk and/or Information Security/Cyber Security. Ideally, has worked in a 2 LOD Cyber Security Risk function
  • Bachelor and or Masters Degree in Computer Science, Engineering or relevant technical field
  • CISSP, CISM, or CISA certifications a strong plus
  • Background in IT Risk Assessment, IT Audit, Information security management
  • Knowledge of US IT Security regulatory requirements and environment in financial services industry a plus (i.e. FFIEC, FIRNA rules, SEC, NIST frameworks)
  • French
48

Security Risk & Resilience Manager Resume Examples & Samples

  • Good understanding of the BAT business operating model and processes and the key business issues
  • 10 years total experience in either international or national security which includes corporate, private contractor, military, law enforcement, or government intelligence service. Experience will include a minimum of 2 years as an international corporate security manager
  • Ability to communicate complex subjects effectively with technical and non-technical audiences
  • Ability to achieve optimal balance between cost and quality
  • Thorough knowledge of local security industry
  • Able to carry out assessments and fraud/incident investigations, managing crisis and emergency situations and adjudicating facts in order to reach logical and ethical conclusions
  • Relevant risk assessment(s) of the potential threats to personnel, assets, information, installations and business operations, and take appropriate security/ mitigation measures including the development of procedures and plans
  • Extract maximum value from outsourced service providers
  • Excellent inter-personal skills and the ability to liaise with internal and external clients at all levels
  • Specialist security certification is preferable (CPP, PSP, CFE etc.)
  • Above average writing, communication, persuasion, and consensus building skills
  • Logical reasoning and persuasiveness
49

Cyber & Security Risk Consulting Senior Manager Resume Examples & Samples

  • Financial Crime Risk Management
  • Cyber & Security Risk Management
  • Operational Risk Management
  • Surveillance
  • Financial services industry experience (which could have been obtained in industry or via consulting roles)
  • Cyber and/or security risk management skills
  • Knowledge of key cyber and security risk technologies and emerging technology trends
  • Regulatory or risk change experience
  • Systems design and delivery skills
  • Project and programme management skills
  • Excellent communication skills with the ability to explain technical solutions and analytics to a non-technical audience
  • Strong stakeholder management skills and experience of working with C-level stakeholders
  • Team leadership, coaching and people development skills
  • A good degree (2:1 minimum)
50

Security Risk-lead Resume Examples & Samples

  • Work with the Information Security Risk Manager to implement all aspects of the risk function, including implementation of processes, tools and systems to identify, assess, measure, manage, monitor and report risks
  • Respond to audit requests and track findings, bringing resolution to all findings
  • Respond to security surveys and questionnaires from Pitney Bowes clients
  • Track evidence of compliance
  • Conduct compliance and risk assessments
  • Coordinate third-party assessments of Pitney Bowes’ IT security posture
  • Coordinate the Pitney Bowes PCI compliance program
  • Coordinate, update, execute, track and report on annual disaster recovery testing
  • Coordinate business continuity activities required to keep Pitney Bowes IT running during a period of displacement or interruption of normal operation
  • Research, report on and implement new solutions in the area of risk management
  • Bachelor’s Degree in Information Security, Computer Science or equivalent
  • Experience interfacing with other internal or external auditors
51

Security Risk Manager Resume Examples & Samples

  • Develop and maintain an effective internal IT control framework that can demonstrate proper design and operation of the controls
  • Manage the implementation of all aspects of the risk function, including implementation of processes, tools and systems to identify, assess, measure, manage, monitor and report risks on an enterprise-wide basis
  • Maintain a repository of standard responses for audits and questionnaires
  • Ensure compliance to regulations and industry standards such as SOx and PCI,
  • Manage third-party assessments of Pitney Bowes’ IT security posture
  • Work with third party auditors to measure and improve Security and Risk Controls
  • Manage business continuity activities required to keep Pitney Bowes IT running during a period of displacement or interruption of normal operation
  • Review and update security awareness training
  • 5 years of experience leading team and personnel in Information Risk environment
  • 10 years of experience in Information Security Risk
52

IAM Security Risk & Control Manager Resume Examples & Samples

  • 8 years experience in technical infrastructure or application develop and support, OR 8 years experience in oversight of technology in an audit, compliance, or risk role
  • Background in information security, specifically with identity and access management
  • Ability to assess processes and technology with a critical eye for deficiencies and improvements
  • Ability to communicate with senior leaders within IAM and across the company as well as technology staff
  • Strong attention to detail, ability to work independently and confidently
  • Bachelor's degree in information technology
  • Audit or compliance oversight experience
53

Director of Cyber Security & Risk Management Resume Examples & Samples

  • Lead large cyber security initiatives with a focus on risk management. Provide program progress and status updates to executives and related committees
  • Solve complex and ambiguous security and risk issues that span legal, compliance and regulatory requirements across various business functions and shared services
  • Strong written and oral executive communication (up-to and including C-Level) including in situations involving controversy, customer negotiations, or influencing and persuading other senior level managers
  • Demonstrated experience of working in a cloud IT environment and cloud product offerings with strong experience in driving SOC2 and NIST certifications for customer facing environments
  • Demonstrated experience to define and operationalize processes pertaining to cyber security and risk management
  • Lead discussions and solutions with Privacy office on new and existing global privacy regulations to drive security risk management. Interfacing with Privacy office and team to identify and address security risks to the organization, partners, customers, etc
  • Building, maintaining and enforcing information security policies, procedures and processes. Establishing a Create-Communicate-Execute process for all policies and working with relevant departments (e.g. Corporate Communications) to this end goal
  • Lead customer, partner and vendor risk assessments and communicate them to information security “customers,” or business partners
  • Building out and executing upon a risk management strategy with roadmap deliverables
  • Developing, building and maintaining a common controls framework
  • Leading the Business Unit Liaison team to provide consultative advice that enables making informed risk management decisions
  • Performing focused risks assessments and communicate them to information security “customers,” or business partners
  • Identifying opportunities to improve risk posture, developing solutions for remediating or mitigating risks and assessing the residual risk
  • Ability to drive accountability among various business functions and shared services by defining and implementing risk based security metrics. Providing reporting and metrics toward the alignment of controls to risks and showing maturity models against it
54

Security Risk Assessment Center Manager Resume Examples & Samples

  • Offer to selected candidate will be made contingent on the results of applicable background checks
  • Our policy restricts consideration of applicants needing employment sponsorship (visas) to specialty occupations
  • Sponsorship will not be considered for this position
  • Relocation assistance is available
  • The SRAC is responsible to coordinate information services and SLAs with AmFam social media listening functions and IT Security along with contract services from vendors such as Global Security Operations Centers to provide the most up to date risks facing the AmFam Corporation
  • SRAC conducts on-site security and vulnerability assessments of all AmFam facilities along with risk assessments for all AmFam special events and executive travel. In addition, the SRAC Manager is responsible to develop associated risk mitigation strategies and security solutions based upon these risk assessments
  • Lead the SRAC operations to ensure optimal identification and resolution of security incidents
  • Develop infrastructure and processes to maintain situational awareness of incidents that may compromise the safety and security of corporate personnel, business operations, and infrastructure
  • Develop, implement and manage overall risk management processes to proactively identify security threats
  • Communicate threats to applicable AmFam Executives which may impact business operations
  • Develop and implement processes to expedite effective and efficient local law enforcement response to safety and security incidents (i.e. medical, fire, hazardous materials, natural disasters, workplace violence, criminal, accidents…) at NHQ and regional facilities
  • Manage SRAC operations at AmFam corporate NHQ, including budget management, performance metrics, contracts, protocols and procedures, and assigned personnel
  • Create and manage security incident reporting process and develop associated risk assessment and mitigation strategies
  • Directly manages AmFam’s Emergency Response Coordinators
  • Develop processes to monitor intelligence sources to identify potential threats or incidents which may target AmFam’s assets. Manage the collection, documentation and assessment of security incidents received from all AmFam strategic partners
  • Develop and maintain SRAC functionality and assist in identifying new technologies and upgrades for information services critical to risk assessment
  • Develop and monitor key performance indicators, determine gaps in performance metrics, and recommend/execute change management techniques for efficiency/quality improvements
  • Conduct exercises to ensure Security Department personnel, emergency response coordinators and first responders are current with the latest threats and incident response techniques to ensure effective execution of AmFam’s emergency response plans
  • Develop highly analytical process to conduct detailed risk assessments
  • Lead and facilitate cross functional teams to orchestrate risk assessment meetings to gather input, rationalize possible events, and discuss possible outcomes
  • Provide routine and crisis management reports based upon on-going and emerging threats
  • Demonstrated experience in emergency management planning, with an emphasis in security program development
  • Demonstrated management level experience performing risk assessments and mitigation strategies
  • Demonstrated understanding of best practices in risk assessment processes and physical security strategies, principles, standards, policies, and procedures
  • Extensive experience in crisis and incident response, focusing on ability to maintain calm and efficiency in high-pressure settings
55

Security Risk Manager Resume Examples & Samples

  • Own the security risk management program globally across Services to drive data protection risk reduction
  • Work with others to build security controls, secure processes, and write security standards to ensure compliance with legal regulations, corporate policies, and customer commitments and to help raise the bar for data protection in the Services division
  • Lead a variety of security risks assessments for applications and systems, business process engineering, and customer data flow within the environment; architect mitigation strategies to reduce risk and enable the business, and determine effective monitoring solutions
  • Maintain existing and build new security governance programs, with special focus on un-addressed areas of Services' business
  • Collaborate with Legal, IT and others to monitor emerging global requirements to determine the impact to existing business practices and represent Services on cross-company security response efforts
  • Drive Services-specific security policy requirements into the appropriate Microsoft Policy, or contractual documentation
  • Enable risk-based strategic planning efforts for security teams across Services, and ensure that risk mitigation strategies are identified, resourced and tracked
  • Establish and report relevant metrics and KPIs to communicate status, demonstrate progress and build awareness of security risk program
  • Build and nurture positive working relationships with stakeholders and leadership, and be engaged as a trusted advisor
  • Advanced knowledge and understanding of a wide range of relevant core security technologies, and information security and privacy standards, laws and regulations
  • Knowledge of and expertise applying security, risk and control frameworks such as NIST, COBIT, ITIL, ISO
  • Ability to perform complex process reviews, interpret the results and articulate the findings in a clear and concise manner
  • Self-motivated with ability to work with little supervision
  • Ability to analyze complex problems, think creatively, communicate recommendations, influence change and drive process and structure into an extremely dynamic environment
  • 8+ years of combined risk management, risk consulting, and information security work experience
  • Certified Information Systems Security Professional (CISSP), Certified Information Systems Manager (CISM), Certified in Risk and Information Systems Control (CRISC), or equivalent strongly preferred
56

Digital Security & Risk Consultant Resume Examples & Samples

  • Works collaboratively as part of an agile development team, on highly visible, divisional/cross-divisional complex projects
  • Sought as a key resource for resolution of unique or complex business problems
  • Drives continuous improvement and efficiencies beyond own scope of responsibility
  • Participate in various forums, to ensure appropriate identification of information risk and drive definition, design and implementation of control procedures to mitigate that risk
  • Utilize effective organizational influence / conflict resolution, verbal and written communication, and leadership skills to communicate a risk based approach to security and control design in line with business goals and vision
  • Minimum of 5 years of progressive experience in Information Security Risk and Controls definition and design
  • This role requires at least one information security, compliance, regulatory or related domain certification (CISSP, CEH, CRISC, CISA, CISM, etc.)
  • BS in Computer Science or a related field is required
  • Proven expertise in mitigating and addressing threat vectors including Dev Ops, Secure Coding (OWASP), and Information Assurance across private, public and hybrid cloud environments, including experience with technologies such as Jenkins, code repositories, chef/puppet
  • 3+ years’ experience and proven competency with regulatory mandates such as GLBA, HIPAA, PCI and SOX
  • Proven competency with risk management frameworks such as ISO 27001, NIST and Cobit
  • Authorized to work in the US without sponsorship
  • Lead security & control assessments on applications, APIs and platforms
  • Help ensure designs and implementations meet security best practice and defined standards
  • Build and tune processes and procedures to scale security assessment for faster feedback to the team
  • Facilitate the definition, design and implementation of security and control solutions and procedures and automate where possible
  • Communicate technology related policies and standards and how they should be applied within the Digital Business units to ensure risk is managed to an acceptable level and compliance achieved where it represents a significant risk to the business
  • Collaborate with Architecture resources to proactively identify potential risk exposures within new digital technology solutions and partner with application development teams and core information risk services groups to design and implement appropriate control solutions and procedures to mitigate risk / exposure
  • Serve as a Risk and Security Controls Consultant on projects, RFP’s & internal/external requests for security specific information
  • Take a lead role in conducting security research on threats and remediation techniques/ technology, make recommendations to the IS/IT teams and oversee implementation
  • Previous/current experience in a highly-regulated industry, or in banking or financial services, is strongly preferred
  • Understanding of technologies used to collect, share, access and use personal information. This includes an understanding of identity verification, encryption and secure coding practices
57

Security Risk Program Manager Resume Examples & Samples

  • 5+ years in corporate IT/Security environment
  • A BS/MS in Information Systems Management or a related field is preferred and certifications such as CISSP
  • Capability to interpret information from multiple sources and identify underlying security risks
  • Ability to distill and communicate security risks of large (web-scale) and complex environments
  • Proficiency with industry and regulatory security and risk management frameworks (e.g., ISO 27000/31000, NIST SP800-53/30)
  • Ability to promote a collaborative environment and bring a positive attitude to difficult situations
  • Ability to triage work and balance short term wins with long term solutions
  • Outstanding written and oral communication skills
  • Experience in identifying, measuring, tracking, and reporting on security risks in an enterprise environment
  • Proven capability delivering projects and solutions from start to finish
  • Background in authorizing and working with security policies and frameworks
  • Demonstrated experience securing IT hardware and Infrastructure as a Service (IaaS) preferred
  • Experience successfully navigating and providing security guidance across a diverse set of business structures and processes
58

Security & Risk Manager Resume Examples & Samples

  • Taking ownership for developing the Security capability within the Newcastle Delivery Centre, while also working closely with the wider UK/I Security Practice
  • Playing an active role in the apprenticeship program, being responsible for the development of apprentices brought into the Security capability in Newcastle
  • Building relationships within security practitioners within industry and academia across the North East, seeking to develop innovate solutions that would benefit our clients
  • Designing pragmatic but effective cyber security solutions for our clients
  • Previous full-time work experience in information security management and/or related functions (Cyber Security Knowledge and skills, Big data processing and analytics, Cloud computing architecture, infrastructure and solution design, penetration testing, vulnerability analysis, intrusion detection etc.)
  • Knowledge of Web Application Security Architecture
  • Integratingsecuritytools,standards,andprocessesintothe productlifecycle
  • Improvingandsupportingapplicationsecurity tool deployments
  • Includes delivery of operational security analytics solutions with real-time detection
  • Adept at identifying and developing a sales opportunity pipeline
  • Experience in mentoring and developing skills in team members
  • As there is potential to work with UK Government clients, the individual must be a UK National with ability to get the required security clearance
  • A background in technical IT roles such as IT architecture, development or operations, with a clear and abiding interest in information security
  • The applicant must demonstrate competence in one of the following sub-domains (Data security, API security, Enterprise application security and Secure application security)
  • Strong communication (written and oral) and interpersonal skills
  • All candidates must be willing to offer full mobility (i.e. prepared to work away from home Monday to Friday as required)
59

DGM / Head-security Risk Manager Resume Examples & Samples

  • Direct responsibility for all Corporate Security operational activities and advice across
  • Sponsor and coordinator of local security agenda
  • Highly developed leadership skills, especially in an international environment
  • Experience of the full range of corporate security risks and mitigation strategies, processes and systems
  • Effective communication and influence skills, deployable at all levels of the organisation in a matrix structure
  • Ability to act coolly and effectively as the leader in fast-moving and complex security operations
  • Professional and/or academic qualifications in operational security risk management
  • Or significant relevant experience operating at a senior level in an operational security environment
60

Cyber Security Risk Assessment Analyst Resume Examples & Samples

  • Review assessment questionnaires and conduct interviews with project teams to clarify responses
  • Leverage the Security Architecture team and other relevant team members as needed, to help assess solution architectures and technical controls
  • Provide consultative assistance to the organization on an as-needed basis concerning information systems control and security issues
  • Build collaborative relationships with project teams and other stakeholders to foster transparency and customer service
  • Experience performing cyber security or risk management assessments preferred
  • 4+ years of experience in IT infrastructure related field
  • Project management experience desired
  • Excellent communication, report writing and presentation skills
  • Ability to work independently and also cross functionally
  • Excellent time management and related organizational skills, including appropriate sense of urgency, a proactive approach, and a suitable ability to anticipate and manage project lifecycle events, issues and obstacles
  • Up to 10% travel required
61

Security Risk & Operations Analyst Resume Examples & Samples

  • 3 - 5 years of experience in information security
  • Experience with vulnerability management for Linux and Windows environments
  • Experience with vulnerability remediation
  • Advanced Windows,Linux, Database, Application, Web server, etc. log analysis
  • Advanced experience troubleshooting security reports on Linux, Windows, routers, firewalls,applications, etc
  • Familiarity with common network vulnerability/penetration testing tools including, but not limited to, Metasploit, vulnerability scanners, Kali Linux, and Nmap
  • Experience reviewing and analyzing network packet captures
  • Working knowledge of network architecture
62

Security Risk Management Consultant Resume Examples & Samples

  • Collect, update, analyze and communicate security information, related to the delivery of UN Women PVE/CVE programmes within the Asia Pacific Region
  • Research and develop internal guidance and advisories on UN Women PVE/CVE programming that incorporates Security Risk Management and assist in its implementation
  • Coordinate security programmatic evaluations of PVE/CVE programmes. Development of mission plan for gathering, verification, and analysis of security information. Deliverables: Mission plans and mission reports as relevant by 30 June 2017
  • Gathering, verification, and analysis of security information. Deliverables: Draft evaluation and mission report/s by 31 July 2017
  • Gathering, verification, and analysis of security information. Deliverables: Final security programmatic evaluations of PVE/CVE programmes by 31 August 2017
  • Conduct research and liaise and coordinate with relevant stakeholders (units, divisions and sections internally as well as UN Agencies Funds & Programmes, Implementing Partners, Civil Society, Host Country Agencies) to identify and develop specific prevention and mitigation measures aligned to security supported PVE/CVE programmes. Deliverables: Report detailing stakeholders consulted with recommendations by 30 September 2017
  • Development of security risk management guidelines for UN Women PVE/CVE programmes in the Asia Pacific Region including recommendations on risk management to enable programme delivery. Deliverables: Draft security guidelines by 31 October 2017
  • Development of security risk management guidelines for UN Women PVE/CVE programme. Deliverables: Final security guidelines by 30 November 2017
  • Development of training materials for dissemination of security guidelines. Deliverables: Training materials by 31 December 2017
  • Dissemination of guidelines and training to relevant stakeholders. Deliverables: List of stakeholders, mission reports by 31 January 2018
  • Evaluate achievements, lessons learned and recommendations for way forward. Deliverables: End of consultancy report by 28 February 2018
  • Payment will be made upon submission of deliverables with an approval of Regional Policy Adviser – Governance, Peace and Security
  • Excellent grasp of security issues both from a programming and a policy point of view
  • Operational knowledge of United Nations Security Risk Management processes and UN Programmes, particularly those with a gender focus
  • Ability to conduct data collection using various mediums, apply judgment in the context of prioritization, plan work and manage conflicting priorities
  • Ability to communicate complex issues to clients and supervisors, clearly present research and analytical findings and formulate useful security guidance and advisories
  • Possesses an array of good communication skills, spoken, written and visual, including the ability to draft/edit in a clear concise style
  • A minimum of two years of progressively responsible experience in Security Risk Management, with an understanding of United Nations risk management and programmatic processes and understanding of gender based programmes
  • Experience working in a field location an asset
  • Technical Qualification (100 points) weight; [70%]
  • Financial Proposal (100 points) weight; [30%]
63

Cyber Security Risk Assessment Manager Resume Examples & Samples

  • Review assessment questionnaires and conduct interviews with project teams clarify responses
  • Identify, communicate, and coordinate other risk management activities that must be completed such as vulnerability scanning, confidentiality and privacy review, and vendor assessment
  • Coordinate with other subject matter experts to mitigate information security risks and to correct compliance exposures and gaps
  • Involve relevant team members including the Security Architecture to assess solution architectures and technical controls
  • Communicate required and best practice improvements to reduce risk to an acceptable level
  • Prepare assessment reports for management to review and approve
  • Assist with the development, implementation, and monitoring of risk management initiatives
  • 1+ years of experience performing cyber security or risk management assessments
  • 5+ years of experience in cyber security related field
  • Project management and cyber security experience desired
  • Security certifications such as Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), or Certified Information Systems Security Professional (CISSP) desired
64

Security Risk Resume Examples & Samples

  • Demonstrated ability to challenge the status quo, identify issues, and provide viable suggestions to improve
  • Proven excellent writing skills including the ability to proof read for proper language and grammar, and editorial tasks
  • Effective skills with time management, organization and prioritization
  • Possess a high level of integrity and ethics
  • Ability to analyze complex information (e.g. probe, examine, and scrutinize)
  • Required to obtain relevant security certification(s) within the first two years of employment
65

Cyber Security Risk Management Senior Analyst Resume Examples & Samples

  • Ensure timely execution of Cyber Security and Information Security risk controls including analysis, aggregation and reporting of material risks
  • Identify issues and root causes including oversight and facilitation of risk mitigation plans including security concepts, controls, and awareness & training in alignment with HP Policy & Standards
  • Provide guidance on security controls to involved stakeholders and partners with them to effectively manage risk
  • Partner with third party management stakeholders (including at minimum: Supply Chain, Factory Chain, IT, Enterprise Risk Management, Procurement) to effectively coordinate execution of security concepts & controls
  • Prepare and present risk management reports, scorecards, and briefings as required
  • Review key metrics and overall performance with internal stakeholders and third parties
  • Support internal & external audit readiness
  • Monitor regulatory changes, corporate updates, and geo-political changes and ensure HP cyber security compliance
  • Support the development and implementation of HP Policy, standards, guidelines, tools, and documentation for consistent execution of risk management activities
  • 4 years of relevant experience across Risk Management, including third parties, or multiple areas within GRC
  • Strong governance & compliance background
  • Understanding of PCI DSS, ISO 27001/27002, NIST Cybersecurity Framework, COBIT, and ITIL frameworks
  • Excellent interpersonal, written, and oral communication skills
  • Ability to work in a team fostered, fast-paced, multi-tasking, global environment
  • Highly motivated self-starter who demonstrates initiative
66

Cyber Security Risk Management Analyst Database Management Systems Resume Examples & Samples

  • Serve as a security subject matter expert, providing multi-disciplinary knowledge, skills, and experience in database management system architecture and management
  • Consult on current and upcoming projects covering all levels of database management systems and IT security architecture
  • Overall assistance in defining security requirements and strategies for database management system design, optimization, and solution delivery
  • Work in Cyber Security Risk Management team to deliver quality risk assessment reports. This requires having an in-depth working experience with an Information Security Risk Assessment using industry standard approach
  • Produce the following quality deliverables for Leidos business leadership
  • Education: Bachelor’s Degree in Information Systems, Computer Science, Information Security or related IT field
  • 8-10 years relevant risk assessment, database security / analytical experience
  • Fundamental knowledge of Oracle, SQL, stored procedures, scripts and reports
  • Comprehensive understanding of Data Protection solutions and technologies including; Data Loss Prevention (DLP), data masking, tokenization, data classification, and data encryption
  • Demonstrate success leading and conducting senior level security risk analysis. Specifically, threat modeling involving system decomposition, threat and vulnerability discovery and mitigation
  • Work experience in a mature risk management team with proven risk assessment methodology
  • Professional Security Industry Certifications such as CISSP, CCNA, CCIE or other relevant industry certifications through such accrediting bodies such as the DoD, ISC2, ISACA, SANS or Comp TIA
  • Proven ability to work with cross-functional teams
  • Self-starter, individual contributor; must perform with limited or no supervision. Possesses proven initiative and developed listening skills
  • Demonstrate timely task completion involving solid organizational skills, task tracking, and follow-up, and productive peer interaction
  • Possess strong technical writing, verbal and presentation skills especially with communicating to PMOs / senior management
  • Expertise with NIST and ISO 27000 series, particularly NIST SP 800-53, NIST SP 800-171 r1, ISO 27001/2
67

Security & Risk Management Analyst Resume Examples & Samples

  • Over 3 years of professional IT experience (security related positions)
  • Experience in architectural design and implementation of complex security solutions
  • Interpreting and applying appropriate Standards, Policies and Legislation, (e.g. ISO27001, PCI DSS, COBIT, SOX, DPA, HMG SPF, GDPR, NIST etc) confirmed by respective certifications or relevant experience
68

Security Risk Mgmt Analyst Resume Examples & Samples

  • Detail oriented, self-starter who can drive initiatives forward with minimal oversight
  • Ability to formally analyze and document technical issues in a risk-based manner
  • Ability to forge collaborative relationships with information security and business partners
  • Strong expertise in one of the following
  • Application security and integrating security into the SDLC
  • Risk management program development
69

Head of Security Risk & Global Rbwm Resume Examples & Samples

  • The job holder will report functionally to the Global Head of SR, and locally to the US CRO
  • The job holder will also maintain another reporting line to the Global RBWM CRO
  • The job holder will liaise closely with US and RBWM business heads and key stakeholders in the performance of the role
  • The job holder operates within Global Risk FIM and Global SR strategy and RBWM FIM and may make recommendations for change
  • The job holder is able to appoint consultants and suppliers within his limits of financial authority and is responsible for their performance
  • The job holder is accountable for the delivery of all projects and services on time and within budget to agreed Global Standards
  • Strong track record at a senior level in risk management
  • Strong knowledge of the core SR disciplines and understanding of law enforcement techniques and procedures
  • Experience in managing large, geographically-dispersed teams, and cost management
  • Excellent decision-making abilities, including when under pressure and to tight deadlines
  • Excellent written and verbal communication skills, with the ability to influence stakeholders at all levels
  • Ability to balance multiple competing demands to find the best solutions for the business
  • Experienced at managing change in partnership with multiple stakeholders
  • Dynamic and inspirational leadership skills
  • Innovative thinking and willingness to challenge the status quo
  • Ability to influence stakeholders at all levels
  • Competent IT knowledge, both in terms of the Groups systems and emerging popular technologies
  • Understanding of the Group's global strategies and ability to translate to local direction
  • High ethical standards
  • Strong ability to correctly prioritise
  • European languages ability beneficial
70

Security Risk Manager Resume Examples & Samples

  • Drive a comprehensive risk assessment and management program focused on the identification, treatment and management of key business risks
  • Partner throughout the organization to develop a comprehensive risk profile of each business unit
  • Devise measures & processes through which to monitor each applicable function
  • Liaise with and offer direction to related corporate functions (Compliance, Risk Management, IT, Operations, HR, and Legal) plus senior and middle managers throughout the organization on the management & treatment of identified risks
  • Develop and implement risk assessment models and methodologies based on commercial & federal best practices
  • Manage and maintain data quality associated with all risk management tracking and reporting
  • Track, measure, and report on the ongoing risk profile of each functional business unit
  • Produce reports & presentations which outline findings, detail risk positions, and recommend treatment
  • Work across multiple Wireline Business Units to drive consistent testing, reporting, and resourcing during applicable assessments
  • Support the risk assessment and reporting activities for both Wireline and supporting business units