Security Specialist, Senior Resume Samples

4.8 (99 votes) for Security Specialist, Senior Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security specialist, senior job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
SJ
S Jacobi
Shemar
Jacobi
48724 Mohr Ville
Detroit
MI
+1 (555) 203 4320
48724 Mohr Ville
Detroit
MI
Phone
p +1 (555) 203 4320
Experience Experience
San Francisco, CA
Senior Database Security Specialist
San Francisco, CA
Halvorson Inc
San Francisco, CA
Senior Database Security Specialist
  • Organizing and monitoring personal workload and escalating to manager when issues arise
  • Establishing, implementing security best practices within the database environment. This includes but is not limited to hardening scripts, audit documents, compliance filings, etc
  • Contribute ideas for best practice improvements, process improvement, and innovative solutions
  • Support project development following documented standards, policies and procedures (Change Management Process)
  • Develop platform specific stored procedures, functions and scripts to support internal processes and improve system security
  • Working closely with other team members, technical/team leads, management, specialized IT areas and application support teams to ensure consistent delivery and quality of database services
  • Performance analysis, monitoring, troubleshooting and resolution of issues within Guardium security suite
Houston, TX
Senior Ediscovery Security Specialist
Houston, TX
Predovic Inc
Houston, TX
Senior Ediscovery Security Specialist
  • Manage inventory and backup of forensic evidence and case management data (virtual and physical)
  • Perform data recovery, computer and network forensic examinations and investigations in support of internal investigations and intrusion incidents
  • Proficient in programming/scripting language(s) to improve productivity in analyzing file data, such as parsing of log files
  • Develop and maintain the necessary documentation to support the forensic and investigative processes and procedures
  • Provide input to the forensic technology roadmap and maintain the hardware asset inventory
  • Provide guidance to information security analyst on forensic evidence analysis, interpretation and documentation of findings
  • Proficient in disk and memory acquisition methods based on operating system, target location (e.g., local, inside/outside the network) and for special situations such as malware or child pornography
present
Houston, TX
Senior Specialist, Information Security
Houston, TX
Dare, Rolfson and Jenkins
present
Houston, TX
Senior Specialist, Information Security
present
  • Recommending and supporting the development and management of network security and incident response policies and procedures
  • Proficiency developing measures to prevent unauthorized software from being installed and executed on systems
  • Developing measures to prevent unauthorized software from being installed and executed on systems
  • Assist in planning, organizing and controlling security administration activities
  • Develop, document and maintain operation processes and procedures to conform with Enterprise Security Control Standards
  • Performing other job related duties as assigned
  • Work independently, with guidance in only the most complex situations
Education Education
Bachelor’s Degree in Cyber Security
Bachelor’s Degree in Cyber Security
Texas A&M University
Bachelor’s Degree in Cyber Security
Skills Skills
  • Data analysis, including ability to define metrics
  • Technical knowledge TCP/IP and network topologies
  • Technical knowledge of Windows and Linux
  • Experience with common incident response tools, technologies, and processes
  • Building scorecards and dashboards, and defining, observing and analyzing data trends
  • Programming languages, specifically SQL scripting language for data extraction and analysis
  • Experience with common computer and network forensic tools, technologies, and processes
  • Experience with Stix/Taxii and other CTI models
  • CISSP or equivalent
  • Previous incident response or SOC experience
Create a Resume in Minutes

15 Security Specialist, Senior resume templates

1

Senior Specialist, Information Security Rec T Resume Examples & Samples

  • Bachelor's degree with a focus in Computer Science or Information Technology or equivalent work experience is highly desired
  • Ability to work with a virtual team
  • Recommends security solutions to assist with the assessment and improvement of security infrastructure
  • Strong critical thinking and analytical skills; demonstrated ability to identify risks associated with business processes, IT operations and information security programs
2

Senior Specialist, Information Security Resume Examples & Samples

  • Provide leadership and direction on new projects and initiatives relating to information security
  • Assist in planning, organizing and controlling security administration activities
  • Develop, document and maintain operation processes and procedures to conform with Enterprise Security Control Standards
  • Provide technical expertise and support to both client and management in risk assessments and the implementation of appropriate data security procedures and products
  • Maintain an awareness of existing and proposed security standard setting groups, State and Federal legislation and regulations pertaining to information security
  • Identify regulatory changes that will affect information security policy, standards and procedures and recommends appropriate changes
  • Understand the SDLC methodologies and how to incorporate security controls in compliance with Enterprise standards into each phase
  • Lead others to solve complex problems; takes a broad perspective to identify innovative solutions
  • Work independently, with guidance in only the most complex situations
  • May lead teams or projects
  • A minimum of 5 years experience in information security
  • Knowledge of current technology trends from a security perspective, including, but not limited to, Cloud computing, mobile applications, and BYOD
  • CISSP Certification is a significant plus
3

Research Security Specialist Senior Resume Examples & Samples

  • Provide security direction and advice to GTRI personnel
  • Serve as interface with federal agencies regarding application of new and ongoing security programs
  • Coordinates the tracking, destruction, transmission and dissemination of Top Secret information
  • Coordinates procurement, tracking, installation, programming and destruction of COMSEC (Communications Security) equipment and key material
  • Prepare for government security inspections and coordinate any follow-up actions required
  • Collaborate with laboratory management on security work-related efforts impacting their operations
  • Coordinate visitor control requirements and special security subcontractor activity
  • Monitor and accommodate construction project work with regard to physical and computer security issues
  • Education:Technical Diploma, Associates Degree or two years college course work or an equivalent combination of education and experience
  • Work Experience:Four to five years job related experience
  • Skills:This job requires working knowledge of specific governmental regulations and requirements related to safeguarding and processing of classified information accessed through GTRI including access and use of associated information management systems
  • Preferred Education:Bachelor's Degree in in Criminal Justice, Security Management, Information Security, Business Management or other related fields
  • Preferred Work Experience:3-5 years of Industrial Security/DoD experience
  • Preferred Certifications: American Society for Industrial Security International (ASIS), Certified Protection Professional (CPP), National Classification Management Society (NCMS)
  • Preferred Skills: Microsoft (MS) operating systems, MS office suites, Security Information Management System (SIMS), Joint Personnel Adjudication System (JPAS), Industrial Security Facility Database (ISFD), Electronic Questionnaires for Investigations Processing (e-QIP), Secure Web Fingerprint Transmission (SWFT) and Electronic Facility Clearance (eFCL) database. Exemplary customer service communication skills (oral and written
4

Cyber Security Fusion Center Advanced Adversary Interdiction Team-senior Specialist Resume Examples & Samples

  • Be part of a team that can perform deep inspection of both current and previous environmental indicators for indications of persistent attacker presence
  • Leverage Big Data to conduct research and analysis
  • Find / develop new threat intelligence, detection, and suggest hardening strategies
  • Drive changes needed to respond to emerging threats
  • Collaborate with leadership to improve internal investigation capabilities for responding to security events through tool building and training
  • Oversee the preparation of written reports and give presentations to internal and external customers
  • Apply expertise to ascertain the impact of an attack and develop threat trends to develop mitigation techniques and countermeasures that can prevent future attacks
  • Targeted attack techniques, tactics, and procedures
  • Analyzing DNS, network, honeypot, IDS/IPS, logs, forensic and other common industry hunting tools and feeds
  • Scripting (Python, Perl, Powershell, Bash, etc.)
  • Windows, Linux Operating System Knowledge
  • Disk/network/memory forensic tools, log analysis, and developing custom scripts/functionality
  • Analyze and triage malware use static/dynamic techniques, including investigations of botnet and rootkit behavior
5

Research Security Specialist Senior Resume Examples & Samples

  • Preferred Education:Bachelor's Degree
  • Preferred Work Experience:N/A
  • Preferred Certifications:American Society for Industrial Security International (ASIS), Certified Protection Professional (CPP), National Classification Management Society (NCMS)
  • Preferred Skills:Must be familiar with SAP/SCI Personnel Security Requirements
6

Senior Perimeter Security Specialist Resume Examples & Samples

  • Provides a level of advanced technical support for execution of the daily management, administration and maintenance activities aligned to protecting EY’s global perimeter security infrastructure environment including Firewall, the Demilitarized Zone (DMZ) or perimeter network, Proxy, 3rd party connectivity and remote access against internal and external network security threats or unauthorized access intrusions identified via IT staff and end-user incidents escalated from the GO Service Desk
  • Takes an active role in building and advancing knowledge of EY’s global data protection policies and compliance directives with specific focus on the perimeter protection infrastructure environment including Firewall, the DMZ or perimeter network, 3rd party connectivity and remote access
  • Solid familiarity of EY’s businesses supported within the location to recognize the impact of perimeter infrastructure technology issues that are restricted to a specific business unit or may be global in nature and to engage and participate with confidence on escalating issues that are impacting a particular desktop, business or location as well as those that have wider impact
  • Cisco Certified Network Associate (CCNA) or appropriate alternatives that provide a knowledge of network concepts such as switching, routing, and protocols
  • Check Point Certified Security Expert (CCSE) (preferred)
  • Blue Coat Certified Proxy Administrator (BCCPA) (preferred)
  • Information Technology Infrastructure Library (ITIL v2 or v3 Foundations training) (preferred)
7

Security IAM Senior Specialist Resume Examples & Samples

  • 9+ years of Information security experience with CA SiteMinder preferred
  • Project Management/Development Lifecycle experience (understand and follow methodology)
  • Ability to manage complex problems when ambiguity exists
  • Provide status while proactively managing issues and risks with mitigation plans
  • Demonstrated track record as a team player
8

Senior Info Security Specialist Resume Examples & Samples

  • 8 years IT security related experience
  • Expert in the areas of computer Incident Response
  • Experience deploying and using host based live response and forensics tools in multi-platform environments containing Windows, Solaris, Unix, and Linux servers and workstations
  • Excellent analytical skills in the areas of host, network, and log based analysis
  • Superior knowledge of common attack methods and possible mitigations
  • Hands on experience with enterprise class network forensics systems, performing packet analysis, and understanding of TCP/IP protocols and services
  • Experience with enterprise class SIEM tools, creating and modify correlation alert rules, parsers, reports, and managing dashboards
  • Strong knowledge in the use and management of Indicators of Compromise
  • Experience with network discovery and security vulnerability assessment tools
  • Able to perform Root Cause Analysis with documentation and timelines of events
  • Experience quantifying incident response KPIs and generating security metrics
9

Senior Database Security Specialist Resume Examples & Samples

  • Strong understanding of security frameworks, tools and methodologies
  • Ability to lead projects that involve others to deliver on database initiatives
  • SOX compliance reporting
  • Participate and contribute to projects throughout the project lifecycle
  • Work with other Database Administrators or Developers in defining requirements
  • Occasional participation in after-hours and weekend support of production implementations, infrastructure activities, and various disaster recovery exercises
  • Develop platform specific stored procedures, functions and scripts to support internal processes and improve system security
  • Contribute ideas for best practice improvements, process improvement, and innovative solutions
  • Administrative intake process support
  • LI-AD1
10

Senior IA Security Specialist Resume Examples & Samples

  • Provide system security tuning, security monitoring, privileged user account management, and reviewing all COTS software products upgrades and patches, including operating systems. SSA shall include, but not limited to, monitoring and performing script writing, storage management interfaces, network interfaces, external peripheral interfaces, and others systems interfacing
  • Provide systems security administration operations and maintenance efforts
  • Provide systems engineering support to analyze and document system security problems in support customer operations
  • Perform security concept and requirements analyses in support of system upgrades and corrective fixes in the O&M environment
  • Provide security test designs and execute security system tests
  • Provide support for all customer systems/services Certificate & Accreditation (C&A) activities
  • Biometric system subject matter expertise
  • Certifications in operating systems and other COTS products are desired
  • Familiarity and experience leading project that employ “agile” methodology and Software Development Life Cycle (SDLC)
  • Advanced Certifications in security products and applications and other security related COTS products
11

Senior Vulnerability Security Assessment Specialist Resume Examples & Samples

  • Knowledge of common commercial and/or open source vulnerability assessment tools and validation techniques used for evaluating operating systems, networking devices, databases and web servers
  • Knowledge of security fundamentals including configuration management and familiarity with enterprise network architecture design from a security perspective
  • Knowledge of Payment Card Industry Data Security Standard (PCI), ISO17799 or 27001, and NIST is a plus
  • Must be able to manage multiple tasks
  • CISSP, CISA, GIAC, CEH or other relevant information security certification
  • Experience in credit card, financial and/or banking industry is a plus
  • Promote a risk-aware culture, ensure efficient and effective risk and compliance management practices by adhering to required standards and processes
  • 5 year work experience
  • Must have information security experience information technology experience
12

Security Application Senior Specialist Resume Examples & Samples

  • Preparing detailed review reports
  • Mentor junior team member
  • Degree in computer science or a related discipline
  • Experience in application security assessment
  • Hands on experience of Web, thick client, Mobile, VOIP, Wireless Application security reviews
  • Exposure and good understanding of manual testing methodologies
  • Basic Knowledge of programming languages like C/C++, C#, JAVA, ASP.NET and familiar with PERL/Python Scripting
  • Knowledge / experience on code review
  • Good Technical aptitude, problem solving and ability to quickly learn and master new topics and domain
  • Nice to have certificates: CEH, CISSP, CHFI
13

Senior Internet Security Specialist Resume Examples & Samples

  • Implementation, operations support, and system administration of Linux servers
  • Active Directory and LDAP knowledge and experience
  • Networking and security protocols knowledge and experience
  • Troubleshooting and Root Cause Analysis
  • Trouble ticketing systems; problem and change management workflow tools.Search Jobs US
14

Senior Info Security Specialist Resume Examples & Samples

  • At least 7 year’s experience with processes, tools, techniques and practices surrounding information security
  • Extensive experience with tools such as MS Excel and MS Access
  • Excellent written and verbal communication skills. Must be able to clearly articulate technical concepts in laymen’s terms
  • Data analysis, including ability to define metrics
  • Building scorecards and dashboards, and defining, observing and analyzing data trends
  • Programming languages, specifically SQL scripting language for data extraction and analysis
15

Senior Specialist, Information Security Resume Examples & Samples

  • Administering the vulnerability management program. Reviewing and responding to known and possible network attacks, vulnerabilities and alerts
  • Maintaining and reviewing secure access to program servers, file shares, and security groups
  • Proficiency performing audit analysis of accounts and process management to include permission lists, organizational changes, separated employees, inactive accounts etc
  • Developing measures to prevent unauthorized software from being installed and executed on systems
  • Recommending and supporting the development and management of network security and incident response policies and procedures
  • Proficiency archiving and reviewing system audit logs and all other pertinent log files that will support incident response activities
  • Maintaining records on configuration and patch management tools to ensure that patches/system modifications maintain the desired security posture
  • Developing/revising technical standards for security devices, security operations, and other operations as required
  • Proficiency developing measures to prevent unauthorized software from being installed and executed on systems
  • Interacting with information security vendors and holding information security vendors accountable to their technology and services obligations to the organization
  • Ensuring that change control procedures are strictly followed for all changes to all production systems
  • Proficiency analyzing security incidents and escalation of security events 24x7
  • Performing other job related duties as assigned
16

Security Senior Sales Specialist Resume Examples & Samples

  • Identifying, initiating, qualifying and closing opportunities, to exceed growth and revenue targets
  • Effectively managing a range of opportunities, the associated reporting and account planning to support the achievement of sales objectives
  • Establishing and expanding valued business relationships with clients and other industry influencers and players allowing you to add value across the broad range of security requirements our customers have
  • Maintaining high levels of knowledge and expertise regarding our customers, their industries, associated risk, managed services and information security technology requirements
  • Preparing proposals, presentations, quotations, contracts, and supporting documentation
  • Negotiating contracts and agreements
  • Engaging and working closely with extended team members including the broader account team (other sales specialists, security solution architects, product managers, operations managers, service managers, and others) to solution, support and add value for our clients
  • Managing client expectations throughout the sales cycle, positioning TELUS as a trusted advisor
  • Managing and ensuring the retention and growth of existing security solutions contracts
  • Continued understanding of the products and services that TELUS provides and being able to effectively demonstrate how these products and services can provide value
  • Establishing effective relationships with customer stakeholders at all levels of your client's organization
  • Continuously focusing on moving opportunities through the sales cycle
17

Security Field Operations Specialist, Senior Resume Examples & Samples

  • Experience with physical security devices (cameras, alarm systems, ACVs, etc.)
  • Experience providing training
  • CRP, CPP, PSP, or PCI Security certification
18

Senior Opsec Security Specialist Resume Examples & Samples

  • Supervise the integration of the OPSEC process into planning and implementation of operations and programs, and associated acquisition activities
  • Oversee the execution OPSEC Assessment and Surveys
  • Support development of tailored threat, vulnerability, and risk assessments in support of DC&MA and customer OPSEC requirements
  • Develops written and oral briefings and attends meetings as required
19

Senior IT Specialist, Information Security Resume Examples & Samples

  • Identify, investigate, and recommend appropriate corrective actions for information security incidents and potential threats, and responds to reported security violations
  • Participate in the evaluation, development, and implementation of security standards, procedures, and guidelines for multiple platforms and diverse system environments to enhance information systems security and prevent the unauthorized use, release, modification, or destruction of data
  • Assist in developing security awareness materials, security presentations, information security training sessions, and communications to actively promote information security awareness for all users
  • Participate in the design of secure business processes in conjunction with other IT functional groups and business units to mitigate risks and enhance system security
  • Work with management to identify sensitive and critical data, understand organizational security needs, and develop procedures to accommodate those needs
  • Provide technical support for a wide range of highly complex information security issues including secure architectures, secure electronic data traffic, network security, and data security and privacy
  • Participate in the design, development, evaluation, and integration of highly complex computer systems and networks to maintain system security
  • Lead cross-functional projects designed to assess and improve control environment or ensure compliance with existing or new regulations. (Projects will require the involvement of various business units and groups, e.g., Internal Audit, Regulatory Compliance, Legal, etc.)
  • Maintain an awareness of existing and proposed security standard setting groups, State and Federal legislation and regulations pertaining to information security. Identify regulatory changes that will affect information security policy, standards and procedures, and recommends appropriate changes
  • May administer user access and maintain records of authorized users
  • Perform all other related duties as assigned
  • Education: Bachelor’s degree (B.A./B.S.) or equivalent in computer science or related discipline
  • Experience: Minimum of 9 years related experience in IT, with 3-5 years in an information security operations or compliance role
  • Certification/Licensure: IT security related certification desired (e.g., CISSP, CISA, GIAC, or similar professional certification)
20

ESS Senior Regional Security Specialist Resume Examples & Samples

  • Two to three years of security related experience
  • Customer service and project management skills
  • Security experience such as guard services, investigator, police officer, security service tech
21

Cpso Security Specialist Senior Resume Examples & Samples

  • Bachelor’s degree in related field with 5 years of full-time security, or
  • High School diploma with 16 years of experience performing full-time DoD security functions
  • Previous Special Access Program (SAP) experience
  • Have a completed SSBI within last 5 years
22

Senior Tscm Security Specialist Resume Examples & Samples

  • Conducting TSCM and technical security services for preventing unauthorized access to government facilities and possible loss of sensitive or classified information
  • Providing reports and briefings of conclusions for each evaluation conducted
  • Providing research services and advising program office personnel on national and international developments in commercial, state-of-the-art, technical security technology
  • Reviewing and making recommendations for the design of technical security upgrades based on counter-threat plans, physical security and technical security policies
  • Working independently or with oversight, advise and assist program office personnel on matters of cyber and technical security policy, procedures, and regulations
  • BS degree is desired with 11 years of security related experience, or an additional 4 years of security experience considered in lieu of a formal degree
  • All applicants must be certified by the Interagency Training Center (ITC) in the conduct of Technical Surveillance Countermeasures (TSCM)
  • A strong cyber security background is highly desired
  • A proven ability to work autonomously and to deliver concise executive-level reports and presentations
  • Ability to read and understand design plans for the purpose of identifying and implementing technical security upgrades
  • Excellent communication, interpersonal, and team-building skills to engender rapport with military personnel, federal civilians, other contractors and foreign governments at all levels of DoD and the IC
23

Senior Computing Security & Information Protection Specialist Resume Examples & Samples

  • Set high expectations for yourself first, and have the courage to continuously raise the bar
  • Hold yourself and others accountable for continuous improvement and communicate expectations directly, openly and effectively
  • Guide and mentor others in creating relevant options for addressing problems/opportunities and achieving desired outcomes
  • Rely on your cybersecurity and technical background to perform security analysis of operational environments, threats, vulnerabilities and internal interfaces to define and assess compliance with accepted industry and government standards; develop authorization and assessment (A&A) documentation for new and existing information systems
  • Lead the development, testing and implementation of cybersecurity solutions and procedures to ensure that systems are compliant with applicable,policies, procedures, contracts and regulatory requirements
  • Analyze and records computing security events and verifies that security parameters are in place
  • Implement security functionality, develop and write security plans, and oversee security awareness program per the guidelines
  • Use personal computing hardware and software to enter project information, such as, statements of work, resource identification and usage, task status, cost estimating and tracking, etc
  • Use processes and tools to maintain, archive, sanitize, and retrieve digital files
  • Construct/build and provide reports and presentation material as needed for assigned projects
  • Identify and gain approval of testing established applications to meet project requirements
  • Perform cybersecurity support and leadership for Boeing programs and ensure compliance with government and company requirements
  • Current US Secret clearance (investigated within the last 5 years) Applicants MUST include their Security Clearance Level, Investigation Type and Investigation Date clearly on their resume
  • IAM Level III DoD 8570 Certification (GSLC, CISM, CISSP). Applicants must include their IAM Level III DoD 8570 Certification clearly on their resume
  • Previous experience in a Leadership role (Team Lead/Project Manager)
  • Professional experience with policies and implementation of Risk Management Framework (RMF): e.g. DAAPM, ICD-503, JSIG, and NIST 800 series special publications
  • Professional experience reviewing or configuring Windows and Linux operating systems
24

Senior Racf Security Specialist Resume Examples & Samples

  • Develops and implements security policies and procedures (e.g., user log-on and authentication rules, security breach escalation procedures, security auditing procedures, and use of firewalls and encryption routines)
  • Educates IT and the business about security policies and consults on security issues regarding user built/managed systems
  • Knowledge of relevant legal and regulatory requirements
  • Knowledge of common information security management frameworks
  • Prefer experience with any of the following: z/OS internals, SMP/E, JES2, UNIX (OMVS)
  • Experience working with a diverse range of data sources/streams and managing these effectively
  • Excellent analytical, decision-making and problem-solving skills
  • Working knowledge of Mainframe systems (z/OS)
  • Experience with enterprise risk assessment methodologies
  • Must be able to multitask in a fast-paced environment with focus on timeliness, documentation, and communications with peers and business users alike
  • Ability to communicate well both verbally and in writing to technical and non-technical audiences of various levels within BKFS or outside the organization (executives, regulators, clients, etc.)
25

Senior Computing Security & Information Protection Specialist Resume Examples & Samples

  • The ability to obtain a U.S. Secret Security clearance
  • 5+ years experience in the Information/Cyber Security domain
  • IAM Level 1 (or higher) DoD 8570/8140 Certification (Security + CE, CAP, GSLC, CASP, CISSP, CISM)
  • Previous experience in a technical Project Management role
  • Prior experience working with and supporting Government/DoD organizations
  • Prior experience working with National Institute of Standards and Technology cyber security controls
  • Prior experience int the Network and Applications Security domain
26

Senior IA Security Specialist Resume Examples & Samples

  • Bachelors degree and 8+ years of relevant experience; An additional 2+ years of experience can be substituted in liue of the degree
  • 5+ years of experience in IA, ISSO, Cybersecurity related roles
  • Experience working with DIACAP and/or RMF; and an understanding of RMF
  • Experience with Patch management for both Windows/SQL & Linux/Oracle vulnerabilities
  • Understanding of HIPAA regulations/compliance standards as it pertains to EMR Systems, OR in depth experience with PII/PCI/PKI compliance standards
  • Experiecne running vulnerability scans and providing remeidation techniques to end clients/users
  • Must be 8570 compliant; Security+CE, CAP, GSLC, CISM or CISSP required
  • Understanding of desining/implementing HBSS at an entertprise level
  • Understanding of nCircle, Remedy, NIPPER, SyncSort, Retina and NMAP
  • Past experience supporting federal contracts at either CMS, NIH, CDC, HSS, and/or the VA
  • Past experience in Federal Healthcare IT Projects, or Commercial Healthcare Projects
27

Senior T&E Cybersecurity Security Specialist Resume Examples & Samples

  • Performs cybersecurity related tasks designed to safeguard the security of systems and information assets by protecting against unauthorized access, modification, or destruction. Manages information systems security, including disaster recovery, database protection, and software development. Performs technical support focused on the development, operation, management, and enforcement of security capabilities for systems and networks
  • Analyzes information security systems and applications then recommends and develops effective security measures. Identifies, reports, and resolves security violations. Evaluates IT infrastructure in terms of risk to the organization and establishes controls to mitigate loss. Determines and recommends improvements in current risk management controls and implementation of system changes or upgrades
  • Works with end users to determine needs, implements policies or procedures, and tracks compliance through the organization. Establishes, plans, and administers the overall policies, goals, and procedures for the information security function. Implements network security policies and procedures, ensures network (LAN/WAN, telecommunications, and voice) security access, and protects against unauthorized access, modification, or destruction
  • On-the-job experience must be in specific IT fields and/or testing areas. Specific experience and background in commercial and/or government specified fields such as cloud, enterprise, virtualization, web, IT hardware and software, database, storage, mobility, communications security, DoD networks and services, and DoD standards conformance technologies is required when supporting the associated IT T&E areas
  • Must provide cybersecurity expertise in a variety of systems administration concepts, practices, and procedures. Relies on extensive experience and judgment to plan and accomplish goals. Performs a variety of complex tasks. A wide degree of creativity and latitude is expected. Leads and directs the work of others. Typically reports to department management or executive. May provide consultation on complex projects and be a top-level contributor/specialist in the department. Must be an expert at problem solving, identifying risk, and communicating results and recommendations to department management
  • Position Requirements
  • Experience in Test and Evaluation of Federal, DoD Military or Agency NSS & IT is highly desired
  • A Defense Acquisition Workforce Improvement Act (DAWIA) certification is highly desired
  • Information Technology Infrastructure Library (ITIL) certification
  • A good understanding of industry and Government best practice test methodologies used to reduce and analyze test and evaluation data
  • Ability to read IT system and capability requirements documents and develop test plans and procedures that support customer go or no-go decisions. Test plans and procedures would be developed to ensure test and test data is repeatable
  • Ability to analyze data and build reports that clearly articulate finding and results
  • Security +, Network +, SSCP, or CISSP certification
  • Knowledge of JITC IT Interoperability T&E processes and methodology for IT systems and applications
  • Lean Six Sigma certification
  • Recent JITC Cybersecurity systems and network security experience is highly desired
  • Active U.S. Government (DoD) Top Secret clearance and SCI with Polygraph
  • DoD and MILDEP Service DT/OT experience highly desired
  • Recent experience Unified Capabilities (UC) Interoperability and Cybersecurity T&E experience is highly desired
  • Recent experience in DoD Logistics, Healthcare and/or Financial Systems T&E experience is highly desired
28

Cyber Security Hardware Forensics Specialist Senior Resume Examples & Samples

  • Minimum of five years of progressively responsible experience in cyber security, incident response, forensic investigations
  • Experience identifying vulnerabilities and modifications to hardware
  • Understanding of computer engineering and hardware design including digital logic design and printed circuit board design
  • Understanding of hardware-level security exploits including signal injection and side-channel analysis
  • Experience in soldering, including equipment and materials required to perform removal and replacement of surface mount devices
  • Experience in the operation and use of digital oscilloscopes, spectrum analyzers, multimeters, logic analyzers, signal generators, and specialized radio test systems
29

Senior Cyber Security Technical Specialist Resume Examples & Samples

  • Experience in development and completion of cyber security Direct/ Indirect assessments per NEI 08-09, and NEI 13-10 Rev 4
  • Must be able to obtain security clearances to obtain unescorted access to a nuclear facility
  • Must be able to obtain qualification for customer cyber security critical group
  • Experience in the nuclear industry
  • Excellent writing, presentation and communication skills; Must be comfortable making presentations to clients and/or company management
  • 10 years of related experience in Cyber Security
  • Bachelor's degree in Cyber Security or a related field
  • Ability to travel at least 50% of the time
30

Senior Target Security Specialist Resume Examples & Samples

  • Control access to Target property and facilities by following best practices, procedures and protocols
  • Direct interaction with law enforcement, fire department, Emergency Medical Services and other emergency management agencies during emergency situations
  • Prevent the loss of Target equipment, property and merchandise through the execution of loss prevention strategies
  • Assist in the development and documentation of investigations in Target Case Management
  • Document incidents in Target Case Management
31

Senior Info Security Specialist Resume Examples & Samples

  • Day-to-day monitoring and analysis of security controls for security events
  • Day-to-day monitoring and analysis of external threat intelligence
  • Enhanced level triage and assessment of security events to determine risk to Rogers
  • The management of escalated security events requiring a managed response
  • Investigation of security events to determine root cause
  • Tracking and reporting of events and investigations
  • Management production and reporting of risk based metrics
  • Undergraduate degree or equivalent. 5+ years of applied IT security experience
  • Excellent initiative, analytical, and critical thinking skills
  • Proven ability to work in a stressful or a crisis situation
  • Proven ability to provide leadership of both security incidents and team resources
  • Understanding of the Kill Chain Methodology
  • Understanding of the Cyber Threat Intelligence Framework
  • Ability to obtain security clearance (if required)
  • Technical knowledge of Windows and Linux
  • Technical knowledge TCP/IP and network topologies
  • Experience with common incident response tools, technologies, and processes
  • Experience with common computer and network forensic tools, technologies, and processes
  • Experience with Stix/Taxii and other CTI models
32

Senior Ediscovery Security Specialist Resume Examples & Samples

  • Participate in the collection and processing of eDiscovery services in support of Legal matters
  • Perform data recovery, computer and network forensic examinations and investigations in support of internal investigations and intrusion incidents
  • Develop and maintain the necessary documentation to support the forensic and investigative processes and procedures
  • Provide input to the forensic technology roadmap and maintain the hardware asset inventory
  • Manage inventory and backup of forensic evidence and case management data (virtual and physical)
  • Comply with records retention policy and dispensation processes based on Standard Operating Procedures (SOP)
  • Patch systems and tools per agreed upon maintenance schedule
  • Provide input to eDiscovery program measures and metrics. Produce weekly matter status updates
  • Participate in eDiscovery process and procedures development based on industry best practices
  • Develop and maintain the necessary documentation to support forensic and eDiscovery processes and procedures
  • Research and develop data collection, protection, and analysis techniques for all supported company computing platforms and cloud services
  • Provide mentorship to other team members as it relates to Forensics & e-Discovery
  • Assures achievement of department goals and initiatives
  • A College degree in computer related studies with at least five years of cyber forensics related experience
  • Competent in the systems and tools utilized in eDiscovery
  • Proficient in disk and memory acquisition methods based on operating system, target location (e.g., local, inside/outside the network) and for special situations such as malware or child pornography
  • Proficient with PC and server operating systems including file systems, registry, version nuances, and applications
  • Proficient in Unix and Linux operating systems including file systems, metadata/logs, and applications
  • Proficient in Apple operating systems including file systems, metadata/logs, and applications
  • Proficient in programming/scripting language(s) to improve productivity in analyzing file data, such as parsing of log files
  • Proficient in database interfaces and SQL query language including browsers that use SQLite v3
  • Proficient in browser structures, plugins, and storage of browser history
  • Provide guidance to information security analyst on forensic evidence analysis, interpretation and documentation of findings
  • Industry recognized forensic certification (e.g., EnCE, CCE) is required
33

Importer Security Filings Specialist, Senior Resume Examples & Samples

  • Create ISF’s using data received from operating systems, templates and documentation/instructions from customers
  • Validate ISF data for accuracy using commercial documentation prior to transmission to CBP
  • Monitor CBP response messages and take the required actions to resolve warning messages, rejections and/or no bill match responses
  • Manage and attend to all incoming communication, documents and similar as it relates to the ISF transaction
  • Communicate and resolve all issues impacting ISF compliance
  • Implement new ISF Customers in accordance with the customer implementation and set-up procedures in ISF policy
  • Utilize system reports and other information to identify improvements in processes at a customer or departmental level
  • Respond timely to internal and external requests for information and provide education on ISF as required
  • Adhere to company ISF policies and all related documentation
  • Adhere to all related CBP regulations
34

Security Technical Specialist Senior Resume Examples & Samples

  • SDLC related duties include creating application threat models and providing security support during all phases of a program or project life cycle, including planning, design, implementation, and deployment
  • Assist developers with automated testing tools that are used in the software development process and code management repositories
  • Educate and train IT software developers in secure coding practices and producing secure applications
  • Collaborate with the security testing team to ensure that more complex testing needs are successfully met
  • Provide specific design and implementation guidance while working as a contributing member of the development team
  • Produce security design documentation on projects and ensure that security is deeply integrated into all phases of the project life cycle
  • Perform SDLC consulting which include performing risk evaluation and ranking, and assessments of SDLC processes
  • Review results of vulnerability assessments and design solutions to reduce the likelihood of identified vulnerabilities in future deployments. Identify and communicate recommended actions to reduce risk of exploitation of identified vulnerabilities
  • Perform review and assessment of risks associated with External Connectivity Requests, Firewall Change requests and scenarios that emerge from other engagements and be able to recommend the appropriate security controls to mitigate those risks
  • Exhibits in-depth understanding of software development, network technology, security technologies
  • Able to handle multiple security assignments and projects
  • Grasps new technologies and security concepts quickly
  • Identifies, clarifies, and resolves complex cyber security problems that require specialized knowledge
  • Promotes adherence to security policies and standards
  • Possesses the ability to produce high-quality design and threat model documentation
  • Collaborate with other security engineers and architects to establish solution patterns and best practices
35

Security Specialist, Senior Resume Examples & Samples

  • Provides advice and counsel to Federal personnel with respect to the protection of National Security Information (NSI). Makes recommendations on policies and guidelines in accordance with federal mandates
  • Support the management of the EPA NSI Program in accordance with current federal requirements to include, but not limited to
  • Managing EPA’s classified material inventory and access to it, to include markings, storage, handling and transportation of classified materials
  • Managing Secure Accredited Facilities (SAFs) and Secure Compartmented Information Facilities (SCIFs), and performing regular accreditation reviews to ensure all spaces where classified operations may be performed are built and maintained appropriately
  • Performing audits of derivatively classified material to ensure marking accurancy; facilitating the development of classification and de-classification guides, if required
  • Ensuring the agency can process classified information on the Homeland Secure Data Network (HSDN) and the Joint Worldwide Intelligence Communications System (JWICS)
  • Issuing HSDN Tokens and verifying SCI access
  • Monthly testing of STEs and secure faxes
  • Providing appropriate training, briefings and education to clearance holders and stakeholders
  • Supporting Federally-mandated nationwide inspections and assessments of Program Offices, Regions and Laboratories that handle NSI and SCI material
  • Conducting interviews of clearance holders, annually, to determine the level of understanding of and compliance with the program’s requirements
  • Preparing SOPs on all facets of the NSI Program and developing best practices for operating its program
  • 6-8 years of related experience
  • Strong commitment to customer service
36

Senior Cyber Security Assessment Specialist Resume Examples & Samples

  • Lead and perform Information Assurance, Cybersecurity engineering and analysis of the Ground and Training Systems
  • Lead the evaluation and verification Information Assurance System Requirements
  • Lead and perform Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG) scans and analysis of computer systems
  • Have used the DISA Assured Compliance Assessment Solution in the last 12 months
  • Lead and perform Vulnerability Assessment of computer systems
  • Lead and perform Penetration Testing of computer systems
  • Lead and perform Static Code Analysis of Software Development Projects
  • Prepare technical briefings and discussion papers
  • Support new business growth by providing subject matter expertise in one or all of the following areas
  • A current U.S. Secret security clearance
  • Has performed an information assurance assessment (cyber security assessment) of a classified software or hardware system within the past 12 months
  • Demonstrated experience with the Software Development Lifecycle (SDLC)
  • Professional Certifications such as CompTIA Security+, CISSP, etc
  • Demonstrated Experience with Windows Server administration
37

Specialist, Senior Scada Cyber Security Resume Examples & Samples

  • Implementation, integration, operation around security of SCADA systems. Also responsible for general system administration responsibilities which include system backups, network documentation, database archiving, user account and account policy creation
  • Troubleshoot and keep SCADA systems running at optimum level, maximizing their uptime by securing of the systems
  • Maintain and create, as needed, scripts to perform special functions or automated reports
  • Maintains SEIM for SCADA
  • SCADA system support and maintenance including system updates or patching
  • Responsible for supporting pipeline control center desks that include a large quantity of servers and workstations
  • Interface with Control Center personnel and supporting team in supporting and enhancing systems
  • Learn facets of pipeline operations and procedures affected by SCADA
  • Learn all facets of system and perform work in an independent manner as well as in a team environment as the job requires
  • Scheduled on-call rotation for 24 x 7 support for the control center is required. Unscheduled 24 x 7 on-call support required during emergencies as needed
  • Backup for other SCADA Infrastructure members as needed
  • A minimum of a Bachelor's degree in computer science, engineering or related technical fields or 5 years of commensurate experience in IT Windows server or workstation administration, or SCADA or HMI configuration or administration is required
  • 5 years SCADA experience in the oil and gas pipeline industry is preferred
  • 5 years of Windows server system administration or SCADA work experience is preferred
  • 5 years experience in Windows 2003 Server and Windows XP 0/S administration, Active Directory Service/ Configuration is preferred
  • 5 years experience in fundamentals of networking is preferred
  • 5 years Cyber Security experience is preferred, but certifications will be considered for experience
  • Understanding of SCADA networks or PLC is preferred
  • Understanding and experience with Serial and IP communications (i.e. Modbus, ROC, ROCPlus, Allan-Bradley, Kimray, Totalflow, OPC) is preferred
  • Experience in scripting languages such as PERL or Visual Basic preferred
  • Experience in OASyS DNA is preferred
  • Experience with Splunk administration (Specifically ES), Palo Alto, Symantec Endpoint Protection, Cisco Firewall, and other security tools
  • Ability to effectively interact with clients, SCADA team, and senior management
  • Ability to work in a small team environment, sometimes under a great deal of stress
  • The ability to communicate well and quickly trouble-shoot problems will be required
  • At times may be required to lift up to 25 lbs., transport and/or install various types of computer and SCADA equipment is required
  • Ability to travel up to 10% domestically is required