Security Tech Resume Samples

4.5 (105 votes) for Security Tech Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security tech job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
MK
M Kerluke
Maiya
Kerluke
5763 Destany Canyon
San Francisco
CA
+1 (555) 871 6292
5763 Destany Canyon
San Francisco
CA
Phone
p +1 (555) 871 6292
Experience Experience
Dallas, TX
Cyber Security Tech Ld
Dallas, TX
Swift LLC
Dallas, TX
Cyber Security Tech Ld
  • Responsible for all activities within the security Incident response lifecycle. These activities include: detection, triage, analysis, containment, recovery and reporting
  • Strong knowledge of enterprise detection technologies and processes (Advanced Threat Detection Tools, IDS/IPS, Network Packet Analysis, Endpoint Protection)
  • Manages and executes processes responsible for the advanced analysis of security threat intelligence (malicious code, industry events, hackers and zero day exploits, OEM weaknesses, intrusion logging, etc.) in order to proactively prepare for security events
  • Develop communication channels with technology owners and the business to evangelize the evolving threat landscape
  • Provides thought leadership and guidance on intelligence/analytics research to build the necessary controls and infrastructure to provide automated and proactive detection and prevention
  • Advanced knowledge of network protocols and operating systems (Windows, Unix, Linux, Databases)
  • Coordinates response, triage and recovery activities for security events affecting the company’s information assets
New York, NY
Data Security Tech Lead
New York, NY
Pollich-Trantow
New York, NY
Data Security Tech Lead
  • Create rational policies for access to sensitive data and tools
  • Drive improvements in our detection and audit processes
  • Conduct and own gap analysis of Dropbox's data security posture including audit and detection capabilities, tooling, and systems coverage
  • Design and managing projects to address any identified gaps
  • Coordinate efforts with our security engineering teams to mature our data security tooling
  • Support internal data security investigations
  • Arrange IS speakers, brown bags and all-employee IS awareness presentations and develop marketing materials for the presentations
present
Boston, MA
Info Security, Tech Lead
Boston, MA
Beahan, Littel and Rogahn
present
Boston, MA
Info Security, Tech Lead
present
  • Identity Management – Oracle Identity Manager, SailPoint IdentityIQ CyberArk Privileged Identity Manager
  • Access Management and Federation - IBM Tivoli Access Manager, Tivoli Federated Identity Manager, AD Federation Services, or RSA SecurID
  • Assist in developing IS awareness materials including presentations, brochures, posters and other medium as necessary
  • Develop and maintain process, framework and SOP documentation for all GRC related functions
  • Assist in audit response activities
  • Provide security consulting and advisory services to business units and project teams
  • Develop action plans and/or recommend alternate solutions to resolve exceptions to standard operating procedures
Education Education
Associate’s Degree in Information Systems
Associate’s Degree in Information Systems
Seton Hall University
Associate’s Degree in Information Systems
Skills Skills
  • Reliability and strong work ethic
  • Ability to network security equipment to a clients LAN network and also demonstrates a basic IT background (smartphones, PC's, IPADS, etc.)
  • Strong knowledge of Cat5/Cat6 color codes and terminology
  • 5+ years of experience pulling and terminating low-voltage cable
  • Reliable transportation
  • Experience with copper
  • 2+ years of low voltage experience
  • 5+ years of experience installing and servicing CCTV(Analog/IP), Access Control, Burglar, and Fire alarms in residential and commercial environments
Create a Resume in Minutes

15 Security Tech resume templates

1

Infrastructure Security Tech Analyst Resume Examples & Samples

  • Process Oriented
  • Standard office documentation and communication tools
  • Extensive hand-on knowledge of Cisco switching routing platforms, and at least one firewall vendor product (e.g Checkpoint Juniper, etc)
2

Cyber Security Tech Operations Analyst Resume Examples & Samples

  • Identify inadequacies within the environment and construct solutions to solve the problem
  • The ability to articulate and document support and operational processes, various tools and monitoring agents
  • Must have experience with two or more of the following systems: IDCert, ITRC, RSAM, ID-Integrate, ITRIMs, PIRA, Service Center
  • Experience with Linux, Microsoft Windows Enterprise Server, ESX VM Solutions, hands-on experience with security or monitoring products
  • Must haveexperience supporting one or more of the following products: Symantec Data Loss Protection, Data Insight, Symantec Endpoint Protection, Symantec Endpoint Encryption or Tanium
  • The knowledge of more than one scripting or programming language. (VBScript, Python, etc.)
  • Technical understanding of large enterprise environments
  • CISSP, CISA, SANS GIAC, MCSP or relevant security certification(s) desired
  • Available to work in an on-call rotation
  • Travel up to 25% of the time may be required
3

Mcafee Information Security Tech Senior Analyst Resume Examples & Samples

  • Application Analyst for Tanium, Invincea, McAfee ePolicy Orchestrator (ePO) and supported products
  • Must have strong written and verbal communication skills (English is required, Spanish / Portuguese is strongly preferred, any additional languages are a plus)
  • Must have a technical background with McAfee security software (ePolicy Orchestrator, Virus Scan Enterprise, HIPS, McAfee Agent, Groupshield, Policy Auditor, Risk Advisor, McAfee Vulnerability Manager etc.). SQL and ITIL framework is a plus
  • Minimum of 5 years work experience in global projects, security operation, system support, conversions, and implementation of an enterprise level application system
  • Experience with security operations and support group in a fast-paced deadline-oriented environment
  • Experience in investigating the Root Cause for Suspicious Threats and analsying the global threats in the Citi Environment
  • Experience in working in a large organization with globally distributed personnel, functions and operations
  • Technical background in informationsystem security, Symantec products, SQL and ITIL framework is a plus
  • Must have 5 years experience working with enterprise security applications performing administration, implementation, configuration, upgrading, and policy creation
  • Strong understanding of Microsoft technologies is required
  • Strong understanding of Microsoft technologies including SQL Database is preferred
  • Strong understanding of Enterprise Change Management is required
  • Strong understanding of Enterprise Problem / Incident Management is required
  • Experience with using a SIEM (Security Information and Event Monitoring) tool such as ArcSight is a plus
  • Effective social, teamwork skills and proven ability to generate and evaluate alternative solutions to complex technical problems
  • Bachelors Degree in Computer Science, Information Systems or related field is preferred
4

Security Tech Specialist Resume Examples & Samples

  • 2+ years in a job requiring frequent phone work
  • 1+ Years in a job requiring Data Entry
  • Previous experience with technology/systems/databases
  • Ability to multitask: type while listening, view multiple screens and systems, keep up to date with new procedures
  • Demonstrated ability to work in a dynamic, fast paced and demanding environment
  • Fast learner - able to grasp concepts from on-the-job training
  • Proficiency with Microsoft Office Suite (Word, Excel and Access)
  • Requires effective verbal and written communications skills and general business knowledge, ability to comprehend and maneuver through multiple systems
  • Technical problem investigation and resolution skills
  • Excellent trouble shooting skills
  • Very high comfort level with Internet/Intranet usage and ability to quickly learn proprietary software and databases
  • Strong analytical, written and verbal communication skills
5

Executive Director, Prod Security Tech Resume Examples & Samples

  • 15+ years experience in cable, telecommunication or other large network environment
  • 5+ years experience in financial/budget management and resource management
  • 5+ years experience managing effective technology programs
  • Experience developing and implementing successfully executing programs that meet the objectives of excellence in a dynamic environment
  • Helpful: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Licensed PEN Tester (LPT), Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), Certified Secure Software Lifecycle Professional (CSSLP)
  • Must be a critical thinker, with strong problem-solving skills
  • Exhibit excellent analytical skills, the ability to manage multiple projects under strict timelines, as well as the ability to work well in a demanding, dynamic environment and meet overall objectives
6

Security Tech Ops Technician Resume Examples & Samples

  • 5+ years of experience in Information Technology with an emphasis on Networking, Security and Operations
  • Hands-on experience administering a Network Access Control platform
  • Network Operations Center (NOC) experience highly preferred
7

Security Tech Rep Resume Examples & Samples

  • Programming/commissioning on Fire/Life Safety systems, Access Control, Nurse Call, Intercom, Camera and Paging systems
  • Communication with office, customer and management on progress of each project daily
  • Works with electricians, general contractors, office staff as well as Fire Marshals and AHJ’s to complete each project
  • Works towards promoting and maintaining safe environments and working habits
8

Cyber Security Tech Ld Resume Examples & Samples

  • Responsible for all activities within the security Incident response lifecycle. These activities include: detection, triage, analysis, containment, recovery and reporting
  • Expand and mature existing incident response processes and activities
  • Manages and executes processes responsible for the advanced analysis of security threat intelligence (malicious code, industry events, hackers and zero day exploits, OEM weaknesses, intrusion logging, etc.) in order to proactively prepare for security events
  • Provides thought leadership and guidance on intelligence/analytics research to build the necessary controls and infrastructure to provide automated and proactive detection and prevention
  • Must be able to present to different audiences and adjust accordingly (business, technical and management) either structured presentations or ad-hoc. Must be able to establish and maintain business relationships with individual contributors as well as management
  • 7+ years of Information Security or related technology experience
  • 3+ years of Information Security Incident Response experience
  • Relevant security knowledge and experience in two or more of the following areas: incident response, malware analysis, threat analysis, network/host intrusion detection, security operations
  • Demonstrated experience with designing and implementing SIEM technology (Splunk, Arcsight, QRadar, etc) and use cases
  • Demonstrated experience in handling cyber incidents and response in similar critical environments (Malware Analysis, Email Threat Analysis, Web Threat Analysis, etc)
  • Experience in the following: Unix Scripting, Programming, SQL, WAF, Reverse Engineering Malware, Vulnerability Analysis/Assessment
  • Ability to influence and guide decision making in crisis moments
9

Info Security, Tech Lead Resume Examples & Samples

  • Perform security risk assessments (SRA) according to the Freddie Mac SRA framework and IS standards for both custom developed and third-party applications within the Freddie Mac Infrastructure
  • Communicate effectively orally and in writing and express conclusions and recommendations in a clear, technically sound manner, understand and communicate how vulnerabilities can be exploited within technology and the Freddie Mac environment in a manner that resonates with the business areas
  • Develop and maintain relationships with internal and external customers to formulate information security risk solutions for Freddie Mac
  • Develop and maintain process, risk methodologies and SOP documentation for all IS GRC related functions
  • Researches and maintains knowledge base regarding Industry frameworks, best practices, information security issues, solutions and potential implications for Freddie Mac
  • Minimum 10-12 years of hands-on technology risk, security and/or governance experience
  • Solid understanding of network security, OSI model, and information security architecture, previous work as a security engineer is a plus
  • Experience managing and developing baseline security configurations and experience with common industry guidelines (CIS, STIGs, etc.)
  • Demonstrated written and communication skills
  • Experience using Risk Management (GRC) tools such as Archer, Agiliance is a plus
  • Expert in using MS Office Suite, particularly in PowerPoint and Excel
  • Experience with project management and/or program management. (SDLC, Agile, etc.)
10

Systems Security, Tech Lead Resume Examples & Samples

  • Checkpoint VSX and Provider 1 experience required
  • Arcsight exposure
  • 5+ years’ experience in a large complex Checkpoint firewall environment
  • Technical product training and certifications, network hardware and application security training and/or certifications
11

Info Security, Tech Lead Resume Examples & Samples

  • Lead the development and update of IS standards, IS policy and baseline security configurations, in accordance with industry standards, best practices and IS GRC Standard Operating Procedures (SOP)
  • Lead annual Self-assessments for applications, infrastructure platforms and business processes
  • Create communications on behalf of IS for awareness activities, initiatives or other required IS announcements
  • Assist in developing IS awareness materials including presentations, brochures, posters and other medium as necessary
  • Develop training materials for Freddie Mac roles with IS responsibilities and work with appropriate parties for delivery and tracking of training attendance
  • Develop and maintain process, framework and SOP documentation for all GRC related functions
  • At least 10 to 12 years of hands-on technology risk, security and/or governance experience
  • Experience managing and developing information security policies and standards, to include a solid understanding of industry frameworks (ISO, COBIT, NIST, etc)
  • Solid understanding of network security, operating systems, and information security architecture
  • Experience managing and developing baseline security configurations and experience with common industry guidelines (CIS, STIGs, etc)
  • Experience using Risk Management (GRC) tools is a plus (i.e., RiskVision)
  • Experience using MS Office Suite, particularly in PowerPoint and Excel
12

Security Tech Resume Examples & Samples

  • Strong customer focus and ability to work under pressure; ability to maintain awareness of, and seek to meet the needs and wants of the customer without being prompted
  • Solid technical skills and experience related to electronic security systems
  • Diploma in Electronics preferred
  • Relevant trade experience preferred
  • Minimum of two years of previous, relevant field experience required
13

Security Tech Resume Examples & Samples

  • 2+ years of low voltage experience
  • Strong knowledge of Cat5/Cat6 color codes and terminology
  • Experience with copper
  • Must have own hand tools and punchdown tools
  • Reliable transportation
  • Reliability and strong work ethic
14

Info Security, Tech Lead Resume Examples & Samples

  • Primarily responsible for vulnerability management of Infrastructure, Database and Web App layers in both consultative and operational roles
  • Must be an SME in vulnerability management in development of vulnerability framework, Standard operating procedures
  • Develop and maintain relationships with internal and external customers to formulate information security compliance solutions for Freddie Mac
  • Communicate effectively orally and in writing and express conclusions and recommendations in a clear, technical sound manner
  • Provide quality control reviews and mentorship to junior staff members on Information Security compliance issues,
  • Manages risk remediation by analyzing the root cause of issues, impact to business, and required corrective actions by leveraging technical and analytical skills
  • At least 6 to 10 years of experience in IS and at least 2 years of experience in IS programs including, but not limited to, Audit, IS Risk Management, Awareness & Training, Identity Access & Management, Information Protection, Incident Management, and Vulnerability Assessment
  • Understanding of the IS risks that are inherent to the supported business
  • Able to work with senior business management to convey ideas and implement IS strategy
  • Organizational, Influence / conflict resolution, verbal and written communication, and leadership skills
  • Advanced presentation, program management, and relationship management skills
  • Minimum of one strongly encouraged (CISSP, CISM or CISA) or have Masters in Information Assurance / Cybersecurity
  • Strong risk analysis, customer service, problem solving, and consulting skills
15

Info Security, Tech Lead Resume Examples & Samples

  • Lead and participate in IAM projects and support efforts and other technical deliverables with varying levels of complexity
  • Be responsible for the delivery of IAM systems that are high quality, reliable, secure, and stable
  • At least 7 or more years of IT related experience such as program development and design, engineering and/or database administration
  • At least five years of recent experience as a Systems Engineer on Identity and Access Management and/or Role Based Access Control projects in a large enterprise environment
  • At least three years of recent hands on development and/or maintenance experience with one or more of these products
  • Access Management and Federation - IBM Tivoli Access Manager, Tivoli Federated Identity Manager, AD Federation Services, or RSA SecurID
  • Identity Management – Oracle Identity Manager, SailPoint IdentityIQ CyberArk Privileged Identity Manager
  • Access Recertification and Governance * SailPoint IdentityIQ, StealthBits or Varonis
  • At least three years of recent experience with Active Directory (AD), LDAP and X.500 directory services
  • Understanding of role based access, least privilege and segregation of duties access control concepts
  • Experience with Java, JavaScript, HTML and/or XML programming
  • Provisioning and access governance experience with and understanding of security on systems such as AD, Unix, Oracle, SQL Server, DB2, Sybase, TopSecret
  • Experience leading IAM projects, support efforts and other technical deliverables with varying levels of complexity
  • Experience with designing access for complex applications
  • Experience with Java, JavaScript, HTML, DotNet and/or XML programming
  • Experience with Federation processes and technologies
  • Leadership and ability to prioritize tasks
  • Bachelor*s Degree in Management Information Systems, Computer Science, Business, or other analytical disciplines or equivalent experience
  • Excellent communication and team skills
  • Demonstrated ability to work under minimal supervision
  • High degree of self-motivation, commitment, and integrity
16

Security Tech Resume Examples & Samples

  • Experience with CCTV's, Alarms, Fire Alarms, Access Control, Card Readers, Door Locks, etc
  • Understanding and Experience installing Software House CCURE, Lenel, AMAG, Bosch, Honeywell, Avigilon, and other systems. Specifically Lenel
  • ****Secret Clearance Preferred******
17

Information Security Tech Lead Resume Examples & Samples

  • Presentation skills, including data visualization
  • Minimum 10 years’ overall industry experience with at least 3 years in the Information Security side
  • Knowledge of Symantec DLP Data Insight/Discover or IBM’s Guardium FAM or similar tools
  • Big Data
  • Hadoop Hive
  • Perl
  • SAN
18

Data Security Tech Lead Resume Examples & Samples

  • Work independently to determine appropriate methods and procedures for maturing data security at Dropbox
  • Conduct and own gap analysis of Dropbox's data security posture including audit and detection capabilities, tooling, and systems coverage
  • Design and managing projects to address any identified gaps
  • Coordinate efforts with our security engineering teams to mature our data security tooling
  • Create rational policies for access to sensitive data and tools
  • Drive improvements in our detection and audit processes
  • Write queries and scripts to pull data from analytics tools and databases as needed
  • Support internal data security investigations
19

Electronic Security Tech Resume Examples & Samples

  • Knowledge of test equipment such as oscilloscope, multimeter, digital analyzer, battery analyzer, and decibel meter
  • Idaho State Limited Energy Journyman License, required
  • SoftwareHouse CCURE 800/9000 Advanced Certification, required
  • Kantech Access Control System Technical Certification, required
  • Vicon VicoNet VMS Software Certification, preferred
  • Avigilon VMS Technical Certification, preferred
  • Genetec VMS Technical Certification, preferred
  • NICET preferred
  • Working knowledge of electronic Access and VMS security systems integration
  • Programming experience with all facets of Integrated Security Systems
  • Excellent reading, writing and comprehensive skills and proficient with computer hardware and software
  • Ability to work overtime, alternate shifts, weekends, and take on-call to meet customer requirements
  • Able to work on ladders and scaffolding
  • Excellent safety history
  • Complete projects documentation in a timely manner as required
  • Coordinate with other installers, technicians and subcontractors
  • Must pass background check with drug screening
  • Must have a valid driver’s license and a driving record that meets company requirements
  • Must complete necessary certification courses on internal and external products used
  • Must be able to obtain and maintain all licenses required by national, state, and local codes
20

Cyber Security Tech Resume Examples & Samples

  • Must have knowledge of IT systems such as IP Networking, Operating Systems, VMware (Vsphere), and remote access protocols (SSH, RDP, SCP)
  • Must be very computer literate with proficiency in Windows Office Suite, Windows OS, and Google applications Suite
  • Must have self-management skills and people skills to work closely with Motorola’s customers as well as Motorola Sales, Engineering, Project Management, and customer service teams
  • Must be able to solve customer problems quickly during stressful situations
  • Must be able to work well in a group setting, collaborating with other team members to resolve technical issues
  • 1- 2 Years experience in Systems maintenance, troubleshooting and repair
21

Info Security Tech Platform SME Resume Examples & Samples

  • Significant experience across a variety of IT capabilities and platforms especially networks and network management tools
  • Sound, broad knowledge of all key technology platforms including cloud hosted and mobile device services and the management of these
  • Technical Information Security control frameworks and associated assurance methods
  • Information Security / IT Security knowledge
  • Successful track record of building relationships with key stakeholders across the IT environment
  • Proven track record in complex change management
  • Excellent documentation and communication skills
  • Good team discipline and capability to work independently whilst meeting deadlines
  • Strong learning agenda and ability to assimilate new technologies and assess their strengths and vulnerabilities
  • Experience within a consumer goods or retail environment preferable
  • Risk and Threat assessment experience desirable
  • Degree level education desirable
22

Security Tech Resume Examples & Samples

  • Low-voltage cabling - Cat5/6
  • Fire/Burglar Alarms
  • Residential/Commercial installs
23

Access Control & Security Tech A Resume Examples & Samples

  • Must have skills and knowledge in all aspects of networked/automated electronic systems including knowledge of processor-based communication and alarm systems and software
  • Ability to read blue prints and schematics
  • Must have skill in the use of hand and power tools, analog/digital test equipment, man lifts, testing devices and ladders
  • Must possess computer skills related to troubleshooting and programming access control systems
  • Must have the ability to follow complex written and oral assignments and communicate effectively
  • Must be able to work independently under minimal supervision, exercise sound judgment and have excellent problem solving skills
  • Must successfully complete and remain certified and compliant in all safety or trades related course work as may be required by the College
  • Willingness to work overtime as required
  • Strong commitment to a diverse working environment and to serving the needs of a large and diverse community
  • Must have at least six years of relevant experience of which two must have been served as an apprentice or equivalent position
  • Must have a valid driver’s license and be qualified under the terms of the Dartmouth College Driver Safety and Motor Vehicle Policy
  • Performs regular testing and maintenance of access control and alarm intrusion systems including assessment and troubleshooting of components and systems
  • Installs new or modify existing door hardware, including locks, as needed
  • Plans work details and follows schematics, wiring diagrams, or blueprints on all equipment and systems as defined above
  • Determines work methods to accomplish assignments such as repairs, replacements or new installations
  • Reviews drawings and plans, and recommends appropriate security devices throughout the campus
  • Tests faulty equipment and applies knowledge of functional operation of access control and security systems to diagnose cause of malfunction. Tests electronic and mechanical components and performs system testing and analysis in order to locate defects
  • Performs systems programming and integration of access controls and security systems with burglar alarm, fire alarm and camera systems
  • Maintains records of system installations, repairs, calibrations, and tests
  • Coordinates installation with the Department of Safety & Security (DOSS), departments, and various maintenance and operations trades personnel. Maintains effective working relationships with constituents
24

IT Information Security Tech Foundation Platform Manager Resume Examples & Samples

  • Professional qualification in information security – e.g. CISM CISSP or equivalent
  • Supplier and tooling selection processes, RFI / RFP
  • Proven track record in delivery of new Information Security capabilities into complex environments
  • Team management, recruitment and development
25

MCH Security Tech Resume Examples & Samples

  • High school diploma or general education degree (GED); or one to three
  • NVCI within one year of hire
  • CPR within one year of hire