Security Technologist Resume Samples

4.7 (122 votes) for Security Technologist Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security technologist job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
JC
J Corwin
Joe
Corwin
471 Aiden Station
Philadelphia
PA
+1 (555) 651 6569
471 Aiden Station
Philadelphia
PA
Phone
p +1 (555) 651 6569
Experience Experience
Detroit, MI
Information Security Technologist
Detroit, MI
DuBuque-Bednar
Detroit, MI
Information Security Technologist
  • Supports the architecture designs, engineering and operational documentation
  • Partners with the lone of business areas to design and develop provisioning work flows along with Role Based Access Control (RBAC) entitlements to applications
  • Delivers installation, integration and deployment of IAM Products
  • Communicates with IT and line of business representatives on both the products and framework approach at the technical and functional level
  • Supports acceptance testing, quality assurance testing, debugging, support and maintenance
  • Provides complex integrated systems planning and provides recommendations that will enhance current or anticipated information systems that support overall corporate and business goals for an Identity & Access Management service to the enterprise
  • Ensures the review and design concepts for new systems and develops and documents the technical design for the integration and implementation of the software
New York, NY
Information Security Technologist G
New York, NY
Abshire, Wolff and Franecki
New York, NY
Information Security Technologist G
  • Oracle Identity Manager
  • Privileged Access Management
  • Active Directory
  • Serves as a subject matter expert supporting, administering and managing multiple disciplines and identity & security platforms
  • PowerShell or other scripting languages
  • Supports acceptance testing, quality assurance testing, debugging and maintenance
  • Mastery of Information Security principles
present
Houston, TX
Senior Computer Systems Security Technologist
Houston, TX
Osinski-Kihn
present
Houston, TX
Senior Computer Systems Security Technologist
present
  • Knowledge of networking protocols and network security methods (TCP/IP, DNS, network encryption, etc.)
  • Routinely provide guidance to, and assist in, the training customers or other analyst
  • Work in a fast paced agile environment
  • Development of standard operating procedures and other technical documentation
  • Work with Entrust Authority product line
  • Work with Microsoft Active Directory Certificate Services
  • Act as the IT SME for technical solutions, problem management and IT Security policies
Education Education
Bachelor’s Degree in Information Systems
Bachelor’s Degree in Information Systems
Liberty University
Bachelor’s Degree in Information Systems
Skills Skills
  • Ability to work in a fast paced agile environment
  • Knowledge of Linux administration
  • Knowledge of standard communications protocols (HTTP/HTTPS, FTP, SFTP, SOCKS)
  • Knowledge of networking protocols and network security methods (TCP/IP, DNS, network encryption, etc.)
  • Ability to communicate effectively with internal and external customers on technical matters
  • Ability to systematically troubleshoot problems to determine root cause and resolution
  • Experience providing guidance to organization staff for secure network designs
  • Hold a current Cisco certification (ex. CCNA, CCNA Security, CCNP, etc.)
  • Information Security Certifications a plus (CISSP, GIAC)
  • Communicate effectively with internal and external customers on technical matters
Create a Resume in Minutes

6 Security Technologist resume templates

1

Information Security Technologist Resume Examples & Samples

  • Implements the functional and technical requirements gathering and analysis for an enterprise wide identity and access management program
  • Supports the architecture designs, engineering and operational documentation
  • Serves as a subject matter expert supporting, administering and managing multiple disciplines and identity & security platforms
  • Partners with the lone of business areas to design and develop provisioning work flows along with Role Based Access Control (RBAC) entitlements to applications
  • Delivers installation, integration and deployment of IAM Products
  • Communicates with IT and line of business representatives on both the products and framework approach at the technical and functional level
  • Supports acceptance testing, quality assurance testing, debugging, support and maintenance
  • Provides complex integrated systems planning and provides recommendations that will enhance current or anticipated information systems that support overall corporate and business goals for an Identity & Access Management service to the enterprise
  • Ensures the review and design concepts for new systems and develops and documents the technical design for the integration and implementation of the software
  • Delivers integration of new systems architecture into current infrastructure and application interfaces
  • Consults and directs identification of alternative uses of technologies that will enhance current or anticipated information systems and that support overall corporate and business goals that are appropriately aligned with the enterprise architecture
  • Keeps abreast of leading and emerging software products and technologies as well as industry standards
  • Compares and evaluates the design and capabilities of multiple system components (e.g., architecture, network, operations and communications)
  • Leverages knowledge, expertise and experience to facilitate the development of robust identity access management solutions
  • Coaches as appropriate. Acts as a resource for staff. Provides reviews and monitors work products. Provides on-the-job training on techniques and methodologies. Provides knowledge transfer as appropriate
  • CISM, CISSP, CISA, or other information security or risk management related certifications a plus
  • 3+ years expertise with deployment and support of Oracle Identity Management suite (10/11g) of products (OAM, OIM, OIA, ESSO)
  • 2+ years of experience of advanced security technologies and concepts, including user provisioning, Single Sign-on directory services, RBAC or Digital Certificates
  • 3+ years technical architecture experience integrating identity and access management software
  • 2+ years Provisioning experience
  • 2+ years RBAC experience
  • Experience with at least the following development languages: J2EE, Java, JavaScript
  • Solid experience with Directory Services and LDAP
  • General understanding of TCP/IP networks, HTTP and DNS technologies
  • Proficient working with UNIX/Linux systems and is reasonable self-sufficient managing them
  • Experience with one or more Database platforms (Oracle, Sybase, MSSQL, MySQL, DB2)
  • Hands on experience in implementing an identity and access management system (Oracle OIM), developing workflows and developing requirements to integrate target applications to the system
  • Hands on experience with integration & implementation of identity & access audit / review / governance solutions such as Oracle Identity Analytics
  • Hands on experience with integration & implementation of Role Management functions including those of Oracle Identity Analytics and similar products
  • Experience in using Governance, Risk and Compliance (GRC) tools
  • Familiarity with RBAC and profile workflow creation
  • Familiar with SAML authentication and authorization
  • Java development skills
  • Root cause analysis
2

Information Security Technologist Resume Examples & Samples

  • CAN BE LOCATED IN RALEIGH OR WINSTON SALEM***
  • Consistently deliver and execute on the designated strategy to effectively address regulatory requirements
  • Coordinate various aspects of regulatory submissions, including developing and reviewing technical documents, developing and tracking submission timelines, and managing the preparation of regulatory submissions to ensure compliance with regulations and guidelines
  • Monitor current and proposed regulatory and audit issues, and ensure that key initiatives are effectively communicated to varied audiences
  • Provide expertise in translating regulatory requirements into practical, workable plans; prepare critical submission documentation and communicate with regulatory agencies where applicable
  • Prepare paper and electronic submissions to support the development of project plans and timelines for related submissions and responses to regulatory agency requests
  • Act as a point of contact between Corporate Information Security (CIS) and other functional areas
  • Proactively manage regulatory, compliance, and audit issues to ensure that they are addressed in a timely manner
  • Develop and manage the implementation, monitoring, and reporting of regulatory issues and responses for CIS
  • Develop effective management responses and remediation plans to ensure that target dates are met and that residual risk is communicated and found acceptable by senior management
  • Evaluate adherence to established policies, standards, and guidelines to ensure that CIS risk management requirements are met
  • Responsible for providing advisory and implementation support in the development of policy and procedures; and coordinating the review of annual policies reviews
  • Assess current security policies and document policy changes/updates; providing guidance to the business line
  • Collaborate with CIS personnel to develop effective audit-issue and risk-finding remediation plans
  • Coordinate LOB, subsidiary, and affiliate information security risk assessments
  • Maintain knowledge of and monitor changes in pertinent laws, regulations, and guidance to effectively interpret external developments and inform/educate internal stakeholders
  • Bachelor’s degree in Computer Science, Technology, Business, or related field
  • Six years of IT risk management and/or IT auditing experience
  • Strong knowledge of financial services industry regulations and their influence on CIS
  • Understanding of current regulatory environment and related implications to security strategy, standards, and frameworks such as PCI, ISO, HIPAA, and NIST
  • Understanding of business processes, internal control risk management, IT controls, and related standards
  • Demonstrated communications, presentation and collaboration skills
  • Experience reviewing and approving protocols, reports, and documents used in regulatory submissions
  • Demonstrated analytical and problem-solving skills
  • Thorough knowledge of IT auditing practices and regulatory requirements
  • Certified in at least one of the following: PMI-RMP, CRISC, CISA, CIA and/or CISM
3

Information Security Technologist Resume Examples & Samples

  • Assist network and application resource owners and IT staff in understanding and responding to security-related audit issues and security access exceptions. Provide on-call support for after-hours system access issues and troubleshoot system access problems and failures or project related security requests that occur after hours
  • Educate information / resource owners in the implementation of necessary information security controls or new upgraded security technologies
  • Identifies training opportunities; designs/coordinates the development of training materials delivers or coordinates training delivery for IAM team
  • Bachelor or technical degree in IT related curriculum or equivalent education and training
  • 6+ years security user access administration experience on multiple platforms
  • Excellent verbal and written communication skills. Strong analytical and problem-solving skills
  • Ability to direct other team members and train others
  • Ability to present and discuss technical information to users with varying technical expertise
  • Proven ability to work under stress in emergencies. Flexibility to handle pressure from many directions simultaneously
  • Must be detail-oriented with a high level of accuracy
  • Strong customer focus and the ability to manage customer expectations
  • Must have strong team-oriented interpersonal skills and the ability to effectively interface with a wide variety of people
4

Information Security Technologist Resume Examples & Samples

  • Oracle Identity Manager experience
  • SQL experience
  • SSO, Password Reset
5

Computer Systems Security Technologist Resume Examples & Samples

  • Experience with IT Security technologies (Web & Mail Gateway appliances)
  • Experience with standard communications protocols (HTTP/HTTPS, FTP, SOCKS)
  • Experience with networking protocols and security methods (TCP/IP, DNS, encryption, firewalls, etc.)
  • Ability to effectively interact with internal and external personnel on technical matters, often requiring coordination between organizations
  • Ability to work in a fast paced, agile environment
  • Ability to work multiple projects at any given time is required
  • Motivated by a desire and drive to learn new Networking technologies and excel in Security and Network communications
  • Experience with Forcepoint AP-WEB/HYBRID (HTTP Proxy)
  • Experience with SSL Encryption
  • Experience with Linux and Windows OS administration and Shell scripting
  • Experience with Scripting languages, PERL, PYTHON, HTML, Javascript, REGEX
  • Experience configuring firewalls or similar network filtering devices
  • Experience writing formal documentation, e.g., requirements collections, test procedures
  • SANS, CISSP, CISM, Security+, Network+ or similar certifications a plus
6

Computer Systems Security Technologist Resume Examples & Samples

  • 1-2 years of experience working with LDAP software
  • 2-3 years basic experience working on Linux systems
  • Experience providing remote on-call system support
  • Work with Global IT customer requests and security issues
  • Excellent documentation and process management skills
  • Work well team members in diverse geographic locations to develop secure solutions for customer requests
  • Self-starter, able to work well with little supervision
  • Apply security policies and procedures to customer solutions
  • Strong software and network debugging skills
  • Experience maintaining Python or Perl scripts
  • Knowledge of UNIX and / or Linux scripting tools
  • Web based languages such as Javascript, Java, and HTML
  • Remote system support, UNIX monitoring tools
  • Interfacing large and diverse hardware and software systems
  • Strong knowledge of Microsoft Visio
  • Background working with Identity Systems
  • Background in IT Security
7

Senior Computer Systems Security Technologist Resume Examples & Samples

  • 4 or more years of relevant security experience
  • Experience developing plans to ensure deployment, installation and upgrades of products within required timelines and resource allocations
  • Ability to quickly gain in-depth technical understanding of various insider threat technologies
  • Act as the IT SME for technical solutions, problem management and IT Security policies
  • Ability to proactively anticipate and identify needs and expectations of customers
  • The ability to effectively interact with external personnel on significant technical matters often requiring coordination between organizations and vendors
  • Highly motivated with the ability to self-start, prioritize, multi-task and work in a team setting
  • Ability to integrate cyber security related data from host network audits, central analysis, and other related sources into investigative or analytical products as warranted
  • Development of standard operating procedures and other technical documentation
  • Routinely provide guidance to, and assist in, the training customers or other analyst
  • Hands-on administrative experience with major operating systems (Windows/Linux)
  • Excellent verbal/written communication skills to effectively communicate and negotiate and collaborate across groups outside of IT Security
  • Multi-discipline background with functional disciplines such as intelligence analysis, counterintelligence analysis, computer forensics, information security, or information assurance
  • In-depth knowledge of enterprise security products and how they are implemented in typical enterprise customer environments
  • Experience with database technologies
  • Raytheon security policies
8

Cyber Security Technologist Resume Examples & Samples

  • Minimum 6+ years of experience in IT or Engineering designing, implementing and operating in a security incident environment
  • Demonstrated experience designing, implementing, and operating at least 3 of the following
  • Information Security and IT certifications: SANS, CISSP, Cisco, etc
  • Experience building and administering Linux based server systems. Red Hat / CentOS experience preferred
  • Scripting in Python or Perl
  • Experience operating TCP/IP networking devices such as switches, routers, and firewalls
  • Ability to write custom alert rules for IDS/IPS and SIEM
  • Experience working on a Computer Incident Response Team (CIRT)
  • Previous experience working in a Security Operations Center (SOC)
  • B.S. degree in Information Technology, Computer Science, Computer Engineering or other related degree
9

Senior Security Technologist Resume Examples & Samples

  • Effectively interact with internal and external personnel on technical matters, often requiring coordination between organizations
  • Systematically troubleshoot problems to determine root cause and resolution
  • Work in a fast paced, agile environment
  • Motivated and self-driven
  • Eligble to obtain a Secret clearance
  • Cisco networking equipment SSL Encryption Linux OS administration and Hands On experience with VMware or similar virtualization technologies
  • Secure configuration of systems and networks
  • CISSP, CCNA, SANS or similar certifications a plus
10

Information Security Technologist Resume Examples & Samples

  • High aptitude for troubleshooting, with a background in Windows and/or Unix/Linux system administration
  • Familiar with Excel functions and pivot tables, SQL or Windows command lines/PowerShell
  • A minimum of 4 years of related experience
  • Experience working in a network security environment, such as a Computer Security Incident Response Team (CSIRT) or Security Operations Center (SOC) is a plus
  • One or more of the following certification designations is preferred, but not required
  • Certified Ethical Hacker - CEH
  • Other Technical Certifications considered
11

Security Technologist Resume Examples & Samples

  • Four years minimum experience with Cisco firewalls (PIX, ASA)
  • Ability to systematically troubleshoot problems to determine root cause and resolution
  • Able to work multiple projects, use time efficiently, and balance priorities is required
  • Requires attention to detail
  • Knowledge of Linux administration
  • Information Security Certifications a plus (CISSP, GIAC)
12

Information Security Technologist Resume Examples & Samples

  • 4 years+ of related experience
  • Background in Windows and/or Unix/Linux system administration, or desktop support
  • Programming skill in Microsoft command line script, or SQL
  • Ability to obtain DoD Security Clearance
  • DoD Security Clearance
13

Senior Computer Security Technologist Resume Examples & Samples

  • Experience providing guidance to organization staff for secure network designs
  • Hold a current Cisco certification (ex. CCNA, CCNA Security, CCNP, etc.)
  • Ability to communicate effectively with internal and external customers on technical matters
  • Ability to work in a fast paced agile environment
  • Bachelor's degree in Information Systems/Technology, Computer Engineering or other related technical degree
14

Senior Computer Systems Security Technologist Resume Examples & Samples

  • Develop, test, deploy, and maintain Raytheon PKI solution
  • Work with Entrust Authority product line
  • Integration of apps to include web servers, application servers, databases, etc
  • Support for the PKI annual audit and required documentation
  • Technical writing/editing and verbal communication skills for technical and non-technical audiences
  • Effectively manage multiple tasks simultaneously and ensuring scheduled goals are met
  • Microsoft Windows server administration
  • Familiarity with the Entrust Authority product line
  • Linux server administration
15

Senior Computer Systems Security Technologist Resume Examples & Samples

  • Install, configure, deploy, and support the following types of Red Hat Linux servers in a high-availability Linux virtual machine (VM) environment
  • Combine data and knowledge from various sources to determine the proper approach for planning and execution
  • Knowledge of common network services and protocols such as TCP/IP, DNS, SSH, HTTPS, VPN
  • Installing, upgrading, and maintaining Apache web servers in a Linux environment
  • Supporting applications in a distributed, highly available, mission-critical environment
  • Installing SSL certificates on web servers and application servers
  • Support of Red Hat Linux web servers and systemsE (SX VMWare environments and with Virtual Machines)
  • Build Apache reverse proxies with multiple instances of Apache on same server
  • Configure Red Hat Linux servers to operate with performance and log monitoring tools, for example, Nagios, QRadar, Cacti, and MRTG
  • Develop custom scripts to extract data from logs and produce ad-hoc reports
  • Install and configure Linux systems with various application software packages in high-availability Linux environments
  • Knowledge of network topology design, security principles and fault tolerant architectures
16

Chief DoD Security Technologist Resume Examples & Samples

  • Previous work experience as an SES, CISO, or comparable technical executive leader
  • Experience with DoD Cloud Security Requirements Guide (SRG)
  • Experience with DoD Risk Management Framework (NIST 800-53)
  • Familiarity with Cloud Access Point and DoD Information Networks
  • Proven experience building security reference architectures for all-in cloud deployments and hybrid scenarios
  • Significant technical expertise in Cloud Computing technologies, scripting languages (Python, Ruby on Rails, etc), integrating 3rd party monitoring tools, encryption tools and best practices, and forensics
  • Working knowledge of cloud computing technologies and workload transition challenges
  • Proven thought leadership in the enterprise security space
  • BS level degree required, computer science, business, math, or equivalent experience preferred
  • Experience leading the certification or accreditation of cloud workload(s) to meet industry standards such as FedRAMP, PCI DSS, ISO 27001, HIPAA, and NIST/DoD frameworks
  • AWS Solutions Architect Certifications (Associate or Professional)
17

Security Technologist Resume Examples & Samples

  • Six years minimum experience with Cisco firewalls (PIX, ASA)
  • Work in a fast paced agile environment
  • Minimal supervision
18

Senior Computer Systems Security Technologist Resume Examples & Samples

  • Minimum 6+ years experience with Cisco firewalls (PIX, ASA)
  • Knowledge of standard communications protocols (HTTP/HTTPS, FTP, SFTP, SOCKS)
  • Knowledge of networking protocols and network security methods (TCP/IP, DNS, network encryption, etc.)
  • Communicate effectively with internal and external customers on technical matters
  • Multiple projects, use time efficiently, and balance priorities is required
  • Bachelor's degree in Information Systems/Technology, Computer Engineering or other related technical
19

Computer Systems Security Technologist Resume Examples & Samples

  • Experience working with customers and documenting project requirements
  • Strong Power Point, Excel, Word and Visio skills
  • Excellent technical writing/editing and verbal communication skills for technical and non-technical audiences
  • Communicate technical concepts to non-technical people
  • Pick up technical concepts quickly
  • Self-starter; work independently with minimal supervision
  • Ability to obtain and maintain DoD secret security clearance, which requires US Citizenship
  • Experience with Microsoft Access, ability to merge data from various spreadsheets in Access
  • Experience with Excel Pivot tables and developing charts for executive leadership
  • Background in project management or as a business analyst
  • Experience with Data Center system deployments
  • Familiar with environment virtualization and virtual server deployment
  • Background using formal change management processes
20

Senior Computer Systems Security Technologist Resume Examples & Samples

  • Demonstrable knowledge of networking (TCP/IP, topology, and security), operating systems (Windows/UNIX), and web technologies (Internet security)
  • Understand system data, including, but not limited to, security event logs, system logs, and firewall logs
  • This is a 24x7 work environment; ability to work weekends, holidays, or alternate non-traditional schedules and shifts
  • CISSP, GCIH, GIAC certifications or similar
  • Ability to obtain a U.S. Government Security Clearance which requires U.S. Citizenship
  • Bachelor's degree in Information Systems/Technology, Computer Science, or related
21

Senior Data Security Technologist Resume Examples & Samples

  • Drive the security aspect of Next Generation Desktop (Windows 7). Be focal point, and coordinate any requirements across the team ┐ Assess vendor vulnerabilities (like a Windows patch), and assess and drive companywide rollout. Work with Lines of Business to patch all machines
  • Assess external threats (example from Media sources or FS-ISAC or FBI). Identify if it could impact Travelers, and create remediation plan
  • Drive project rollout (install new network technology, or new email/mail security technology, or endpoint security technology). Technical expert. Can direct less senior folks
  • Provide legal support with investigations (in-depth forensics, eDiscovery requests, executive requests)
  • Very deep skills in a specific area (network security, email/eDiscovery, endpoint security)
  • 2+ years of experience deploying and supporting Tanium in an enterprise. Deployment experience should include support of security configuration management and/or patch management
22

Information Security Technologist G Resume Examples & Samples

  • Implements the functional and technical requirements gathering and analysis for an enterprise wide identity & access management program
  • Supports acceptance testing, quality assurance testing, debugging and maintenance
  • Leverages knowledge, expertise and experience to facilitate the development of robust identity and access management solutions
  • 3 or more years of experience and high proficiency with the following Information Technologies
  • Relational database technologies - specifically SQL experience
  • Oracle Identity Manager
  • Privileged Access Management
  • PowerShell or other scripting languages
  • RACF experience
  • Cyber-Ark
  • NAC
  • Centrify
  • Audit experience
  • Ability to develop well-defined and repeatable workflows
23

Senior Security Technologist Resume Examples & Samples

  • Work with Microsoft Active Directory Certificate Services
  • Application integration and documentation
  • Provide server support for PKI enabled systems
  • Testing and documentation for the PK-Enablement of various applications
  • Touch labor required for servers in McKinney, TX
  • Must be able to obtain and maintain a DoD Secret security clearance
  • PKI Solutions
  • Experience in IT system configuration, testing, and development of end user documentation preferred
  • Background working with Identity Management systems
  • Background in software testing; application debugging skills and web development
24

Information Security Technologist Resume Examples & Samples

  • Completing documentation and procedures for installation and maintenance. May interact with users to define system requirements and/or necessary modifications
  • Analyzing existing programs or formulating logic for new systems, devising logic procedures, preparing flowcharting, performing coding and testing/debugging programs
  • Developing conversion and system implementation plans
  • Preparing and obtaining approval of system and programming documentation
  • Recommending changes in development, maintenance and system standards
  • 2 or more years of experience in a software development or technical operations related role
  • Experience developing and/or supporting applications with at least one of the following: SQL, WebSphere, Java, PERL, .NET, HTML, VB, IIS, Cron, ETL, ColdFusion
  • Experience working on one of the following platforms: Windows, UNIX, Mainframe
  • Experience monitoring, troubleshooting and repairing application software issues
  • Demonstrated advanced communication skills (both verbal and written)
  • Thorough understanding of RDBMS and SQL fundamentals
25

Information Security Technologist Resume Examples & Samples

  • Developing system implementation plans
  • Working with Risk, Audit and Assurance testing teams collectively to reach common goals
  • Experience developing and/or supporting applications with at least one of the following: SQL, PERL, Python, .NET, HTML, VB, IIS, Batch Job Scheduling, ETL, ColdFusion, IIS
  • Experience working on the following platforms: Windows, UNIX
  • Monitor, troubleshoot and repair application software issues
  • Understanding of RDBMS and SQL fundamentals, able to run MS SQL Server and Oracle queries, reports
  • Experience in a Financial Services IT setting
26

Security Technologist Architect Resume Examples & Samples

  • Technical and functional knowledge of commercial cybersecurity technologies deployed at various layers of the enterprise architecture. These include
  • End point protection technologies (AM, AV, SCCM, etc)
  • Network sensors and controls (IPS, FW, LB, WAFs)
  • Application security technologies
  • Service Management and automation technologies (e.g., ServiceNow)
  • SIEM (Arcsight, etc)
  • Security Analytics
  • Threat Management, etc
  • Good technical understanding and experience in use case driven logical and physical architecture development would be helpful
  • Perform assessments and performance analysis to support, design, and develop of new technical security controls
  • Responsible for supporting assigned systems and be accountable for working with various engineering, technology and operations teams to define, explain, and implement security configuration controls to improve the security posture of the organization
  • Knowledge and experience and a full working knowledge of technologies such as Windows, Exchange, UNIX, networking, web technologies, SQL Server and TCP/IP, security technologies WAF, NGFW, IPS, as well as knowledge of one or more programming languages
  • Bachelors or higher degree in a technical discipline is desirable
  • Ability to build from good relationships with clients/operational managers and colleagues
  • Ability to gather and assimilate information
  • Ability to adapt and prioritize
  • Ability to work under pressure and meet deadlines
  • Ability to think ahead and anticipate problems, issues and solutions
  • Knowledge and practice of formal architecture methodologies such as UML, MDA, or TOGAF is desirable