Security Technology Specialist Resume Samples

4.9 (119 votes) for Security Technology Specialist Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security technology specialist job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
RH
R Hammes
Ryleigh
Hammes
5421 Darron Mews
Los Angeles
CA
+1 (555) 794 4966
5421 Darron Mews
Los Angeles
CA
Phone
p +1 (555) 794 4966
Experience Experience
Phoenix, AZ
Security Technology Specialist
Phoenix, AZ
Mayert LLC
Phoenix, AZ
Security Technology Specialist
  • Manage multiple and simultaneous projects and re-prioritize for unplanned critical work
  • Plan, design, test and implement complex integrated and networked access control and video systems
  • Evaluates success of product modification and regularly monitors performance to ensure ongoing utility. Resolves complex issues as they arise
  • Participates in special projects and performs other duties as assigned
  • Monitors vendor and contractor's work on security installation projects to ensure compliance with specifications
  • Develop project plans, budget and lead projects, including coordinating vendor and contractor activities
  • Conduct extensive security system audits and job walks for various types of facilities
Boston, MA
Information Security Technology Specialist
Boston, MA
Leuschke Inc
Boston, MA
Information Security Technology Specialist
  • Investigate how non-compliant items can be remediated or how their risk could be mitigated and provide recommendations
  • Opportunity to work with a global team
  • Perform the information security review of infrastructure products and verify their compliance to the Citi Information Security Standards
  • Perform the information security review of infrastructure products and verify their compliance to the Citi Information Security Standards (CISS)
  • Work with clients from Citi Architecture and Technology Engineering (CATE) and third-party vendors to obtain information on the reviewed products
  • 3-5 years working in an Information Technology related field
  • Work with clients from Citi Architecture and Technology Engineering (and third-party vendors to obtain information on the reviewed products
present
Detroit, MI
Information Technology Security Specialist
Detroit, MI
Cruickshank-Runolfsdottir
present
Detroit, MI
Information Technology Security Specialist
present
  • Development and Maintenance of IAM process and service metrics
  • Developing documentation detailing IAM processes, service offerings, and best practices
  • Participate in the security process improvement across the GIS IAM team
  • Collaborate to improve efficiencies and relationships with Disney enterprise partners, other internal business partners and technical support/service providers
  • Presenting, explaining, and clarifying complex security integrations and process flows from multiple sources to technical and non-technical audiences
  • Managing multiple tasks and priorities on tight deadlines
  • Providing knowledge of Information Security Concepts, principles, and common policies/standards
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
California State University, Fullerton
Bachelor’s Degree in Computer Science
Skills Skills
  • Excellent problem solving abilities and analytical skills. Ability to see the big picture with high attention to critical details
  • Excellent interpersonal skills
  • Ability to learn and understand new technologies and understand the architecture of systems
  • Strong work ethic and judgment
  • Ability and willingness to both read and write technical documentation
  • Ability to influence others across a geographically diverse organization
  • Communication – excellent writing and verbal skills
  • Strong customer relation and project management skills
  • Security mindset; ability to think the way an attacker would think
  • Experience with security testing is
Create a Resume in Minutes

10 Security Technology Specialist resume templates

1

Information Security Technology Specialist Resume Examples & Samples

  • Perform the information security review of infrastructure products and verify their compliance to the Citi Information Security Standards (CISS)
  • Work with clients from Citi Architecture and Technology Engineering (CATE) and third-party vendors to obtain information on the reviewed products
  • Evaluate the security and compliance of the products by reviewing documentation and by hands-on testing
  • Investigate how non-compliant items can be remediated or how their risk could be mitigated and provide recommendations
  • Embracing new technologies, actively seeking out opportunities for improving efficiency of the Information Security Review Process and seek out possibilities for implementing automation for any manual efforts
  • Embed quality control measures in all processes and activities to ensure a robust and sustainable data integrity review that can adapt to meet the dynamic requirements of the IT IS organisation
  • Responsible for managing customer expectations
  • Security mindset; ability to think the way an attacker would think
  • Ability and willingness to both read and write technical documentation
  • Experience in multiple domains of technology
  • Experience in any product certification frameworks (e.g. Common Criteria) is a plus
  • Experience with developing Archer modules is a plus
  • Professional Certifications are either required or will be expected to acquire as part of continued professional education e.g. ITIL, SCCP, CISSP, CISM
2

Security Technology Specialist Resume Examples & Samples

  • Plan, design, test and implement complex integrated and networked access control and video systems
  • Develop project plans, budget and lead projects, including coordinating vendor and contractor activities
  • Manage multiple and simultaneous projects and re-prioritize for unplanned critical work
  • Evaluate project proposal, and work orders and determine scope of technical and construction work requirements
  • Conduct extensive security system audits and job walks for various types of facilities
  • Coordinate the installation of hardware and software and evaluate compatibility, functionality and suitability of completed installations
  • Monitors vendor and contractor's work on security installation projects to ensure compliance with specifications
  • Reviews billing and invoicing to ensure compliance with contract specifications and budget
  • Investigates, troubleshoots and resolves systems and hardware issues
  • Relevant years of security experience in the implementation of large-scale security programs, systems and technology
  • Thorough knowledge and understanding of intrusion detection systems, electronic access control and CCTV/IP video surveillance systems
  • Demonstrated knowledge of database and operating systems to include Information Security, Network - Security, ODBC, Access Control and a technical understanding of Emergency Response, Disaster - Recovery and Business Continuity
  • Requires a thorough knowledge of security procedures, disaster recovery and business continuity
  • Must be flexible and possess the ability to function in stressful situations
  • Excellent time-management, communication, technical writing, presentation development, facilitation, and organizational skills required
3

Senior Information Technology Security Specialist Resume Examples & Samples

  • Chicago based position with interaction to all lines of business
  • Minimal travel required (<10%), Domestic & International
  • Support 60,000+ users across North America
4

Ph-technology Security Monitoring Specialist Resume Examples & Samples

  • High standard of performance, attention to detail and commitment to excellenceAbility to deliver results in a creative and dynamic organization
  • Experience with industry standard commercial and open source event logging and security analysis tools
  • Knowledge of encryption systems
  • Familiarization with contemporary malware, obfuscation techniques and tools, and attack techniques
  • Familiarization with host-based security and application logs, as well as logs from custom developed and industry standard security sensors and sources
  • Familiarization with basic network forensic techniques and network based attack analysis (all layers)
  • Experience and strong working knowledge with testing malware against commercial controls
  • Familiarization with network forensic techniques and network based attack analysis (all layers)
  • Familiarization with configuration management, change control/problem management integration, risk assessment and acceptance, exception management and security baselines (e.g. COBIT, CIS Baselines, NIST, vendor security technical implementation guides, etc.)
  • Ability and willingness to work in large, globally diverse environment spanning multiple time zones
  • · Creative, self-starter with leadership skills and the ability to manage multiple tasks concurrently
  • Demonstrated ability to positively influence and persuade individuals of varying level
  • Certifications PMP, ITILv3, CISSP, GCIH, CISM
5

Senior Technology Security Specialist Resume Examples & Samples

  • Minimum of 10 years IT experience with a minimum of 5 years in IT Security
  • Demonstrated expertise with security assessment processes, penetration testing techniques and tools
  • Extensive hands on keyboard experience conducting in-depth penetration testing exercises
  • Experience with both commercial and open source tools such as burp, nmap, nessus, openvas, sqlmap, metasploit, meterpreter, kismet, wireshark, Aircrack-ng
  • Proven ability to generate customized testing scripts in common languages such as python, ruby, pearl, bash
  • Ability to develop, extend, or modify exploits or exploit tools
  • Strong knowledge of common web and mobile application vulnerabilities, such as the OWASP Top 10 for web and mobile, and ability to provide solutions
  • Strong knowledge of information security principles, standards, practices and technologies for various applications and operating systems including mobile operating systems
  • Demonstrated experience with network and IT security components, including firewalls, intrusion detection systems, anti-malware software, data encryption, VPN’s, vulnerability scanners, server operating systems, and other industry-standard techniques and practices
  • Knowledge and understanding of current security standards and regulations such as ISO 27001/2, NIST, etc
  • Ability to research and analyze data and problems, develop appropriate solutions and concisely and clearly communicate to stakeholders
  • Strong verbal and written communication, analytical, negotiation and interpersonal interaction skills
  • Demonstrated problem solving skills with an ability to develop creative solutions
  • Ability to review and continuously improve processes
  • Ability to remain current and relevant with knowledge and techniques in the security and compliance space
  • Ability to travel periodically
  • Experienced member of enterprise level penetration testing “Red Team”
  • Understanding of Android and iOS filesystems and internals
  • Published a security related whitepaper
  • Experience with mobile application penetration testing
  • Experience with Web Services and REST
  • Bachelor's degree in or related experience
  • Security accreditation (i.e., CISSP, GSEC, GCIH, GPEN, GWAPT, GMOB, CEH)
6

Information Security Technology Specialist Resume Examples & Samples

  • Perform the information security review of infrastructure products and verify their compliance to the Citi Information Security Standards
  • Work with clients from Citi Architecture and Technology Engineering (and third-party vendors to obtain information on the reviewed products
  • Ability to develop and implement process improvement initiatives
  • Ability to learn and understand new technologies and understand the architecture of systems
  • Flexibility to adapt to changing demands and priorities
  • Must be a self-starter and strong team player
7

Technology Security Senior Assessment & Anomaly Detection Specialist Resume Examples & Samples

  • Must have thorough knowledge of web application, infrastructure, and Internet security along with a general understanding of common operating systems, networking protocols, database, and application development
  • Experience operating and leveraging a SIEM
  • Experience with Network Infrastructure Design
  • One or more Information Security certifications (e.g. CISSP or GIAC) preferred
8

Information Security Technology Specialist Resume Examples & Samples

  • Develops and manages security solutions for a functional area
  • Manages IS risk during the development of new products and applications, ensuring that risks are mitigated during the development process
  • Develops, tests and coordinates the implementation of innovative and enhanced security content solutions
  • Enforces compliance; demonstrates extensive understanding of IS standards and best practices across multiple disciplines
  • Ensures that approvals and reviews are executed when needed
  • Performs IS awareness and training activities
  • Demonstrates familiarity with IS technologies and issues on standard platforms
  • Resolves complex problems/projects through in-depth evaluation of business processes, system processes and industry standards; performs root cause analyses
  • Communicates and interacts regularly with program teams or business management on IS related programs, policies, and standards
  • Provides evaluative judgment based on analysis of factual information in complicated and unique situations
  • Exhibits sound and comprehensive communication and diplomacy skills to exchange complex information
  • 3-5 years’ development experience in with HP ArcSight
  • Strong execution capabilities
  • Excellent knowledge of technical writing and documentation and the ability to map processes and procedures back to roles and responsibilities within the organization
9

Senior Technology Security Specialist Resume Examples & Samples

  • Minimum of 5 years experience working in IT Security
  • Solid understanding of Android and iOS filesystems and internals
  • Extensive hands on keyboard experience conducting in-depth penetration testing exercises on Android and iOS mobile applications
10

Information Technology Security Specialist Resume Examples & Samples

  • Minimum 2 years in technology organizations with demonstrable experience in delivering projects and other initiatives
  • Minimum 2 years in an Identity Management oriented area of expertise
  • Minimum 2 years demonstrable experience with technical documentation and analytics
  • Minimum 2 years experience in standard development technologies such as JavaScript, JQuery, .Net etc
  • Knowledge in security or Identity related areas
  • Knowledge and capabilities in Federation, SAML, Oauth, OpenID Connect and other industry standard Authentication/authorization solutions
  • Understanding of data management & database structures
  • Experience writing complex MS SQL queries
11

Technology Security Monitoring Specialist Resume Examples & Samples

  • Ability to review and understand security requirements, develop relevant testing strategies, provide detailed test plan and cases accordingly
  • Experience with industry standard commercial and open source vulnerability scanning (application, web, Infrastructure) tools
  • Experience with supporting and using industry standard GRC platforms and tools
  • Knowledge of one or more of the following: Java, Python, JS/Node, PHP, C#, Ruby, Chef
  • Basic understanding of Authentication/Authorization Principles
  • Basic understanding of encryption principles and key management
  • Experience in developing or securing solutions in the cloud
  • Experience in test automation
  • Ability to deliver results in a creative and dynamic organization
  • Well versed with OWASP – Top Ten and WASC Threat Classifications
  • Experience with performing manual vulnerability assessments and penetration testing on web and mobile applications
  • Ability and willingness to work in large, globally diverse environment spanning multiple time-zones
  • Creative, self-starter with leadership skills and the ability to manage multiple tasks concurrently
  • Bachelor’s Degree in Computer Science, Risk Management, Information Assurance, or equivalent work experience
12

Security Production Support Technology Specialist Resume Examples & Samples

  • Re-creates, analyzes, troubleshoots, and diagnoses incidents relating to Information Security technologies
  • Liaisons with appropriate teams from various technical disciplines for the development of corrective actions or viable workarounds to resolve incidents
  • Executes scheduled or unscheduled tasks relating to operational maintenance and monitoring of security technologies
  • Provides technical expertise to enable all necessary operational procedures
  • Communicates operational support issues on an ongoing-basis
  • Breadth and depth of knowledge and experience in a wide variety of technologies and software solutions in a large scale organization
  • Demonstrable knowledge of Unix/Linux, Windows 2012 server O/S, Web/IIS, networking/LAN/WAN/DMZ, Firewalls, SQL & Oracle Database Technologies
  • Possesses the proper time and incident management disciplines to self-direct improvement initiatives and to align activities throughout the incident life cycle
  • Approximately 5 to 7 years working within Information Technology in a global firm
  • Good time management, organizational, and decision-making skills
13

Information Technology Specialist Security Analyst Resume Examples & Samples

  • Three (3) or more years (full-time equivalency) of professional IT experience such as the following
  • Two (2) or more years of experience in an organization serving 100 or more customers using an electronic ticketing system for trouble tickets, work orders, change requests and service requests
  • ITIL training or awareness (IT Infrastructure library)
  • One (1) or more years of experience with WA state security solutions (such as RACF, SAW, SFT, or RSA Tokens)
  • Three (3) or more professional references, to be included in your profile. Please include at least one supervisor, peer, and (if you have supervised other staff) a subordinate
  • Responses to the Supplemental Questions
14

Advanced Technology Security Specialist Resume Examples & Samples

  • Veterans' preference eligible or veterans who have been separated from the Armed Forces under honorable conditions after substantially completing at least three consecutive years of active duty (click here for information on veterans)
  • Conducts assessments ((technical (evaluation of technology) and non-technical (evaluation of people and operations)) of threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations for facility technology
  • Serve as technical expert and liaison to law enforcement personnel and explain incident details as required. Identifies and assesses the capabilities and activities of cybersecurity criminals or foreign intelligence entities; produces findings to help initialize or support law enforcement and counterintelligence investigations or activities
  • Applies knowledge of operational threat environments (e.g., first generation [script kiddies], second generation [non- nation state sponsored], and third generation [nation state sponsored]) and general attack stages (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.) through official written reports and executive level briefings
  • 50% or Greater
  • Travel of up to 50% may be required
15

Advance Technology Security Specialist Resume Examples & Samples

  • Conducts assessments ((technical (evaluation of technology) and non-technical (evaluation of people and operations)) of threats and vulnerabilities, determines deviations from acceptable configurations, enterprise or local policy, assesses the level of risk, and develops and/or recommends appropriate mitigation countermeasures in operational and non-operational situations for facility technology. Identifies and verify hardware, application software, network, and system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations
  • Analyzes threat information from multiple sources, disciplines, and agencies across the Intelligence Community. Synthesizes and places intelligence information in context; draws insights about the possible implications/application to federal facilities and associated systems
  • Monitor external data sources (e.g., cybersecurity defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain the currency of cybersecurity defense threat condition and determine which security issues may have an impact upon building and security technologies/networks. Correlate incident data/intelligence to identify specific vulnerabilities and make recommendations that enable expeditious remediation
  • Advise senior management and federal officials on risk levels and cybersecurity posture of systems evaluated or assigned
  • Develop(s) an investigative plan(s) to investigate alleged crime(s), violation, or suspicious activity utilizing computers and the Internet
16

Information Security Technology Specialist Resume Examples & Samples

  • Support the organization through internal and external audits of the various processes and procedures in us
  • Results oriented, is able to achieve desired outcomes independently and at appropriate priority levels
  • Demonstrated ability to develop and implement process improvement initiatives
17

Information Technology & Security Specialist Resume Examples & Samples

  • Maintain and assess network information systems supporting Real Time data collection, analysis, reporting and archival storage of Test & Evaluation range missions
  • Perform network security audits and ensure implementation of safeguards according to Information Assurance (IA) requirements while maintaining operational capabilities
  • Train and mentor IT staff and users on Network Systems interconnections in production & development environments
  • Perform research translating customer’s mission requirements, pressing needs, and available fiscal resources into comprehensive Hardware and Software solutions
  • Create customized OS & application baselines for Windows/Linux utilizing various COT’s/GOT’s SW solutions to meet or exceed customer’s specifications
  • Conduct inventory/audit of each system weekly and adjust baselines as required
  • Tailor customer/PC support as required; minimizing impact to daily workflow, allowing users to maximize their assigned test mission(s)
  • Provide annual Mission Room Awareness briefing to senior management and peers detailing current capabilities and future Mission Room enhancements
  • Responsible for initial research to standup McAfee’s Host Based Security System (HBSS) solution to further Mission Room systems configuration, network, and antivirus security requirements
  • IA Officer; act as second to IA Manager by assisting in providing secure systems environments, through diligent security patching, while meeting all required inspection criteria
  • Evaluates existing Special Access Program (SAP); systems, capabilities, and initiates feasibility studies and cost benefit analyses to determine means necessary to enhance their value and ultimate mission performance
  • Bachelor's degree in Computer Science or other relevant field with 3 years’ experience
  • Must be compliant with DoD 8570.01-M with Security + certification
  • Ability to troubleshoot and diagnose system problems required
  • Must have ability to quickly understand the customers overall technical objectives and mission a provide effective solutions
  • Must exemplify a dedication to achieving the mission of the 96TW as well as high standards of quality and excellence in performing the duties
  • Must be willing to travel up to 15%
18

Technology Security Specialist Resume Examples & Samples

  • Minimum ten (10) years’ experience in application design, architecture and development. Understanding of software engineering processes and system development life cycles
  • Expert systems experience with OWASP, AWS, Bamboo, JSON, XML, and Jenkins development required
  • Knowledge of Sonar, Jersey, Cucumber and Selenium is a plus
  • Good interpersonal, written and oral communication skills
  • Knowledge of the financial services industry a plus
19

Information Technology Specialist Security Resume Examples & Samples

  • Business Travel may be up to 10% of duty time
  • Knowledge of applying network cybersecurity concepts, principles, methods, and practice
  • Skill in investigating
  • Ability to communicate effectively (orally and in writing)
  • Ability to lead a team
  • It is your responsibility to verify that information entered, uploaded, or faxed (i.e., resume) is complete, accurate, and submitted by the closing date. Uploaded documents may take up to one hour to clear the virus scan. Faxed documents must be completely transmitted (fax and scan complete) by 11:59 PM (EST) on the closing date of the announcement
20

Information Technology Specialist Information Security Resume Examples & Samples

  • 464781400
  • Occasional travel up to 10% is required
  • Knowledge of Information Technology System Security Principles and Methods
  • Ability to Analyze Information Technology Systems
  • Ability to Manage Information Technology Security Programs
  • Ability to communicate orally
21

Security Production Support Unix Technology Specialist Resume Examples & Samples

  • Strong knowledge of Unix/Linux and Bash or Expect scripting experience
  • Demonstrate knowledge of application troubleshooting, detailed log analysis a must, coding skills a plus
  • Possesses strong knowledge of ITSM ticketing technologies to identify incidents within the queue, research incidents and enter remediation activities
  • Maintains a working knowledge of the overall technical operating environment to support proper recognition and impact of service issues and to position improvement opportunities as part of Information Security’s Production support
  • Manifests analytical and problem solving abilities to negotiate issues, handle ambiguity as well as changing priorities and to provide solutions that are both financially sound and operationally feasible
  • Maintains a working knowledge of the Information Technology Infrastructure Library (ITIL) to recognize appropriate aspects in the Incident, Problem, Change processes and improvements
22

Security Infrastructure & Platform Technology Specialist Resume Examples & Samples

  • Translates intermediate-level user-defined capabilities into system/product requirements. Works with more experienced technology specialists to understand business rationale and client expectations
  • Implements agreed upon solutions to documented business needs. Customizes (recodes) standard third-party vendor products to comply with business needs
  • Supports assigned products by responding independently to client inquiries and resolving issues of intermediate complexity
  • CISSP or CCSP certifications are a plus
  • Two to three years experience in area of technical expertise. Understanding of software engineering processes and system development life cycles
  • Understanding of software engineering processes and system development life cycles
  • Strong problem solving skills and capability to understand and set direction for complex technology integration
  • Intermediate level UNIX/LINUX (RHEL) systems administration experience - PowerShell, Korn Shell, BASH, Python, SSH
  • Intermediate level Windows Server experience, along with Active Directory
  • Intermediate knowledge of application and infrastructure security concepts
  • Intermediate level TCP/IP and Web-based internetworking concepts, including Protocols - HTTP/ SMPT, etc
  • Network concepts associated with firewalls, routers, load balancers, and network segmentation
  • Troubleshooting experience leveraging sniffer, netstat, TCPdump, etc
  • Intermediate level AWS scripting
  • Knowledge of database technologies, including Oracle, SQL Server, and DB2. Basic understanding of SQL language is a plus
  • Knowledge of the financial services industry preferred
23

Information Technology Specialist Information Security Resume Examples & Samples

  • 467989300
  • Training Attendance/Site Visits
  • Knowledge of cyber security principles
  • Knowledge of operations planning
  • Ability to communicate in writing
  • Ability to communicate verbally
  • It is your responsibility to verify that information entered, uploaded, or faxed (i.e., resume) is complete, accurate, and submitted by the closing date. Uploaded documents may take up to one hour to clear the virus scan. Faxed documents must be completely transmitted by 11:59p.m. Eastern Standard Time on the closing date of the announcement
24

Information Technology Specialist Security Resume Examples & Samples

  • 468227600
  • Demonstrate your experience with the Tenable software
  • Demonstrate your experience with McAfee ePO
  • Describe your knowledge of Active Directory GPO
  • Describe your experience briefing senior executives and other senior leaders concerning IT security
  • Describe your experience providing reports to audit recommendations from the Office of Inspector General and other regulatory agencies concerning IT
  • Describe your experience responding to IT security incidents
  • A recent copy of a Standard Form 50-Notification of Personnel Action that documents current or former federal employment status
  • Veterans' Preference documentation, if applicable. Please indicate on your resume the type of veterans' preference you are claiming and provide the appropriate supporting documentation (DD-214
25

Information Technology Specialist Information Security Resume Examples & Samples

  • 25% business travel is required to CONUS/OCONUS locations
  • Attention to Detail - Is thorough when performing work and conscientious about attending to detail
  • Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services
  • Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendation
  • Ability to prevent system vulnerabilities
  • Knowledge of analytical techniques and methodologies
  • Skill in communicating effectively
  • This position is covered by the Alcohol and Drug Abuse Prevention and Control Program. The incumbent is required to sign a DA Form 5019-R (Condition of Employment for Certain Positions Identified as Critical Under the Drug Abuse Testing Program) and must pass urinalysis testing, as required prior to appointment and periodically thereafter
  • Shift work will be required
  • TDY may constitute up to 25% of time both within and outside Continental United States
  • May be subject to extended TDY or Worldwide Deployments during crisis situations to perform mission essential functions as determined by management
  • This position is mission essential and the incumbent is required to report for duty, as necessary, in an emergency (regardless of holidays, weekends, nights, furloughs) or conditions such as weather in which non-essential personnel are not expected to report
  • Incumbent must be willing to take and successfully pass a Counterintelligence Scope Polygraph (CI/Poly)
  • This position requires professional certification under DoD Directive 8570.1, "Information Assurance Training, Certification, and Workforce Management." Per the Directive's implementing manual, DoD 8570.1-M, "Information Assurance Workforce Improvement Program." You will be required to successfully meet the requirements for Certified Ethical Hacker and Computer Network Defense Incident responder (CND-IR)
26

Information Technology Specialist Security Resume Examples & Samples

  • 468191500
  • Demonstrate your experience with Tenable software?
  • Demonstrate your experience with McAfee ePO?
  • Describe your knowledge of Active Directory GPO?
  • Describe your experience briefing senior executives and other senior leaders concerning IT security?
  • Describe your experience providing reports to audit recommendations from the Office of Inspector General and other regulatory agencies concerning IT?
  • Describe your experience responding to IT security Incidents?
27

Security Technology Specialist Iv-infrastructure Resume Examples & Samples

  • Translates senior-level user-defined capabilities into system/product requirements. Works with more experienced technology specialists to understand business rationale and client expectations
  • Assesses the feasibility of requirement implementation and makes informed recommendations to management. Suggests mutually agreeable alternatives, when applicable
  • Provides subject matter expertise in assigned projects through all phases of the development lifecycle. Defines field of use, standards, and best practices around assigned products and technologies
  • Minimum five years experience in application design, architecture and development. Understanding of software engineering processes and system development life cycles
  • Strong teamwork skills and capability to lead teams
28

Security Technology Specialist Resume Examples & Samples

  • Evaluates success of product modification and regularly monitors performance to ensure ongoing utility. Resolves complex issues as they arise
  • Integrates third-party products into the Vanguard environment, frequently with the collaboration of Systems Integration teams. Evaluates vendor products with respect to technical requirements to fill business capability needs, product maturity, and integration complexity
  • Supports assigned products by responding independently to client inquiries and resolving issues of greater complexity. Provides technical guidance and mentoring to less senior crew
  • Expert systems experience with a product or technical area (e.g. Cognos, SAS, DataStage, Web Trends, Documentum, TeamSite, FileNet, etc.)
29

Information Technology Security Specialist Resume Examples & Samples

  • Windows and Linux Operating Systems
  • Group Policy Enterprise File system (EFS)
  • Appsense
  • Siteminder
  • Ping Federate
  • Power Keeper
  • SSL Certificates
  • Network Traces
30

Information Technology Specialist Information Security Resume Examples & Samples

  • Business Travel is up to 5% of the time
  • Attention to Detail - Is thorough when performing work and conscientious about attending to detail in order to adhere to the latest security trends, vulnerabilities, privacy legislation, and news items and communicate new finding with other team members
  • Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services to participate in analysis reviews and ensure lessons learned are integrated into the regulatory compliance process
  • Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately to guarantee collaboration with other departments to ensure the timely delivery of audit materials on a monthly, quarterly and annual basis
  • Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations of changes in security policies and practices in accordance with changes in law of sector security practices
  • To begin, click to create a USAJOBS account or log in to your existing account. Follow the prompts to select your USAJOBS resume and/or other supporting documents and complete the occupational questionnaire (https://apply.usastaffing.gov/ViewQuestionnaire/10022256)
  • It is your responsibility to verify that your application package (resume, supporting documents, and responses to the questionnaire) is complete, accurate, and submitted by the closing date. Uploaded documents may take up to one hour to clear the virus scan