Security Tester Resume Samples

4.5 (77 votes) for Security Tester Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security tester job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
AL
A Larkin
Al
Larkin
23391 Roman Track
Boston
MA
+1 (555) 513 7713
23391 Roman Track
Boston
MA
Phone
p +1 (555) 513 7713
Experience Experience
Philadelphia, PA
Cloud Security Tester
Philadelphia, PA
Cremin-Romaguera
Philadelphia, PA
Cloud Security Tester
  • Search for the security testing standards and make use of them
  • Help the organization build information security awareness e.g. by providing trainings
  • Align security test activities within project lifecycle activities
  • Knowledge of threat modeling and other risk identification techniques, Knowledge of system security vulnerabilities and remediation techniques
  • Analyze a given situation to determine which security testing approaches are most likely to succeed, implement them and evaluate the effectiveness
  • No restriction for travelling
  • Demonstrate the attacker mentality by discovering key information about a target, performing actions in a protected environment that a malicious person would perform and understand how evidence of the attack could be deleted
Detroit, MI
Security Assessment Tester
Detroit, MI
Wiza Group
Detroit, MI
Security Assessment Tester
  • Location will be Bethesda or McLean
  • Develop and document security evaluation test plan and procedures
  • Assist in researching, evaluating, and developing relevant Information Security policies and guidance
  • Actively participate in or lead technical exchange meetings and application review boards, documenting actions items/results of these events
  • Conduct hands-on security testing, analyze test results, document risk, and recommend countermeasures
  • Develop, assemble, and submit C&A testing results reports that document testing activity and results to support the creation of C&A risk assessments and C&A approval packages
  • Assess/calculate risk based on threats, vulnerabilities, and shortfalls uncovered in testing
present
New York, NY
Application Security Tester
New York, NY
Luettgen, Hoppe and Treutel
present
New York, NY
Application Security Tester
present
  • Provide mentoring for junior level analysts and specialists
  • Aid team members for enhancement and enrichment of security monitoring tools with contextual information
  • Lead cyber investigations for escalated, complex computer security incidents using computer forensics, network forensics, root cause analysis and malware analysis
  • Develop tactical and strategic cyber intelligence by acquiring threat intelligence and technical indicators from external and internal sources
  • Engage in threat hunting activities to proactively search for threats in the enterprise environment
  • Create and maintain playbooks used in response for investigation/incident triggers in support of 24/7 Cyber Threat Operations and Cyber Threat Management program
  • Create and maintain use cases for recurring investigation/incident triggers in support of the 24/7 Cyber Threat Operations and Cyber Threat Management program
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Georgetown University
Bachelor’s Degree in Computer Science
Skills Skills
  • Demonstrated proficiency in basic computer applications, such as Microsoft Office software products
  • Knowledge of the incident handling procedures and intrusion analysis models
  • Ability to travel, occasionally overnight
  • Industry certifications in general technology (e.g. Microsoft Certified Professional (MCP), Microsoft Certified Solutions Expert (MCSE), Network+)
  • Ability to work independently with limited supervision
  • Ability to formulate, lead and persuade individuals, large teams and communities on ideas, concepts, and opportunities
  • Advanced knowledge of processes, procedures and methods to research, analyze, and disseminate threat intelligence information
  • 5+ years in information security with specific application security testing experience
  • Demonstrated experience with systems for automated threat intelligence sharing using industry standard protocols such as Structured Threat Information Expression (STIX) and Trusted Automated Exchange of Indication Information (TAXII)
  • Consistent history of delivering on commitments
Create a Resume in Minutes

13 Security Tester resume templates

1

Security Tester Resume Examples & Samples

  • Conduct effective security testing with the use of automated/semi-automated toolsets (for example Nessus, WebInspect)
  • Conduct manual penetration testing with the support of the penetration testers within the team
  • Ensure testing is delivered (either remotely or on-site) in line with the current service offerings
  • Maintain skills with which to conduct security testing using automated toolsets and develop relevant skills with which to conduct manual penetration testing in one or more of the following domains: Infrastructure, Application, Mobile (iOS, Android, Windows, Blackberry), Wireless and etc
  • To provide technical advice and guidance on IT security related queries to both Project and “BAU run” areas as and when required
  • Good grounding in automated/semi-automated security testing toolsets
  • Good knowledge of IT and Security principles
  • Keen to develop security testing expertise across a number of areas
  • Have good time management and organizational skills to manage workload
  • Show a willingness to learn and understand the business context/significance of technical security test findings
  • Some understanding of manual penetration testing techniques and manual false positive validation
  • Some knowledge of information security frameworks and standards such as ISO17799/27001 and their application into diverse environments
  • Good understanding of the security mechanisms associated with some of the following; Windows or Unix operating systems, mobile devices, switched networks, web based applications and databases
2

Application Security Tester Resume Examples & Samples

  • Conduct application vulnerability scans and penetration tests
  • Perform code reviews of in-house developed applications
  • Conduct logical security audits of business solutions and technology implementations
  • Lead cyber investigations for escalated, complex computer security incidents using computer forensics, network forensics, root cause analysis and malware analysis
  • Develop tactical and strategic cyber intelligence by acquiring threat intelligence and technical indicators from external and internal sources
  • Create and maintain use cases for recurring investigation/incident triggers in support of the 24/7 Cyber Threat Operations and Cyber Threat Management program
  • Create and maintain playbooks used in response for investigation/incident triggers in support of 24/7 Cyber Threat Operations and Cyber Threat Management program
  • Identify new threat tactics, techniques and procedures used by cyber threat actors
  • Publish actionable threat intelligence for business and technology management
  • Deliver expert cyber intelligence services and material to information technology and business leaders
  • Prepare appropriate threat intelligence content for customer and executive presentations
  • Provide mentoring for junior level analysts and specialists
  • 5+ years in information security with specific application security testing experience
  • Must be able to manually discover and exploit web vulnerabilities
  • Familiarity with penetration testing tools such as IBM Rational AppScan, Burp Suite Pro, Nikto, w3af, Nessus, Qualys, nmap, and proxy tools
  • Application and web development experience is a plus
  • Broad knowledge of general IT with mastery of two or more of the following areas: operating systems, networking, computer programing, web development or database administration
  • Critical thinking and problem solving skills
  • Ability to work independently with limited supervision
  • Industry certifications in general technology (e.g. Microsoft Certified Professional (MCP), Microsoft Certified Solutions Expert (MCSE), Network+)
  • Industry certifications in cyber security and forensics, such as Certified Information Systems Security Professional (CISSP), Certified Forensic Computer Examiner (CFCE), GIAC Certified Forensic Examiner (GCFE), GIAC Certified Forensic Analyst (GCFA), GIAC Certified Incident Handler (GCIH) and other related credentials
3

Security Tester / Ethical Hacking Tester Resume Examples & Samples

  • Scoping of penetration tests, use cases, and timing
  • Develop and communicate recommendations on findings remediation
  • Creation of testing reports and delivery of results to managemenT
  • Continuous improvement of testing processes and methodologies
  • Bachelor’s Degree in Computer Science or related field of study
  • 2+ years of penetration testing experience
  • Working knowledge of ISO27001
  • Strong encryption background
  • Broad Operating System knowledge
  • Previous Security Experience with Cellular Carriers
  • Demonstrable Threat Modeling experience
  • This role will span both traditional IP based infrastructure as well as in-vehicle technologies - working knowledge of vehicle-based security protocols is a big plus
4

Cloud Security Tester Resume Examples & Samples

  • Experience on Application Security tools, Integration of testing mechanisms with industry best practices such as the Open Web Application Security Project (OWASP)
  • Knowledge of threat modeling and other risk identification techniques, Knowledge of system security vulnerabilities and remediation techniques
  • Common software vulnerabilities and their mitigation techniques
  • Knowledge of Configuration and Security logs of Security Firewall and edge Devices
  • The ability to evaluate new and emerging security technologies
  • 2 years' experience with each of the following
  • Firewalls, Intrusion Prevention System (IPS), Virtual Private Network (VPN) and other edge and network security components - Vyatta Gateway (GW), Fortigate, Checkpoint, Cisco Adaptive Security Appliance (ASA), Juniper Junos Network Operating System (JunOS) Firewall (FW)
  • Load Balancing (LB) using edge nodes; Install/Configure/ Ops for NetScalar, HAProxy LBs
  • Security Assertion Markup Language (SAML), Open Standard for authorization Single Sign On (OAuth2 SSO) and open standard and decentralized authentication protocol (OpenID) Connect implementations
  • Preferred field of study: Computer Science, Engineering or a relevant field
5

Security Certification Assessor Tester Resume Examples & Samples

  • Ensures the integrity and protection of networks; systems; and applications by technical enforcement of organizational security policies; through monitoring of vulnerability scanning devices
  • Performs periodic and on-demand system audits and vulnerability assessments; including user accounts; application access; file system and external Web integrity scans to determine compliance
  • Prepares incident reports of analysis methodology and results
  • Provides guidance and work leadership to less-experienced technical staff members; and may have supervisory responsibilities
  • 8 Years experience and a relevant BS degree or
  • 5 Years experience and a relevant MS degree or
6

Cyber Security Tester Resume Examples & Samples

  • Write custom testing tools – Determine the test requirements for a vehicle and then design and develop custom testing tools to support automated or semi-automated testing
  • Perform security assessment – Perform threat modeling, code review, vulnerability assessment and penetration testing
  • Bachelor's degree in Computer Engineering, Computer Science or Electrical Engineering
  • Proven track record of security research (papers, conference presentations, blog posts)
  • Effective communication of technical data and concepts to peers
  • Ability to effectively collaborate with geographically distributed cross-functional team
  • Understand Honeywell development methodologies
7

Cyber Security Product Tester Resume Examples & Samples

  • Create test cases – track and implement quality assurance test runs, discrepancy reporting, resolution verification
  • Maintain regression test cases and automate their application
  • Conduct appropriate analysis and ensure discrepancies are appropriately forwarded to next level support services, both internal engineering and product vendors
  • Facilitate environment access; track / recover specific environment states in which discrepancies are observed
  • Maintain frequently asked questions and their resolutions
  • Contribute technical input to CDM CMaaS User and Operator Training
8

Cyber Security Control Assesor / Tester Resume Examples & Samples

  • Must have current TS/SCI and able to pass polygraph with 60 days of hire
  • Working knowledge of NIST SP 800-53A, ICD 503, FISMA, DCID 6/3, relationships between IC and DoD policies for assessment and authorization
  • Skill in using network analysis tools to identify vulnerabilities
  • Skill in assessing the robustness of security systems and designs
  • Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes
  • Skill in developing and apply security system access controls
  • Skill in assessments of industry IT operating system, software database, or hardware
  • Skill in systems engineering, requirements analysis, system development, software development, or hardware development as applied to the information assurance or cyber security field
  • Ability to prepare the various types of security related documents
  • Ability to conduct vulnerability scans and recognize vulnerabilities in security systems
  • Ability to evaluate the trustworthiness of the supplier and/or product
  • Ability to evaluate the adequacy of security designs
  • Ability to establish effective working relationships internally and externally to the client organization
  • Must obtain appropriate (IAM or IAT level III - CISSP, CISM, CASP, CISA or GSLC certification (CISSP preferred)) 8570 Certification within 90 days of hire and maintain certification throughout employment
  • Working knowledge of roles and procedures of red/blue team activities
  • Working knowledge of commercial or military software development methodologies, process, and standards
  • Working knowledge of web services protocols, including Simple Object Access Protocol (SOAP), Web Services Description Language (WSDL), and Universal Description, Discovery and Integration (UDDI)
  • Working knowledge of structured content tools and languages, and content management systems
  • Experience using XACTA
  • Developed technical documentation and white papers
  • Knowledge of virtualization technologies and virtual machine development and maintenance
  • Knowledge of emerging security issues, risks, and vulnerabilities
  • Skill in identifying gaps in technical capabilities and in talking to others to convey information effectively
  • Experience within the Intelligence Community
  • Certified 8570 IAM or IAT level 3, (CISSP, CISM, CASP, CISA or GSLC certification (CISSP preferred))
  • 12 years experience with Bachelor's degree
  • 14 years without degree
  • 8570 Level III certification within 90 days of hire
9

Pen Tester / Security Consultant Resume Examples & Samples

  • A Bachelor's degree or equivalent relevant professional experience
  • 4-6 years of experience in in-depth information security and/or risk management experience with specific focus on one or more of the following
  • Penetration testing of Networks, Applications, or Red Team Exercises
  • Ability to consistently and successfully undertake numerous penetration testing activities at both network and application level, ensuring customer satisfaction goals
  • Strong understanding of industry leading practices in information security, compliance and risk management Network security
  • Previous customer facing responsibilities are must
  • Demonstrated abilities to execute simultaneous work
  • Track of records of previous experience with large enterprise or banking or other verticals
  • CREST or Tiger Registered, or Certified Tester qualified
  • Experience researching, developing, and applying new methodologies and technologies
  • Coding experiences in a variety of languages, including Perl, Python, Ruby and Java)
  • Understanding of the PCI DSS, including ASV responsibilities
10

Security Tester Resume Examples & Samples

  • 1+ years of experience with conducting security compliance tests and vulnerability assessments of mainframes, UNIX and Linux, Windows, virtual environments, applications, databases, routers, switches, firewalls, and VPNs using manual methods and commercial automated tools
  • Ability to travel up to 50% of the time within the US and US Territories
  • Experience with conducting vulnerability assessments and compliance scanning using Nessus
  • Knowledge of Cybersecurity threats and techniques used by adversaries to compromise systems
  • CISA, CEH, or CISSP Certification
11

Cyber Security Pen Tester Resume Examples & Samples

  • Conduct Cyber Security Assessments and Penetration Tests (hands-on work) as an individual, self-managed tester, or in small project teams
  • Search for security vulnerabilities in both traditional IT assets (web applications, fat clients, ERP systems, installations of COTS products), as well as Siemens products. Initial responsibilities will focus on web application security, but will be expanded to cover more non-standard IT, industrial devices, and Siemens products based on individual capabilities
  • Follow industry best practice methodologies for penetration testing (e.g., OWASP guidelines), and be able to use tools for a basic level assessment, and manual penetration testing for advanced level assessments
  • Document findings for management and technical staff and recommend mitigating actions
  • Work with customers to determine their need for security assessments, present and explain the employed methodology, and support them with feedback and verification during mitigation
  • Drive technology and research in the area of Penetration Testing for Siemens products and enterprise solutions
12

Cyber Security Tester, Senior Resume Examples & Samples

  • 3+ years of experience with systems administration, network administration, or information security
  • Experience with developing, managing, and securing Microsoft Windows, UNIX, or Linux platforms
  • Experience with system security patch implementation, vulnerability management, and risk mitigation
  • Experience with security scanning tools and standards, including eEye Retina, Nessus, or Gold Disk
  • Experience in implementation with IA principles, National Institute of Standards and Technology (NIST) special publications, federal regulations, security standards, and DoD and DoN policies
  • Knowledge of vulnerability assessment tools, including Nessus, Security Content Automation Protocol (SCAP), Secure Technical Implementation Guides (STIGs), checklists, and Security Requirements Guides (SRG)
  • HS diploma or GED required
  • IA Workforce 8570 Certification within 6 months of hire date
  • Experience with system administration and configuring primary operating systems, including Microsoft Windows, UNIX, or Linux
  • Experience with McAfee-based products, including Host Based Security System (HBSS) and HIPS
  • Experience with using SCAP technology for security implementation
  • Experience with the Navy METOC community
  • Experience with DIACAP requirements, system security authorization agreements, and performing certification and accreditation (C&A) activities
  • Experience with network design and testing methodologies of integrated systems a plus
  • Experience with programming in Perl or C# a plus
  • Knowledge of Navy, DoD, and other security and information assurance related security requirements, including DCID6/3, DoDISS, and NIST guidelines
  • Knowledge of Windows and UNIX
  • DoD 8570 Certification
13

IoT Security Tester Resume Examples & Samples

  • Building automated checks to ensure that we eliminate any potential security issues from our products before releasing
  • Experience of applying security tests and scans using automation
  • Strong understanding of software security
  • Experience in IoT and Cloud computing
  • Experience in web technologies and APIs
  • Experience in test automation and continuous delivery
  • Focus and determination to debug problems and to figure out root causes
  • Knowledge of Jenkins or similar continuous integration
  • Good communication skills in English and Finnish
14

Security Certification Assessor Tester Resume Examples & Samples

  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices
  • Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance
  • Provides guidance and work leadership to less-experienced technical staff members
15

Cyber Security Tester Resume Examples & Samples

  • 1+ years of experience with IT
  • Experience with FISMA, RMF, and NIST SP 800–53 or 53A
  • Experience with federal agencies
  • Ability to analyze information system configurations and technical specifications against security control standards and identify deficiencies and remediation strategies
  • Ability to interpret Nessus scan results
16

Cyber Security Tester, Mid Resume Examples & Samples

  • 2+ years of experience with IT
  • Ability to coordinate with and gather information from several different data sources and client operating units simultaneously
  • Experience with current technologies used for technical security control reviews, including Microsoft System Center Configuration Manager, IBM Endpoint Manager (IEM), previously Tivoli Endpoint Manager (TEM) or BigFix, and Tenable Nessus software preferred
  • Knowledge of medical devices, security challenges, and solutions
17

Cloud Security Pen Tester Resume Examples & Samples

  • Obtaining security authorizations for systems under the authority of NCI-Frederick/FNLCR by conducting IT security audits of the network and devices for Federal Information Security Management (FISMA) compliance
  • Performing penetration tests on cloud based applications
  • Ensuring NCI-Frederick/FNLCR information systems maintain appropriate operational security posture consistent with the FISMA, working in close collaboration with information system owners
  • Serving as an advisor on matters involving the security of NCI-Frederick/FNLCR information systems, and provides security awareness and training to NCI-Frederick personnel, customers, and users
  • Developing and assessing information security requirements for NCI-Frederick/FNLCR, and ensuring information system owners integrate and implement security requirements into the design, development, and configuration of information systems
  • Coordinating security-related activities with the Information System Security Officers (ISSO), Information System Owners, and common control providers
  • Possession of a Bachelor’s degree in job related field from an accredited college or university according to the Council for Higher Education Accreditation (CHEA) or four (4) years related experience in lieu of degree
  • A minimum of six (6) years progressively responsible job related experience. Experience must include functioning as an analyst or equivalent for compliance auditing, information security, information systems, or related. Must also have web application/service penetration test experience
  • Practical understanding and application of the NIST Risk Management Framework and FedRAMP requirements
  • Work independently and make decisions regarding complex issues with appropriate consultation of peers, cross-functional teams, and supervisors
  • Must be analytical and able to analyze complex information, synthesize disparate data sources, and communicate effectively
  • Must be able to develop technical documentation and non-technical presentations; and, express information in a clear, concise, and organized manner, both verbally and in writing
  • Must be detail-oriented with the ability to prioritize multiple tasks/projects
  • Demonstrate working knowledge of standards and guidelines for Information Security published by the National Institute of Standards and Technology (NIST)
  • Working knowledge and expertise required for administering the information security aspects of information systems in compliance with regulations and directives of FISMA, and the Office of Management and Budget (OMB)
  • Proficient with penetration testing tools and cloud infrastructure and software as a service, including Amazon AWS
  • Location is in Rockville, but must be willing to travel to Frederick office occasionally
  • Experience with regulatory compliance related to cloud security
  • Experience with scripting (pyton, bash and powershell)
  • Certifications such OSCP, GWAPT, GPEN
18

Cloud Security Tester Resume Examples & Samples

  • Write a security test plan, perform and evaluate security tests from a variety of perspectives: policy-based, risk-based, standards-based, requirements-based and vulnerability-based
  • Align security test activities within project lifecycle activities
  • Analyze the effective use of risk assessment techniques in a given situation to identify current and future security threats and assess their severity levels
  • Analyze a given situation to determine which security testing approaches are most likely to succeed, implement them and evaluate the effectiveness
  • Identify improvement areas and security gaps where additional or enhanced security testing may be needed
  • Help the organization build information security awareness e.g. by providing trainings
  • Demonstrate the attacker mentality by discovering key information about a target, performing actions in a protected environment that a malicious person would perform and understand how evidence of the attack could be deleted
  • Write security test status report to ensure the level of accuracy, understandability and to meet the stakeholder requirements
  • Analyze candidate security testing tools and use most suitable ones based on specified needs
  • Search for the security testing standards and make use of them
19

Security Assessment Tester Resume Examples & Samples

  • The duties of this labor category include examining the Sponsor’s information systems to determine if vulnerabilities exist and, if they are found, what mitigating strategies can be applied. The end goal is to ensure the integrity of Sponsor systems by identifying and mitigating potential avenues of exploitation, including system level attacks and user level attacks. The Security Assessment Tester coordinates planning, scheduling, and testing of projects in the Certification and Accreditation (C&A process
  • Review and make recommendations on program-level documentation (e.g., requirements specification, system architecture, design documents, test plans, security plans, etc.)
  • Identify mitigating countermeasures to identified threats, vulnerabilities, and shortfalls
  • Perform network security analysis and risk management for designated corporate networks
  • Develop, assemble, and submit C&A testing results reports that document testing activity and results to support the creation of C&A risk assessments and C&A approval packages
  • Clarify security requirements and recommend security countermeasures
  • Read and analyze SSPs and develop understanding of systems and applications into security test plans
  • Location will be Bethesda or McLean
  • Broad knowledge of network architectures and network management tools
  • Demonstrated ability to perform complex technical tasks in pursuit of overall goals with minimal
20

Cyber Security Tester Resume Examples & Samples

  • 3+ years of experience with DoD Assured Compliance Assessment Solution (ACAS) suite of tools
  • BA or BS degree or 5+ years of experience with DoD ACAS suite of tools
  • DoD 8570.01-M Compliant Certification, including Security+, CISSP, GSEC, CASP, CEH, or CISA
21

Application Security Tester Resume Examples & Samples

  • W2 only no sponsorship
  • Contract to Hire
  • Location- San Antonio
  • 5+ years of practical experience in Application Security (AppSec)
  • Subject matter expert in Application Security
  • Expert Penetration tester; Certified (CEH, GPEN, OSCP, etc)
  • Java certified
  • Experienced in AppSec at a financial services company
  • 3+ years of experience with the following tools
  • Automated Dynamic Testing tools such as IBM Security Appscan or HP Webinspect
  • Burp Suite Professional and its accompanying utilities (Proxy, Spider, Intruder, and Repeater)
  • Static Application Security Testing tools such as HP Fortify, IBM Appscan Source, or Checkmarx
  • Able to provide application security strategy input
  • Able to explain security issue remediation
  • Experience with source code reviews (manual and automated)
  • Experience with threat modeling