Senior Security Resume Samples

4.9 (105 votes) for Senior Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the senior security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
DB
D Botsford
Darius
Botsford
19573 Gerlach Parkways
Los Angeles
CA
+1 (555) 690 9507
19573 Gerlach Parkways
Los Angeles
CA
Phone
p +1 (555) 690 9507
Experience Experience
Houston, TX
Senior Security Automation Engineer
Houston, TX
Schmidt-Roob
Houston, TX
Senior Security Automation Engineer
  • Develop secure coding practices and provide hands-on training for systems and network focused development teams
  • Work closely with quality engineering, product management and other team members to develop, test and deploy high quality software securely
  • Develop hardening guidelines and review security configurations related to Linux/Unix hosts, common application frameworks and network devices
  • Integrate security capabilities with other security pillars that include identity access management, data protection, network security and application security
  • Implement cutting edge security technologies, drive towards adoption, create proof-of-concept and frameworks
  • Research new security technologies and perform cutting-edge research on new attacks
  • Participate in all stages of development from design through implementation
Detroit, MI
Senior Security Manager
Detroit, MI
Torphy-Grant
Detroit, MI
Senior Security Manager
  • Overseeing the implementation of security manned guarding training, testing and alignment of their Assignment Instructions to TWDC Security Standards & SOPs
  • Rotating schedule; opening week’s arrival time 0615 and closing week’s departure time 1800
  • Works through managers in setting and implementing standards, priorities, and schedules
  • Defines an application or infrastructure architecture and framework for deploying and developing business applications
  • Develop and grow team members thru mentoring, coaching, developmental opportunities and feedback
  • Directs the personnel activities of IS team members covering development, feedback, and mentoring
  • Responsible for assisting in the development of Annual Operating Plan and accomplishment of area goals within plan
present
New York, NY
Senior Security Specialist, rd Shift
New York, NY
Block and Sons
present
New York, NY
Senior Security Specialist, rd Shift
present
  • Assist in all Main Security Office functions to include security enforcement, emergency response, monitor fire and HVAC Systems, communicate with local police and fire departments, dispatch operations, and emergency notifications
  • Perform core Rover duties including campus rounds, break coverage, building inspection, perimeter patrol and more
  • Photograph new employees/contractors and create identification cards
  • Assist Facilities Service Center in call taking and dispatch functions in accordance with the established procedures
  • Provide leadership during response to all medical, fire, security, and other safety related emergencies and incidents and write comprehensive reports following established procedures
  • Occasionally monitor fire alarm control panel and interpret alarm indicators for emergency type and location. Rapidly reposition to location of possible emergency and assess, determine and respond within a three (3) minute timeframe from initial alarm
  • Completes and issues hot work permits
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of San Francisco
Bachelor’s Degree in Computer Science
Skills Skills
  • ArcSight experience is highly desirable
  • Phone and remote support experience, knowledge and resolution ability
  • Proficient in time management; the ability to organize and manage multiple priorities
  • Ability to interpret and create policies, procedures and manuals
  • Data Collection: Knowledge of procedures used to obtain security-related information (e.g., observation, interviews and reading
  • Relevant materials)
  • Data Collection: The ability to collect data and produce reports (e.g., resource allocation, timekeeping and job costing) for analysis and decision-making
  • Drive Innovation: Generate new or unique solutions and embrace new ideas that help sustain our business (encompassing everything from continuous improvement to new product and package innovation)
  • Collaborate with System, Customers, and other Stakeholders: Develop and leverage relationships with stakeholders to appropriately stretch and impact the System (Company and Bottler)
  • Act like an Owner: Deliver results, creating value for our brands, our System, our customers and key stakeholders
Create a Resume in Minutes

15 Senior Security resume templates

1

Senior Security Architect / Engineer Resume Examples & Samples

  • Maintain an understanding of current and emerging security threats and technologies
  • Identify, procure and prototype new solutions designed to prevent, detect, and respond to threats
  • Examine disparate data to identify patterns and trends, then normalize and integrate into existing automation tools to correlate the resulting data
  • Review, analyze and report on relevant security intelligence
  • Participate in security incident response through in-depth, technical (log, forensic, malware, etc.) analysis
  • Create and track security metrics to enable reporting to senior management
  • Experience architecting and integrating security solutions including devices, networks and systems necessary to prevent, detect and respond to security threats
  • Expert knowledge of a wide range of current network security technologies such as firewalls, proxies, network and host-based intrusion prevention, DLP, vulnerability assessment tools, security information/event management, endpoint security, anti-virus/anti-malware, etc
  • Familiarity with security intelligence gathering, threat identification and attribution
  • Development/scripting experience: Python and/or PowerShell is a plus
  • Current CISSP or CISM certification preferred
  • 5+ years of hands-on technical experience in information security
  • Knowledge of SOX and other regulatory compliance frameworks
2

AM Senior Security Architect VP Resume Examples & Samples

  • Participate in technology strategy discussions to understand future technology drivers, assess risk/tools gaps and engage corporate teams to deliver appropriate solutions to address potential gaps
  • Support the AM Information Risk Management community to address specific technical challenges posed by a planned or unplanned change. Assess the risk of a scenario (considering compensating controls, impact, likelihood and residual risk), size the risk appropriately and provide recommendations that are fit for purpose and address root cause
  • Conduct periodic engagement and knowledge sharing forums with technology teams and various risk/security SMEs
  • Collaborate with other security architects within AM and across the firm to identify common information risk challenges and provide solutions
  • Develop and monitor the delivery and participation in the global program review and preparation of status reporting
  • At least 5-10 years experience in Information Technology, with 3+ years as a technology architect or Java application developer
  • At least 3+ years experience in an IT Risk organization or equivalent experience in risk and security processes with proficiency in the following areas – Threat Modeling, Application Security Controls (e.g .OWASP Top (10), Authentication and Authorization, Encryption and Vulnerability Management
  • Experience in security testing, code review, attack models, architecture analysis, standards and requirements
  • Experience in at least two or more web development frameworks, such a Spring MVC, Spring WebFlow, Google Web Toolkit, Bootstrap, ExtJS, Jersey, Struts , Wicket, JBoss Seam, etc. Broad knowledge of various technology products and infrastructure services. Hands on experience with Java, n-Tier technologies, enterprise databases, Mobile technology (wireless, IOS, Android, Blackberry), UNIX and Windows Server and Desktop OS, Web/Middleware (Apache, Tomcat, IIS, JMS/MQ), and (1) or more of the following languages:.NET, #C, C/C++ programming, and Virtualization technology, Network (Firewall, Load Balancing, Web Application Firewalls, Accelerators), Source Code Analysis and Review
  • Experience deploying VMWare/ESX, Windows and Linux architectures
  • Working knowledge of SAN and NAS based systems
  • Experience with data management, relational or object-oriented systems- desired
  • Strong research, investigation and evaluation skills
  • Strong system analytic ability and practice
  • Experience with successful implementations of highly scalable and highly available systems in a multi-tier environment
  • Experience with disaster recovery planning, testing, auditing, risk analysis
  • A self-starter with ability to work under minimal supervision and under pressure
  • Basic understanding of technology concepts, for example, firewall basics (layer 7 firewall versus network layer firewall), OSI stack, Proxy technologies, Active Directory/LDAP basics, asymmetric / symmetric encryption, IT Disaster Recovery and IT Resiliency testing, VPNs, SSL, Secure SDLC, Authentication protocols (e.g. Kerberos), Authorization (fine grained versus coarse grained), DMZ, understanding of OWASP top 10 and source code vulnerabilities (e.g. CSS, SQL injection, Directory traversal), IDS/IPS (host and network based), defect management, change management assurance, database technologies and concepts (e.g. DDL, DML, encryption options, compartmentalization (containers), etc)
  • Demonstrated experience with engineering and architecture discipline in 3 or more of the technology areas listed above
  • Highly motivated, comfortable taking the initiative and able to work collaboratively
3

Senior Security & Comp Specialist Resume Examples & Samples

  • Work closely with business partners, key stakeholders, and internal departments to perform user ID reviews and reconciliations as required
  • Assemble and document security and compliance artifacts as required to satisfy internal and external audit requirements
  • Input to IT Compliance strategies to ensure the effectiveness and efficiency of the organization's IT Controls
  • Monitor new application requests and changes to inform and educate team members on expectations and requirements necessary to maintain compliance with information security policies and procedures and prepares appropriate documentation for internal and external audits
  • Support and coordinate internal/external audits and attestations to ensure deficiencies are identified and addressed
  • Provide oversight of Security and Compliance remediation projects ensuring timely completion and validation of completion
  • Coordinate artifact generation and submissions required to satisfy PCI, SOX and IT Controls for all applications in scope
  • Stay informed about information compliance and security trends, directions, and technologies in the technology industry. Monitor industry trends and identifies best practices and/or methodologies to implement in-house
  • Demonstrated experience managing a Security and/or Compliance program for a large and complex organization
  • Knowledge of security related legislation/regulations with emphasis on Sarbanes Oxley, PCI, and privacy
  • Proven experience influencing business and technology leadership to achieve security and compliance requirements
  • Ability to establish credibility and working relationships with a wide range of personnel, including operations, management, executive, and legal staff as well as external auditors
  • Demonstrated professional written, verbal, and presentation communications skills
  • Experience working for a public company
  • Experience working in a multi-national and multicultural environment
  • Ability to be flexible with work schedule and travel requirements
  • Demonstrated strong organizational and time management skills
4

Technology & Information Risk-senior Security Specialist Resume Examples & Samples

  • Enhance existing in-house and vendor software
  • Create new software to solve the Firm’s core security challenges
  • Provide engineering escalations to services and operations teams
  • Able to support after hours escalation
  • Create, review and maintain documentation
  • Lead and mentor junior members of the team in technical areas
  • Provide training to services and operations team members
  • Run projects and take it from inception to turnover to production
  • Collaborate with peer teams globally and communicate frequently
  • Meet with vendors to assess commercial products for use in the Firm
5

Senior Security Technical Analyst Resume Examples & Samples

  • Review and operate enterprise wide security platforms, investigate events using enterprise Security Information, Event Manager (SIEM) and various network forensic tools, and work with appropriate business units to remediate
  • Initiates automation as necessary to effectively manage system logs and security alarm reporting
  • Technical knowledge and experience in operating system security and security best practices
  • Experience with network monitoring tools to monitor attacks/threats preferred
  • Organization and documentation
6

Senior Security Architect End Point Resume Examples & Samples

  • Engage with all business units in GECC to understand global capabilities, communicate direction and drive adoption of agreed strategy and architecture
  • Build a “current state” picture of end point security architecture in GECC, identifying gaps and defining strategic priorities. Engage with CTO and other parts of IT to define projects necessary to drive the agreed End Point security strategy
  • Develop the business, information and technical artifacts that constitute the end point enterprise security architecture
  • Engage with functional stakeholders (e.g. legal, compliance, risk teams) to determine security needs and help determine solutions to meet business objectives and regulatory requirements
  • Serve as a security expert in end point related engagements, helping business units comply with enterprise security policy, regulation and best practices
  • Coordinate with the CTO, GE Corporate Enterprise Architecture and GE Capital Architecture teams to develop and document target-state security architectures and future security technological strategies consistent with industry trends
  • Communicate security risks and solution to business partners and IT staff
  • Minimum 8 years’ information security experience with
  • 5+ years of implementation experience with end point security software and tools with at least 1 year in an enterprise environment
  • 4+ years of experience developing technology solutions for financial services, healthcare, or other highly regulated industry
  • Experience in using an enterprise architecture methodology such as Zachman/TOGAF
  • Knowledge of security specific architecture methodology such as SABSA
  • Strategic thinker and change agent
  • Understanding of financial services regulatory environment including FFIEC, GLBA and PCI-DSS
  • Working knowledge of a broad range of current security appliances, tools, and applications and security methodologies
  • Must submit your application for employment through gecareers.com to be considered (Internals via COS)
  • Must be able to satisfy the requirements of Section 19 of the Federal Deposit Insurance Act
  • Must be willing to comply with pre-employment screening, including but not limited to drug testing, reference verification, and background check
  • Must be willing to work out of an office in New Orleans, LA
  • Must be willing to travel up to 20% of the time
  • Ability to lead and influence all levels of stakeholders and constituents including external constituents such as auditors or regulatory bodies
  • Strong conceptual thinking and communication skills – the ability to conceptualize complex business and technical requirements into comprehensive models and templates
  • Ability to take input from multiple stakeholders, make a decision on a way forward and then drive the outcome
  • Strong technical and business skills
  • Industry-recognized security certification such as CISSP, CISM or CISA
  • IMLP or EIMP graduate
7

Senior Security Consulant Resume Examples & Samples

  • Experience of providing security delivery to clients, in the areas of Identity and Access Management
  • Ability to identify customer security issues and design and implement solutions fit for purpose ensuring effective deployment of the chosen technologies
  • Awareness of the trends and issues in Information Security
  • Good communication skills, both written and verbal
8

Senior Security Analysis Pipeline Req Resume Examples & Samples

  • Assisting in building SOC and CIRT processes, procedures, and training
  • Ability to deliver technical training in areas such as incident handling, event analysis and correlation, general SIEM skills, IDS/IPS and log monitoring, threat management, etc
  • Eyes on glass monitoring and resolution of security incidents within established customer Service Level Agreements
  • Specialize in network and log-centric analysis
  • Use of IDS, IPS, and/or other signature matching technology
  • Information Technology experience with network security technologies, specifically TCP/IP, and related network tools
  • A sound understanding of TCP/IP and networking concepts
  • Understanding of source code, hex, binary, regular expression, etc
  • Experience with QRadar a plus
  • Subject matter expert (SME) in one or multiple areas such as Windows, Unix, Midrange, Mainframe, Firewalls, Intrusion Detection, Threat Detection Analysis, or Information Risk Management
  • · Network, Security, or Platform certification(s) (S+, N+, MCSP, CNA)
  • CISSP or SANS GIAC GCIA certification desired
9

Senior Security Architects Resume Examples & Samples

  • Designing, developing, testing/QA, and/or implementing secure software development lifecycle and software applications and/or systems
  • Project management of Information Security and Security Applications, and effective communication, influencing, and negotiations skills
  • Expertise in design & development of hardware and software data protection mechanisms with a deep understanding of cryptographic & key management protocols, solutions, and technologies using C/C++, Java across heterogeneous platforms inclusive of windows & Linux
  • Expertise in database security and auditing solutions
  • Deep understanding and development of tokenization solutions
  • Designing and developing Public Key Infrastructure & certificate management solutions using C/C++/Java on Windows & Unix platforms
  • Experience in data security regulations, control frameworks, and standards: PCI-DSS, Federal certifications of crypto systems such as FIPS & Common Criteria Certification
  • Experience in and implementation of enterprise key management, encryption and tokenization solutions: RSA Data Protection Manager/Safenet Data Secure/Voltage SecureData/Protegrity Database Encryption
  • Deep understanding and experience in Identity and Access Management solutions Experience with implementing two-factor authentications and Single Sign on solutions; and,
  • Experience in Data Privacy and Digital Rights Management solution development and implementations, including digital rights management
10

Senior Security Intrusion Analyst Resume Examples & Samples

  • Security policies
  • Hands-on knowledge and experience operating security infrastructure: firewall, IPS, SIEM, antivirus, malware prevention, vulnerability scanning, web gateways, application whitelisting, IOC detection, and other industry-standard tools
  • Deep technical and practical understanding of the tools, tactics, and techniques that malicious actors employ
  • Experience with content creation using ArcSight SIEM
  • Strong knowledge of network packet analysis tools, specifically tcpdump and wireshark
  • Strong knowledge and experience using network flow data for intrusion analysis
  • Network Infrastructure, In-depth technical knowledge of enterprise networking such as routing, switching and vlans
  • In depth knowledge and experience with enterprise operating systems, including Windows, Linux, and MAC. Must specialize in at least one of these operating systems, preferably Linux
  • In-depth knowledge of ArcSight SIEM technology Experience in a Security Operations center (SOC)
  • Hands-on experience with enterprise information security incident response processes and procedures
  • 3+ years working within the information security field, with emphasis on security operations, incident response, intrusion detection, SIEM usage and security event analysis
  • Experience with operations security such as security device installations, configuration, troubleshooting (e.g., WAF, IDS, etc.) and maintenance
  • Experienced in network device configuration, routing, switching and firewalling
  • Experience with team leadership and mentoring
  • Solid verbal and written communication experience
  • Advanced knowledge and experience with ArcSight SIEM
  • Professional certifications to include CISSP, SANS GCIA, SANS GCIH, ArcSight ACSA or ACIA
  • Bachelors of Science degree in Computer Science, Computer Engineering, Information Technology or equivalent
11

Senior Security Architect, VP Resume Examples & Samples

  • Primary point of contact for AM solution architects and application developers in support of key business projects. Participate in the SDLC to ensure risk/security controls are being incorporate, and standard frameworks and practices are adopted. Provide appropriate guidance to mitigate risks early during the plan, design and requirement phases
  • Lead the development of security standards and best practices that will facilitate a consistent security profile across asset management
  • Lead/contribute to the development of security tools and process reference models that will enable technology architects and application developers to efficiently incorporate security solutions/controls into new projects and target state architectures
  • Conduct technology product assessments prior to new technology products being introduced within the AM technology environment
  • Develop and present status reports on various activities and project workstreams
  • At least 5-10 years experience in Information Technology, with 1+ years as a technology architect or Java application developer
  • Broad knowledge of information risk management and security processes with proficiency in the following areas – Threat Modeling, Application Security Controls (e.g .OWASP Top (10), Authentication and Authorization, Encryption and Vulnerability Management
  • Experience with security testing, code review, attack models, architecture analysis, standards and requirements desired
  • Broad knowledge of the following development frameworks are a plus: Spring MVC, Spring WebFlow, Google Web Toolkit, Bootstrap, ExtJS, AngularJS, Jersey, Struts , Wicket, JBoss Seam, WebSockets, PKI, Virtualization technology, Network (Firewall, Load Balancing, Web Application Firewalls, Accelerators),
  • Broad knowledge of the following technologies are a plus: Java, n-Tier technologies, enterprise databases, Mobile technology (wireless, IOS, Android, Blackberry), UNIX and Windows Server and Desktop OS, Web/Middleware (Apache, Tomcat, IIS, JMS/MQ), and (1) or more of the following languages:.NET, #C, C/C++ programming
  • Excellent communication and influencing skills, with demonstrable ability to debate issues, stand firm on principles yet remain sensitive to business/technology drivers
12

Senior Security Solutions Consultant Resume Examples & Samples

  • Acting as a team leader for the identified region in regards to the delivery of security solutions and engagements
  • Developing security initiatives and offerings for security consultation with a focus on strategic and complex security offers and solutions
  • Defining customer requirements for Security Solutions with a focus on Identity Management solutions and/or Infrastructure Protection solutions i.e. Firewalls, VPNs, VOIP, Intrusion prevention/detection, Access controls, Perimeter security, Secure content including Network Access Control (NAC), Data Loss Prevention (DLP), Security Information and Event Management (SIEM)
  • Experience designing and deploying security solutions such as IT Infrastructure / Network Protection, Secure Content, and/or Security Information & Event Management
  • Experience delivering Threat Risk Assessments, Malware Profiling, Vulnerability Assessments, Incident Response, Governance, Risk and Compliance, etc
  • Security solution design practices based on the gathering of technical and business requirements
  • Advanced security concepts and experience
  • Network Security experience
  • Familiarity with vendor security solutions such as Fortinet, McAfee, Websense, Arcsight or RSA
  • 10+ years in IT with a minimum of 5 years of demonstrated experience in providing detailed technical architecture expertise on Security Solutions within large corporate environments with a focus on solution implementation
  • Ability to manage complex deliveries or programs from a pre sales and delivery perspective
  • Able to communicate technical points to others at the technical, user and management levels
  • The successful candidate will be expected to travel to customer sites on consulting engagements as required
13

Senior Security Linux Engineer Resume Examples & Samples

  • Take ownership of and troubleshoot tickets generated
  • Remotely manage client devices and correct problems whilst adhering to change control processes
  • Identify internal SecureWorks infrastructure outages and escalate to the appropriate teams for resolution on a wide variety of systems
  • Participate in disaster recovery meetings, testing, and reporting
  • Develop and document appropriate health troubleshooting techniques and guides for new platforms and provide knowledge base articles by working with senior engineers as new product offerings are being created to improve the speed and accuracy of problem resolution
  • Significant theoretical and industry based knowledge of working with security appliance technology including Linux based hardware platforms
  • Understanding of intrusion detection, firewall operations, and other general security practices
  • Strong understanding of Unix or Linux operating systems including, but not limited to
14

Senior Security Architect Secure Technology Architecture & Management Resume Examples & Samples

  • Integrates business and security requirements into technology lifecycle management and contributes to multiple large, complex application projects with cross functional teams and business users
  • Researches, designs and advocates new technologies, architectures, and security products that will support security requirements for the enterprise, its customers, business partners and vendors
  • Thought leader who effectively communicates with and influences peers and leadership regarding optimum architectural approaches that meet business requirements while managing security risk and maintaining compliance
  • Analyzes and recommends strategy and direction to mitigate security risks within the IT architecture and infrastructure
  • Acts as a change agent within the organization through hands on technical leadership. Demonstrates and encourages continuous development
  • Mentor, coach and train members of the IT Security & Risk Management and Architecture Teams and other technologists across Nordstrom
  • Provide strategic direction for core enterprise infrastructure and Security supported technologies such as data protection (DLP, encryption…), perimeter protection (WAF…) Splunk Enterprise Security SIEM, managed security services, cloud services security
  • Work closely with Security engineers across the Information Security to support the performance, health and security state
  • Document reference architectures and best practices for security technologies and methods
  • Develop and maintain awareness of new trends in security technology
  • Implementation experience with commonly accepted industry standards and best practices relating to security such as ISO 27001/27002, NIST, CMM etc. Specific experience in driving an enterprise security framework based on these practices is strongly desired
  • Working knowledge of one or more security and IT Architecture standards including COBIT, TOGAF, Open Security Architecture, or Service Oriented Modeling Framework required
  • Demonstrated knowledge of threat modeling and application security risks and mitigations (e.g. OWASP), knowledge of Service Oriented Architectures and Web Services standards as they relate to an enterprise security model required
  • Demonstrated ability to influence and clearly communicate across vast sections of IT and Business including company leaders required
  • Ability to partner well with outside vendors including security companies required
  • Demonstrated experience in making articulate and effective oral and written presentations to different audiences required
  • Ability to lead, build and develop team of senior IT professionals through formal and informal reporting relationships required
  • Deep architectural knowledge of core information security functions and controls including firewalls, identity and access management, vulnerability management, network security, threat detection/SIEM etc
  • Excellent interpersonal skills, including comprehension, conflict resolution, teamwork and relationship building
  • Bachelor's degree in Information Security, Information Technology, Computer Science, or similar field required, Masters preferred
15

Senior Security Architect & Engineer Resume Examples & Samples

  • Evaluation of IT systems, appliances, and devices being proposed for use within the environment and their ability to meet Tribune Media’s security requirements, recommending mitigating controls for identified limitations and risks
  • Design, implement, and operate security tools across the Tribune Media network
  • Designs, documents and recommends improvements to security architectures, technologies, and related security controls
  • Develops and maintains the security technology plan and roadmap to provide a defense in depth architecture
  • Provides guidance to project teams regarding computing system or network configuration and security controls
  • Works with Develops and maintains computing system and network build standards
  • Implements complex security architecture project tasks including providing requirements for designing and implementing components of the Information Security program
  • Interfaces with external departments and vendors to provide expert level consultation concerning Information Security architectures and the, implementation and integration with existing network environments, applications and services
  • Evaluates third party products and services to verify that they meet security standards and will integrate seamlessly and securely into the Tribune Media computing architecture
  • Works with Internal audit and other departments to ensure security controls meet regulatory compliance such as SOX, PCI, or HIPAA
  • Government security clearance preferred
  • Experience with security and forensics investigations
  • Technical background, with understanding of concepts of compliance, confidentiality, integrity and availability, disaster recovery, business continuity, user authentication and authorization
  • Ability to identify and analyze significant problems and opportunities
  • Demonstrated ability understanding policies and regulatory requirements
16

Senior Security Specialist, IAM Resume Examples & Samples

  • Minimum 3 years in an Identity Management oriented area of expertise
  • Minimum 2 years experience with provisioning, directories & federation
  • Knowledge of Identity Provisioning tools such as CA Identity Minder, Oracle Identity, IBM ITIM etc
  • Ability to understand and write complex MS SQL queries
  • BA/BS in business or computer science or equivalent work experience
17

Senior Security Specialist, Ops Resume Examples & Samples

  • Ensure appropriate security policies and controls are in place that will safeguard digital files and vital electronic systems
  • Respond to computer security breaches and viruses
  • Issue, follow-up on, resolve or drive resolution of open security event tickets
  • Engage with cross-functional teams in the design and implementation of security projects and initiatives
  • Assist with the development of metric and scorecards in support of the information security program for quarterly and annual Information Security reports to executive management
  • Three (3) years of practical information security experience
  • Experience in information management and information technology security design and implementation
  • Demonstrated experience in creating conceptual, logical and physical security diagrams, Thorough understanding of vulnerabilities and countermeasures
18

Senior Security Manager Resume Examples & Samples

  • Provide professional state-of-the-art security advice, guidance, and support to our global business system to prevent or successfully resolve high order threats and serious incidents, such as extortions, kidnappings, terrorism, and intentional criminal product contamination
  • Provide guidance and/or conduct investigations involving criminal activities, such as fraud, theft, product counterfeiting, Code of Business Conduct violations, and workplace violence throughout our global business system by using legal security and law enforcement techniques and procedures
  • Conduct in-depth risk assessments and develop appropriate mitigation plans for global major events, such as Olympics and FIFA World Cup to ensure the protection of our personnel, assets, and our Company’s image and reputation
  • Partner with Global Alliances and Ventures management and host business units’ project teams to deliver security and IMCR support during global major events to ensure the protection of our personnel, assets, and our Company’s image and reputation
  • Develop and drive consistent global asset protection capabilities across the global business system by strengthening the Company’s incident management and crisis resolution (IMCR) system, emergency planning, and business continuity through effective IMCR training and scenario based validation exercises
  • Establish and maintain international and domestic liaison with appropriate law enforcement, regulatory agencies, and embassy personnel to obtain relative threat/risk intelligence and assistance with investigations
  • Conduct security assessments of global system facilities and make recommendation to enhance our asset and personnel security protection
  • Actively engage with business unit annual planning sessions to ensure alignment of SSD resources to achieve agreed objectives in supporting personnel and asset protection within the business unit
  • Develop mitigation security strategies and provide security support for senior executive leaders
  • Security/Law Enforcement Knowledge: Knowledge of domestic and international law enforcement /security organizations; includes the ability to develop strategic liaison/contact with such organizations to accomplish security-related missions
  • Global Asset Protection Strategies: Knowledge of strategies used to enhance the overall security posture to counter evolving threats to the global business system; includes the ability to enhance the system's response to issues/incidents based on lessons learned from previous incidents and validation exercises
  • Investigative Procedures: Knowledge of interview techniques and procedures used to collect pertinent security-related information; includes the ability to recognize circumstances that may require further investigation and knowledge of procedures for arranging such investigation (e.g., appropriate personnel)
  • Investigative Skill: Ability to apply investigative techniques and principles to collect and evaluate relevant case information; report facts in the proper format; obtain truthful accounts of incidents/issues
  • Professional Objectivity: Knowledge of techniques used to tactfully enforce Company policies and procedures while remaining objective when handling security issues
  • Data Collection: Knowledge of procedures used to obtain security-related information (e.g., observation, interviews and reading
  • Relevant materials)
  • Data Collection: The ability to collect data and produce reports (e.g., resource allocation, timekeeping and job costing) for analysis and decision-making
19

Senior Security Specialist, Risk Resume Examples & Samples

  • Collect, conduct, and deliver on analysis of newly identified Risk Observations; identification, classification, analysis, delivery, and consultation with stakeholders. Maintain the Risk Register where these Observations are recorded, and deliver analysis on the entire book of Technology Risk based on the Register. Oversee the creation and maintenance of The Walt Disney Company’s GIS Risk Scorecard, and provide linkage to related work
  • Engage new customer and advertise the GIS Risk Management Service to new stakeholders, collecting their input, and walking them through their initial delivery from the Program
  • Drive the creation of or evolution of existing Program features, including all aspects from initial stakeholder interaction to final delivery and ongoing tracking & reporting
  • Gain and maintain detailed understanding of all GIS Service Offerings and related tools & solutions, such that full command of GIS’ book of business can be brought to bear on every other aspect of the position
  • Min 8 years work experience in large enterprise technology organizations
  • Min 5 years of Information Security specific work
  • Min 3 years Risk Management, Assessment, Compliance, System Audit or Security Architecture specific work
  • Strong team building, collaboration, and outreach skills
  • Strong Strategic flexibility and the ability to manage through ambiguity
  • Strong aptitude for reporting tools, such as SQL reports, Crystal Reports, database research in large technology organization coupled with advanced analytical and system audit or architecture skills
  • Experience in presenting Information Security Risk Assessment deliverables to either internal or external clients
  • Experience taking a broad scope of information, and funneling that into an organized, and effective professional communication for Executives and others
  • Certifications through SANS, ISC2, ISACA, or others
  • 10+ years’ work experience in Fortune 100 technology organization(s)
  • 8 years Information Security specific work
  • 5 years Risk Management or Security Architecture work in large organization(s)
  • Skills in SQL-Python-regex data analysis for risk delivery
  • Incident Handling/Pen Testing experience
  • Experience as a Security Architect or in Security Architecture work
  • Consulting or similar role requiring defined, SOW-driven delivery (or similarly non-open-ended engagement) on Risk Assessment or Security Architecture function
  • CISSP, CRISC, CISA, GCIH, CEH, Certifications
  • Bachelor's degree. Security-specific education, whether degree related or not
20

Senior Security Malware Engineer Resume Examples & Samples

  • Plan and lead development of professional practices to conduct malware analysis, containment and post infection remediation
  • Function as SME for in-house malware protection products. Research and execute technology refresh according to product roadmap and industrial best practices
  • Lead coordination of incident response activities when is required during each Security Incident Response event
  • Conduct technical assessments and research of computer related security incidents to ensure the continuing development of security protection technology as it relates to defending and protecting Robert Half and its customers
  • Assess severity levels of security threats (e.g., incidents, vulnerabilities, malicious code) and coordinate the appropriate notifications or escalations in a timely manner to Director, Information security
  • Act as an escalation point to provide technical guidance to Security Operations when processing any complicated security requests
  • Establish security metrics to measure effectiveness of security solutions/processes
  • 5+ years' IT security engineering experience or a non-technical degree with 7+ years' security engineering experience
  • CISSP preferred and other security focused certifications a plus (i.e. CEH, CISM, SANS Certs, etc)
  • Security related technologies and solutions (firewalls, IPS, WIPS, WAF, SIEM, Honeynet, Zero-hour malware/virus analysis, eDiscovery/Forensics, vulnerability scanner, web proxy, EDR/endpoint security, Cloud Authentication Broker)
  • Must have a thorough understanding of technical concepts required for advanced malware analysis and uses knowledge, creativity, and company practices and priorities to obtain solutions to defend advanced malware attacks
  • Experience in handling security incident response is required
  • Knowledge of dev/ops/infrastructure/platform/network security is required
  • Ability to gather requirements and perform risk analysis effectively
  • Ability to communicate and explain risks with customers of varying levels of expertise
  • Demonstrated customer service abilities and problem solving skills
  • Ability to lead under pressure in a professional manner
  • Expertise in malware behavior, malware outbreak containment and remediation
  • Ability to develop a project plan, meeting established deliverables and timelines
  • Ability to execute based upon directions from senior team member
  • By mail: Please mail your cover letter and resume to
21

Technology Senior Security Specialist Resume Examples & Samples

  • Plan, implement, upgrade and monitor security controls for the protection of TWDC computer networks and information systems
  • Provide technical assistance in the selection, configuration, and maintenance of network security devices including, but not limited to, firewalls, IPS/IDS, SIEM, WAF, Network-based Malware detection and related platforms
  • Develop technical security standards to support policies including assisting in creating and coordinating security monitoring standards and incident investigation procedures
  • Five (5) years of IT experience in three or more areas (i.e. infrastructure, network, Client Server, application, desktop OS, project management)
  • Demonstrated experience with security event logs from Windows, Unix, intrusion detection systems, network, and remote access solutions
  • Experience managing IDS / IPS / firewall systems across an enterprise. General knowledge of
22

Senior Security Sotware Engineer Resume Examples & Samples

  • Drive Incident Management, Problem Management, Change Management, as part of a learning organization
  • Work with SE management, PM and Dev Leads and Managers to drive operability, stability, and resilience into the architecture and design of the product
  • Drive complex Live Site issues through to resolution
  • Translate requirements from custom code applications on service dependencies in packaged software services. Build deep SME-level knowledge and understanding of these dependencies
  • Mentor and coach team members, assist in overall technical development of the entire SE organization
  • Be accountable for the overall service manageability and operability of several different systems, including by making suggestions for dependent systems to SE management and PM and Dev peers
  • Demonstrated ability in designing, implementing, and supporting multi-tiered services, particularly with a focus on operability
  • Experience with the SDLC and its tools such as source control, quality engineering concepts, release engineering, and change control
  • Experience with at least one of the following languages: C/C++, Java, or C#- Strong understanding of systems at scale and troubleshooting techniques
  • Exhibit a strong understanding of software deployment strategies and configuration management
  • Professional experience designing, developing, and shipping high quality software or services, using ASP.NET, AJAX, MVC/MVVM, HTML/CSS, JavaScript, jQuery, REST, GIT, Powershell, SQL, Azure, TFS, WTT and all Web development technologies
  • Strong communication and collaboration skills to work with people from a variety of technical backgrounds
23

Senior Security Test Analyst Resume Examples & Samples

  • Execute automated security testing using HP WebInspect
  • Perform manual security testing in accordance with the Macquarie security testing standards
  • Create security test plans to ensure application testing meets the eCommerce Security Testing Standard
  • Create, review and verify security assessment reports
  • Create and manage appropriate change and incident requests for security testing tasks
  • Manage and update service documents
  • Produce monthly business and risk reports
  • Manage security testing assets by ensuring that software tools are up-to-date and database and disc storage are properly maintained
  • Provide timely and accurate reporting of test progress, risks & issues
  • Provide feedback and coaching to junior members of the team
  • Conduct trainings and other knowledge sharing activities across the organization
  • Work with different account teams on scheduling, estimation and managing testing activities
  • Manage security testing schedule and keep track of monthly recoveries information
  • Work with the development teams and business groups in analysing applications to find security vulnerabilities and exploits
  • Promote the service within the organisation and facilitate its future development and expansion
24

Technology Senior Security Specialist Resume Examples & Samples

  • Minimum 10 years of practical technology experience with 7 years in an information security discipline
  • Must have experience in digital analysis, such as computer and network forensics
  • Ability to investigate complex scenarios and solve problems
  • Familiar with DLP platforms
  • Certifications and training in incident response, computer forensics and related is preferred
25

Senior Security Specialist, Data Protection Resume Examples & Samples

  • Collect metrics, conduct risk assessments and consulting,
  • Deliver on risk management objectives; identification, classification, analysis, delivery, and consultation with stakeholders
  • Oversee the updates to The Walt Disney Company’s GIS Risk Scorecard and own driving risks down
  • Own reports out to senior staff members and executives on a regular basis
  • Own operational metrics associated with the conduct of day-to-day business processes in support of IT Security Risk Management consulting across the enterprise
  • 5 years of IT experience in three or more areas (i.e.public cloud infrastructure, secure application development, virtual network, big data, elastic compute, cloud security)
  • 3 years of practical information security experience in a large enterprise
  • Experience managing IDS / IPS / firewall systems in an enterprise environment
  • Detailed understanding of TCP/IP and communication protocols, Windows authentication mechanisms (Kerberos, NTLM, AD), networking technologies, software defined computing, containerization, routing and switching, big data, elastic compute, and risk analysis and risk management methodologies
  • Excellent communication skills, including risk and metrics reporting
  • Experience with connected technologies such as public cloud infrastructure, internet of things, sensors/integrated platforms, SCADA systems
  • Two or more senior Information Security certifications (e.g. CISSP, OSCP, or GIAC) preferred
  • BS degree in Computer Science, MIS, Computer Engineering, or equivalent work experience
26

Engineer, Senior Security Resume Examples & Samples

  • Network and endpoint security management, access/authorization controls. (50%)
  • Application and data security management. (25%)
  • Penetration testing, incident response. (15%)
  • Other duties as assigned. (10%)
27

Senior Security Response Engineer Resume Examples & Samples

  • Significant demonstrable experience as a security engineer and a penchant for vulnerability analysis
  • Ability to read code (C/C++, Java, Ruby, Scala, Go)
  • Bachelor’s degree in Computer Science; Masters is desirable
28

Senior Security Master Resume Examples & Samples

  • 5-10 years of Security Master and Pricing experience
  • Specific knowledge and familiarity with a wide range of pricing vendors
  • Intricate knowledge of a wide range of security types, including OTC and Derivative products
  • Experience creating logical, efficient and controlled workflows with large data sets
  • Proven track record of successfully managing a dynamic team
  • Demonstrated understanding of relational databases
29

Senior Security Specialist, VM Resume Examples & Samples

  • Support execution of vulnerability management programs through meeting facilitation, activity measurement, customer engagement, and program education
  • Vulnerability Assessment and Treatment Analysis: Evaluate infrastructure and application security vulnerabilities and communicate risk-based treatment expectations
  • Reporting: Vulnerability management program effectiveness and efficiency and perform targeted historical analysis
  • Minimum Security Baseline Configuration: Work with Security Architecture and technology stakeholders to inform the development of Minimum Baseline Standards for secure configuration
  • Proven knowledge of data center infrastructure technologies is required: Windows and Linux operating systems, clustering technology, data storage solutions, middleware technology, and monitoring technologies
  • Excellent communication abilities, both written and verbal, with the ability to clearly and successfully articulate complex issues to a variety of audiences and teams
  • Ability to investigate and analyze complex scenarios and solve problems in innovative ways
  • Able to produce and review process and procedural documentation, including knowledge base articles, workflows, and overview presentations, all with great attention to detail
  • BA/BS in information technology, computer science, computer engineering or equivalent
30

Senior Security Manager, Policy & Awareness Resume Examples & Samples

  • Develop strong working relationships with technology and business partners across a global organization that are impacted by the capture, storage, processing, dissemination and security of information
  • Provide training and leadership as well as manage IT and IS teams composed of internal and external resources
  • Chair policy governance council
  • Continue to build and enhance secure application design and development policies and practices
  • Enhance technical operational procedures to improve efficiency of the assessment process for testing and reporting on control objectives and standards defined in ISF
  • Develop and maintain security policies and procedures including, but not limited to, incident response plans, business continuity plans, secure SDLC, ISF etc
  • Coordinate and liaise with Legal teams to support operational, legal, and regulatory requirements such as Data Privacy, Safe Harbor, PII, etc
  • Drive strategy for security incident management and identify opportunities to improve visibility and sophistication of response capability for user awareness
  • Implement organization-wide security awareness initiatives and provide timely information to employees and leadership regarding new and emerging threats
  • Work with relevant stakeholders to develop IT security policies and controls
  • Collaborate with all teams to communicate and enforce security controls
  • Create technical standards to guide engineering teams on installation and configuration of new technologies toward adoption of best practices and in compliance with existing policies and standards
  • Creating the information security training and awareness strategy and plan
  • Building out a qualified core team of employee's, contractors and third party providers to execute the program
  • Develop and execute detailed project plans for training strategy and materials for all levels of the organization and be the subject matter expert for information security training, awareness and guidelines* Enhance, develop and evolve the existing current information security portal and newsletter programs
  • Develop and execute communication and marketing strategies focused on security policies, standards, and guidelines via all available channels including internal social media, email, online and print campaigns
  • Maintain and index a repository/library of content materials for training, communications, and marketing
  • Interpret and summarize technical information for presentation to non-technical business resources
  • Develops, integrates, improves, documents and implements process and procedures utilized for the team
  • BA/BS in Computer Science or related discipline required
  • Advance degree preferred
  • Certifications such as MCSE, CCNA, CCIE, CISSP, CISM, GIAC, CEH preferred
31

Senior Security Product Engineer Resume Examples & Samples

  • Uses advanced engineering skills and knowledge to solve complex development problems and achieve engineering goals
  • Applies security architecture, design and specifications through development, integration and testing at detailed levels
  • Works with security leaders to develop solutions and tools to mitigate potential security issues
  • Works from policies, guidelines and strawman documents to develop detailed engineering solutions with the product, development and integration teams
  • Guides development teams to engineer security into early phases of the SDLC
  • Must be able to lead security code review efforts
  • Presents issues with clear remediation path and impacts
  • Reviewer of vulnerabilities, failures and compromises
  • Provide regular reporting on projects and initiatives
  • Mentors team members
  • 7-11 years experience
  • 5+ years experience with software development lifecycles
  • Good natured and positive with people and a team player
  • Must have strong problem-solving skills
  • Ability to manage multiple projects with strict timelines
  • Technology detail oriented to handle complex products, systems and networks
  • High degree of initiative and be well organized
32

Senior Security Solution Specialist Resume Examples & Samples

  • Responsible for the attainment of Fiscal Revenue objectives
  • Prospects and qualifies both new and recurring business opportunities
  • Ownership of deal management
  • Develops strategies and tactics which leverage competitive advantage and profitability
  • Prepares and conducts formal group presentations at senior management levels
  • Develops and presents proposals including cost justification, business case and technical portion of response for integrated solutions which represent high value for the Customer and profit for the company
  • Leads the creation of Customer offer process (internal business case) and manages approval steps
  • Leading and negotiating revenue opportunities for all service elements (such as SLA’s, DRP, Maintenance, etc.) working with Service Management
  • Responsible for engaging and supporting Client Executives for new business development opportunities
  • Provides expert consultation on security concepts, products and services
  • Spends the appropriate amount of time continuously learning by researching and learning new technologies, both internally and externally, to provide single point of contact to the Customer in the sales process
  • University degree in Engineering, Computer Sciences or Business
  • Industry Security Certifications preferred: I.e. CISSP,
  • Experience in the ICT industry selling security solutions to Enterprise Customers
  • Ability to prospect and identify opportunities while developing strong Customer relationships
  • Adaptability and flexibility
  • Demonstrated strength in understanding and influencing team dynamics vision and full grasp of business issues
  • Ability to keep up to date on industry security trends such as Cyber Threat Intelligence (CTI), Cloud Security, etc
  • Able to work in a fast paced team environment
  • Business acumen
  • Solution selling experience
  • Superior sales skills (prospecting, qualifying, negotiating, closing)
  • Technical breadth coupled with depth (typically acquired through a minimum of 3 years of experience) and solution selling in one or more of the following areas
  • Managed security services: DDoS, Managed Firewalls, IDS/IPS, SIEM, SOC, etc
  • Professional Services: Vulnerability Assessments, Penetration testing, Security assessments, Consulting, Integration, Outsourcing, etc
  • Reselling security solutions utilizing vendor partnerships: Cisco, Fortinet, Checkpoint, HP, Palo Alto, Symantec, etc
  • Value added Services: Cross sell Bell’s product and services portfolio
33

SOC Senior Security Specialist Resume Examples & Samples

  • Help remediate security incidents by interfacing with internal customer teams and other tool vendors
  • Perform log analysis, use of IDS, IPS, and/or other signature technology. Manage and maintain the log management and threat analysis solution
  • Knowledge to manage and troubleshoot Fortigate devices, Cisco ISE, Snort, Juniper UTM’s, Barracuda, SecureVue EIQ and Checkpoint devices
  • Extensive experience creating alerts, dashboards, and reports. Ability to document processes and procedures alongside cross training the rest of the team
34

Senior Security Architect Tegra Resume Examples & Samples

  • Collaborate across the company to guide the direction of mobile security, working with hardware, software, research and product teams
  • Research, design, and develop architecture solutions meeting internal and external security requirements and standards
  • Architectural modeling, validation, microarchitectural definition, following standards bodies, and developing infrastructure for hardware security verification
  • Work with customers, partners to identify and address security issues and threats
35

Senior Security Information & Event Management Administrator Resume Examples & Samples

  • Knowledge of network security infrastructure
  • Knowledge of patch management
  • Knowledge of Systems Administration, Middleware, and Application Administration
  • Knowledge of Network and Network Security tools administration
36

Senior Security Egrc Solutions Consultant Resume Examples & Samples

  • Defining customer requirements for Security Solutions with a focus on eGRC but may also include Identity Management solutions and/or Infrastructure Protection solutions i.e. Firewalls, VPNs, VOIP, Intrusion prevention/detection, Access controls, Perimeter security, Secure content including Network Access Control (NAC), Data Loss Prevention (DLP), Security Information and Event Management (SIEM), etc
  • Developing detailed architecture plans, performing requirements analysis and producing design documents including functional and technical specifications
  • Providing technical support services to develop and maintain integrated security solutions
  • Designing and building processes, workflows, and technical requirements for eGRC solutions such as RSA Archer
  • Determining system architecture specifications and working parameters for hardware/software compatibility
  • Providing hands-on integration leadership coaching to other technical team members
  • 7+ years in IT with a minimum of 3 years of demonstrated experience in providing detailed technical architecture expertise on Security Solutions within large corporate environments with a focus on solution implementation
  • Gather and translate business requirements to technical solutions and ensuring customer needs are well represented
  • Designing and building processes, workflows, and technical requirements for RSA Archer and other eGRC Solutions
  • Willing to attain and maintain technical certifications with our major vendors
  • Experience with eGRC software or other enterprise COTS software (CRM, ERP, etc)
  • Knowledge of core information security concepts related to Governance, Risk and Compliance
  • Bilingual an asset
37

Senior Security Data Analyst Resume Examples & Samples

  • Gather report requirements from Portfolio Managers and other front office investment team members
  • Assist in creating and scheduling attribution and analytics reports within Barclay’s POINT
  • Run ad-hoc report requests from the front office users
  • Review and resolve system errors
  • Perform data validations and resolve data discrepancies to ensure accuracy of Barclay’s POINT system
  • Project support – understanding requirements, data flows, system needs and testing
  • Production support – Day-to-Day Involvement of data flows and systems from/to Barclay’s POINT
  • Set up of complex Fixed Income securities within POINT, including creating security models, pre-payment schedules and updating security reference data
  • Ability to troubleshoot data analytics and identify and resolve portfolio performance issues
  • Thorough research of issues and execution of solutions
  • Identify and assist in the implementation of business process improvements
  • Documentation of SOPs
  • Coordinate priorities with Business Groups, Accounting, and IT
  • Interact and build relationships with multiple areas of the company
  • BA Degree required
  • Minimum of 5 years business experience in the Financial Services/Asset Management industry
  • Experience in Security Reference Data required
  • Strong knowledge of Security types (such as Fixed Income, Equities, Options, Credit Default Swaps, and Credit Default Exchange) is required
  • Understanding of portfolio/security data analytics (Yields, Duration, Convexity, Spreads) is required
  • Strong business and technical background with portfolio accounting, security pricing, and understanding of corporate actions across all fixed income asset classes and complex derivative securities
  • Bachelor’s Degree in Business Administration, Economics, Finance, and Information System desired
  • Knowledge of Barclay’s POINT Preferred
  • Experience with Bloomberg
  • Understanding of portfolio performance and attribution
  • Intermediate Microsoft Office skills and basic SQL knowledge preferred
  • Strong communication (verbal and written skills), relationship skills and client service skills
  • Strong understanding of business control functions
  • Show initiative and demonstrate ownership
  • Strong analysis, problem-solving, and strategic thinking skills
  • Must be able to multi-task and demonstrate an ability to prioritize multiple items
38

Senior Security & Networks Engineer Resume Examples & Samples

  • Cisco Ironport
  • F5 product set
  • Checkpoint product set
  • CyberArk
  • Symantec Product set (DLPSEP, SIEM.)
39

Senior Security Managing Consultant Resume Examples & Samples

  • Providing hands-on consulting services to clients offering appropriate levels of information security
  • Conducting risk assessments and information security program assessments
  • Interpretation of information security policies, standards, and other requirements
  • 7+ years of experience in Information Security Consulting
  • Negative Vetting Level 1 (previously Confidential) as a minimum
  • Negative Vetting Level 2 (previously Top Secret Negative Vetting Level 2) viewed positively
40

Workplace Technology Senior Security Design Engineer Resume Examples & Samples

  • Working with infrastructure teams to assist architect in design of new systems, upgrades and enhancements following High Level and Detailed Design standards
  • Overseeing and being accountable for quality of solutions deployed by the team
  • Providing input into strategic direction of desktop security services, using industry trends, experience and existing knowledge
  • Engagement with workplace teams around security requirements and consulting for workplace projects
  • Maintaining relationships with Macquarie business users and the wider global IT team
  • Point of escalation for level 3 support queries and assistance
  • At least 5 years' experience in the IT industry, with at least 2 in a design-focused role
  • Understanding of designs at a high level and detailed level, and interactions with infrastructure technologies and their impact on solutions
  • Good understanding of architecture and design principles
  • An understanding of Service Management including change, incident and problem management as it applies to a large corporate environment and use of an ITSM tool such as Remedy
  • Exhibit technical credibility with both IT and business stakeholders
  • Ability take initiative, work independently, and manage tasks to a timeline
  • Detailed knowledge and experience of McAfee Desktop Security products including ePolicy Orchestrator, VirusScan Enteprise, Host Intrusion Prevention, Host Data Loss Prevention
  • Experience with Avecto Privilege Guard and Avecto Defendpoint
  • Sound knowledge of Active Directory, Group Policy and DNS
  • Microsoft SCCM 2007 / 2012
  • Microsoft SCUP
  • Microsoft InTune
41

Senior Security Architect Data Protection Resume Examples & Samples

  • 10+ years' demonstrated experience in designing and implementing technology and process solutions to reduce the potential risk of data compromise
  • Experience in delivering comprehensive architecture specifications for complex security​ issues
  • Demonstrated ability to integrate various security and data protection technologies and controls into a cohesive architecture that sufficiently mitigates risk
  • A high-level understanding of modern information security concepts including network intrusion, vulnerability exploitation, data exfiltration, and social engineering
  • Experience in the design and implementation of full lifecycle data management strategies
  • Understanding of the entire ecosystem of data protection including strong knowledge and domain expertise, implementation, and/or integration in four or more of the following domains
42

Senior Security Architect / Engineer Resume Examples & Samples

  • 7+ years of previous Security Architecture and Engineering experience
  • Bachelor's and/or Master's Degree in Computer Science and/or a related field
  • Extensive Technical Cyber Security experience with Software
  • Previous experience with Linux, Windows , and TCP/IP solid fundamentals
  • Substantial experience working with PCI compliance, Rapid7, Web Firewalls, Splunk, Akamai security suite, AWS -IAM Policies, and Incident response processes
  • OO programming experience in Python, C#, Ruby, etc
  • Experience with AWS, Cloudformation, Terraform and any additional AWS automation tools
  • Experience with NIST80053/66 / OWASP
43

Senior Security Solutions Consultant Resume Examples & Samples

  • Perform network and wireless network penetration testing
  • Perform web application penetration testing
  • Use of various methodologies used in Attack & Penetration testing
  • Perform testing using OWASP and Secure SDLC standards
  • Coordination and delivery of ongoing quarterly enterprise scans
  • Meeting with clients to present and disclose scan findings
  • Ongoing development, maintenance and management of our existing security testing lab environments
  • Management of client expectations and timely resolution of issues that may arise
  • Perform Incident Response Reviews for Bell’s clients
  • External Relationships
  • University degree or equivalent business experience
  • Excellent communication skills in English and French (spoken and written)
  • Proven experience using OWASP and Secure SDLC best practices
  • Comfortable with
44

Senior Security Engr Resume Examples & Samples

  • Consult engineer on security requirements and utilize best practices to meet them
  • Engage in domain-specific threat modeling and attack surface analysis/reduction
  • Work with the Cloud Infrastructure and Platform teams to lead initiatives and develop and build security utilities and tools that will enable GE Software to operate more securely
  • Engineer Security solutions for Predix Cloud and the planning and implementation of risk mitigating security solutions
  • Build and maintain a robust infrastructure/platform security roadmap to meet customer demands and regulatory mandates
  • Prepare reports at appropriate levels of confidentiality for stakeholders to view
  • Responding to customer-facing departments about Predix security posture
  • Responding promptly and in detail to customer-sponsored penetration tests
  • 3+ years of experience in threat management, vulnerability management, and information protection in a cloud environment
  • 3+ years of experience in cloud infrastructure and platform security solution consulting, engineering, and assurance
  • Partner with product owners in requirement gathering and vetting
  • Foster a collaborative and cooperative team environment, encouraging input and participation from all members
  • Experience in cryptography, network security or systems security
  • Platforms using hardware security modules (local HSMs), SafeNet, Thales
  • Experience with or willingness to learn about semiconductor and OEM systems
  • Deep understanding of security tools and technologies
  • Experience in large enterprise and cloud environments
45

Senior Security Engr Resume Examples & Samples

  • Consult architect on security requirements and utilize best practices to meet them
  • Engage in application and domain-specific threat modeling and attack surface analysis/reduction
  • Maintaining a backlog of security-related tools that will improve the maintainability and security of our code and the pace of development
  • Promotes standards through workshops, knowledge shares, and code walk-throughs
  • Produces content for training developers on secure coding
  • Provides guidance on automated testing tools and techniques
  • Bachelor's Degree in Computer Engineering or in a STEM major (Science, Technology, Engineering, or Math) and/or a minimum of 3 years of equivalent experience
  • 2+ years of experience in security development life cycle
  • At least 2 years of experience involvement with development team(s) that delivered software based services
  • Experience with auditing and risk assessments
  • Experience with Security Development Lifecycle processes such as Threat Modeling desired
  • Experience with or willingness to learn about DevOps and Agile development practices
  • Good understanding of security tools and technologies to facilitate secure development
  • Experience in large enterprise environments
46

IT Audit / IT Senior Security Consultant Resume Examples & Samples

  • Plan, execute, direct and complete IT audits
  • Identify and assess information system related risks
  • Participate in technology and security audits against industry standards such as NIST, ISO, COBIT, etc
  • Assist in designing test plans to evaluate control objectives and identify weaknesses in the information technology control structure
  • Understand and manage firm risk on audits and proposals
  • Minimum of three to five years of overall direct IT audit experience performing hands-on information security risk assessments, vulnerability assessments through the incorporation of automated scanning and audit tools, as well as performing IT General Controls in support of SOX 404 compliance, Application Controls and security audits
  • Minimum of two years of direct Information Security experience performing hands-on information security risk assessments and vulnerability assessments such as for PCI and GLBA, HIPAA, or FFIEC compliance
  • Strong experience in staff and audit management in an integrated client service team
  • Exceptional client service and communication skills with a demonstrated ability to develop and maintain outstanding client relationships
  • Ability to work with limited supervision
  • CISA or CISM or CISSP required
  • Proficient knowledge of Cloud Security Framework, NIST 800-53/NIST 800-37, FISMA, Certification and Accreditation (C&A), FISCAM, OMB A-123 is desirable
  • ITIL, ISO 27001/2, PCI QSA, ASV or equivalent certification a plus
  • Background and understanding of the risks and controls in technologies such as client/server, various applications of logical security, open systems architecture, data warehousing, and imaging is desirable
  • Proficient understanding of ERP systems, Operating Systems, Databases, and Network Infrastructure components is desirable
47

IT Audit / IT Senior Security Consultant Resume Examples & Samples

  • Adhere to the highest degree of professional standards and strict client confidentiality
  • Manage, direct, and monitor client services teams on multiple engagements
  • Develop a project vision and set challenging personal and client service team goals
  • Minimum of five years of overall direct IT audit experience performing hands-on information security risk assessments, vulnerability assessments through the incorporation of automated scanning and audit tools, as well as performing IT General Controls, Application Controls and security audits
  • Minimum of three years of direct Information Security experience performing hands-on information security risk assessments and vulnerability assessments such as for PCI and GLBA, HIPPA, or FFIEC compliance
  • LI-BL1
48

Senior Security Processing Analyst Resume Examples & Samples

  • Trade processing and settlement
  • Failed and unmatched trades monitoring, follow-up, resolution
  • Inquiry and problem resolution
  • Preparation of reversals / corrections
  • Control on future trades that have already been booked (pre-matching)
  • Follow-up on discrepancies/problems detected at this stage
  • Solving of reconcilement issues
  • Funding
  • External and internal transfers processing
  • Handle interest claims
  • Process reversals / corrections requested by RM’s
  • Check & reconciliation of items under your name assigned by the reconcilement dept
  • Static data maintenance
49

Senior Security Engineeer Resume Examples & Samples

  • Supporting adherence of IRM’s systems to evolving security requirements and policies
  • Plan, implement and manage DoS Continuous Monitoring Program
  • Evaluating emerging technology (e.g., social media, mobile computing) and makes recommendations to support the DoS continuous monitoring efforts
  • Enhance continuous monitoring capabilities by identifying technical and non-technical security controls assessment process for automation. Identify potential data sources, data processing methods, and tools; engineer workflows; perform trade analysis and work with engineering and operations staff to implement solutions in productions.  
  • Bachelor’s degree in a technical or engineering related discipline or equivalent experience; and 8+ years of relevant experience. 4 years of experience may be substituted in lieu of a degree
  • Self-starter with ability to identify tasking, present solutions, and coordinate implementation
  • Understanding and knowledge of programming and/or scripting
  • Microsoft Certified Engineer (MSCE)
  • Security certifications including, but not limited to
  • Certified Information Security Manager (CISM)
  • Understanding and experience with big data, analytics, correlation, and data mining
  • Understanding of National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37 and 800-53 as well as other NIST, Committee on National Security Systems (CNSS), and Office of Management and Budget (OMB) mandates
  • Working knowledge and understanding of virtualization products
  • Working knowledge and understanding of Active Directory, SMS/SCCM, and databases
50

Senior Security Architect IT Engineer Resume Examples & Samples

  • Responsible for envisioning and taking steps to implement the controls needed to protect both Diebold assets as well as information and assets that have been entrusted to Diebold by third parties or customers
  • Acts as a central point of contact within Diebold when it comes to security architecture
  • Responsible for the architecture security of systems, solutions and products at a global level
  • Reviews and provides guidance and recommendations for product design, infrastructure, and network configurations as it pertains to security
  • Establishes and maintains strong working relationships with Diebold business units involved with security matters (Legal Department, Internal Audit Department, Financial Controls and Compliance, Human Resources, Information Technology, Global Risk & Security, etc.)
  • Understands the fundamental business activities performed by Diebold, and based on this understanding, provides recommendations for appropriate security solutions that adequately protect these activities
  • Stays informed about the latest developments in the security field, including threats towards the organization, tools, attack vectors, and cutting edge preventive measures
  • Bachelor's degree required, Master's degree preferred
  • Minimum 6 - 8 years of technical experience in the security aspects of multiple computer platforms, operating systems, software products, network protocols and system architecture. Emphasis is on system and security architecture
  • Experience working in a team environment and taking a leadership role when performing security related work
  • Knowledge of security and enterprise architecture frameworks like; SABSA and TOGAF
  • Knowledge of application penetration assessments, threat models, security code reviews, and integration of security testing methodologies within corporate SDLC practices
  • Experience with security software such as vulnerability scanners, IDS/IPS, WAFs, HSMs, and penetration testing toolkits
  • The ability to communicate with multiple business units and business owners in order to facilitate a strategy around security
  • Experience with infrastructure design and security related specifications
51

Senior Security Specialist / Architect Resume Examples & Samples

  • Evaluate information gathered from multiple sources, reconcile conflicts, decompose high-level information into manageable details and distinguish user requests from the underlying true needs
  • Ensure planning, design and implementation processes to meet or exceed business goals and objectives
  • Collaborate with external and internal customers to analyze information needs and functional requirements and deliver the artifacts as needed
  • Engage in multiple initiatives simultaneously. Work independently with users to define concepts and under direction of the chief architect and project managers
  • Translate complex functional, technical, and business requirements into architectural designs
  • Coordinate between business and IT stakeholders to develop a solution architecture approach
52

Senior Security Automation Engineer Resume Examples & Samples

  • Be passionate about automation and avoiding doing things manually
  • Create, maintain and share technical documentation used by engineers and other team members
  • Develop secure coding practices and provide hands-on training for systems and network focused development teams
  • Building robust security strategy through analysis, consensus building, and ultimately ambition to really make the case for a fundamentally security foundation of the Thunder IoT Platform
  • BS or MS in Computer Science or equivalent experience
  • Strong knowledge of public cloud security hardening
  • Deep understanding of fundamental technologies like DNS, Load Balancing, SSL, TCP/IP, SQL, HTTP
  • IDS, App Sec, Network Sec, firewalls, pen testing, fuzzing, spoofing, repudiation DDoS, perimeter monitoring, formal policies, and human behavior
  • Educated and continually learning about latest emerging threats and defenses
  • Experience with large-scale security incidents and managing them, including communication with internal and external stakeholders, while maintaining clarity in a chaotic situation
  • Experience working with stakeholders proactively on every facet, and the ability to compose thoughtful, understandable analysis that provides clear communication of what happened, reactive steps, and future proactive steps to ensure our customers that we genuinely take security seriously and doesn't panic when in the hot seat of an ongoing incident
  • Know some of those hard problems that are unique to IoT ecosystems and has some ideas on approaches thought of already on how they would solve them
  • Thinking outside of general scope, include human behavior
53

Senior Security Adjudicator Resume Examples & Samples

  • Minimum 15 years of 1811 federal law enforcement experience as a former agent
  • Minimum five years directly-related analyzing investigations, record checks, and other information as necessary for the purpose of making a written record of the accuracy and completeness of the investigation and to enable an accurate security adjudication decision
  • Candidates will analyze and investigate all necessary information for the purpose of determining the final decision on the adjudication of clearances
  • Working knowledge of Microsoft Office software applications (Word, Excel, Outlook, PowerPoint)
54

Senior Security Policy Resume Examples & Samples

  • Perform as a Security Policy/Compliance analyst
  • Work onsite with the customer’s technical teams and leadership to build relationships and find ways to leverage and maximize technical investment recommendations
  • Assist with RFP technical proposal responses, as needed
  • Assist Cloud Architects in establishing a strategy and approach to transform customer infrastructure and development environment to a Cloud based solution
  • Developing Security Policies and/or ensuring Security Compliance for Cloud implementations
  • Drive security requirements for the customer, integrating multiple capabilities and scenarios supporting the cloud implementations
  • Provide Security Policy and/or Security Compliance expertise to managers and technical staff, and the customer
  • Function as a Security Policy and/or Security Compliance expert on project assignments, and must possess the ability to apply a comprehensive knowledge across key tasks and high impact assignments
  • Plan and lead Security Policy and/or Security Compliance assignments, with the potential to supervise others in doing so
  • Demonstrates strong oral and written communication skills, with the ability to communicate technical topics to management and non-technical audiences, as well as interface with the senior customers on a daily basis
  • Ensure HIPAA violations do not occur within the program by taking a proactive role in the constant vigilance and rigor to emphasize HIPAA compliance throughout all levels of the program (systems, personnel, and data). To be fully aware of all PHI/PII within their respective program and how it is protected
  • Bachelor’s degree in Business, Computer Science, Information Technology, Information Systems, Systems Engineering, or related disciplines and 14 years of related experience; Master’s degree in Business, Information Technology, Information Systems or related disciplines and 12 years’ experience; PhD in Business, Information Technology, Information Systems or related disciplines and 9 years’ experience; or 18 years of experience will satisfy the education and experience requirement
  • 8+ years of experience working as a Security Policy or Security Compliance as a Cyber Security, IT Security, or Information Assurance analyst
  • 5+ years of experience with developing security policies, processes, and procedures in the federal government
  • 5+ years of experience with assessing new security laws, policies, or standards to determine program-level impact
  • 5+ years of experience with the NIST Risk Management Framework and SP 800 issuances, continuous monitoring, and information system security policies, standards, and procedures
  • Must have a solid understanding of cloud deployment, security policy requirements and assessments, and service models as defined by the National Institute of Standards and Technology (NIST)
  • Ability to perform an IT audit and develop a comprehensive risk assessment process; on multiple CSPs and services offerings such as Microsoft Office 365 and SharePoint
  • Ability to obtain a position of public trust
  • Must be US Citizen or US Permanent Resident
  • Security+ Certification or other Professional security or auditing certifications a plus: CISSP, CISA, GIAC, SSCP, CIPP, CIA, CSCS
  • Technical awareness of FedRAMP, FISMA, NIST, RMF and Federal Government Certification and Accreditation (C&A) process
  • Experience with responding to external audits and developing remediation plans
55

Senior Security Manager Resume Examples & Samples

  • Anticipate, design and execute plans within a dynamically changing environment, including the flexible deployment of resources based on both routine and evolving operational priorities and emergency situations
  • Directly engage with leaders and cast to provide the direction, expectations, information, staffing and resources needed to deliver on the mission to serve and protect while achieving the highest level of guest service
  • Maintain a positive, collaborative and productive workplace environment by quickly identifying, engaging in and resolving conflicts, fostering trust, and leading through cast relations decisions
  • Make decisive, sound, high quality decisions on escalated security issues, accurately judging the urgency, response, and need for further escalation
  • Utilize metrics to continuously monitor and evaluate the efficiency and effectiveness of security methods, procedures and team performance, identifying opportunities for improvement and making recommendations for enhancement
  • Build superior relationship and collaborative partnerships with peers, clients, supporting law enforcement agencies and corporate resources. Foster these relationships through inclusion, information sharing and teamwork
  • Develop and grow team members thru mentoring, coaching, developmental opportunities and feedback
  • Maintain a strong connection to industry trends and best practices to advance and grow a world class operation
  • Responsible for assisting in the development of Annual Operating Plan and accomplishment of area goals within plan
  • Lead in the development of a culture of safety
  • 10 years of experience in a Security leadership role leading multi-faceted teams
  • Knowledge and ability to direct the operations, services and activities of a comprehensive security program and team
  • Tireless, diligent and dedicated leader, driven to deliver
  • Readiness and comfort with being in the position of decision making, demonstrating an exceptional level of judgment
  • Actively engages when there is conflict, bringing resolution and composure
  • Future-focused with the ability to set direction, rally a team and move work across the finish line
  • Demonstrated ability to develop deep cast relations resulting in a culture grounded in trust, fairness and teamwork
  • Solid record of bringing others along, sharing information and building trusting relationships
  • Strong written communications with emphasis on security assessments, analysis and reporting
  • High effective oral communicator with a positive leadership voice, ability to influence and readiness to communicate direction
  • Ability to maintain extreme confidentiality of sensitive information
  • Demonstrated strong analytical skills and comfort with using metrics to manage the business
  • Demonstrated ability build and develop a team with an eye for talent and an inherent coaching style
  • Ability to work with a dynamic and diverse team is essential
  • 3 years experience as a leader of leaders
  • Demonstrated knowledge of Walt Disney World’s Security policies and procedures
  • Demonstrated knowledge of Walt Disney World’s property and resources
  • Experience in managing a proprietary guard force in a hospitality industry
  • Knowledge of and experience with leading edge integrated access control technologies and practices
  • Knowledge of and experience with leading edge crisis management, emergency preparedness planning, response and business continuity
  • Knowledge of and experience with leading edge people and package screening technologies and practices including canine programs
  • Working knowledge of Investigative and Intelligence services, private, and government organizations and an active network of contacts and partnerships within those organizations
  • Knowledge of Florida State Statutes and experience interacting with law enforcement
  • Experience in interacting with executives in a Fortune 500 Companies
  • Valid ASIS Certified Protection Designation
56

Senior Security Solutions Sales Executive Public Sector Resume Examples & Samples

  • Partner to identify, develop, and close additional opportunities at existing clients & work with sales team to close
  • Identify all the key technical influencers and present the Verizon value proposition to executive level clients
  • Possess the skills necessary to clearly articulate Verizon value proposition to all levels within a customer's organization
57

Senior Security Consultant Engineer Resume Examples & Samples

  • Problem/Query resolution -
  • Provide exceptional support capability from a systems, network and application level, ensuring to extend general knowledge within a dynamically changing customer environment
  • Extend beyond logical debugging capability using existing and developing analytical skills on general cryptographic technologies
  • Focused delivery on resolution of issues within a high degree of customer satisfaction, technical expertise, business acumen and timeliness
  • Follow operational process and procedures as per the existing and continually adapting function of a global support centre
  • Interact with 3rd party vendors on both a technical and professional level
  • Provide expert and creative solutions for problems reported on Cybertrust Products to ensure external and internal customer satisfaction and productivity
  • Coordinate escalation of user, product and support issues among sales, product development and marketing to ensure timely distribution of knowledge and positive impact on customer satisfaction and productivity
  • Where necessary replicate customer environment/issues on GSS test lab
  • Where escalation to engineering is required, provide detailed diagnostic information including problem origination theories, environment configuration, debugging output and relevant logs and traces
  • Ensure regular feedback is provided on problem status to customers, GSS Management where issue is a P1 or P2 and to relevant development and product management staff and co-ordinate problem fixes/patches when available
  • Research, resolve, and respond to complex questions received via Operations Analysts, Call hand over, callbacks or escalations from the field, and provide support on electronic services, in accordance with current standards
  • Research, develop or recommend, and test diagnostic tools and aids for improving diagnostic capability relative to developer tool set
  • Perform monitoring and hands-on management of Hosting systems globally, related to security services
  • Technical Degree or equivalent experience
  • Minimum five years in appropriate technical roles
  • Experience in python,
  • Solid Understand IP v4/v6, Routing, NAT, GARP, OSPF
  • Strong hands-on knowledge of operating systems (particularly MS Windows, Linux), general databases SQL (Oracle) skills and application integration using MS Auto-enrol
  • VM aware, vCentre, vMotion
  • Ability to work in a truly global environment
  • Good application diagnostic hands-on skills at process and thread handling level
  • Solid customer relations and inter-communication skills, both written and verbal
  • Applied team communications and interpersonal skills
  • General presentation skills
  • Familiarity with Network Security, including Firewalls, SecureID and relating products (RSA’s Managed One Time Password.)
  • Familiarity with Python, Java, LDAP’s, PKI, HSM’s
58

Senior Security / IA Engineer Resume Examples & Samples

  • Experience performing security requirements analysis, decomposition and allocation to HW and SW
  • Experience with defining and evolving HW and SW security architectures
  • Familiar with Program Protection Plan (PPP) required by DoDI 5000.02 and DoDI 5200.39
  • Active or recent CISSP or equivalent Certification
  • Demonstrated technical leadership experience
59

Big Data-senior Security Architect Resume Examples & Samples

  • Pro-actively research and Identify network and system vulnerabilities and provide recommended counter measures or mitigating controls to reduce risk to an acceptable and manageable level
  • Perform big data analysis and security analytics to model, simulate and detect attack scenarios and anomalies
  • Perform end-to-end threat modeling of complex systems and solutions and generate detection frameworks/signatures to detect threats/anomalies
  • Build, maintain and manage large scale big data analytics frameworks and systems
  • Establish SIEM and data aggregation/correlation capabilities for data obtained from security sensors and end points
  • Develop and automate scripts, tools and resources needed to advance ethical hacking capabilities around new and emerging technologies like mobile, cloud and embedded systems
  • Actively involved in security research around new and emerging technologies
  • Provides second- and third-level support and analysis during and after security incidents
  • Research and assess new threats and security alerts and recommend remediation actions
  • 5-6 years of combined job or research experience (academic)
  • Expertise in security analytics, signature development, APT emulation and advanced threat modeling
  • Experience in big data analysis, map reduce and Hadoop frameworks
  • Well versed in statistical modeling and statistical programming languages like R, SAS etc
  • Prior experience or expertise in network data/protocol analysis
  • Hands on experience in encrypted traffic and network protocol analysis to detect malware behavior, botnets and malicious activities
  • Strong understanding of cryptographic concepts and applied cryptography (SSL, AES etc.)
  • Good knowledge of OS internals, kernel modules and system authentication/process frameworks of windows and linux operating systems
  • Knowledge of or experienced in exploit development, vulnerability research/reporting or writing system modules in C & C++
60

Senior Security Architect ICS Resume Examples & Samples

  • Drive technically the implementation of OT-system security controls in our manufacturing sites (network segmentation, malware protection concepts)
  • SPOC for cyber security topics (incidents, operational issues etc.) for assigned OT Systems – for global and local organizations
  • Membership in internal / external security committees within IT/OT security
  • Initiate, lead or support of Proof of Concepts before roll out
  • Effectively design security protection in Industrial Controls Systems environments across all of Novartis divisions
  • Trusted partner to Tech-Ops leadership team to ensure proper security protection of industrial controls systems
  • Ensures adequate protection design and operating effectiveness
  • Master degree in IT Engineering or Process Automation
  • Professional ICS / OT security certification like GICSP, or IT security certifications like CISSP
  • Languages: English written & spoken (required), additional languages a plus
  • > 8 year +in-depth experience of securing Industrial Control Systems(ICS) like PLC, SCADA, DCS, Serialization solutions
  • Ideally also experience in securing laboratory systems like chromatography, NIR, Raman and other laboratory including laboratory environmental equipment
  • Ideally a solid foundation in laboratory / ICS support which was build up with IT topics like network architectures, network protocols, industrial protocols, Active Directory, Backup processes, virtualization of applications and other general IT knowledge
  • Experienced in the use of tools for incident investigations, simulation and forensics
  • GxP regulations and CSV, 21 CFR part 11 in depth knowledge
  • Knowledge of related standards like IEC 62443, NIST 800-82
61

Senior Security Technical Program Manager Resume Examples & Samples

  • Five years of experience in Program Management or related field
  • Outstanding interpersonal skills; must display customer obsession, patience, humor and a can-do / whatever-it-takes resourceful and positive attitude
  • Experience and technical knowledge of security engineering, system and network security, authentication and security protocols, cryptography, and application security
  • Reliable with strong follow-through abilities with impeccable attention to detail
  • Seven years’ experience managing programs that delivery technology solutions to a global market
  • Master’s degree or equivalent experience
  • Demonstrated history leading technical teams and programs that identified security issues and risks, and developed mitigation plans for network infrastructures consisting of firewalls, routing & switching devices, peripherals, server/client dependencies, and mobile devices
  • Experience with driving policy implementations that streamlines execution and decreases redundancy
  • Knowledge of the National Institute of Standards and Technology (NIST) Cybersecurity Framework
  • CISSP, CISM or CEH certifications
62

Senior Security Vulnerability Engineer Resume Examples & Samples

  • Organize resources to build and perform vulnerability assessments of operating systems, applications, databases and network infrastructure components to detect, enumerate and classify major vulnerabilities for performing trend analysis and reporting to Enterprise customers through the use of vulnerability assessment tools and methodologies
  • Schedule and maintain security operations management of operating systems, security applications and network infrastructure components to provide security configurations, controls for user account access, monitoring of services, centralized logging, network connectivity, job scheduling execution and routine maintenance through the use of administrative tools and methodologies
  • Organize and perform vulnerability classification based on industry publications, attack vector analysis, and external intelligence
  • Coordinate resources for auditing of applications, operating systems and networks to provide a measurable technical assessment that includes interviewing staff personnel, performing security vulnerability scans, reviewing access controls or analyzing physical access to ensure availability, confidentiality and integrity to help the organization meet internal and external regulatory compliance (PCI, SOX, HIPPA, NIST)
  • Interpret the results of the attack and penetration testing of the HCA enterprise for information gathering, vulnerability detection, analysis and exploitation planning, and results reporting to remediate exploits and ensure confidentiality, integrity and availability of mission critical information assets
  • Mentor junior engineers in security knowledge and experience in technologies and methodologies as it relates to operating systems, firewalls, proxies, access controls, encryption, networking, programming/scripting, auditing, vulnerability assessments, and operations management to assist the team with effective research, data gathering, analysis, metrics reporting and communications
  • Provide guidance using specialized knowledge and toolsets to operational teams during enterprise wide crisis scenarios, e.g. large-scale production service outages, outside of the routine change management process
  • 5-7 years of applicable work experience is needed for a successful candidate
  • Comprehensive understanding of Security Methodologies
  • Advanced experience with TCPIP/UDP/ICMP
  • Comprehensive knowledge of the OSI Reference Model
  • Advanced experience with Networking components (routers, switches, load balancers, wireless access points, etc)
  • Comprehensive knowledge of firewalls, proxies, mail servers and web servers
  • Advanced experience with operational support for operating systems, applications and networks
  • Comprehensive knowledge of relational databases and structured query language
  • Advanced experience with vulnerability assessments
  • Comprehensive knowledge of malicious code (worms, viruses, spyware, etc.)
  • Comprehensive knowledge of enterprise-scale security assessment infrastructure
  • Advanced experience in automation and scripting of applications and systems systems i.e. Python, Perl, JavaScript, Splunk, Archer GRC
63

Senior Security Solutions Engineer Resume Examples & Samples

  • Significant programming experience with two or more of the following: Java, Ruby, Python, ECMAScript, Golang, Swift, and/or Objective-C programming languages
  • Strong experience with coding techniques and best practices for security, performance optimization, and ease-of-use
  • Comfort with macOS, Linux or other Unix-based operating systems
  • Phenomenal Debugging skills
64

Senior Security Consultants Resume Examples & Samples

  • Individuals should have worked on significant security projects for public sector organisations, financial services companies or Utilities
  • Candidates will have a thorough understanding of how business security risk and technical security risk is assessed and managed, including security policy and process development
  • Experience of secure design and operation of business systems is highly desirable
  • Regulatory compliance (financial, personal data, sector specific)
  • Identity management at a business level including
  • End to End User provisioning
  • Role Based Access Control
  • Single sign on capability
  • Multi-factor authentication
  • PKI, Token, Claims based and Federation
  • Remote access
  • On-line channel security
  • Customer/citizen registration
  • Infrastructure build and operation at network, operating system or application level
  • Security operations centres and Advanced Threat Analysis
  • Technology supporting fraud detection and data protection
  • Security products deployment and operation including
  • IDAM
  • DLP
65

Senior Security Application Engineer Resume Examples & Samples

  • Experience with managing MS SQL or MySQL database
  • In depth understanding of security related technology such as RFID, card readers, video analytic, iris or other type of biometric verification system
  • Certification in Lenel Onguard, Milestone and VidSys
66

Senior Security Hardening Engineer Resume Examples & Samples

  • An active security clearance is required
  • Ability to travel : Travel expectation 0%-25%
  • CISSP, CompTIA Security+, and CompTIA Linux+ certifications a plus
  • Requires excellent communication skills and ability to work with local and remote sites (including management)
67

Senior Security Architect / Consultant Resume Examples & Samples

  • Your primary responsibility will be to serve as a recognised subject matter expert and thought leader with deep expertise in security infrastructure and information security, and to use this expertise to perform assessments, presales work, act as trusted advisor to our clients, and participate in design and implementation projects
  • You will handle consultative engagements to deliver security infrastructure consultancy (e.g. security architecture review or design) and information security assessment services (e.g. security risk assessment), including
  • You have minimum a bachelor degree in ICT (Master strongly preferred); relevant certifications such as CCIE, CISM, CISA, CISSP, TOGAF and ITIL are considered a strong plus
  • You have at least 10 years’ experience in security solutions or related business
  • You have strong operational foundation and consulting experience, knowledge of industry technologies and willingness to further maintain and broaden this knowledge
  • You are fluent in French or Dutch and have good verbal and written knowledge of the other language as well as English
  • You have emotional and stress resilience and ability to autonomously achieve challenging goals
  • You have clear and persuasive communication and ability to interact with various stakeholders in a consultative engagement
  • You have analytical thinking and excellent problem solving ability as well as an appreciation for rigour and objectivity
  • You have good business acumen allowing identification of business opportunities and our clients’ business needs, and delivery of consultative engagements in line with these
  • You have strong personal initiative and a sense for innovation, to identify efficient and competitive solutions to our clients’ needs, as well as new types of engagements and solutions
  • You have the flexibility and willingness to travel if needed
  • You have strong ability to work as part of a team, and to drive or lead such teams where opportune
  • You are eligible and prepared to obtain NATO clearance if necessary
  • You are acting with integrity and commitment to Dimension Data’s core values of Clients, Teamwork, Professional Excellence, Innovation, Integrity, Respect & Diversity which is essential for a successful career
  • You are services- and business-focused
68

Senior Security Technical Architect Resume Examples & Samples

  • Research, evaluate, develop, and implement technology-related plans and technical design proposals for high impact IT solutions and their usage, involving leading edge technologies and methods; they consider key factors such as their long-term effectiveness (service delivery and cost), practicality, scalability, technical limitations and criticality
  • Perform the most complex and detailed technical intricacies necessary to establish IT systems infrastructure
  • Collaborate with technology leaders throughout the organization to gain insight into their plans/technical requirements; they influence architecture/technology direction and develop an integrated set of strategies/roadmaps which meet overall business goals. Will be responsible for working with cross-functional teams to define and implement enterprise-wide strategies and architecture/technology changes
  • Minimum of 10 years experience leading IT architecture, product development and/or infrastructure engineering domains
  • Maintains relevant technology certifications or mastery in one or more technology areas
  • Demonstrated experience collaborating with cross functional team and customers to define and implement IT architecture/technology changes
  • Previous experience successfully leading and influencing teams through significant technology, process and organizational change
  • In depth knowledge facilitating programs/projects and reaching decision on topics where there are conflicting priorities and/or philosophical opinions and point of view or approach - capable of pragmatic negotiation
  • Experience evaluating, selecting, and developing new products or services
  • Ability to identify, communicate about, and mitigate risk
  • Demonstrated knowledge and prior success developing and presenting financial/business case recommendations
  • Master’s degree in Engineering, Computer Science, or related technology area, preferred
69

Senior Security & AAA Engineer Resume Examples & Samples

  • Ensure security controls are implemented and operating effectively as part of solutions delivery
  • Engineer service request fulfillment processes
  • Liaise with Information Security partners to enforce compliance with all bank standards
  • Subject matter expertise across various enterprise identity authentication technologies ranging from AAA (RADIUS/TACACS), RSA, 802.1X technologies (Wired/Wireless), Active Directory, LDAP, NTLM, and token based systems
  • Identity authentication technologies, including Active Directory, LDAP, NTLM and RADIUS TACACS, RSA, 802.1X, NAC, and token based systems
  • Experience working with SSL Certificate Authorities, and certificate management
  • Working knowledge in proxy, load balancer, DNS, DHCP, firewall, IDS, IPS, SSL off loader, malware
  • Expert understanding of network protocols
  • Programming/scripting experience (Perl, Python or Golang)
  • Knowledgeable on network management and monitoring tools (HP NNMi, Syslog, Splunk, Entuity, Tivoli ITM, HPNA, Cisco CMCS, Netscout)
  • Excellent written and verbal communication. Ability to present at an executive level
  • Ability to interact with clients at all level, from the C-Level to IT individual contributor
70

Global Senior Security Consultant Resume Examples & Samples

  • Define and provide pragmatic security guidance and architectures that balance business benefit and risks
  • Act as security Subject Matter Expert (SME) with a strong technical understanding of private and/or public cloud offerings such as Microsoft Azure
  • Collaboratively define security configuration standards for internal and external cloud platforms and technologies
  • Engage IT project teams throughout the SDLC to identify and prioritize applicable security controls and provide guidance on how to implement these controls
  • Five or more years of experience in an Information Security or Information Technology discipline with demonstrated experience in one or more the following
  • Experience providing and validating security requirements related to a broad range of operating systems and databases
  • Experience conducting risk assessments, vulnerability assessments, vendor and third party risk assessments and recommending risk remediation strategies
  • Self-starter with the ability to research and present on security topics to technical teams, IT management and business stakeholders
  • A Bachelor's degree in Computer Science or a related discipline, or equivalent work experience
  • (advanced degree preferred)
  • Certifications - Candidates are preferred to hold or be actively pursuing related professional certifications such as CISSP, GSEC, CISM, CRISC, CCSK or CISA
71

Senior Security Design & Engineering Specialist Resume Examples & Samples

  • Lead the planning and design of enterprise information security services architecture and solution design
  • Lead the implementation of enterprise information security services at the bank, including supporting governance models and processes
  • Assess enterprise information security services projects for risks, identify potential exposures, and present recommendations to project stakeholders
  • Provide leadership and oversight to other team members for the mature and effective design, implementation, configuration and delivery of information security services
  • Monitor effectiveness of enterprise information security services, identify problem areas, and work with technology teams to address/resolve issues
  • Seek to continuously improve enterprise information security services by evaluating emerging threats and trends, identifying opportunities for improvement and creating strategies to enable change
  • Provide consulting and guidance to the enterprise related to enterprise information security services
  • 7 - 10 years of relevant experience, with advanced knowledge in one or more of the following security disciplines: vulnerability and configuration management; endpoint protection; advanced threat protection; intrusion detection and prevention; and/or, log collection and SIEM
  • Experience with platforms related to one of the above security disciplines (e.g. experience with Qualys for vulnerability/configuration management, experience with enterprise suites of endpoint protection, experience with Advanced Threat Detection platforms and solutions, experience with Splunk for log collection/SIEM)
  • Awareness of regulatory and compliance frameworks and requirements related to financial institutions and information security
  • Proficiency with defining, communicating and operationalizing effective governance including establishing and maintaining policies, processes and metrics
  • Ability to understand, review and advise on technical aspects of information security services, (e.g. hardening configuration standards, technical signatures/policies, scripts)
  • Experience in vendor management, including contract reviews and negotiations
  • Ability to maintain strong relationships and influence others toward a common goal
  • Completion of a Bachelor’s degree or equivalent program in Computer Science, Management Information Systems or similar field is strongly preferred
  • Completion of CISSP or other recognized information security certification is strongly preferred
  • Prior experience working for or with financial institutions a plus
72

IBM Senior Security Architect Resume Examples & Samples

  • You don't go home and do gardening or home decoration - you go home and hack!
  • Preferably with a computer science degree and masters
  • Other certifications include CISSP and security architecture
73

Senior Security Functional Lead Resume Examples & Samples

  • Provides leadership in establishing and maintaining a robust security model across all financial systems, including PeopleSoft, the financials warehouse and other related systems
  • Responsible for improving core security set up and initiating operational processes necessary to monitor and maintain. This includes process improvement, documentation, and knowledge transfer in the following areas
  • Base user profiles requirements
  • Detailed knowledge of role mappings to functions
  • Chartfield Security requirements (ensure user is delivered the correct Department, Program, Project access)
  • Sponsored Projects Security model
  • Workflow Approval Security
  • Manage sensitive data and ensure only required end users have access
  • Authentication of PeopleSoft model to additional integrating systems within the Prime applications suite
  • Offers guidance and direction across the Office of Finance and Treasury on information security initiatives and issues
  • Leads security analyses and oversees application security design for new financial systems
  • Reviews and oversees the process for provisioning user access and recommends changes to seek process efficiency
  • Designs and implements quality assurance process to verify the accuracy of provisioning tasks
  • Leads annual recertification review of security user access
  • Monitors and enforces appropriate segregation of duties. Ensure roles are not created with excessive and conflicting privileges while ensuring multiple roles are not assigned to a user creating a security breach
  • Provide expertise and thought leadership to the Office of Finance and Treasury in recommending processes and tools to protect University financial data and mitigate risks for unauthorized access
  • Coordinates with the Office of Information Technology on security-related initiatives that will have an impact on our University financial systems
  • Serves as the lead for Prime workflow monitoring and revisions. The successful candidate is expected to have strong understanding of workflow rules, provisioning and enhancements requested by businesses and departments
74

Senior Security Manager Resume Examples & Samples

  • A proven background working in physical, content and information security, events risk management and crisis management
  • Experience working in a large corporate organisation, collaborating, influencing and persuading decisions across multiple stakeholders in a matrix structure
  • Experience of managing and monitoring security QA programmes
  • Experience in dealing with Vendor, including performance management of SLA/KPIs
  • Experience of conducting investigations, SRAs and implementing appropriate security plans, systems and control measures
  • Strong leadership and management skills
  • Excellent written skills and background in developing security SOPs and aligned training and planning documents
  • Proven strategic and analytical skills
  • Proven ability to analyse complex situations, make relevant decisions and design/implement effective solutions
  • Proven ability to align security solutions that facilitate the achievement of commercial objectives, accommodating company culture and style
  • A flexible approach to variable working hours - travel requirements is essential
75

Senior Security Control Specialist Resume Examples & Samples

  • Senior member of the Control Center team on a specific shift; assigns tasks, acts as a mentor and provides coaching and feedback as appropriate to the Team Leader
  • Provides expertise in the SCC equipment and software optimizing the team's use of systems
  • Assists in development and implementation of security initiatives, processes and programs
  • Collects security related information for dissemination to leadership and security team members responding to routine, urgent and emergent calls for service
  • Monitors, acknowledges and responds to fire and security alarms
  • Monitors acknowledges and responds to email communications and warning system notifications
  • Operates the VOIP multi-campus radio system and facilitates communication to and between Security team members and other users
  • Manages calls for service, assigns work and dispatches Security Officers
  • Responsible for sending appropriate emergency pages, making key personnel notifications, making mass notification messages and alerting emergency services (911)
  • Attends training; maintains job-specific certifications, actively participates in field or classroom training drills and exercises and meets or exceeds minimum training standards
  • Maintains security access control through audits, badging updates and available system reviews
  • Maintains current and accurate knowledge of emergency procedures. Accountable for submitting accurate documentation; uses correct forms, writes legibly, uses proper spelling and grammar and submits timely, accurate, understandable, and error-free information
  • Responsible for development and maintenance procedures and training materials
  • Responsible for managing confidential information in a discreet and professional manner, to include, but not limited to Human Resources driven requests and BOLO information
  • Activate/Deactivate temporary and terminated badges as needed
  • Conducts audits as assigned
  • Add/remove clearance codes as directed by access approval contacts and update the ProWatch database
  • 5-years of relative experience with increasing levels of responsibility (corporate security, police, military, fire service or emergency dispatch services). Experience as a lead in a Security Control Center environment is preferred; assigning tasks, mentoring team members and coaching
  • Functional/Technical Qualifications
  • Knowledge or experience in a fast paced security control or operations center environment
  • Effective written and verbal communications with working knowledge of Microsoft Office applications
  • Must have significant knowledge acquired through previous experience, certification or specialized training in Security Control Center operations, physical security systems, and radio dispatch communications and emergency management
  • Prefer ProWatch software, visitor management systems, video review and access control reporting experience
  • Prefer working knowledge of door hardware classifications and key management systems
76

Director, Senior Security Architect Resume Examples & Samples

  • Security Systems: Plans, develops and implements security measures to safeguard information against accidental or unauthorized modification, destruction or disclosure. Confers with senior management, content developers, facilities and other personnel to identify and plan security for data, software, hardware, telecommunications, and computer systems. Determines methods of implementing and enforcing security policies. Candidate will understand the merits of theory vs usability and advise resource owners on formation of appropriate security policies
  • IT Systems Continuance: Responsible for designing, implementing and integrating risk management procedures for equipment and systems throughout the enterprise. Has thorough understanding of strategic nature of business continuance initiatives. Actively monitors and tests contingency planning processes and procedures, and responds quickly to system failures. Interfaces with all levels of management and outside vendors in support of system continuance programs across all sites
  • Developing and maintaining AMAG Cloud security architectures, strategies, authentication stacks and standards across the enterprise while leading and directing the planning, development and implementation of data and system security controls and practices
  • Keeping AMAG interest and strategic goals first and foremost while ensuring that international, national and local Information security and privacy regulations are being adhered to associated with ISO9001, PCI, HIPAA, PII, SOX, MA201, California Privacy Laws, FTC Audit Compliance and other standards as necessary
  • Protects valuable information and maintains the confidentiality and integrity of data through: Knowledge of security management, network & protocols, data and application security solutions Knowledge of industry trends and current and emerging risks
  • Plans, organizes directs and manages resources for effective and efficient use of security technologies related to the protection of Cloud computing systems and data
  • Develops and delivers communications corporate-wide for the successful deployment of security controls Implement active security measures on all information and computer assets
  • Investigate suspected misuse of systems or non-compliance of security policies. Report security exposures, misuse or non-compliance to senior management. Monitor critical systems and test for vulnerabilities
  • SETEC steering committee leadership
  • Analyzes gaps between current and target security architecture and develops and implements roadmaps and plans to close gaps
  • Supports critical enterprise application environments as well as commodity technology services providing general security support
  • Responsible for maintaining relationships with outsourcing vendors for support of some of these environments
  • Ensures the definition and delivery of information security training and orientation to all employees. Train information owners and officers in the implementation of necessary computer security processes and procedures of upgraded security software and devices; consult with senior staff to ensure selection
  • 8+ years of progressive experience in a combination of risk management, information security and IT jobs with five years of experience leading projects or acting in a leadership role
  • HTTP, FTP, SMTP, SSL and SSH
  • Candidates with ITIL foundation certification and/or ITIL Security Management Practitioner will be strongly favored
  • The candidate should also have a strong understanding of TCP/IP networking, and should have a complete understanding of common Internet technologies such as ESSO, MFA, DNS, DHCP, Optimally candidate will understand common database technologies, ODBC, API concepts, basic SQL queries
  • Technical proficiency in security-related hardware and software, including demonstrated ability in firewall implementation and management, network monitoring tools and intrusion detection, VPN systems, authentication, secure email, encryption technology, and PKI required
  • Working knowledge of risk assessment procedures, policy formation, role-based authorization methodologies, authentication technologies, and security attack pathologies required
  • Demonstrated confidence and leadership as a member of project teams in a cross-functional environment. Experience protecting aspects of an e-commerce web presence
  • Manages and assists in performing security, usage and log monitoring following system procedures of all components of AMAG’s data infrastructure
  • Strong subject matter experience in application security, vulnerability testing and development of a risk appetite
  • Impeccable executive presentation and communication skills Excellent influencing and problem resolution skills
77

Senior Security Specialist, Ops Resume Examples & Samples

  • Preform Security Analyst Functions
  • Perform Service Delivery of Security Operations Infrastructure
  • Data Loss Prevention technology oversight, product management, upgrades, and reporting,
  • Provide technical assistance in the selection, configuration, and maintenance of network security devices including, but not limited to, firewalls, IPS/IDS, SIEM, WAF, network-based Malware detection and related platforms
  • 5 years of IT experience in three or more areas (i.e. infrastructure, network, Client Server, application, desktop OS, project management)
  • Experience in Symantec data loss prevention tools/products supporting a large enterprise
  • Experience working with Enterprise SIEM, log sources, incident escalation
  • 3 years of practical information security experience
  • Demonstrated experience with security event logs from various operating systems and appliances
  • Experience managing IDS / IPS / firewall systems across an enterprise
  • Thorough understanding of vulnerabilities and countermeasures
  • Ability to rapidly assess a situation and identify, isolate and communicate problems and issues
  • One or more senior Information Security certifications (e.g. CISSP or GIAC) preferred
78

Senior Security Consultant Threat Intelligence Resume Examples & Samples

  • Present tactical and strategic intelligence about threat groups, the methodologies they use and the motivations behind their activity
  • Prepare detailed and comprehensive cyber intelligence analytical products including analysis reports, cyber threat assessments, and internal threat briefings on both operational and tactical intelligence for a variety of audiences
  • Share threat intelligence for the purpose of engaging and maintaining relationships both internally with cybersecurity operations team, network and system operations teams, and externally with cyber intelligence analyst counterparts across the vertical and cyber communities
  • Monitor open source information feeds and a variety of internal and external sources to produce periodic intelligence summaries to maintain situational awareness on adversaries and targeted attack groups
  • Establish an internal repository for threat intelligence information and products
  • Identify and gain access to external and internal intelligence resources required to appropriately anticipate threats and risks to customer assets (information incident trends, known command and control system lists, firewall logs files, vulnerability assessment results, etc)
  • Work with the cybersecurity operations team to establish and implement the procedure for intelligence support to hunting within the technical environments for known indicators of compromise, analyze findings, and report to security management as needed
  • Ensures threat intelligence is integrated with information security efforts and initiatives
  • Use formal intelligence analysis methods to collect information about Internet-based malware-related criminal and espionage activities and the actors behind them; perform extensive research using available data sources to make predictions about cyber criminals and their future activities
  • Develop and maintain a portfolio of relevant, known threat actors to include motivations, intentions, objectives, historical attacks and targets, known tools and malware, Tactics, Techniques and Procedures (TTPs), known infrastructure and indicators of compromise
  • Establish a threat intelligence SharePoint site that can be used for information dissemination and storage
  • Utilize threat models as a structured approach to identify, classify, prioritize and report on threats to the enterprise
  • Other such threat intelligence tasks determined by the threat intelligence officer as deemed reasonable and appropriate to meet the threat intelligence objectives
  • 6+ years of Computer and Information Systems experience
  • 5+ years concentration in performing cyber threat intelligence within overall experience
  • Technical understanding in the following areas: network communication using TCP/IP protocols, system administration, understanding of malware (malware communication, installation, malware types), knowledge of computer network defense operations (web/email proxy, firewall, IDS/IPS, router/switch)
  • Demonstrated understanding of cyber advanced persistent threats, actors, infrastructure, TTPs, and the internet underground (deep/dark web)
  • Ability to program in Python and experience using Python for threat intelligence data analysis Experience developing processes for tactical intelligence support operations
  • Experience in establishing and refining processes for maintaining situational awareness
  • Experience implementing intelligence support and situational awareness operations
  • Experience with multiple intelligence provider platforms (i.e. Digital Shadows, Domain Tools, Flashpoint, INTEL 471, Recorded Future, CrowdStrike, ThreatScapes, PassiveTotal, and others)
  • Experience with the following toolsets: Link Analysis tools, (i.e. Paterva Maltego or IBM Analyst Notebook), Geospatial mapping tools (i.e. ArcGIS or Google Earth) SIEMs (ie. Splunk, ArcSight, or Q-Radar), and Threat Intelligence Platforms (i.e. ThreatStream, ThreatConnect, Soltra, or MISP)
  • Experience applying Kill Chain analysis, Cyber Intelligence Preparation of the Environment (CIPE) modeling, or Diamond modeling of cyber threat activity
  • Experience collecting, analyzing, correlating and interpreting data from multiple sources for the purpose of documenting findings and providing meaningful relevant products
  • Strong, demonstrated technical writing and communication skills
  • Experience with all-source intelligence gathering and analysis techniques
  • 10+ years experience performing cyber threat intelligence analysis
  • Masters degree in area of study relevant for cyber threat intelligence analysis
  • In-depth knowledge of cultural, social and political activities and conditions in foreign countries
  • Fluently speaks languages other than English
  • Experience writing YARA rules or IOC’s
  • Ability to write SQL queries
  • Perl and other relevant programming language experience
  • Experience with structured analytic techniques (i.e. Analysis of Competing Hypothesis or Alternative Futures Analysis)
  • Advanced NETFLOW or PCAP analysis
79

Senior Security Specialist, DBM Resume Examples & Samples

  • Plan, implement, upgrade and monitor security controls for the protection of TWCC computer networks and information systems
  • Plan, implement, monitor Imperva Database Monitoring technology
  • Review proposed change control request to ensure proper alignment with TWDC policies standards and guidelines
  • Provide coordination for security event detection, identification and resolution
  • Strong experience supporting Imperva Database monitoring technology across a large enterprise
  • Demonstrated experience with security event logs from various Operating Systems and appliances
  • Information Security technology/compliance experience. Familiarity with major regulations such as Sarbanes-Oxley and NERC CIP preferred
  • Detailed understanding of TCP/IP and related communication protocols, Windows authentication mechanisms (Kerberos, NTLM, AD), networking technologies, routing and switching, and risk analysis and risk management methodologies
80

Senior Security Analysis Specilaist Resume Examples & Samples

  • Perform unscripted security analysis activities, using access to client tools and systems
  • Access log data, configuration data and other systems as necessary to perform analysis
  • Interact with client internal teams to manage incidents using client ticketing systems
  • Support continuous improvement, including: investigations into repeat false positives, identification of opportunities for process automation, proactive identification of additional data that enables further value-add to event handling, and other suggestions for additional client data that could improve the service, and other efficiencies
  • Use knowledge gained in investigations for purposes of process improvement by using an internal client wiki
  • Contribute to regular service status reporting for the client, according to an agreed monthly reporting cycle
  • Support root cause analysis for malware outbreaks within the organization
  • Use the existing client systems to build a knowledge base, and use this to track the outcomes of events and associated remediation actions
  • Provide regular risk and threat reporting to the client in relation to Secure Works services. This includes
  • Following investigation, provide a triage function for confirmed incidents
  • Prioritise identified vulnerabilities in line with agreed criteria
  • Provide a regular vulnerability management risk report
  • Provide a monthly vulnerability management service and compliance report
  • Utilise security intelligence as an input to vulnerability management to enhance remediation prioritisation
  • Ensure that vulnerability information is incorporated into the incident manage services to reduce false positives and enhance the ability of the service to analyse and prioritise events
  • Degree in information technology or related field
  • Security technology experience
  • Extensive experience in security incident handling
  • Evidence of current applicable security training and or certification
81

Senior Security Solutions Developer Resume Examples & Samples

  • Significant programming experience with two or more of the following: Java, Swift, Ruby, Python, Golang, and/or Objective-C programming languages
  • Strong object oriented programming and design skills
  • Experience with one or more web frameworks
82

IT Senior Security Specialist Resume Examples & Samples

  • Implement, support and enforce procedures, guidelines, and standards; assist the organization with understanding, implementation and compliance with the same
  • Maintain and implement the enterprise’s security awareness and training programs
  • Create management reports and dashboards
  • Manage ISMS document set, projects and publishing system
  • Conduct research and maintain an understanding of current and emerging information security, privacy and compliance risks and vulnerabilities, as well as their remediation procedures and technologies
  • Support the review, selection and deployment of security technologies Deploy and operate an ISO 27001 information security management system (ISMS)
  • Assist with the operation and enhancement of the security toolbox including application, network and database vulnerability scanning tools, as well as log analysis and alerting tools
  • Manage incidents and corrective actions
  • Assist with Business Continuity and Disaster Recovery plan development and testing
  • Develop and implement metrics collection and reporting process for management and staff
  • Develop metrics gathering and reporting systems
  • Assist with the implementation and operation of localized virtual security teams, including regular meetings, training, local project support and incident management participation
  • Manage security projects using industry-standard project management and communication techniques
  • Participate in relevant security training events and activities
  • Maintain current technical and operational security skills and certifications
  • Ability to create and maintain enterprise security documentation to be used by USAI security, technical and business teams and clients
  • Strong understanding of Microsoft server and desktop operating systems
  • Demonstrated understanding of network technologies – routers, switches and monitoring tools
  • Working knowledge of security technologies – CheckPoint / Cisco firewalls, IDP, IDS
  • Working knowledge of basic log management functions, products – e.g. LogRhythm
  • Familiarity with network vulnerability scanning tools such as Nessus and application vulnerability scanning tools such as DAST/SAST
  • Basic understanding of Microsoft SQL and SQL databases
  • Demonstrated experience with ISO 27001, ITIL, or SOC2 assessment frameworks
  • Strong knowledge of Microsoft Office products – Word, Excel, PowerPoint
  • Knowledge of current technological developments/trends in area of expertise
  • Knowledge and understanding of ITIL processes
  • Ability to work in a highly confidential manner
  • Requires strong capability to prioritize competing demands, manage multiple concurrent tasks and run meetings on schedule
  • Project management skills required, including the ability to estimate work efforts, define work plans, delegate work, monitor progress and report schedule variances and scope changes
  • Requires the ability to follow established internal PMO procedures and present project conclusions
  • Proficiency in MS Project strongly preferred
  • Requires the ability to compose and verbally deliver information of varying levels, using appropriate grammar, tone, inflection and non-verbal cues, while also listening to and correctly deciphering verbal communication delivered by others
  • Requires the ability and capacity to communicate ideas, facts and data in writing using appropriate grammar, syntax and sentence structure including the ability to create technical documents
  • Requires the ability to understand a situation by breaking it apart into smaller pieces, and/or tracing the implications of a situation in a step-by-step causal way
  • Requires the ability to strive for optimal results by taking responsibility for timeliness, commitment to task and adherence to performance standard
  • Requires the ability to behave in a trustworthy and transparent manner
  • Requires the ability to work cooperatively with others and be part of a team
  • Requires the ability to keep emotions under control and to restrain from negative actions or behaviors
  • Requires the ability to understand and help/assist both internal and external customers and meet their need
  • Requires the ability to adapt to and work effectively within a variety of situations, individuals or groups, as well as understand and appreciate different and opposing perspectives
  • Requires the ability to understand a situation or problem by putting the different pieces together to see the bigger picture
  • Requires the ability to understand other’s feelings and concerns, and to value individual differences in people
  • Requires the ability and willingness to align his/her own behavior with the needs, priorities and goals of the organization
  • Requires the ability to effectively build and maintain friendly, warm relationships or networks of contacts with clients/customers
  • Assertiveness: Requires the ability and intent to appropriately display assertive behaviors to ensure others follow and comply with given directions
  • Must have a baccalaureate degree in information technology, or related field
  • Must have a minimum of five years relevant work experience
  • One or more of the following certifications is desirable: ITIL – Information Technology Infrastructure Library, Microsoft Certified Systems Engineer: Security, CISSP – Certified Information Systems Security Professional, ISSAP – Information Systems Security Architecture Professional, CISA – Certified Information Systems Auditor, CISM – Certified Information Security Manager
83

Senior Security Directory Operations Engineer Resume Examples & Samples

  • LDAP
  • DNS
  • Delegation
  • Replication
  • Advanced Identity & Access Management concepts and HCA application
  • User lifecycle management
  • Dependence of major integrated systems
  • Fully recognize the business or regulatory drivers behind IAM
  • Role based access controls
  • Methods of systems integration – Federation, LDAP, Windows, Unix
  • Access control standards and best practices
  • Understanding of major IAM tools and the services
  • Unique identification
  • Provisioning / De-provisioning
  • Advanced information security concepts
  • Cryptography services
  • Web application security
  • Policy and standards
  • Data classifications
  • Directory services
  • Vendor support engagement
  • Scripting concepts
  • Regulatory compliance (HIPAA, PCI, SOX)
  • Database technologies
  • Desktop and productivity tools
  • Effectively coordinate activities across groups
  • Drive limited internal projects and initiatives with little to no oversight
  • Implement or improve processes affecting multiple groups and/or organizations
  • Coordinate activities within group
  • Independent worker
  • Advanced organizational knowledge
  • Political climate
  • HCA direction and priorities
  • Reporting structures
84

Senior Security Policy & Awareness Manager Resume Examples & Samples

  • 8+ years Security Policy and Awareness experience
  • Experience working with outsourced vendors with security policies
  • Biggest skill is the drive to results around the security policy implementation
85

Senior Security Signature Manager Resume Examples & Samples

  • The continuous development and refinement of signatures, policies, configurations, scripts and indicators used to identify malicious or unauthorized activity via network, host, and scanning based detection
  • Active DoD Secret (TS is preferred) Security Clearance
  • A bachelor's degree in computer science or related discipline plus 5 years of demonstrated operational experience; or
  • A PHD degree in computer science or related discipline plus 3 years of demonstrated operational experience; or
  • Demonstrated experience in supporting CND and/or network systems and technology
  • DoD 8570 compliant by obtaining/maintaining required IAT level II certifications such as (GSEC or Security + CE or SSCP orCCNA Security)
  • DoD 8570 compliant by obtaining/maintaining required CND-Infrastructure Support certifications such as (SSCP or CEH)
  • Provide quality customer service with excellent problem solving skills
86

Senior Security Research Consultant Resume Examples & Samples

  • Work with the CTU research team to perform proactive all-source research to identify and characterize new emerging threats, vulnerabilities, and risks based on client security context
  • Perform first-tier malware analysis using run-time analysis, comparative analysis, and reverse engineering tools
  • Produce actionable intelligence information for delivery to customers in the form of support ticket responses, technical reports, briefings, and data feeds
  • Support Security Operations Center and Security Risk Consulting services by providing intelligence in response to client escalations
  • Provide advice on security practices and procedures to peers and clients
  • Generate and apply innovation via short-to-moderate term projects to improve process efficiency and service value
87

Temporary Senior Security Specialist Resume Examples & Samples

  • Conducts complex and confidential investigations for the Corporation. Identifies internal controls issues and works with BU management toward corrective action, so as to preclude additional, like problems. 30%
  • Creates and inputs investigative incidents and results into Security case management system. 10%
  • Reviews and analyzes background investigations for employees regarding derogatory information received during the vetting process. 5%
  • Establishes and maintains federal, state, county and local law enforcement contacts and relationships. 10%
  • Provides support for other Corporate Security functions and activities (Annual Shareholder Meeting, tabletop exercises, Executive Protection) 25%
  • Provide employee training regarding such areas, but not limited to violence in the workplace, fraud, employee safety, physical site security and any other programs. 20%
  • Position Interacts with Business Unit leaders during the investigative process
  • Investigations are conducted to support or refute allegations, with an emphasis on clearing employees unjustly accused of wrongdoing, and investigating any actions which are perceived to be violative of the Companys Code of Business Conduct
  • Works under minimal supervision
88

Senior Security Specialist, Architecture Resume Examples & Samples

  • Develop and document technical solutions that meet specifications and that impact future developments (position papers, process flows, requirements, data flows, mapping to controls)
  • Identify, select, develop and document architecture artifacts (reference architectures, standards, policies, reusable designs, best practices) across data protection topics
  • Research, learns and assess new technologies
  • This role will habitually interact with internal and external customers on security-related projects and operational tasks, and prepare/conduct briefs to senior staff members and executives on a regular basis
  • Presents issues, solutions and project status to senior and executive management
  • Serves as an escalation point for technical problems and maintenance
  • Must be able to understand business drivers and processes to evaluate risk and recommend solutions with a balanced result
  • Promote awareness of applicable security policies and standards and implement or coordinate remediation required by audits, as necessary
  • Collate security event data to produce monthly exception and management reports
  • 5 years of experience with 3 or more of the following areas including: data protection, cloud deployment and migration, secure application development, networking
  • 3-5 years of practical and hands on security experience such as cloud security and engineering, mobile platforms, WAF, IDS/IPS, network intelligence, DLP, firewalls, and/or change control
  • Demonstrated experience in creating conceptual, logical and physical security diagrams
  • Information Security technology/compliance experience. Familiarity with major regulations such as Sarbanes-Oxley and NERC CIP
  • This will require practical use and understanding of advanced security protocols and standards, and solid knowledge of information security principles and practices as well as latest scalable technologies (hard and soft)
  • 5+ years hands on IT security experience with a focus on data systems, systems engineering or software engineering
  • Must be proficient in at least one programming language (Perl, Ruby, Python, C, C++, etc.) and possess working knowledge of databases
  • Two or more senior Information Security certifications
  • Fortune 500 experience – working in large complex environments
  • Familiarity with ITIL or similar framework a plus
89

Senior Security Consultant T Resume Examples & Samples

  • Supports the branch sales looking and profitability through exceeding the individual sales booking plan, while paying attention to the annual service, lease and direct sales
  • Develops an effective job schedule for each installation to include cost control; and coordination of subcontracting, Engineering, Sales and the customer
  • Assists the Branch Manager with selecting subcontracting to meet installations needs based on business forecasts and actual bookings
  • Bachelors degree preferred (Business, Mechanical or Electrical)
90

Senior Security Vulnerability Analyst Resume Examples & Samples

  • Execution and planning of vulnerability analysis of high security embedded devices (Smart Cards, secure elements etc) during product development
  • Execution and support of vulnerability analysis activities in support of Common Criteria certifications of products (technical report review, follow-up investigation etc. with focus on hardware, crypto libraries, and operating systems)
  • Support of the various HW development teams of NXP with state-of-the-art security know-how and keep close contacts with all groups within NXP that take an interest in security (Research as well as BLs)
  • Review of academic research and investigate new potential attack paths on high security smart cards and secure elements
  • PhD (or Master + at least 3 years of experience) in the field of Embedded Security and proven expertise (publications, etc.) in Side-Channel Analysis
  • Ideally with a background in smart card / semiconductor process technology, embedded security technologies, especially countermeasures in HW and SW, signal processing, advanced measurement techniques, cryptography
  • Knowledge of 8051 / ARM based security products. C, JAVA, Python and ideally assembler language
  • Experience with advanced CMOS HW designs and their underlying non-volatile and volatile technologies would be beneficial - in particular in the context of advanced side channel analysis techniques
  • Strong leadership skills with a proven ability to direct others and achieve set goals
  • The ability to work independently without supervision is essential
  • The candidate will have a creative approach to problem solving with a focus on achieving objectives
  • The candidate will have direct experience of academic / industrial research (conferences, workshops, journals, etc.) including personal participation in such events
  • The candidate will have good communication skills including the ability to present ideas formally in meetings as well as individually and a proven track record in this regard
  • Ability to interact smoothly with a diverse range of colleagues, customers and partners inside and outside of NXP
91

Senior Security R&D Engineer IBM Cyber Security Center of Excellence Resume Examples & Samples

  • Prior hands-on experience and expertise in computer and/or network and/or web security
  • Excellent interpersonal, written, and verbal communication skills
  • Low level programming experience
92

Senior Security Review Technologist Resume Examples & Samples

  • Research, understand, and work with Line of Business contacts to document business cases and data being sent-to or received-from Travelers' vendor partners
  • Perform new assessments and reassessments of computing environment controls for Travelers' vendor partners
  • Communicate security control deficiencies of Travelers' vendors to LOB contacts to help them understand the associated risks of doing business with the vendor partners
  • Work closely with Travelers Legal and Procurement areas to ensure vendor partner contracts include appropriate security language
  • Work closely with Travelers Engineering team to ensure B2B connections and data transfers with vendor partners are set up appropriately and securely
  • Support various ad-hoc requests for Information Security expertise and assistance
  • Research and understand the PCI Requirements and their impact on Travelers
  • Contribute towards the annual self-assessment activities for both Travelers and Dominion (Travelers Canada)
  • Identify potential compliance gaps or weaknesses and determine appropriate plan for remediation
  • Consult with LOB contacts regarding new and/or changing business processes that impact credit/debit card payment
  • Work closely with OAI-sys and Architecture areas to ensure that network and technology roadmaps continue to facilitate PCI Compliance
93

Senior Security Manager Resume Examples & Samples

  • Serve as the primary security expert and point of contact for executive staff, advise and participate in crisis management events
  • Advise and guide project and proposal leads on how projects may be designed to mitigate or avoid risk, while meeting goals and objectives and ensuring excellent customer service
  • Serve as the main point of contact with external local agencies and security providers in order to leverage their knowledge, capabilities and resources in support of the company’s interests
  • Support all aspects of the design and implementation of security management at Kronos facility and in the field including the completion of security assessments and audits, security policies and procedures, emergency response plans, vetting plans, information security plans, travel security policies, scopes of work for security-related personnel and companies, security training, crisis management support, technical support for proposals and investigations of fraud, misconduct
  • Oversee scheduled drills and exercises relating to emergency response and work with Kronos executive staff to make any required enhancements
  • Complete advance work prior to identified Kronos employee travel and report out to Kronos executives
  • Oversee the camera and access control systems within the Kronos facility
  • Bachelor’s degree with a major or course work in Business Administration, Criminal Justice, Law Enforcement, Security or closely related field and/or equivalent experience
  • Strong experience working and or liaising with corporate security and contracted security companies
  • Willingness and ability to be on call for an emergency occurring outside of normal business hours
  • Strong ability to: communicate effectively both orally and in writing with staff and the public; understand and follow standard operating procedures; perform duties in a professional manner and appearance; write required reports; investigate allegations of fraud and misconduct; and make independent and good judgment decisions within proper policy and procedures
94

Senior Security Delivery Team Lead Resume Examples & Samples

  • Experience in IT Security and Investigations
  • Demonstrated capability in handing large scale investigations involving Targeted Threat Actors
  • Must have a deep and current understanding of the tools techniques and tactics of Targeted Threat Actors and remain up to date with current and future trends
  • Possesses as a unique blend of experience, vision, technical, and intrapersonal skills that are required for such a position
  • MSc degree in a field with emphasis on computer security and investigations, desirable
  • BSc in a relevant digital investigation/security subject; or
  • BSc qualification and relevant IR/Forensic post degree qualifications; and
  • Post degree qualification in IR/Forensics (e.g. SANS); and
  • Demonstration of a continuing ability to self-teach
  • CISSP, GCIH, GIAC, GCFE, GREM SANS Certifications, EnCE, ACE (at least two of these)
95

Senior Security / Cyber Defense Analyst Resume Examples & Samples

  • Analyse information from variable sources; leverage various toolsets to gain awareness of potentially suspicious activity
  • Subject matter expert on security related issues
  • Ability to aggregate and correlate alerts from systems and/or SIEM analytics tool to provide context, environmental awareness, baselines, and root cause analysis
  • Participate and assist in identifying and responding to global security incidents
  • Provide a point of escalation for incidents within various global regions
  • Monitor and investigate network and system events to pre-emptively determine attack
  • Perform initial investigations; identify attack vectors and mitigation tactics
  • Communicate effectively with representatives of the business, technology specialists, and vendors
  • Gather forensic evidence for analysis, investigation, disciplinary action or criminal investigation
  • Strong understanding of Windows, Unix/Linux operating systems, security administration, network security weaknesses, vulnerabilities and remediation, TCP/IP networking and firewall concepts
  • Knowledge of security auditing processes
  • Expert knowledge of information security issues, trends and leading practices
  • Prior experience in security development and implementation of tools is desirable
  • GIAC Certified Forensic Examiner - GCFE
  • Certified Information Systems Security Professional - CISSP
96

Senior Security Ops Analyst Resume Examples & Samples

  • Provide direction on the usage of legacy and third party security solutions/tools/services with remote support providers and integration techniques. Day to day oversight of MSSP/external vendors providing SecOp services
  • Contribute in the evaluation of new or updated security solutions with engineering
  • Evaluate and escalate events and incidents to the Security Administration and Engineering teams based on established escalation procedures
  • Provide real-time monitoring and timely response to alerts and anomalies generated by security tools
  • Provide oversight and direction to outsourced service provider
  • Execute changes in security access systems based on results from analysis received from Risk & Compliance, Internal Audit, External Audit, and other functions as deemed appropriate
  • Supports departmental and corporate goals by meeting key performance indicators and defined metrics
  • Fully support and follow Change Management processes and procedures
  • Help standardize documentation for support of assigned systems and applications and help to facilitate understanding and use within level one support organization
  • Accurately record all interactions with customers in the incident management tracking tool
  • Perform special assignments as required
  • 3 or more years required of working in security operations center or incident response role (preferably with global scope) – experience leading an incident team
  • 3 or more years required of combined IT and security work experience with a broad exposure to infrastructure/network and multi-platform environments
  • 4 years of experience (minimum) and hands-on working knowledge with a variety of security technologies and processes including but not limited to Firewall (such as Check Point, Fortinet, Cisco ASA, Palo Alto, Juniper), VPN, SEIM, IDS/IPS (such as SourceFire, HP TippingPoint), HIDS, malware analysis and protection, content filtering, logical access controls, data loss prevention (such as Symantec, RSA, McAfee), content filtering technologies, application firewalls (such as F5, Imperva), vulnerability scanners, forensics software, and security incident response
  • GIAC and ISC2 certifications such as CISSP are highly preferred
  • Familiarity with audit support and response, and regulatory compliance (Sarbanes-Oxley (SOX) and PCI-DSS)
  • Ability to effectively prioritize and execute tasks in a complex environment
  • Solid understanding of standard business processes including Change Management, Problem Management, Work Prioritization, Quality Assurance, and Continuous Improvement best practices, etc
  • Strong interpersonal and conflict management skills
97

Senior Security Manager Resume Examples & Samples

  • Performs security reporting, and addresses escalated or high-risk security issues
  • Develop detailed understanding of the data flow and data definitions of each project to ensure appropriate levels of security are applied commensurate with risk
  • Utilize communication and technical skills to communicate between business and security teams
  • Work with and support initiatives by regional security staff
  • Recommends development and implementation of physical security policies, programs and procedures
  • Ensures initiatives align with department goals, and processes/procedures are maintained to meet service and quality standards
  • Directs and coordinates Visa Inc.'s internal and external investigations and ensures compliance with corporate policies and procedures
  • Coordinates and administers vendor relationships and contractual agreements
  • Conduct global and/or regional security risk assessments and provide recommendations of corrective action to senior management
  • Assist with security designs for new and existing facilities
  • Support global Security Awareness program to raise awareness of data and physical security controls
98

Senior Security Automation Engineer Resume Examples & Samples

  • Automate DMPD's security operations and aid governance
  • Understand current security posture of product ecosystem and specifics for DMPD's solutions
  • Implement cutting edge security technologies, drive towards adoption, create proof-of-concept and frameworks
  • Collaborate with cross-functional peers to influence industry standards adoption
  • Integrate security capabilities with other security pillars that include identity access management, data protection, network security and application security
  • Work with cross-functional experts to set strategic direction for Application and Infrastructure Security
  • BS or MS in Computer Science, Engineering or Information Systems Management with a Security concentration and 7 or 5 years respectively of industry experience
  • Ability to quickly digest any issue/problem encountered and recommend an appropriate solution
  • Hands on experience in using Penetration Testing or Dynamic Application Security Testing Tools (Burp suit, Vega, Wapiti, W3af, SQLMap or commercial products Acunetix/Netsparker/Metasploit) is a must
  • Experience in CI/CD, understanding od various CI/CD tools and frameworks like Jenkins, Maven, Hudson, Artifactory, Bamboo, Chef, Ansible
  • Experience in SSL/TLS, Keystores, RBAC, etc
  • Experience in deployment processes and best practices
  • Well versed with J2EE ecosystem with hands on knowledge of core java, Spring, Cryptography, Hibernate, Kafka, Maven, etc
  • Industry security certifications (i.e. CISSP, CISSP-ISAAP, CISA, CISM) is a plus
99

Senior Security Technical Specialist Resume Examples & Samples

  • Develop well-prepared, accurate engineering network design documentation
  • Consult on Information Security risks and specification of appropriate mitigating controls
  • Act as a Subject Matter Expert for the relevant technology area
  • Perform assessment of existing network elements and implement design updates as required to ensure all network components meet the network design specification
  • Keep abreast of technology and IS risk landscape and develop appraisal reviews where applicable
  • Manage the preparation, execution and reporting of the AOP planned activities and budget requirements
  • Provide recommendations regarding future security technology and platform growth strategies
  • Specify, define, document design processes, standards and practices related to the network to ensure engineering best practices are maintained
  • Act as a prime technical interface with technology providers
  • Facilitate and manage vendor platform governance meetings & relationship
  • Interface to co-ordinate and resolve network design and / or process related issues
  • Raise purchase orders and creation of statement works as required
  • Provide lab setup, perform testing and configuration deployment on production devices
  • Generation of network design, testing and implementation documentation
  • Provide recommendations concerning technical solutions and IP Network strategy
  • Building personal and professional relationships necessary to operation as a trusted technical expert
  • Balance conflicting technical and financial requirements
  • Develop technical scoping documentation from product requirements
  • A technical qualification (degree) in Telecommunications Engineering (or related Engineering discipline) or equivalent
  • Security certifications such CISSP or equivalent
  • A minimum of 10 years’ experience in telecommunications. Both depth and breadth of technical experience is required. This should include extensive experience in a technical role in one or more of the following areas: Firewall and Network level security controls, server and application security methodologies
  • Good understanding of Optus networks, procedures and day to day activities
  • Sound understanding of InfoSec policy and industry standards in managing Information Security risk
  • Clearly communicate and present ideas and information to Director level
  • Strong stakeholder communication skills
  • Experience in liaising with middle and senior management
  • Checkpoint and Crossbeam hardware and Software knowledge
  • IDS/IPS, Tufin and RSA Envision hardware and software knowledge
  • IXIA and Spirent application level test set knowledge
  • Competent level IP routing including the following protocols; BGP, OSPF, RIP
  • Cisco and Juniper hardware and software knowledge
  • Desired experience, understanding or credentials in
  • Experience in security design and implementation
  • Experience in securing a large scale network, server and application environment
  • Experience with System administration on multiple operating systems such as Windows, Linux and Solaris
100

Senior Security Manager Resume Examples & Samples

  • Manages the design, development, implementation, and operations of all security technologies for Allscripts Hosting Solutions
  • Serves as the BU's SME to identify security risks, then recommend alignment of security technology investment and resource management strategies align with organizational risks
  • Consults with various departments on security systems, operational impacts of controls, internal - external communications, and other initiatives
  • Researches, recommends, acquires and implements vendor provided solutions/tools in line with Allscripts’ tactical and strategic goals
  • Performs all aspects of project management, scheduling & prioritizing activities, staffing, technical design and technical review to ensure key milestones are met and successful completion of security projects is achieved
  • Responsible for the establishment and adherence of standards and methods for developing and deploying security applications across the supported business units
  • Defines an application or infrastructure architecture and framework for deploying and developing business applications
  • Main point of contact for customer requests and proactive involvement in solving business problems with technology solutions
  • Support the functions with economic justifications of build vs. buy decisions for application deployment
  • Keeps informed of new developments and trends; makes recommendations to senior management on desirable additions or replacements
  • Assists subordinate managers in assessment and training of personnel
  • Works through managers in setting and implementing standards, priorities, and schedules
  • B.S. in Computer Related field of study highly desirable
101

Senior Security Certification Analyst Resume Examples & Samples

  • 90%
  • Leads CMVP consulting to organizations within the company to understand how to undertake and manage FIPS security certifications
  • Provides CMVP security certifications advice to Gemalto management & R&D teams in multiple sites, to help to facilitate applicable IDSS products through evaluation
  • Confers with development staff throughout design processes to understand product security features under development and ensure that the design is appropriate to meet the requirements necessary to support CMVP security certifications
  • Prepares or updates, in cooperation with development staff, technical documentation in support of CMVP certifications
  • Support PLM in responding to CMVP-related queries internally and from customers, lab and government and guide resolving evaluation-related issues as they arise
  • Provides verbal and written reports on CMVP certifications progress where required
  • Establish and maintain JIRA tickets regarding action items required for CMVP certifications
  • Integrate with Agile and other R&D team activities to drive certifications requirements in development activities
  • Establish regular communication with management, R&D, peers and team members
  • Remain abreast of current CMVP certifications and related standards and drive changes in the interests of the company
  • Project manage the security product evaluations between product management, engineering, and the security testing lab, including presentation of regular reports defining progress against major milestones, elevation and mitigation to risks as they arise and escalations to management when roadblocks occur and need intervention
  • The Senior Analyst is responsible for working with the Director in security vulnerabilities incident management
  • The Analyst will be required to perform other duties as required as part of supporting the team and as directed
  • 6 years’ experience with Common Criteria evaluations and/or FIPS 140-2 validations and/or other national and/or international security programs
  • Experience providing advice and/or expertise in a consulting role related to security certifications
  • Experience developing certifications evidence documentation
  • Experience with standards development and/or driving changes to security standards e.g. FIPS
  • Program and/or project management experience
  • Developer experience and working with /C ++ and Java programming is an asset; and
  • Experience with Unix scripting and/or script languages (e.g., Perl) an asset
  • Applied knowledge of assessing product compliance and recommending actions to meet CMVP and FIPS and/or Common Criteria evaluation requirements
  • Applied knowledge of cryptographic algorithms, RNG and entropy as related to CMVP requirements
  • Demonstrated knowledge of IT Security principles and techniques particularly related to PKI and network security
  • Demonstrated capability to improve efficiency, productivity, and performance of programs
  • Demonstrated written and oral presentation skills; and
  • Demonstrated project management capabilities
102

Senior Security Technical Team Lead-europe Resume Examples & Samples

  • An experienced technical leader of Incident Response delivery
  • The ability to oversee multiple ongoing incidents from a technical delivery perspective
  • In depth knowledge of all mainstream IR technologies, and an awareness of similar developing technologies
  • Excellent understanding of the implications of Data Privacy legislation
  • Excellent understanding of forensic and incident response methodology and tooling
  • Excellent understanding of IT Security to protect and monitor the enterprise
  • Form part of a 24*7*365 callout function
  • 80% of time will be spent overseeing field investigations (billable to client), collaborating with senior staff, and mentoring junior staff on current cases
  • 20% Research and administration
  • BSc or higher in a Computer Forensics; or
  • The ability to develop technical labs and solution to support IR delivery
  • Ability and willingness to be involved with APT security research community to maintain knowledge and garner intelligence
103

Senior Security Portfolio Program Manager Resume Examples & Samples

  • Provide leadership within the Information Security Portfolio/ Program Management function
  • Identify, understand, and manage all security focused projects and programs in the IPG Security Portfolio and Roadmap
  • Develop reasonable understanding of program/ project scope for all in-scope initiatives
  • Enable effective working relationships with all project managers with security related projects
  • Operational Program Management cadence with PM’s to enable timely and sustainable information flow regarding projects in the Portfolio
  • Create and maintain a process for periodic updates and maintenance of the IPG Security Roadmap process
  • Actively engage and provide insight to peer IPG CISO organization functional leaders to synchronize efforts and resources as well as build stakeholder support for critical initiatives
  • Develop and maintain effective relationships with key leaders, peers, and project resources in the IPG IT Organization
  • Enable portfolio reporting capabilities and generate standard actionable portfolio metrics to various executive audience including board level consumption
  • Promote a long-range planning cadence that allows CISO and select executives to consider and prioritize initiatives beyond the one-year horizon
  • Understand and incorporate IPG financial planning processes into portfolio management responsibilities
  • Partner with IPG IT and Agency architects where appropriate to understand key principles and issues for technically focused projects within the portfolio
  • Create and effectively communicate understanding of the current state of the portfolio and its risk impacts to the information security posture of IPG
  • Partner with select project managers to impact their ability to identify and influence roadblocks to project success
  • Act as the principal advisor to the CISO on all topics related to identifying, planning, and monitoring execution of security programs and projects
  • Develop IPG CISO Organization Program and Project Management standards where appropriate
  • Influence and monitor the project-intake process to ensure clear project objectives, scope, and timeline for all projects entering the Portfolio
  • Proactively provide counsel to CISO and IT Leaders regarding programs or projects within the portfolio which are not anticipated to provide value or enable appropriate secure capabilities for IPG
  • Develop and influence appropriate IT Leaders in agencies
  • MBA or Bachelor’s degree in Information Security Management, Information Systems, or Business Operations Management
  • PMP, CISSP preferred
104

Senior Security Consultant / Architect Resume Examples & Samples

  • Provide enterprise level vision, strategy, problem anticipation and problem solving capabilities for a Security Operation Center (SOC)
  • Develop policies and standard operating procedures using industry best practices
  • Work with engineers and analysts to provide full understanding of the environment and provide recommendations for improvements/enhancements
  • Participate/manage incident response activities
  • Provide knowledge transfer in a phased approach
  • Participate in customer calls and meetings on a regular basis
  • Research, recommend, and lead implementation of new or improved information security tools and technologies
  • Subject matter expert for technical investigations of security violations
  • Design and implement disaster recovery operations
  • E03 requires 4+ years concentration in an Security Consultant or Architecture role or equivalent experience
  • E04 requires 6+ years concentration in a Security Consultant or Architecture role or equivalent experience
  • Experience with risk management and gap analysis
  • Understanding of multiple data types
  • Knowledge of SIEM, Proxy, FW, DS/IPS, DLP, threat intel, and other detection mechanisms
  • Experience managing, responding to and resolving situations caused by network attacks
  • At least 1 of the following certifications: CISSP, PMP, CCNP or related advanced IT certification
  • Experience with IT infrastructure
  • Experience in a 24x7x365 SOC environment
  • 8+ years of Consultant or Architect experience
  • Master’s degree in Computer and Information Systems, Engineering, Science, or Mathematics
105

Senior Security Technology Program Manager Resume Examples & Samples

  • Job performance will be measured with regard to the execution of SSG-PSD PRC security office PRC Security Working Group objectives
  • The candidate should have experience working in the security field in China at a technology company, or wide exposure to security through other work experience such as business development, technical sales or sales engineer roles
  • Expertise in China's security commercial and regulatory environment, or evidence of a capability to rapidly become an expert
  • Strong experience managing teams or coordinating between teams to achieve specific business or organizational objectives
  • A bachelor's degree in Business Finance, Accounting, Economics or Engineering, with at least 10 years of relevant business experience MBA preferred
  • Strong stakeholder management skills with the ability to work effectively with very senior members of staff across internal organizations, including sales and marketing, product divisions and business groups, finance etc
  • Ability to drive informed decision-making, handle ambiguity, and tackle complex issues using data as a problem-solving tool
  • Very strong written and spoken communication skills
  • Fluent verbal and written in English preferred but not required Qualifications-Fluency in Mandarin
  • Internal candidates with strong global team networks are preferred
106

Senior Security Full Stack Engineer Resume Examples & Samples

  • Full stack support for corporate websites
  • Implement new technical solutions to accommodate new goals and feature requests for corporate websites
  • Build custom tools and dashboards for security analytics and reporting
  • Improve automation of daily operational tasks by leveraging vendor APIs, custom scripts and configuration management systems
  • Perform security reviews of server / web application architecture and ensure compliance with Rally Health security policies and best security practices
  • Analyze potential impact of new threats and exploits and communicate risks to relevant business units
  • Three or more years of technical experience in the systems engineering or software engineering field. Work experience in an environment certified and compliant with a globally recognized Security Framework / Information Security Management System (NIST SP 800-53, ISO27001, HIPAA, HiTrust, SOX, PCI) is a plus
  • Working knowledge of web development within AWS (EC2, CloudFront, S3, IAM, VPC, Route53)
  • Proficient knowledge of Linux (Ubuntu, CentOS, RHEL)
  • Proficient knowledge of Chef and or Ansible
  • Proficient knowledge of web servers (Apache, Nginx, IIS)
  • Proficient knowledge of a back-end programming language (PHP, Ruby, Python, Java)
  • Proficient knowledge of databases (Oracle, MySQL, PostgreSQL, MongoDB)
  • Proficient knowledge of HTML5, CSS3, XML, JSON, XSLT and JavaScript
  • Good understanding of code versioning tools (Git, BitBucket, SVN, CVS)
  • Good understanding of cryptography for data at-rest and data in-transit
  • Experience automating the administration of systems through scripting and APIs
  • Experience customizing and extending functionality of web application frameworks or content management systems
  • Ability to work extremely well under pressure while maintaining a professional image and approach
  • Exceptional information analysis abilities; ability to perform independent analysis and distill relevant findings and root cause
  • Team player with proven ability to work effectively with other business units, IT Security management and staff, vendors, and consultants
  • Ability to present information to stakeholders and/or decision makers in an effective and professional deliverable
107

Senior Security Team Leader Resume Examples & Samples

  • 2017 SENIOR SECURITY TEAM LEADER.pdf
  • Grade 12 or equivalent with relevant NQF level 5 (Certificate / Diploma or equivalent) Security Management, Risk Management or at least successful completion 2nd year of Tertiary studies
  • 3-5 years' experience in the security discipline
  • Experience at supervisory level will be advantageous
  • Compliance to local regulatory body (PSIRA – Level C)
  • Led team of people and had inputs into their personal/career development through coaching
  • Knowledge and application of industry legislation
  • Demonstrate a professional demeanour that includes the ability to interact and communicate with all stakeholders
  • Experience in advising business stakeholders at operational level
  • Computer literate (Microsoft Office)
  • Proficient in English (read and write)
  • Valid Code 08/EB drivers license
  • Auditable delivery track record
  • This post is dependent on successful completion of the Company's screening protocols such as being declared medically and physically fit and being security cleared
  • Knowledge of relevant legislation
  • Knowledge of product security business processes as relevant to business
  • Knowledge of security systems and processes, methodologies relating to physical, electronic and information security, and other security technologies
  • Knowledge and understanding of internal policies and procedures
  • Discipline knowledge (security risk management principles, practices, legislation)
  • Investigative and analytical skills
  • Surveillance and observation skills
  • Attention to detail and a tolerance for routine
  • Assertiveness, judgement ability and good planning and co-ordination skills
  • Good communication skills and ability to interact with personnel, customers, third parties, service providers
  • Ability to keep composure/presence of mind and confidence to operate in a life-threatening environment and/or act in the event of an emergency
  • Security risk management skills
  • Ability to effectively handle conflict, give and take constructive criticism
  • Influencing and alliance building skills
  • Multi-disciplinary mind-set (appreciate the impact of own practices on the practices of other disciplines)
108

Senior Security Development Engineer Resume Examples & Samples

  • Work with internal Product Team to derive use-cases and commercial schemes based on requirements and selected technologies
  • Lead and manage implementation across various departments, teams and stakeholders
  • Responsible for providing detailed documentation and knowledge transfer to operations team
  • Responsible for conducting solution brief and technical training to Technical Pre-sales team
  • Understand and identify customers challenges and problems in IT Security domain
  • Responsible for detailing the Scope of Work (SOW) for a project based on requirements, design and Service Level Agreement (SLA)
  • Provide level 3 advanced technical support on deployed security solutions
  • Perform security system reviews on feature development and solution enhancement
  • 3-4 years of working experience in Windows OS, Linux/UNIX servers, workstations, virtualisation systems
  • 4-7 years of experience working on security related technologies including PKI, VPNs, firewalls, IPS/IDS, Web Proxies, Cloud security, SIEM, DDoS Protection, Endpoint Threat Protection, Threat Intelligence Systems
109

Senior Security Administrative Specialist Resume Examples & Samples

  • Provides guidance and work leadership to less-experienced security staff
  • Knowledge of Microsoft Office and standard computer applications
  • Oral and written communication skills sufficient to compose and deliver responses to customers? routine questions in a clear and concise manner
  • Experience in access control; security personnel and physical security functional areas; to include but not limited to access control software and systems; personnel security policies and procedures; and facility physical security requirements
  • Experience performing adjudicative support ? Expertise in eliciting information; articulating information; and documenting information in a well-organized manner
  • Advanced ability to lead a team of security professionals encompassing multiple disciplines
  • Familiarity with Intelligence Community Directive (ICD) 705 regulations; to include requirements pertaining to Co-Use agreements
110

Senior Security Response Engineer Resume Examples & Samples

  • Experience in detection or incident response operations
  • Solid understanding of networking protocols and operating system internals (Linux, OS X and Windows)
  • Experience with network security monitoring tools, endpoint monitoring and forensic analysis tools (open source and commercial)
  • Willing to challenge the current state of detection and response operations
  • SANS 508 or equivalent professional training and experience a plus
111

Senior Security Advisory Consultant Resume Examples & Samples

  • Lead and deliver large scale cyber security consulting projects and security strategies based upon an understanding of security trends and customer business direction with responsibility for customer satisfaction targets, deliverable milestones, and project profitability
  • Provide delivery and project management of security advisory projects
  • Successfully support deepening customer relationships within the region on behalf of Cisco Security Advisory Services
  • Scope engagements and support the development of proposals and statements of work, effectively translating customer requirements into an engagement to meet those needs; complete accurate project profitability models
  • Translate business, industry, and regulatory requirements into information security objectives and associated tactical/strategic information security initiatives
  • Drive the execution of defined methodologies in a manner consistent with global practice expectations
  • Determine and define customer specific solutions and consulting methodologies as required
  • Participate in the development and continuous improvement of service portfolio
  • Participate in the development and ongoing improvement of the full commercial and proprietary consulting toolset
  • Complete time and expense reporting in a timely and accurate manner
  • 40-60% travel
  • Incident response planning
  • Security operations enablement
  • Optional: 3+ years of experience in managing the delivery and execution of security consulting engagements with Fortune 100 multinational organisations
  • Demonstrated experience in pursuing and close strategic consulting services engagements
  • Strong ability to consistently and successfully lead engagements from a technical and managerial perspective, achieving high levels of customer satisfaction and target margins
  • Strong understanding of industry leading practices in information security, compliance, and risk management
  • High degrees of experience and exposure to more than one industry vertical such as service provider, energy, financial, or manufacturing
  • Successful experience in holding credibility with top client executives while presenting complex ideas and creating urgency to execute proposed engagements and recommendations
  • Ability to engage and build relationships at CxO and management levels as well as demonstrate technical acumen when required
  • Excellent consulting skills, Successful consulting experience preferred
  • Data Management
  • Local Laws and Regulations
  • SANS Critical Controls
  • Global Information Assurance Certification (GIAC)
  • Certified PCI Qualified Security Assessor (QSA)
  • ISO 27001 Lead Auditor
  • Fluent in English, Japanese
112

Asia-pacific Senior Security Consultant Resume Examples & Samples

  • Engage IT project teams involved in developing cloud based application, throughout the SDLC to identify and prioritize applicable security controls and provide guidance on how to implement these controls
  • Act as Subject Matter Expert (SME) in applying and evaluating loud security capabilities and have deep technical understanding of responsible portfolios
  • Demonstrated integrity in a professional environment
  • Candidates are preferred to hold or be actively pursuing related professional certifications such as CISSP, GSEC, CCSP, CISM or CISA
  • Advanced degree preferred
  • CISSP or CCSP preferred
  • Seven or more years of experience in an Information Security or Information Technology discipline
  • Knowledge of Cloud Security Alliance’ cloud security controls
  • Working experience with more than one of these technologies, i.e. Java, .NET, Oracle, SQL, C++, webSphere, Sharepoint, IIS, Apache, etc
113

Senior Security Design Engineer Resume Examples & Samples

  • Car/allowance
  • Generous pension contribution
  • A flexible cash pot to spend on benefits
  • Wider corporate benefits and perks
114

Senior Security Manager Resume Examples & Samples

  • Ensures IBM's TS/SCI, SCIF and DoD security support activities function with a singular purpose, while adhering to the principles of agility, knowledge sharing, process improvement, innovation and a collaborative team focused approach
  • Responsible for communicating internally to ensure company business goals, strategy and objectives are imbedded into the security program support elements to ensure mission success
  • Provide subject matter expertise, advice, guidance and direction to IBM executives and managers in addressing and solving complex problems and issues relating to the classified programs environment
  • Chairs the company's Insider Threat Program Working Group spanning all classified elements
  • Collaborates with IBM Corporate Security leadership and other classified programs management to ensure established lines of communication and authority are clearly focused
  • Possess a current Top Secret/SCI clearance/access with polygraph and eligibility for additional accesses as may be required
  • 15 years experience in implementing above security responsibilities and requirements
  • Experience working in a team oriented environment with a strong emphasis on written and verbal communications skills
  • Ability to mentor and guide less experienced security officers and provide timely performance feedback to all direct reports
  • Working with ISMs and ISSOs, must be able to provide oversight and guidance with respect to classified information systems
  • Must be able to interact with Industrial Security partners, government security counterparts and others as required to benchmark best security practices
  • In depth knowledge of SCIF construction, accreditation and operational requirements
  • Ability to navigate, manage and work in a matrix environment
  • Knowledge of cybersecurity and counterintelligence environments and new requirements as they relate to the Insider Threat Program
115

Senior Security Device Analyst Resume Examples & Samples

  • At least one or more network and security industry/professional certifications (CCIE Security, CCSME, Juniper JNCIP Sec, Blue Coat Security, or similar industry-recognized certifications)
  • Fluent English (reading/writing/speaking)
  • Combined experience in network administration, server administration, information security
  • Experience in BMC Remedy
116

Senior Security Email Analyst Resume Examples & Samples

  • Previous Information Assurance or Cyber Experience in the Telecommunications industry
  • Previous experience working in a Security Operations Center (SOC) with focus on Computer Network Defense (CND)
  • Understanding of Enterprise email components (hardware, software, etc.)
  • Knowledge of Threat Monitoring Procedures
  • Program and Scripting Experience
  • Ability to comply with any regulatory requirements
  • Demonstrates knowledge and understanding of cyber risks and threats related to cyber attackers
  • Bachelor degree from an accredited college in a related discipline, or equivalent experience/combined education with 3-5 years of professional experience. This job role is considered experienced, but still a learner with influencing responsibility on junior team members
  • Certification (A+, Network+, Security+, CISSP, GSEC, GCED, GCIA, and GNFA) a plus
117

Senior Security & Contingency Manager Resume Examples & Samples

  • Coach, support and develop staff, including supervision, to maximise their performance and ensure high standards of care, values, ethical standards, equality and diversity, policies and procedures, legislation and contractual and inspection framework requirements are met
  • Collate and report information regarding the frequency and nature of security incidents, advising and implementing remedial action
  • Support contingency planning within the Centre, organising practical exercises in conjunction with the Youth Justice Board so that the Centre and its staff are prepared for incidents
  • Manage the Control room function ensuring effective safety and communication at all times
  • Lead on the management of security incidents
  • Identify areas of risk and manage appropriate functions to mitigate whilst maintaining a positive risk culture
  • Engender a positive health and safety culture to meet and maintain relevant Health and Safety recognition
  • Participate in centre assessment days, following safer recruitment guidelines to ensure delivery of the recruitment plan
  • Security Officer/C481/85597/1
118

Senior Security Ops Engineer Resume Examples & Samples

  • Tune, monitor and analyze network traffic and respond to IDS alerts
  • Drive down mean time to resolution for all Security work
  • Work with the GRC team to develop the policies, standards and procedures related to Security Management
119

Senior Security Research Lead Resume Examples & Samples

  • Lead a strong team of security researchers to deliver on the team’s research, response and advice goals
  • Lead efforts to build and use automation. Machine learning and the cloud to scale-out impact
  • Determine most effective method of problem resolution with internal research team and engineering team input
  • BS in Computer Science or Computer Engineering, or relevant degree
  • 7+ years of experience doing research, security, data science, machine learning, or malware
  • Good communication skills and an eye for detail. Able to perform well under stress, particularly in emergency response situations
  • Strong understanding of operating system and computer networking concepts
  • Strong technical and thought leader with skills in various scripting tools and/or C# programming background preferred
120

Senior Security Assessment Analyst Resume Examples & Samples

  • Excellent verbal and written communications skills, including presentations to clients and senior technical resources
  • Comprehensive web application security expertise
  • Excellent security knowledge (access control) of one or more applicable security technologies or platforms
  • Experience in application and integration of globally accepted security standards
  • Contacting system owners for assigned systems to gather relevant background material about the system/application and setting up interviews for information gathering
  • Conducting security assessments using available documentation
  • Acting as Technical Lead on assessment tasks; ensuring the assigned cases are assessed as scoped, that attacks are taken to their fullest potential and that creative, complex and blended attacks are used to further add value to engagements
  • Experience in security testing is a plus
  • Knowledge of cloud security architecture is a plus
  • Financial Services industry knowledge is a plus
121

Senior Security Technical Program Manager Resume Examples & Samples

  • Access Control List Technical Product & Program Management
  • Privileged Access Technical Product & Program Management
  • Compliance & Audit Technical Product & Program Management
  • Vulnerability Technical Product & Program Management
  • Infrastructure Security Product & Program Management
  • Working with multiple delivery teams to take ownership and accountability of technical project planning and delivery for security and infrastructure build out programs
  • Seek to continuously grow by proactively seeking and embracing constructive feedback
  • Providing the same level of feedback to colleagues to encourage an open and collaborative culture
  • 8+ years experience managing large highly complex programs/projects utilizing Agile/Scrum, Kanban
  • Experience in driving key security engineering, compliance and other security products and programs internally and externally in a cloud environment
  • Excellent at setting expectations with teams, through providing meeting agendas, follow-up items, and check-in meetings to discuss any confusion
  • Complete ownership and ability to solve problems
  • Ability to be flexible with a positive attitude and learn quickly in a dynamic environment
  • Detail-oriented. Able to juggle multiple projects and tasks
  • Bachelor's Degree required, preferred Masters in engineering, computer science or related technical field
  • Thorough understanding of security related technologies and products is a plus
  • Ability to establish credibility and rapport with senior executives and technical and non-technical team members alike
  • Ability to successfully collaborate with multiple technical functions in the areas of infrastructure, technical operations, software engineering and customer support
  • Familiarity with Google documents
  • Familiarity with retail platforms and applications (e-Commerce, Point of Sales, retail back office)
  • Familiar with various security standards, policies and governance such as: PCI-DSS, ISO 27001, HIPAA, AICPA SOC reports, NIST Cloud standards
  • 5+ years experience managing governance, risk and compliance related products and programs
  • Understanding of Security Development Lifecycle
122

Senior Security Technology Analyst Resume Examples & Samples

  • Strong Intrusion Detection: management, tuning, monitoring & analysis
  • Demonstrate an understanding of incident response processes, cyber threats, vulnerabilities and network exploits
  • Review and Interpret various system logs (e.g., Windows System, Application, Event logs, Linux, Email, Web server, DNS , DHCP , VPN, Proxy, IDS)
  • Perform Enterprise vulnerability assessment scanning
  • Analyze vulnerabilities, determine impact, write alerts and advisories, implement remediation
  • Identify and follow through on host remediation when a compromise is found
  • Install and test application and network application upgrades and patches
  • Maintain, update and create automated procedures to maintain network security
  • Strong SIEM experience – administer and usage
  • Solve host remediation issues when help desk personnel need assistance
  • Monitor and maintain web filtering
  • Maintain Unix/Linux environments
  • Design, installs, configures, manages, and maintains mission critical enterprise firewalls, IPS, VPN and other technical controls
  • Apply strategic and tactical responses in real-time in a high stress and changing environment
  • Provide mentoring to staff as a means to develop job satisfaction and coordinates cross training opportunities with other technical support groups
  • Centrally monitor critical systems and responds to security events according to procedure and experience
123

Senior Security Manager Resume Examples & Samples

  • Manage the companies Security Operations Center staff and processes. Implement procedures and provide response to manage emergencies such as fires, threats, protests, and other office and/or security-related incidents
  • Initiate response protocols and escalate emergency issues to appropriate management stakeholders. Has authority to act at own discretion as circumstances dictate and to make decisions where personnel and procedural control and guidance are not available. Available 24 hours a day, 7 days a week to serve as primary contact to respond to emergency calls as prescribed by Security Director
  • Consult with site management to ensure service levels and consistencies in operating procedures are met across the domestic footprint for Liberty Mutual domestic physical security vendors
  • Assist in developing security standards and procedures for offices across the domestic footprint and perform audits as requested. Train and educate managers, employees and contractors to ensure awareness, compliance and enforcement
  • Prepare and maintain Disaster Recovery/Contingency Planning for Security Operations Center and related staff Ensure all data is on file and is accurate and practical. Serve as a team member on the Corporate Emergency Response Team and Business Continuity Initial Assessment Team
  • Research and develop recommendations for potential security technology improvements required to protect the companys assets and enhance operational activities to include communications, access control, visitor management, video surveillance, integrated security platforms, etc
  • Review security incident reports; oversee compliance activities, and other administrative duties. Develop summary reporting and identify trends in risk and exposure. Analyze problems; develop action plans and implements solutions to security related problems. Investigate security-related issues and violations in corporate policy and procedure
  • Attend court or depositions if necessary on LM's behalf. Maintain security pertinent data on all legal holds. When necessary, assist with and file GL claims on behalf of Facility Managers. Coordinate claim data reconciliation/collection
124

Senior Security Infrastructure Admin Resume Examples & Samples

  • 6+ years of in depth SQL Server Database Administration experience
  • Experience installing, configuring, managing, monitoring and troubleshooting SQL Server 2008, 2012, 2014,2016
  • Expert knowledge on Microsoft SQL Server Enterprise administration using AlwaysOn Availability Groups
  • Experience with Replication, Log Shipping, Clustering, and Database Mirroring
  • Strong knowledge of backups, restores, recovery models
  • Advanced SQL Server performance tuning skills
  • Strong experience with database upgrades from one SQL version to another SQL version
  • Experience in troubleshooting and resolving database integrity issues, performance issues, blocking/deadlocking issues, connectivity issues, data replication issues etc
  • Experience with using SQL Profiler to help troubleshoot performance bottlenecks
  • Ability to detect and troubleshoot and resolve database related CPU, memory, I/O, disk space and other resource contention issues
  • Expertise in reviewing stored procedures and TSQL code to meet IT company standards for readability, reliability, and performance tuning
  • Ability to support an enterprise database infrastructure with hundreds of databases
  • Strong knowledge of indexes, index management, integrity checks, configuration, and SQL patching
  • Proficient knowledge of Disaster Recovery and Multi-Instance implementations and methodologies
  • Strong self-sufficiency and initiative working on Database projects
  • Experience configuring, developing and troubleshooting SSIS and SSRS
  • Will be a part of an On-Call rotation with some after hours and weekend work required
125

Siem-sioc Senior Security Consultant Resume Examples & Samples

  • Strong communication skills both written and verbally
  • Ability to translate security impacts to the wider business
  • Knowledge of cyber security threats, threat actors and their associated TTPs
  • Skills to analyse attack vectors against a particular system to determine attack surface
  • Ability to produce attack models applied to a scenario
  • Ability to demonstrate problem areas using kill-chain techniques and attack path analysis
  • Knowledge of security controls, how they can be monitored, and thwarted
  • Knowledge of log formats for syslog, http logs, DB logs and how to gather forensics for traceability back to a security event
  • Experience with security devices such as IDS/IPS, HIDS/HIPS, anomaly detection, Firewall and Antivirus systems and their log output
  • Network forensics: network traffic protocols, traffic analysis (i.e. Network flows and PCAP), intrusion detection
  • Working knowledge of SIEM tools (such as RSA, Arcsight, Splunk and Qradar)
  • Takes an active part in the gathering, analysis, and communication of threat intelligence through the intelligence process/life-cycle
  • Provide intelligence briefings to other areas of the business on threats or threat actors and the risk they bring to the environment
  • Coordinates the planning, development and production of communication materials using various communication vehicles
  • Interface with Security Operational Center (SOC) management and related internal groups for review, production, and dissemination of content
  • Experience with Security Assessment tools (NMAP, Nessus, Metasploit, Netcat)
  • Experience in technical publication management
126

Senior Security PM Resume Examples & Samples

  • Ability to foster cooperation across groups
  • Calm in a crisis
  • A B.A or B.S. degree in Computer Science or similar field or equivalent experience
  • 2+ years of hands-on experience in security investigations, threat detection & analysis, security program manager, and/or incident response
  • Strong comprehension of security trends, emerging threats and calculating risk to recommend/take proper courses of action
  • Experience with security events or availability incidents is a must
127

Senior Security Transparency Automation Specialis Resume Examples & Samples

  • Corporate IT compliance activities
  • Business applications security
  • Infrastructure security
  • Security architecture
  • Cloud compliance activities
  • Analytic and assessment services to further shape transparency on the SAP global security status and to drive our Operations Security strategy
  • Graduate in Computer Science, Software engineering, Engineering or equivalent
  • Quick Learner, passionate, motivated and self-managed
  • Strong communication skills in English and German
  • Good theoretical & practical knowledge in the reporting area
  • Knowledge of Cloud based operations (SaaS, PaaS, IaaS)
  • Consulting skills
  • Experience with the SAP Security Policy Framework including IT Security Standards, Directives and Procedures is a plus
  • Experience in security dashboards and security reporting
  • Knowledge of regulatory requirements for IT Security (e.g. ISO 27001)
  • Knowledge in IT Best Practices (e.g. ITIL)
  • Familiar with SAP analytics tools
  • Basic knowledge of SAP HANA Modelling
  • Demand for a challenging position and the desire for self-development
  • At least 3-5 years professional experience in the field of consulting or reporting
  • Additionally, work experience in the area of security is a plus
128

Senior Security Manager Resume Examples & Samples

  • Manages all aspects of contracts with security risk management partner/company
  • Initiates and oversees the development, implementation, administration, monitoring, and improvement of security, policies, programs, procedures, and protocols designed to protect company personnel, assets, plant operations, business partners, vendors, visitors, and the community
  • Implements all required government and company security programs and protocols
  • Responsible for updating and notifying the required agencies when changes are made in the facility Security Plan (as needed)
  • Manages the ongoing administration, maintenance, audits, and upgrades of all required security programs and procedures
  • Oversees security office facilities, systems, and equipment, including surveillance equipment and badge identification systems
  • Coordinates the security aspects of a site emergency
  • Plans and conducts physical security audits, and prepares comprehensive and well-documented reports of findings
  • Ensures inspection of the perimeter fencing and lighting, and coordinates with maintenance to correct any deficiencies
  • Ensures the correct operation, maintenance, and repair of camera and personnel access control systems
  • Ensures key & lock control, including key duplication
  • Prepares appropriate reports regarding losses, vulnerabilities, and violations as they affect plant operations
  • Develops and manages site security budget annually
  • Initiates work orders, service orders, material requests, major project installations, and/or renovations for fencing, lighting, cameras, alarms, badging systems, and security facilities
  • Serves as a resource for issues involving plant security
  • Stays abreast of the latest security issues, methodologies, and equipment and regulations
  • Advises management and recommends upgrades to security operations
  • Travel up to 40%
  • Bachelor's degree (or higher) in Criminal Justice or similar discipline preferred
  • 7-10 years of security experience, including leadership experience in crisis situations required
  • Experience working with the public and government agencies (as a plus)
  • Experience in the Energy Sector preferred
  • Certified Protection Professional (CPP) preferred
129

Senior Security Manager Operations Resume Examples & Samples

  • Background in law enforcement/military or intelligence service within region (10 years) and/or at least 5 years of experience in senior roles in business security
  • Comprehensive knowledge and experience of security management acquired in the public or private sector
  • Proven comprehensive investigational and analytic skills to identify investigative and security issues independently and with minimal oversight, as well as the ability to customize, implement, and execute solutions efficiently and effectively
  • Fluency in both oral and written English
  • Computer literate (excellent knowledge of MS Office: Word, Excel, Power Point)
  • Valid driving license, category B
130

Senior Security Tools Engineer Resume Examples & Samples

  • Host Based Intrusion Prevention system administration/management – 1 Year Experience
  • Security Information Event Management (SIEM) Tool administration – 1 Year Experience
  • Intrusion Detection / Prevention administration – 1 Year
  • DISA STIG Validation / Compliance – 1 Years
  • Minimum of two years related experience is required, two of which must be specialized in Information Security
  • McAfee ePolicy Orchestrator (HBSS) Administration – 1 Year
  • ACAS Security Center Vulnerability Scan Tools – 1 Year
  • Wireless Intrusion Detection administraton/management – 1 Year
  • DIACAP Certification & Accreditation or NIST RMF – 1 Year
  • CISSP (Preferred)
  • Bachelor’s Degree in Computer Science, Information Assurance, Information Systems, or other related scientific or technical discipline is preferred
131

Senior Security Specialist, rd Shift Resume Examples & Samples

  • Perform core Rover duties including campus rounds, break coverage, building inspection, perimeter patrol and more
  • Photograph new employees/contractors and create identification cards
  • Assist Facilities Service Center in call taking and dispatch functions in accordance with the established procedures
  • Provide leadership during response to all medical, fire, security, and other safety related emergencies and incidents and write comprehensive reports following established procedures
  • Occasionally monitor fire alarm control panel and interpret alarm indicators for emergency type and location. Rapidly reposition to location of possible emergency and assess, determine and respond within a three (3) minute timeframe from initial alarm
  • Conducts inspections per established hot work permit processes to preserve safety at ESPN facilities
  • Occasionally perform Security Associate and Security Specialist duties. Be a role model and reinforce standards for those roles
  • Identify and recommend security protocol or procedural enhancements
  • May provide security presence at special events
  • In some instances, you may establish barricades, operate gates, and generally direct vehicular and pedestrian traffic
  • Provide appropriate general information to visitors and employees
  • Perform general security system checks
  • Monitor and enforce campus parking regulations in accordance with established procedures
  • Monitor hand held radio channels for HVAC, Electrical, Maintenance, Construction and Safety to facilitate communication between groups
  • A minimum of three (3) years of security or law enforcement experience
  • Must pass a pre-employment background check, DMV check, and urinalysis drug screen
  • Maintain a professional presence in image and interactions at all times
  • Proven ability to operate as an informal leader within a team
  • Possess the ability to apply functional expertise and guide others
  • Ability to positively influence team effectiveness
  • Highly adaptable with the ability to work well under pressure. Maintain composure in stressful situations
  • Ability to perform tasks independently and apply good judgment in a variety of situations
  • Able to take command and diplomatically control difficult situations
132

Senior Security Specialist, Architecture Resume Examples & Samples

  • Design and develop security consulting strategies and methodologies: mimic best practice in industry and tailor to TWDC needs
  • Hands on engineer, design, initially configure, integrate and operationalize network-based and infrastructure security technologies and solutions for security monitoring, assurance, mitigation and response with key focus on newer technology spaces such as cloud computing, mobile computing, etc
  • Creates and maintains IT Security consulting practice to address infrastructure, cloud and mobile security related strategies, methodologies, policies, standards and processes
  • Identifies areas for architectural, engineering and operational improvements of existing infrastructure, cloud and mobile security solutions, drives such improvements start to finish
  • Utilizes existing infrastructure, cloud and mobile security solutions and develops new ones to bridge gaps
  • Develops and updates infrastructure, cloud, mobile security program policy interpretation, suggests updates to governance based on new security risks and technologies
  • Provides infrastructure security program transparency to management and compliance by reporting the company’s infrastructure, cloud and mobile security posture on a regular basis, providing trend data and progress insights
  • 10-15 years in information security
  • 5+ years primarily in infrastructure, cloud, mobile security area
  • Leadership in at least one discipline in IT Security, including Operations or Architecture
  • Leadership in large consulting firm
  • Record of hands-on experience, including metrics
  • Hands on experience is more valuable than certifications. However, SANS and GIAC certifications are regarded as adequate training
  • 15+ years in information security
  • 7+ years primarily infrastructure, cloud and/or mobile security areas
  • Deep experience working with broadly diverse groups requiring differing security solutions in the same scope
  • Multi-discipline leadership in major Consulting firm
  • Fortune 50 business experience
  • Infrastructure, cloud, mobile security-related certifications by ISC2 and GIAC, as well as technology-specific certs by security vendors
  • Professionally passionate about information security, esp. infrastructure, cloud and mobile security
  • Experiences working in a large, highly complex business environment
  • Preferred work experience includes large enterprises with diversified business lines, service providers, operators, Hi-tech vendors, security vendors (product dev and proserv areas), and/or media/entertainment/social networking/gaming business lines
  • Solid understanding of information security principles and industry best practices primarily in the infrastructure, cloud and mobile security areas
  • In-depth understanding of infrastructure/network, cloud and mobile security
  • Hands on security engineering experiences on 3 of the following categories, cloud technologies preferred
  • BS/MS in any hard science (e.g. engineering, mathematics, statistics, physics), quantitative business major with passion in hi-tech (e.g., MIS, informatics)
  • IT Security Policies and Standards
133

Senior Security Master Specialist Resume Examples & Samples

  • Support various investment managers in securities setup
  • Complete adjustments and/or edits to trades
  • Update securities attributes, securities set up and pay-downs of securities
  • Manage data gathering, reporting and analysis
  • Maintain reference and pricing data to account for corporate action events, regulatory disclosures, and to enable seamless trading for clients
  • Reconcile trade related data, processing account and security updates as well as other data integrity related functions
  • Proficiency with Microsoft Excel and Bloomberg
  • 2+ years of experience with fixed income asset classes in a security master related role
  • Progress towards CFA
  • Intermediate or advanced proficiency with Microsoft Excel and/or Access
  • Exposure to Charles River Investment Management system
134

Senior Security Manager Resume Examples & Samples

  • Responsible for ensuring that proper security coverage exists at all times
  • Reviews incident reports to ensure that they are completed in a timely manner and written in a clear and concise format
  • Reviews, revises and updates security policies or procedures as they become necessary, or as instructed by management
  • Ensures availability 24 hours a day in the event of an emergency
  • Responsible for tracking and submitting resort security statistics to the regional security director, or their designee, annually
  • Completes all required Company trainings and compliance courses as assigned
  • Adheres to Company standards and maintains compliance with all policies and procedures
  • A minimum of three (3) years of experience in the Security field required
  • A minimum of two (2) years of supervisory experience in the Security field required
  • Computer proficiency in Microsoft Word, Excel and Outlook
  • Able to perform a variety of duties, often changing from one task to another of a different nature, with impending deadlines and/or established timeframes
  • Competent in public speaking
135

SOC Senior Security Architect Resume Examples & Samples

  • 10-12 years of related experience with supervisory experience preferred
  • 8-10 years of direct experience in cyber security engineering and/or cyber defense operations services required
  • 5 years cumulative experience in Security Operations Center / Computer Incident Response Team / Security Engineering / Secure Solution Design
  • 3 years of direct experience managing, responding to, and resolving crisis situations caused by cyber security events in a federal agency, DOD, or intelligence community environment
  • 3 years of direct experience in project management for evaluating, implementing, optimizing cyber tools and capabilities
  • Direct experience in a personnel management role for a minimum of 10 employees with responsibility for managing job performance, technical skills development, and career management preferred
  • Direct experience in consulting or service management strongly preferred
  • Requires the capability to proactively deliver innovative and effective cyber capabilities and evaluations in a distributed network defense environment
  • Requires mature capabilities in managing security engineering and operations activities involving numerous security product categories including firewalls, intrusion detection/prevention, anti-virus infrastructures, security incident/event management systems, threat intelligence platforms, and common operations tools such as ticketing systems
  • Requires the ability to effectively engage the business on cyber topics, to define cyber project requirements and engage effectively with broad IT transformational teams
  • Must be able to lead highly technical professionals through regular transformations of services delivered to address dynamic threat environments
  • Must demonstrate extremely strong business management and personal leadership skills with complementary cyber security technical skills
  • Demonstrated ability to interact effectively with executive leadership on a regular basis using written and oral communications
  • Must possess aggressive business growth capabilities and desire to grow business
136

Senior Security Control Center Analyst Resume Examples & Samples

  • Monitor, investigate, and respond appropriately to alarm signals to include fire, life safety, intrusion, and asset protection, and provide direction as necessary for US Bank
  • Coordinate response with relevant internal or external agencies to provide ongoing protection of U.S. Bancorp customers, personnel and assets. Process bidirectional communications from U.S. Bancorp personnel, law enforcement agencies and U.S. Bancorp customers and vendors
  • Provide assistance with and documentation of all U.S. Bank alarm system testing
  • Interact closely with all divisions within the corporation, i.e.: Senior Management, Investigations, Guard Services, Facilities, and Engineering. Serve as intermediary to channel communications between U.S. Bancorp Business Lines and serve as a primary disaster communications hub for US Bancorp and related entities
  • Assume responsibility and take necessary actions for problem resolution. Must be able to work independently with little or no guidance and recognize when management involvement is required. Requires communication with all levels of management, up to and including the executive level
  • Adapts to changes or problems that may be encountered while performing routine daily activities. Assists in maintaining staffing requirements with little or no prior notification. Mandatory overtime and shift assignment may be required at times, especially during crisis or disaster. Occupancy of the Security Control Center by two qualified persons at all times is required. Staff may be confined to center during breaks and lunches
  • Monitor various auxiliary systems including: CCTV systems for both local and remote properties; a variety of access systems, to include badge, perimeter, and internal secured areas; satellite television and internet weather sources for news and weather events, both local and national, and to determine anticipated company impact and provide notifications as required
  • Provide written documentation, using good grammatical form and appropriate style, to express ideas in a thorough and concise manner. Produce factual and accurate written reports as required. Coordinate processing of documentation per corporate and departmental auditing guidelines
  • Operate a variety of computer systems, and be familiar with various software packages such as Windows Operating System and other proprietary software packages. Perform system data updates as required, to include input, processing and storage of critical data. Provide and maintain wireless messaging systems for other US Bank personnel including radio communications, cellular communications and digital paging
  • Significant impact on the safety, security and protection of U.S. Bancorp personnel, customers and assets may result based on actions taken and decisions made while carrying out the duties and responsibilities of this position. Ability to deal with life-safety and other emergency issues using proper judgment is critical
  • Monitor and analyze various information sources (I.e. Social media, vlogs and blogs, internet news sources etc. for situations such as security incidents, life safety, criminal acts/terrorism, etc., which could or are impacting USB
  • Utilize process improvement strategies and analytical thinking to improve the configurations and use of the intrusion detection system, event logs & minimize the number of false-positives
  • Maintain an understanding of the current vulnerabilities, response, and mitigation strategies used in security operations
  • Participate in the security incident response team efforts and other security investigations activities as assigned
  • Assist in building the SCC and physical security processes, procedures, and training
  • Help analyze security tools and systems and report on security and performance
  • Stay abreast of current technologies, developments, security compliance requirements, standards and industry trends in order to help achieve the goals of the department
  • Distributes workload and monitors production of work load on shift
  • Responsible for taking ownership by managing assigned systems or projects. Required to be the assigned primary contact and project leader for the SCC and Physical Security Division. (e.g. systems, procedures, equipment, initiatives)
  • In place of a supervisor at either SCC, or at a supervisor or managers direction, provides input to manager for performance standards and reviews. Reviews employee work assignments, vacation requests, updates current schedule and forwards to Manager for final approval
  • One to two years of applicable experience
  • Minimum one year of customer service experience, preferably in dispatch or security console activities
  • Must be able to pass background check and obtain certification for State of Oregon’s Department of Public Safety Standards and Training for alarm monitoring
  • Excellent oral, written, and interpersonal communication skills
  • Proven customer service and problem resolution skills
  • Basic word processing and spreadsheet skills and experience with department specific systems preferred
  • Detail oriented and adaptable to changing circumstances
  • An advanced understanding of banking and property management operations
  • One year of documented experience in a supervisory capacity
  • Two years as an employee within Enterprise Security Services
  • Ability to work independently with little or no guidance and recognize when management involvement is required
  • Demonstrated history of self-motivation and good decision making
137

Senior Security PM Resume Examples & Samples

  • Provide project management for project activities to ensure that the project is completed on time, within budget and within scope
  • Define project scope, duration, resources and cost, as well as the best course of action/approach to attain the project objectives
  • Provide project management for project scheduling, tracking, issue management, risk management, change management, and status reporting
  • Follow the State Unified Information Technology Environment (SUITE) Project Management Methodology (PMM) and System Engineering Methodology (SEM), based on Industry standard PMI framework and SEI’s CMMI framework
  • Utilize the State’s Project Portfolio Management (PPM) tool (Changepoint) on all projects
  • Plans and coordinates work with teams. Designs and implements project plans. Generally work with other IT managers and IT technical teams. Relies on experience and judgment to plan and accomplish goals
  • Acts as a program manager for large complex enterprise IT Security initiatives
  • Acts as a partner to other project managers performing Project Management Quality Assurance for their projects
  • Relies on experience and judgment to plan and accomplish goals. A significant degree of creativity and latitude is required. Works under limited supervision with considerable latitude for the use of initiative and independent judgment
  • Self-directed and independent. Responsible for the coordination and completion of projects. Oversees all aspects of projects. Sets deadlines, assigns responsibilities, and monitors and summarizes progress of project. Prepares reports for upper management regarding status of project
  • Creates a structure and organization for the management of a complex environment with emphasis on quality, productivity, and consistency. Directs corrective actions in any area where performance falls below objectives
138

Senior Security Arcsight Administrator Resume Examples & Samples

  • Development of ArcSight Use Cases
  • Excellent Unix system administration skills
  • Expert Level implementation experience with ArcSight logger (at least one year of experience)
  • Good writing and documentation skills
  • Experience working in a Security Operations Center as an analyst, team lead, or manager
  • Successful completion of one or more ArcSight administration or analyst course
  • Serve as subject matter experts in SIEM technologies and methodologies
  • Support and maintain a high throughput and high performance ESM installation (OS, application software, appliances, vendor management, and databases)
  • Provide and support requirements for event log collection for a global organization
  • Interface with clients, partners, and internal teams to facilitate proper onboarding of event log data from log identification to SIEM event analysis, tuning, and white listing
  • Provide actionable and proactive engineering plans to management to support ever-increasing availability, capacity, and capability requirements of ESM and infrastructure
  • Provide consultation and expert advice regarding content capabilities and structures to clients, partners, and internal teams
  • Architect, build, and maintain advanced and effective SOC and analysis monitoring content
  • Constantly looking for new ways to monitor and alert on suspicious activity
  • Advanced system administration skillset in both Unix and Windows technologies (ability to install OS from scratch, reconfigure OS and networking parameters, perform security hardening, and monitor system performance)
  • Experience hands-on administration of ArcSight ESM (performing upgrades, troubleshooting performance, installing and/or configuring, content migration)
  • Integrated various of event log data into ArcSight including but not limited to pre-collection analysis, determination of necessity, performing aggregation and filtering of high volume data feeds
  • Exceled at troubleshooting new and unknown problems with little guidance
  • Developed, performance tested, and deployed advanced ArcSight ESM content in a high performance installation (>10,000 EPS)
  • Installed, migrated, and maintaining Stock ArcSight connectors
  • Developed, optimized, and deployed Flex ArcSight connectors leveraging at least two of the three following technologies UDP,XML and SQL
  • Performed in-depth ESM performance monitoring and tuning at a both OS and SQL level (using utilities like SAR, SQL configuration parameters, OS configuration parameters, etc)
  • ArcSight connector appliance and logger hands-on administration
  • Scripting knowledge in PowerShell, Perl, visual basic, general batch/shell scripting or alternatively, hands-on experience developing enterprise applications using JAVA or C# etc
  • Developed, performance tested/tuned, and deploed advanced ArcSight ESM content in a high performance installation (>10,000 EPS)
  • Created advanced multi-component rules, using variables, categories, and lists to enrich the rule output using framework approach
  • Created and utilized complex filter structures to establish and maintain standardized data sets and components including data normalization
  • Dissected and validated IDS/IPS signatures using network tools such as Wireshark and tcpdump
  • Performed hands-on malware analysis and produced malware analysis report with analysis of vector of attack
  • Certifications (ACSA / AESA / ACIA / AEIA) desired
139

Senior Security Manager Resume Examples & Samples

  • Lead the operations of the SOC to ensure optimal identification/resolution of security incidents, and enhance client security
  • Manage the collection, documentation and research of security incidents received via the SOC
  • Communicate threats to Senior Management which may impact the client
  • Conduct scheduled and ad hoc training exercises to ensure staff are current with the latest threats and incident response techniques
  • Oversee and develop strategies to identify, detect, and prevent fraudulent activity
  • Perform supervisory/managerial responsibilities
  • Develop, mentor and counsel staff
  • Ensure section/branch goals and objectives align with division/department strategy
  • BS/BA degree or equivalent combination of related work experience desired
  • 10+ years of experience in the Cyber Security field
  • Prior SOC Management experience highly desired
  • Prior security analysis experience is desired
  • CISSP Certification & PMP Certification highly desired
  • Other desirable certifications include; Security+, CEH, GCIA, GCIH or similar
  • Experience in troubleshooting in a technical environment
  • Experience performing analysis utilizing IDS/AV consoles
140

Senior Security Delivery Leader Resume Examples & Samples

  • Define and execute a delivery strategy including security solution development, business proposal implementation, up and cross sell during implementation and managing the margin
  • Define and execute a competency pursuit strategy including envision new security platforms, packaged security service offerings and security delivery accelerators
  • Define and execute customer management, engagement governance, scope monetization and ensure delivery excellence through process, technology and people in global delivery centers
  • Define and execute delivery management strategies including escalation management, streamlining delivery process, control of margins and operations
  • Engage with internal business and matrix technology teams to analyze the current state of security processes and systems of customers, then use that information, along with business strategies to envision the future state in accordance with customer business needs
  • Collaborate closely with designers, engineers, and other cross-functional team members within the organization to ensure that our products are built to the highest security standards
  • Should have 20+ years of experience and a strong Information Security Technology Background including all security domains, to include but not limited to Identity and Access Management, Data Security, Cloud Security, NextGen SOC, Threat and Vulnerability management, Application Security and IT GRC automation
  • Should possess a knowledge of enterprise security environments, experience in security consulting services
  • Should be well versed in security Policies & standards, security GRC and Security Audit practices
  • Should have expert level understanding of the information security vendor landscape
  • Should have demonstrated ability to create and maintain CISO, CSO-suite relationships and derive business from those relationships
  • Should work collaboratively with other Cognizant practices and geographic regions to ensure that Cognizant continues to operate effectively as one firm
  • A personal style that is viewed as open-minded and collaborative
  • Ability to effectively write and communicate complex issues in an easy to understand manner
  • Ability to be candid, open and consistent in communicating
  • Ability to share information with awareness of its effect on others
  • Ability to tailor written communications to audience, avoiding technical jargon
141

Senior Security Orchestration & Automation Engineer Resume Examples & Samples

  • Experience evaluating complex products from creation of criteria, all the way through product selection
  • Ability to work with large, globally distributed teams
  • Must know python like the back of your hand
  • Must have previous experience with incident response or threat intelligence (you need to speak the same language as your "customers")
  • Puppet, Chef, or similar system automation systems
  • Integration of multiple, disparate systems with both documented and undocumented APIs
  • Experience with Salesforce (the platform) is a plus
  • Proficiency with Java and Scala would be handy, considering some of the integrations needed
  • Our long term datastores are within HDFS, so MapReduce skills would be useful
  • Past development experience with Kafka and Spark
  • A devops background is preferred
  • Previous knowledge/experience with orchestration and automation platforms
  • Service ownership experience
142

Senior Security Response Engineer Resume Examples & Samples

  • Identify, track and report on emergent threats to the security of BlackBerry products, associated companies, and customers
  • Triage code defect based issues and quantitatively evaluate risk using industry standard metrics such as CVSS
  • Cultivate strong working relationships with external researchers, reporting organizations and customers to ensure effective collaboration. Work with customer facing and internal teams to continually improve processes used to identify and fix product security issues
  • Ability to analyze code behavior down to assembly level language
  • Firm grasp of secure software development lifecycle
  • Holds a Bachelors degree, Masters degree or equivalent in a computer science/engineering OR related and relevant experience
  • Knowledge of application security configuration and best practices
  • Experience with issue management as well as designing/defining proactive mitigation strategies
143

Senior Security Engineer / Project Manager Resume Examples & Samples

  • Mentor critical thinking by seeking additional information for logically thought out problem alternatives
  • Minimum 10 years project management experience with networking systems development and deployments in a medium to large enterprise preferably in a multi-hospital and /or medical center setting
  • Large Corporate program management experience is a strong plus
  • Knowledge with networking designs, data flow and components at a CCNP level, but certification is not required
  • Understanding of Security Methodologies
  • Knowledge of advanced firewall technologies especially Palo Alto firewalls is helpful but not necessary
  • Knowledge of Windows/Linux/Unix operating systems is helpful but not necessary
144

Senior Security Architecture Assessment Analyst Resume Examples & Samples

  • Conducting remote/in-person interviews with system owners to get all required information for assessment and to identify any gaps
  • Reviewing results with system owners, as needed
  • Creating comprehensive security architecture assessment reports that clearly identify root-cause and remediation strategies
  • Developing and establishing global security standards and processes
  • Mentor Consultants in both technical and consultative skills to ensure the team executes at a consistently high level
  • Ability to manage expectations and handle high-pressure situations with tight deadlines
  • Experience in an information security (application and/or infrastructure) role in an enterprise environment
  • Ability to explain common application vulnerabilities and remediation strategies to developers
  • Ability to quickly adapt to changing priorities and demands
  • Excellent knowledge of information security processes, response procedures, and various attack methods used for information theft or network intrusion
  • Excellent knowledge of network technologies as they pertain to communications, computer system environments and related infrastructures
  • Experience with security architecture analysis as well as secure software system designs and architecture including common development platforms and hardware/languages
  • Strong understanding of general Information security principles and solutions including design principles, data flow, connectivity and configuration
  • Knowledge of network protocols (e.g. TCP/IP, DHCP, DNS) and design processes including an understanding of security objectives, operational objectives, and tradeoffs
  • Knowledge of network access, identity, and access management (e.g., public key infrastructure [PKI]) as well as encryption
  • Working knowledge of Office applications (Windows, Office Professional, Visio, etc.) and specialized project/program management software (MS Project, etc.)
  • Experience with practical programming languages such as Java, JavaScript or .net
  • Knowledge of the iOS or/and Android platform and their security model is a plus
  • ITIL Knowledge/Certification is a plus
  • Preferred: CISSP, GIAC, SSCP or, CEH, CSSLP is a plus
145

Senior Security Manager Central Europe Cluster Resume Examples & Samples

  • Develop, manage and execute a business-aligned security strategy for Central Europe with associated action plans. This will include information security, business continuity management, crisis management, Security Risk Management, factory & supply chain security, asset and personnel protection
  • Drive a pro-active, risk-focused and intelligence based approach to implementation of Security Risk Management across Central Europe, with well-developed networks internally and externally to enable informed business decisions and activities
  • Lead the CEC Anti Illicit Trade Strategy through the development of strong partnerships with the business and with external liaison contacts
  • Exercise ‘high performance leadership’ across Central Europe. This will include active engagement of business stakeholders, providing leadership to Country Security Managers/ Managers of Security
  • Advise and support, and where appropriate actively assist, in deployment of End Market Business Continuity and Crisis Management plans/processes
  • Plan and conduct security enquiries, investigations and reviews of security incidents
  • Effectively manage contracted third party security service providers
  • Provide security support and oversight of security at the factories within Central Europe (Pecs, Augustow, Kanfanar, Ploiesti & Vranje) and develop and manage relationships with the various factory Leadership Teams
  • Prepare and manage the CEC security budget
  • Develop close working relationship with LEX (Legal and External Affairs), HR, Audit, Risk and IT Security managers in CEC, Adria, Poland and Romania
  • Development and implementation of Security Awareness Programmes for all employees and business partners, to ensure full cross-functional commitment to security policies, procedures and strategies
  • Maintain effective liaison with relevant external stakeholders especially law enforcement, intelligence and government agencies to obtain practical and material assistance for the business
  • Maintain close contact / liaison with other security professionals from embassies and international companies
  • A comprehensive knowledge and experience of security management, information and intelligence handling, interpreting threats and risks
  • Strong leadership, management and delegation skills
  • Sound analytical, judgement, influencing and decision making skills
  • Excellent planning, coordination, and reporting skills, with the ability to organise substantial workload comprising complex, diverse tasks and responsibilities
  • Possess clear, concise and well-structured written and verbal communication skills in English
  • Previous corporate security experience
  • Knowledge and understanding of the diverse End Markets in Central Europe
  • Previous anti-illicit trade related experience, particularly in intelligence and enforcement
  • Established networks across customs, law enforcement and NGO’s across Central Europe
  • Experience of Operations Security – particularly factory security issues
146

Senior Security Information Engineer Resume Examples & Samples

  • Provides daily supervision of, and direction to staff
  • BA or BS degree in Computer Science or Information Management with 8 years of directly relatable experience in the discipline (12 years of experience in lieu of degree)
  • 5 years of experience in defining security programs or processes for the protection of sensitive or classified information
  • U.S. citizenship
147

Senior Security Specialist, GRC Resume Examples & Samples

  • Delivery of security risk, governance and regulatory compliance across business units
  • Knowledge of IT general control and secure information management practices
  • Must be able to plan, coordinate and deliver an annual penetration program
  • Must be able to develop and maintain security frameworks, policies and standards
  • Strong and varied technical knowledge of platforms – Windows, Unix, Linux, etc
  • Plan and execute threat and risk vendor assessments
  • Understanding of privacy, regulatory, compliance, vendor management and legal requirements
  • Security governance frameworks, cyber security policies and standards
  • Principles of independent security testing
  • Security vulnerability scanning tools for systems, applications, and web
  • Technologies Linux, Windows, AIX, databases, web or cloud based applications
  • Application development and security management tools
  • Network and Security Appliances and Firewalls
  • OWASP concepts and their application
  • IT risk and control frameworks, CobIT, NIST & ISO27001
  • Knowledge of audit, IT operational and/or IT risk management experience
  • Strong documentation and communication skills to report to management and technical teams
148

Senior Security Archit Consultant Sec Resume Examples & Samples

  • Extremely strong written and verbal communication skills and an ability to communicate across all areas and levels of the business
  • Excellent analytical and problem solving skills
  • Proven experience in identifying solutions for complex problems in enterprise environments
  • Motivated self-starter who is has a track record of taking ownership of information security challenges and driving them to resolution
  • Bachelor's degree in Computer Science or Business Information Management
  • Minimum 5 years' experience in information security or information technology disciplines
149

Senior Security Manager Resume Examples & Samples

  • Coordinate and provide management oversight for a large, multi classification level Classified Material Control program
  • Coordinate and provide management oversight for a Physical Security program of a multi classification level, multiple location operations campus.(IDS, ACS, PDS)
  • Coordinate and provide management oversight for all Personnel Security actions both DoD collateral and DoD SCI actions in regards to contract personnel support, subcontract personnel, government support and uniformed service members associated with various contracts
  • Coordinate and provide direct management support to an operational and active NSA COR COMSEC account
  • Fully comprehend and manage Access Control policies and procedures for multiple levels of classified meeting management and facilities to include verification of PCL, need-to-know and access authorizations keeping with DD 254 relationships and national policy
  • Rotating schedule; opening week’s arrival time 0615 and closing week’s departure time 1800
  • Weekend operation support as needed
  • After hours alarm response
  • Minimum of 8 years of progressive Security administration experience, including a minimum of 3 years supervisory experience; 5 years relative to National Industrial Security as a Security Manager, Assistant Facility Security Officer, or as a Facility Security Officer
  • Knowledge of supporting security disciplines, including document control, visit certifications, personnel security processing, SCI and security processes and procedures
  • Required experience with E-QIP/JPAS/ACAVS/ISFD/DIAS/SIMS
  • Specific physical security experience building and accrediting closed areas
  • Working knowledge of the NISPOM (DoD 5220.22-M), NISPOM Supplement, DCID 6/4, DCID 6/9, ICD 705, M-1 and other current government regulations pertaining to administrative, physical, and information security
  • Managing TSWA’s is a plus
  • A working knowledge of TEMPEST and TSCM programs is a plus
  • Working in joint environments with military and defense contractors
  • Excellent written and oral communication, as well as excellent interpersonal skills. Highly experienced in interfacing with Government customers and executive management
  • Experience as an SSO and in SCIF management
  • Facility experience with robust connectivity across multiple security domains
  • Special Access Programs
150

Senior Security Design Specialist Resume Examples & Samples

  • Produce design and engineering documents, including engineering drawings and specifications, of Low Voltage Security Systems that includes; designing access control systems, CCTV camera systems, security riser diagrams, security single line diagrams, copper and fiber security systems, camera schedules, understand door hardware, design security wall fields, and security system specifications that are ready to be bid by security integrators
  • Security Control Room sizing, security HVAC environmental control equipment heating parameters, lighting, security systems cable specifications sizing and parameters
  • Consulting, Engineering and design of complex CCTV, Perimeter Intrusion Detection Systems(PIDs) biometric readers, and other intrusion detection systems and their respective infrastructure support systems
  • Client site surveys for documentation and preliminary cost estimating of your design and building conditions assessments, on-site assignments to document existing security risk conditions and collect security design requirements
  • Coordinate system layout and drawings with other disciplines such as mechanical, electrical and architectural design for lighting parameters, HVAC parameters, and IT/IS specialist
  • Design Security systems, including preparation of contract documents, calculations and ROM cost estimating
  • Inspect work in progress and completed work during CA services
  • Perform additional duties as assigned by the Department Head, or Project Manager
  • Minimum BS Degree in Engineering or similar technical degree with a minimum of 15 years as a security professional experience or equivalent military/government work experience
  • PSP Certification
  • Proficiency in AutoCAD, Revit, and Microsoft Office Suite of Products
  • Working knowledge of design guidelines and building codes
  • Federal work experience and Revit/BIM knowledge desirable
  • CPP, and PMP credentials desirable
  • Intern Engineer (EIT) or Professional Engineering License desirable
151

Senior Security Application Analyst Resume Examples & Samples

  • Familiarity with RUP and Agile
  • NIST
  • Security Assessment
  • Security Audit
152

Senior Security Engineer, Engineering Resume Examples & Samples

  • Responsible for design, development and testing of security products and solutions
  • Responsible for conducting technology assessment, Proof-of-Concept and recommendation of selected security solutions
  • Responsible in working closely with principal partners for technology knowledge transfer and technology notice broadcast such as End of Life or End of Sale
  • Degree or higher in Computer Science, Engineering and Information Systems
  • 4-7 years of experience of Network/Security architecture or operations experience. Knowledge of Information Security Solutions
  • Good understanding of local and wide area of network concepts - IP routing protocols and topologies (OSPF, BGP, MPLS), switching technologies (VLANs, Spanning Tree), wireless LAN technologies
  • CCNA/CCNP, SANS GIAC, CEH, CISSP, CISA are preferred
  • Other product specific security certifications on platforms such as Firewalls, Forensics, Threat Detection, Deep Packet Inspection, Correlation systems are considered
153

Senior Security Operation Engineer Resume Examples & Samples

  • Work closely with a number of engineering and operation teams to ensure required security controls are in place across all Cloud environments
  • Write, build and deploy a wide range of security services
  • Build and deploy security solutions on cloud
  • Hands-on system infra operations, security operations and security engineering
  • Ability to write tools using Python, Ruby, Go, Peri, PHP
  • Good understaing of netowrk, cloud and security principles
  • Experience of AWS Cloud, CI/CD principles, configuration management
  • Experience with monitoring, logging, metrics or SIEM platforms (Splunk, ElasticSearch)
  • Software and Engineering background
154

Senior Security Manager Resume Examples & Samples

  • Coordinate efforts of the Plain Clothes Officer Program, Canine Program and Anaheim Police Resort Program with the camera surveillance and screening locations
  • Lead the Disneyland Resort Canine Program ensuring the program complies with the applicable regulation, laws, and certifications
  • Lead the Disneyland Resort Plain Clothes Officer (PCO) Program to identify and conduct surveillance of individuals. Responsible for ensuring the PCOs are complying with applicable regulations, laws, and are utilizing best practices
  • Coordinates and manages the police contract with the Anaheim Police Department. The coordination includes the location placement, role responsibility, and resort training of the police officers assigned to the Disneyland Resort
  • Responsible for the overall coordination, assessment, and response of threats and the management of significant events occurring at the Disneyland Resort by leading the Security Duty Managers
  • Develop and grow team members through mentoring, coaching, developmental opportunities and feedback
  • Effectively communicate with the Vice President of Security and Emergency Services and provide continuous updates on effectiveness of meeting objectives and commitments
  • Demonstrated knowledge of Disneyland Resort policies and procedures
  • Demonstrated knowledge of Disneyland Resort property and resources
  • Knowledge of California State Statutes and experience interacting with law enforcement
  • Minimum of 10 years in positions of increasing responsibility related to applicable Security disciplines
  • Minimum of 5 years of experience leading large teams of 50+ team members
  • B.A./B.S. degree, preferably in security management, criminology or related field
155

Senior Security System Admin Resume Examples & Samples

  • Install PatchLink on these machines based on approved schedule
  • Document deficiencies
  • Determine remediation effort & plan (with help from management)
  • Possibility of executing the remediation effort
156

Senior Security Policy Administrator Resume Examples & Samples

  • Create security policies, control standards and baselines. The security liaisons for the major infrastructure components including Network, Windows, and Open Systems Vulnerability scanning, Threat Analysis, and PCI. Security resource for development projects
  • Assist with security risk assessments and application security assessments. Also tracks and reports on open issues through remediation
  • Responsible for security related vendor products and services
  • Coordinate, test and monitor compliance for SOX, SAS 70, FFIEC, PCI, and any federal requirements that impacts DST from a Security Perspective
  • Optimal
157

Senior Security & Control Engineer Resume Examples & Samples

  • Consulting on Application and Infrastructure Control Framework (i.e. ACR/ICR, SCRP evidence, etc.)
  • Provide guidance on appropriateness of compensating controls . Consulting on Security Control Process to the application teams and application owners
  • Facilitating communications with Suppliers in identifying and documenting IT controls
  • 1-5 years of Security and Controls, IT audit, or equivalent experience
  • Familiar with Ford processes, procedures, and organization. . Excellent verbal and written communication
  • Infrastructure Engineering and/or Support
  • Project Management . Experience with collecting and documenting SCRP/ACR/ICR information at Ford Motor Company
  • Strong organizational skills; able to advance multiple work streams concurrently
  • BS, preferred
158

Senior Security Control Engineer Resume Examples & Samples

  • Assist with the identification of Operations-Identified Comments and associated risk
  • Provide support for Supplier On Site Assessment
  • Knowledge of Application Development Lifecycle
  • Experience with collecting and documenting SCRP/ACR/ICR information
  • Strong organizational skills
  • Ability to advance multiple work streams concurrently
159

Senior Security Infrastructure Consultant Resume Examples & Samples

  • Identify gaps in the security architecture, and develop recommendations for long and short term roadmap for corrections
  • Where applicable, work closely with the Verizon PM team to ensure that project scope is correctly delivered and that the TM practice requirements are defined and delivered
  • Provide security configuration services around firewall ruleset design, review, implementation and operation management. If necessary, provide firewall ruleset analysis, workflow automation and implementation of automation
  • Assist firewall refresh
  • Applicable knowledge of
  • Industry certification such as CISSP, CCSE, SANS or other Security certifications, such as GCIA, GCIH, GREM, GPEN, CEH
160

Senior Security Event Analyst Resume Examples & Samples

  • At least 5 years of professional experience, with the majority focussed on information security
  • At least 2 years of experience in a Security Operations Centre (SOC) or incident response team
  • Experience with SIEM systems such as Splunk, AlienVault, QRadar, ArcSight or similar
  • Familiarity with core concepts of security incident response, e.g., typical phases of response, vulnerabilities vs threats vs actors, Indicators of Compromise (IoCs), etc
  • Experience handling the most complex escalated cases in a Security Operations or Incident Response environment (L2 / second-level cases)
  • Experience mentoring and developing junior team members
  • Experience developing and delivering internal training / knowledge transfer sessions within an information security team
  • Exceptional communication skills, including an ability to quickly and concisely summarise complex situations
  • Familiarity with system administration and security controls on Linux and Windows, including in Active Directory environments
  • Experience analysing system and application logs (e.g., web or mail server logs), either to investigate security issues or complex operational issues
  • Familiarity with Salesforce Sales Cloud (CRM) or Service Cloud
  • Experience automating common analysis and response tasks (e.g., scripting in Python, Perl, Unix shell scripts, PowerShell)
  • Familiarity with common web development technologies
161

Senior Security Remediation Analyst Resume Examples & Samples

  • Provide leadership, guidance, and technical expertise to high profile security remediation efforts
  • Work closely with the application, infrastructure, and security teams across the enterprise
  • Work with entire CISO staff (e.g., DCO Architecture, and the Governance Risk and Compliance teams) to evaluate security findings and rank remediation recommendations according to enterprise risk
  • Coordinate and drive all Information Security Remediation Management activities which will consist of understanding the non-compliant/security issues, remediation need, establishing remediation ownership, collaborating on possible remediation solutions, reviewing & approving key deliverables, and monitoring remediation to resolution
  • Act as a Subject Matter Expert on Entrust Datacard security policies, standards, and hardening procedures
  • Work collaboratively with other groups across the organization and communicate effectively with all levels of management
  • This role will be responsible for reporting and remediation guidance on multiple US Federal systems
  • US Federal data must be handled by a US Citizen and information kept within American borders
  • Keep up-to-date on new vulnerabilities and how they pertain to the Entrust Datacard environment
  • Review and perform analysis of vulnerabilities
  • Work with eGRC tooling to document remediation requirements
  • Work with infrastructure teams to determine exceptions where applicable
  • Communicate to internal teams vulnerabilities that have potential to impact the business
  • Follow up with internal teams to ensure remediation is being performed
  • Minimum 3+ years of Information Security expertise
  • 5+ Years infrastructure experience as a System/Network Engineer
  • Bachelor's Degree in Computer Science, Engineering, Information Security, equivalent work experience, or military background
  • Excellent written and verbal communication skills with the ability to explain complex technical concepts in business terms
  • Assertive and self-driven individual who can ensure tasks are followed through until completion
  • Attention to detail and motivated to deliver exceptional quality
  • Ability to travel to Canada for meetings and team events as needed
  • Familiar with industry standard security frameworks such as, ISO 27001:2013, NIST, and/or Webtrust standards
  • Project Management skills and approach for IT related activities and projects
  • Excellent communication and written skills along with experience preparing reports for senior executives
  • Proven understanding of Enterprise Network devices (i.e. routers, switches, firewalls)
  • Proven understanding of Operating platforms (i.e. UNIX , Linux and Microsoft)
  • Experience preparing and testing IT Contingency Plans
  • Vendor and industry certifications in networking and security such as Palo Alto CNSE, CISSP, or other related certifications
  • Expertise with industry standard frameworks (ISO, NIST, PCI, Safe Harbor) would be an asset
  • Experience with Vulnerability Assessment Platforms and reporting tools such as Tenable and Rapid 7
  • Bachelor’s degree in Information Systems, Computer Science
  • Experience with eGRC tools and processes
  • SSL Certificate knowledge
  • ITSM/ITIL knowledge
  • Industry certifications (e.g. CISM, CISA, CRISC, CISSP, CIPP, PMP)
162

Senior Security Research Engineer Resume Examples & Samples

  • In depth understanding of the architecture and operation of microprocessors and various memory systems is required. Deep familiarity with semiconductor failure analysis techniques and encryption is necessary
  • Demonstrated excellence security research appropriate for the development of tamper resistant architectures and technologies. Must be able to think about the whole system security profile. Demonstrated record of research funding and primary author of published articles in the security domain are a plus
  • The candidate must be a self-starter, capable of achieving organizational and program objectives, and must possess excellent communication skills, both written and verbal
  • Demonstrated skills in innovation, creativity and collaboration are a must
  • Ability to develop and maintain effective working relationships with others who may have ongoing competing priorities and viewpoints, including company employees, peer competitors and customers is a must
163

Senior Security Research & Development Engineer Resume Examples & Samples

  • B.S. or M.S. in Computer Science, Computer Engineering, or related discipline with 10+ years of experience
  • Knowledge of embedded systems, computer science concepts, computer security concepts, and networking
  • Strong knowledge of C, C++ and x86 and/or ARM assembly
  • Strong background in vulnerability analysis and exploitation
  • Development and vulnerability research experience on Windows, Linux, OSX and embedded systems
  • Dynamic and static reverse-engineering skills
  • Experienced with WinDBG, GDB, or LLDB. IDA experience a plus
  • Experience in Hypervisor development, with a focus on security
  • Experience with firmware security
  • Kernel development skills
  • Reverse engineering embedded devices
164

Senior Security Specialist, VM Resume Examples & Samples

  • Work with Security Architecture and technology stakeholders to inform the development secure configuration standards
  • One or more Information Security certifications (e.g. CISSP or GIAC)
  • Demonstrates some proficiency in one or more programming language, i.e., ASP.NET, C#, PHP, Python
  • Some experience working with DevOps methodologies
  • ITIL Foundations certification
  • BA/BS in information technology, computer science, computer engineering or equivalent work experience