Specialist Security Resume Samples

4.6 (114 votes) for Specialist Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the specialist security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
DJ
D Jones
Donnell
Jones
55805 Kshlerin Flat
San Francisco
CA
+1 (555) 354 3062
55805 Kshlerin Flat
San Francisco
CA
Phone
p +1 (555) 354 3062
Experience Experience
Detroit, MI
IA Security Specialist
Detroit, MI
Schamberger-Jacobson
Detroit, MI
IA Security Specialist
  • Conduct malicious file scanning and report findings for identification of potentially compromised systems
  • Support the Host Based team in identifying anomalous network and host activity
  • Support the Host Based team in weekly analysis of systems to identify vulnerabilities, anomalous host behavior, compromised network hardware and advanced malware
  • Active Security Clearance
  • The continuous development and refinement of signatures, policies, configurations, scripts and indicators used to identify malicious or unauthorized activity via network, host, and scanning based detection
  • Directly maintain and evolve network defense detection strategy to keep pace with emerging threats and adversarial techniques, for both internal and external networks, as well as host based security
  • Conduct in-depth traffic analysis of documented covert channels to create tailored response signatures
San Francisco, CA
Info Security Specialist
San Francisco, CA
Mertz-Zemlak
San Francisco, CA
Info Security Specialist
  • Providing periodic updates on risk management and security projects for senior executives
  • Responding to urgent security-related issues at any time
  • Supporting implementation of Visa's information security program into the technology organization
  • Providing input for plans, roadmaps, and prioritization for projects in order to drive down organizational risks
  • Providing risk evaluation and assessment of likelihood and impact of security findings, vulnerabilities and exceptions
  • Leading risk identification, quantification, and management efforts related to the technology organization
  • Serving as the responsible subject matter expert on IT Risk within that organization which includes
present
Philadelphia, PA
Program Security Specialist
Philadelphia, PA
Breitenberg, Roob and O'Keefe
present
Philadelphia, PA
Program Security Specialist
present
  • Assist with test planning and support to include assisting with test plans and technology demonstrations
  • Provide oversight and management of contract close out documentation
  • Review industry Standard Operating Procedures (SOP), providing written correspondence for government signature recommending 8 of 39 approval or addressing comments requiring further clarification from the submitter
  • Provide assistance in support of PMO security reviews and inspections at remote facilities
  • Provide support to PSO in facility records management, tracking document status, collecting missing documentation; updating, validating, maintaining facility database and records
  • Review and provide comments for Statements of Work, contracts, RFPs and security plans
  • Conduct security briefings and debriefings; develop SETA program/training
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Michigan State University
Bachelor’s Degree in Computer Science
Skills Skills
  • Basic experience in technical writing and documentation, and information security standards, procedures and policy
  • Strong customer services skills, interpersonal, verbal and written communication skills
  • Strong analytical, problem-solving, decision-making and organizational skills
  • Ability to perform multiple tasks concurrently and meet established deadlines in a dynamic work environment
  • Mainframe environments 
  • IT environment
  • IT standards, procedures, policy
  • Information security audits
  • Information security architecture
  • Product and vendor evaluation
Create a Resume in Minutes

15 Specialist Security resume templates

1

Corporate Bank Security Specialist Resume Examples & Samples

  • Prefer 2 years of systems experience
  • Prefer 3 years of corporate institution security
  • CPTED (Crime Prevention through Environmental Design) Training and experience using the CPTED concepts
  • General knowledge of bank security
  • 4 years of security experience
  • Strong technical expertise and the ability to consult with clients to assess their requirements and suggest solutions
2

Security Assessment Specialist Resume Examples & Samples

  • Develop and enhance existing application security services with broad strategic oversight
  • Launch new and innovative application security services to embed security as early as possible within the SDLC at Barclays
  • Draw upon a broad experience of security assessment techniques and effectively combine to optimize the efficiency of application security testing
  • Work closely with the penetration testing team to develop manual application security assessment services
  • Adopt lead responsibility for the development of services and materials for the dissemination of specialist application security knowledge
  • Manage senior stakeholder relationships across the bank & evangelise new and existing services across the group to ensure a high level of up take
  • Design, develop and deliver relevant MI reports related to team utilisation, high risk vulnerabilities & common issues,
  • Present, on a regular basis to senior stakeholders within GIS and ensure appropriate buy-in and focus
  • Analyse repeated issues found across a cross section of engagements and use this information to develop highly bespoke, relevant application security training materials – driving down the number of development cycles
  • Manage the relationship with key vendors and ensure Barclays are utilising the best products available in the marketplace
  • Manage a team of application security consultants in multiple geographic locations, providing clear direction and managing their day to day activities, performance etc
  • Ensure a high level of utilisation of the team
  • Develop and enhance existing static code analysis services
  • Develop hybrid manual / automated assessment services with efficiency as a core priority
  • Draw upon extensive experience in the area of application layer penetration-testing in order to effectively work with the penetration-testing team to synchronise expertise and efforts
  • Specific and extensive product experience in the areas of SAST/DAST, ideally including Fortify & WebInspect
  • Understanding of application security issues, coding standards, strong communication skills and ability to articulate them to developers and project managers
  • Knowledge of programming languages potentially including languages such as: Java, C#.NET, C/ etc
  • Experience working with development projects as a developer or security subject matter expert
  • Understanding of wider SDL activities such as threat modelling and design review
3

Info Security Specialist Resume Examples & Samples

  • Passed exam for Information Security professional (such as Certified Information Security Manager (ISACA), Certified Information Systems Auditor (ISACA), or Certified Information System Security Professional (ISC2))
  • At least 3-5 years’ experience with processes, tools, techniques and practices for assuring adherence to standards associated with accessing, altering and protecting organizational data
  • IT environment
4

Security Solutions Sales Specialist Resume Examples & Samples

  • Persuasively communicate value to the clients, working for larger, more complex projects
  • Developing proposals by analysing critical business drivers and risks to pursue and win Security Outsourcing deals
  • 8 years+ experience in IT Security Sales
  • Demonstrated record of achieving/exceeding sales targets in a complex IT service business environment
  • Confidently managed a complex portfolio of deals larger than USD5M for Security Outsourcing
  • Demonstrate knowledge of the relevant areas of the Security Business
  • Strong influencing and communication skills and network up to and including C levels
  • Excellent written and verbal communication skills including presentations
  • Team player and leadership skills in working with pursuit and consulting teams
  • Highly developed consultative approach, solution selling and business development skills
  • Good project oversight skills
  • Available and willing to travel when required
5

Sales Specialist HP Software Security Products Resume Examples & Samples

  • University or Bachelor's degree; Advanced University or MBA preferred
  • Directly related previous work experience
  • Demonstrated achievement of progressively higher quota diversity of business customer, and higher level customer interface
  • Prior selling experience includes multiple, diverse set of selling responsibilities
  • Viewed as expert in given field by company and customer
  • Considered a mentor of selling strategy, including designing strategy
  • Typically 12+ years of related sales experience
  • Project management skills required
  • 3-5 years' experience in the desired specialty
  • Is considered a master in knowledge of products, solution or service offerings as well as competitor's offerings to be able to sell large, complex solutions
  • Know strengths and weaknesses of key competitors in account and how to leverage this knowledge in the account
  • Uses expertise in specialty, consultative solution selling and business development skills to align the client's business needs with solution
  • In-depth knowledge of client's business, organizational structure, business processes and financial structure
  • Considerable knowledge of the customer's infrastructure and architecture
  • Demonstrates leadership and initiative in successfully driving services sales in accounts - prospecting, negotiating and closing deals
  • Demonstrates leadership and initiative in successfully driving full portfolio including hardware, software and services needed for the customer's requirements
  • Balance strategic and tactical pursuits to optimize coverage and develop a predictable revenue stream
  • Uses C-level engagement skills in collaboration with account leads to offer value-add solutions to the client
  • Excellent project oversight skills
  • Works with the account team to build an effective account plan and strategy to drive incremental revenue in the account
  • Utilizes Siebel as an expert and accurately forecasts business
  • Successful partner engagement experience. Works effectively with our partners to drive additional revenue
  • Understand and sells high value software solutions
  • Demonstrates the ability to leverage HP's portfolio of products and services to change the playing field against our competition
  • Understands the leverage of services as part of strategic portfolio of products. Promotes services as part of all strategic opportunities
  • Maintain knowledge of industry trends, associated solutions, and key partner/ISV solutions
6

Info Security Specialist Resume Examples & Samples

  • Conduct high risk and sensitive ethical hacks of internally and externally hosted applications globally according to scope defined by Red team
  • Co-ordinate and execute system/network level advanced red team and ethical hacking exercises
  • Work special/off-hours (late nights, weekends etc.) as deemed necessary for the successful and covert execution of Red team exercises (emulating adversaries)
  • Design and develop scripts, frameworks and tools required for facilitating and executing complex undetectable attacks
  • Performs penetration and remediation testing & reporting through the application of expert ethical hacking and penetration techniques in a fast-paced, highly technical environment. Identify network and system vulnerabilities and provide recommended counter measures or mitigating controls to reduce risk to an acceptable and manageable level
  • Coordinate Red team operational briefings and presentations to non-technical audience and executive management, as required
  • Provide technical support to Business Leader/Chief Specialist in identifying and streamlining new/existing protocols and tools used by the Red team
  • Technical support could include, but not limited to the following: (1) Audit support & remediation, (2) Process Improvement, (3) Analysis & Reporting, (4) Cross Divisional Functional education, training and awareness, (5) Function/Methodology/Strategy advancement
  • Define and develop agenda for training and educating security professionals on advanced exploits, tools and frameworks
  • Perform research of emerging technologies and design frameworks and capabilities required to perform Red team exercises of new technologies adopted by Visa
  • Requires comprehensive knowledge and mastery in assigned areas applying skills and competencies in challenging and complex situations
  • Recognized expert in the company. Only a few positions require such extensive knowledge and skill
  • Complete mastery of at least one technology domain and solid working knowledge of at least one other. For example, web applications, system exploitation, network based attacks, Reverse engineering, Mobile security etc
  • May be involved in design phases of projects. May have professional certifications or affiliations
  • Able to work at an intermediate level when executing and improving work processes to ensure achievement of business goals
  • Bachelor’s degree (or equivalent) in Computer Science, Information Security or a related field
  • Eight to Ten Years of progressive experience with increasing responsibility in Information Technology, Information Security and Compliance that includes a combination of technical and project leadership responsibilities
  • Expertise in performing advanced exploitation and post-exploitation attacks as part of ethical hacking exercises
  • Prior experience or expertise performing Red team exercises will be a plus
  • Experience in writing proof-of-concept exploits and creating custom payloads and modules for common ethical hacking frameworks and tools
  • Well versed in system exploits (e.g. Buffer Overflows, PTH attacks, windows authentication framework etc.), network exploitation (e.g. VLAN hopping) or web application exploitation
  • Well versed with security tools & frameworks like Metasploit, Core, Canvas etc
  • Extensive understanding of cryptographic concepts and applied cryptography
  • Prior experience with exploit development or writing system modules in C & C++, a major advantage. Knowledge of high level programming languages an added bonus
  • Prior experience with reverse engineering, malware analysis and forensic tools will be an added advantage
  • Good interpersonal, facilitation, and demonstrated emerging leadership skills
  • Able to operate at an advanced level of written and spoken communication; write and speak effectively with impact
  • Conducts complex analytical functions by performing security assessments and ethical hacks of high risk sensitive applications
7

Security Solution Software Sales Specialist Resume Examples & Samples

  • Development and execution of a business plan that meets and/or exceeds individual revenue goals for the designated territory,
  • Develop a pipeline through a combination of cold calling, marketing generated leads, reseller led or partnered opportunities and working with the IBM customer facing teams
  • You'll be expected to maintain superior product, industry and company knowledge
  • Provide thorough account management of the installed base
  • Exercise accurate revenue forecasting
  • Previous success using a Strategic Selling methodology to close business below and at the C-Level
  • The ability to navigate a complex organization and develop a compelling value proposition to close business
  • Excellent verbal and written communication skills are required as is extensive knowledge of the security and privacy marketplace and competitive landscape
  • Technology literacy must include experience selling security software and appliances (IPS, Security Intelligence and Endpoint Management)
  • An extensive network of appropriate contacts in the territory
  • Must be capable in MS Office including, Word, Excel, PowerPoint and Project
  • Min 3 yrs in a similar software sales role selling Security solutions
8

Cyber Security Business Risk Specialist Lead Resume Examples & Samples

  • Contribute to the development and implementation of cyber security security policies, standards, procedures, and guidelines
  • Assist CIB IRM and Technology Teams to ensure that CIB can engage effectively in support of all risk-based projects
  • Accomplishments in program leadership, policy/standards development, project management
  • Integrity and high standards of personal and professional conduct
9

Info Security Specialist Resume Examples & Samples

  • The candidate will be responsible for rolling out the new Key Controls
  • The candidate communication across Information Security and our Business Partners
  • The candidate should have an in-depth understanding of security controls, policies and best practice standards
  • The candidate must be able to communicate the concepts of information securitycontrols to guide information security practices and solutions within the IT environment
  • The candidate must possess leadership skill
  • Prefer CISA or CRISC and / or CISSP certifications and have 10 - 12 years industry experience in information security
  • The candidate must have an in-depth knowledge of Industry standards suchs ISO27002, NIST, PCI, and FFIEC
  • Bachelor degree in Computer Science, Information Systems, Management Information Systems, or Business Administration or other related field. (Master degree is preferred.) Significant and relevant technical experience meeting the job description may be substituted for degree requirements.; typically requires a minimum of 10 - 12 years information security experience
  • Interpersonal and facilitation skills along with effective communication (both written and verbal) skills
  • Demonstrated ability to meet deadlines and commitments in an environment that requires multitasking among concurrent projects
  • Ability to convey security concepts related to network, application, and systems - to both technical and non-technical audiences
  • 10-12 years experience providing information security or information technology consulting services to a broad range of companies and/or federal and state agencies
10

Info Security Specialist Resume Examples & Samples

  • Supporting implementation of Visa’s information security program into the technology organization
  • Establishing information security as an enabler of the organization’s core business processes
  • 10+ years of IT or Risk experience in large, highly-regulated organizations
  • Mature understanding of IT risk management, compliance and regulatory requirements
  • Professional experience within financial services, banking, or critical infrastructure organizations
  • Technical security certification (CISSP or similar)
11

Principal Security Specialist Corrective Action Resume Examples & Samples

  • Assist in the development, maintenance, and enhancement of the GIS Corrective Action Governance program
  • Understand Disney’s information controls and how they apply to the Disney environment
  • Understand Disney’s ever changing environment to ensure an effective and timely response
  • Oversee reporting on a dynamic list of corrective actions
  • Partner on high and critical priority corrective actions based upon risks and exposure to the Disney environment
  • Develop/manage program metrics/KPIs which are provided to BU Segments and DTSS leadership
  • Seek to continuously improve efficiencies and relationships with Disney Security, Compliance, BU’s and Technical Support organizations
  • Expert level of organizational skills working within a matrix organization.Knowledge of laws, regulations, and industry requirements related to Information Security (i.e. EU Safe Harbor Directive, Payment Card Industry, Domestic and International Privacy regulations
  • Expert project/program management and prioritization skills
  • Expert level Technical support experience
  • Ability to build and maintain constructive working and communications relationships with a diverse community of technical and non-technical audiences
  • Excellent planning and organization skills. Ability to focus/align tasks around critical initiatives in a time effective manner
  • Ability to coach and develop junior staff including basic quality review of work of others
  • Thorough, good follow up and follow thru
  • Self-starter with leadership skills and the ability to manage multiple tasks concurrently
  • Strong analytical, organizational and decision-making skills
12

Operations Specialist Security Transfer Resume Examples & Samples

  • Able to understand and interpret applicable regulations and take the proper actions; able to consistently follow written procedures
  • Dependable attendance record and strong work ethic required
  • Knowledge of administrative and clerical procedures and systems such as word processing, managing files and records, and other standard office procedures and terminology
13

Security Tools Specialist Resume Examples & Samples

  • 2 Draws upon concepts of tools, technologies and methodologies to collaborate with other technical specialists when carrying out assigned duties
  • 3 Effectively negotiates with technical peers, account teams and information security specialists to meet control objectives and policy review dead lines
  • 4 Recognises and articulates job related problems to management
  • 5 Analyses technical problems and creates solutions involving the use of existing techniques or tools. Performs assigned tasks within schedule in accordance with established standards and guidance
  • 6 Prepares and recommends technical alternatives involving technology, methodology, tools, processes and solution components
  • 7 Challenges the validity of given procedures and processes with the intent to enhance and improve a customer solution
  • 8 Has a functional understanding of policies governing security compliance GSD331, GSD332, ITSC104, ISEC and some regulatory requirement pertinent to the clients industry
  • 9 Know whom to contact for clarification, direction and confirmation
  • Understand the technical aspects of key strategic tools and develop measures to mitigate functional gaps that may impact the ability to deliver on the entire scope of the policy
  • Work with the Security Compliance team to develop strategies to overcome limitations with the tool
  • Communicate with the Security Policy and Policy Program office to ensure tool calibration is scheduled to meet cyclic policy reviews
  • Agree details of tool policy review schedule with relevant members of C&G
  • Attend account security related meetings and coordinate with account specific coordinators
14

Cyber Security Vulnerability Discovery Specialist Resume Examples & Samples

  • Driving tool strategy for vulnerability identification across technologies (i.e. applications, network, distributed systems, end points)
  • Ensuring accurate and holistic view of vulnerability posture across the technology stack
  • Ensuring timely identification of the latest vulnerabilities
  • Ensuring data accuracy in vulnerability findings
  • Working with the larger team to provide vulnerability assessments and remediation guidance
  • Strong technical background with five years experience in vulnerability detection and various methodologies to do so (examples include, but not limited to: Qualys, Nessus, AppScan, Fortify)
  • Good relationship/partnering skills with other enabling teams (i.e. other firmwide technical teams)
  • Subject matter expertise on identifying vulnerabilities in one ore more of the following: application, Operating System, and Network
  • Creative problem solving
  • Experience with working in large scale, diverse technical environments
  • Ability to work well under pressure and juggle multiple priorities
  • Strong attention to detail, data accuracy, and data analysis
  • Self-motivated and operates with a high sense of urgency and a high level of integrity
  • Keeps up with the latest threats and vulnerabilities
  • Strong understanding of networking concepts, secure network/systems configuration/operating systems/application security
  • Familiarity of interactions between various technologies and security concepts
  • Ability to manually validate vulnerability findings from off the shelf tools
  • Ability to create custom tools to identify vulnerabilities (i.e. scripting languages)
15

Solutions Specialist, Security Resume Examples & Samples

  • Establish and maintain business relationships with internal partners to ensure the customer’s business needs are efficiently addressed
  • Propose solutions that incorporate the complete scope of Bell Security products/services
  • Manage multiple priorities in an ever changing environment while responding to and surpassing customers’ needs and Bell’s expectations
  • Be recognized as a « Trusted Advisor » in his/her field, developing resourceful sales strategies, leveraging established networks and local chambers of commerce activities, expositions, customer seminars and trade shows
  • Establish and maintain a strong business relationship with customers through the sales cycle. Develop proposals for future and actual customers when required
  • Ensure internal partners have all the support and information needed for presales activities
  • Strong Funnel management experience
16

Security Customer Support Specialist Resume Examples & Samples

  • Basic knowledge in Information Technology
  • At least 6 months experience in IT Networking
  • French: Fluent
17

Security Vulnerability Management Technical Specialist Resume Examples & Samples

  • Provide and demonstrate best-in-class subject matter expertise and practical knowledge of a wide variety of information security and vulnerability management products and tools
  • Provide and demonstrate strong leadership, organizational and coaching abilities
  • Help to formulate vulnerability lifecycle management frameworks and working structures for initiatives associated with infrastructure technology and solution delivery teams
  • Execute Information Security strategy to proactively identify risk and drive remediation reduction
  • Act as point of contact for managing and delivering various vulnerability and remediation reports
  • Implement security improvements by assessing the latest tools, evaluating industry trends, and anticipating requirements
  • Demonstrate ability to plan technology deployments, implementation of new processes and manage stakeholder engagement
  • Help to coordinate and manage activities within the vulnerability lifecycle management process
  • Regularly communicate the progress of initiatives in writing and/or in presentation to senior leadership
  • Work with various risk and information security teams in presenting vulnerability management status and updates to technology subject matter experts and management
  • BA/BS required, MS/MBA preferred
  • Professional Certifications Required: CISSP
  • Prior experience includes 5 years+ in a successful operations position with information security or information technology
  • Expert knowledge of vulnerability management and information security tools
  • Experience with QualysGuard Vulnerability Scanner a plus
  • Experience with Symantec Enterprise Security Manager (ESM) a plus
  • Experience with Symantec Control Compliance Suite (CCS) a plus
  • Experience with Skybox View Enterprise Suite a plus
  • Well organized with follow-up abilities; has a proven track record of effectively managing multiple projects in a dynamic environment and deals effectively with change
18

Security Assessment Engr-specialist Resume Examples & Samples

  • A STEM or Computer Science 4yr Bachelors degree
  • Applicant must possess very strong analytical skills and be very detail oriented
  • Applicant must have recent experience of performing in-depth security assessments for platform and web based applications, or have systems auditing experience
  • Must be able to produce a detailed security assessment document to a high standard
  • Must have worked on projects where at least 1 of the following has been a factor: SOX, GLBA, PCI-DSS
  • Must be able to produce documentation to a high standard for subsequent publication
  • Experience of the roll-out of security solutions throughout a large enterprise
  • Experience of Databases / Data Warehousing, and Business Intelligence tools
  • An expert in the security consulting field who has significant expertise in UNIX security and the security of web based applications
  • Familiar with COBIT
  • PCI Assessment expertise highly desirable
  • Working knowledge of Cryptography
  • Exposure to real-time monitoring and intrusion detection
  • Teradata experience
  • Informatica experience
  • Mainframe
  • Hadoop
19

Security Specialist, Risk Resume Examples & Samples

  • Triage analysis of newly identified risk artifacts; identification, classification, and some analysis
  • Assists in the continuous improvement and implementation needs of our Service Now Risk Management portal
  • Assist in the creation of customized reporting and analytics mechanisms
  • Minimum 4 years in technology organizations OR an Information Technology specific 4-year Bachelor’s degree with demonstrable aptitude
  • Strong aptitude for reporting tools coupled with advance analytical skills
  • Experience with administration and design of the ServiceNow suite of tools is a must
20

Principal Security Specialist, Cyber Trends Resume Examples & Samples

  • 8+ years in the field of Cyber security
  • 8+ years Intelligence gathering – preferably in Cyber
  • Ability to deliver results in a complex and dynamic organization
  • Ability to manage multiple priorities and work effectively in a fast-paced, high volume, results driven environment
  • Ability to rapidly assess a situation and produce summarized results of the issue
  • Must have a strong knowledge of hacker methodologies
  • Strong cross-team collaboration and team building skills
  • Excellent verbal, written, and presentation skills
  • Ability to develop and deliver presentations using MS SharePoint, Excel and PowerPoint
  • High standard of performance, attention to detail and commitment to excellence
21

IT Risk & Security Specialist Resume Examples & Samples

  • Managing exceptions to existing IT policies
  • Creating risk assessments for raised exceptions requests
  • Creating regular reports for senior management
22

Cyber Security Resilience Specialist Resume Examples & Samples

  • Responsible for defining and ensuring successful delivery of cyber security tabletops, drills, and operational exercises in order to ensure UBS Cyber defences are fit for purpose and constantly improving
  • Conduct cyber threat analysis based on all-source reporting analysis and intelligence community input
  • Perform in-depth analysis, consolidation, and reporting of cyber threats of interest, incorporate malware and forensics details into threat folders and exercise briefings, participate in and lead working group and planning sessions to develop exercise cyber scenarios, storylines, and events to facilitate integration of cyber into the Bank's internal as well as external exercises and assessments
  • Develop products to be used in the execution of war games and exercises. Provide facilitation during war games as needed
  • The successful candidate will have experience interacting with knowledgeable and demanding audiences at all levels of management
  • At least 10 years of IT Security or relevant experience with at least 2 -3 years specifically performing cyber exercise (drills, tabletops, operations) execution including exercise role players, exercise network support and data capture and reporting
  • Demonstrated experience in designing, planning, executing and assessing cyber exercises, TTXs and drills
  • Demonstrated familiarity with After Action Reporting, developing Lessons Learned, and capturing exercise artifacts
  • Experience performing cyber threat analysis of adversary capabilities to attack computer networks
  • Experience with cyberspace domain analysis
  • Experience with developing and presenting briefs for senior leadership
  • Excellent writing skills and ability to communicate effectively, including briefing senior officers. Experience working in heavily regulated environments, preferably in the finance sector
  • Proactive and consistently shows initiative
  • Excellent analytical, problem-solving and technical skills
23

Authentication & Security Infrastructure Engineering Specialist Resume Examples & Samples

  • Support the CA SiteMinder Citi Single Sign-On (SSO) architecture and infrastructure
  • Support the Federation and Advanced authentication products and services engineered within Citi
  • Perform advanced infrastructure troubleshooting and interface directly with various IT teams to resolve technical issues within the production environment
  • Develop/review technical documents to ensure consistency, accuracy and compliance with Citi’s corporate technology directions
24

Info Security Specialist Resume Examples & Samples

  • Help implement a pre-defined ASM integration program to harvest data from our different detective sensors such vulnerabilities and weaknesses that are discovered during development, QA and/or production testing into single data lake
  • Build strong analytical algorithm to identify anomalies and patterns across multiple stream of data from sensors
  • Improve secure coding practices, metrics, and policies, standard and methodologies based on data analysis
  • Help build the vulnerability life cycle (VLC)
  • Help connect data into IDS and IPS in Visa to help the systems and application protect itself
  • Collaborate with attack surface management teams to identify new and improved solutions proactively managing software security risk aligned with business goals
  • Create common weaknesses scoring model (CWSM)
  • Well versed (experience preferred) with driving and implementing big data program in relation with common security weaknesses
  • 5 to 10 years in technology, information security, and/or application development
25

Principal Security Specialist, CAT Resume Examples & Samples

  • 3+ years of program and project management experience
  • Expert level of organizational skills working within a matrix organization
  • Ability to articulate IT compliance requirements and design IT controls frameworks
  • Ability to develop and deliver presentations providing internal training on compliance matters
  • SharePoint administration, Excel, PowerPoint
  • Proven track record of successfully managing and implementing programs and projects
  • Experience working with perimeter technologies (e.g., router, firewalls, web proxies and intrusion prevention, etc.) and security tools (i.e. web application scanners, vulnerability scanners, file integrity monitoring, configuration monitoring, etc.)
  • 4 year degree, Computer Science, Risk Management, Information Assurance
26

Security Engagement Specialist Resume Examples & Samples

  • Educate internal Adobe teams on operational practices
  • Interface with Adobe’s customers during the sales process to respond to inquiries and explain operational and security practices
  • Represent Technical Operations in contract negotiations
  • Coordinate responses to technical and security inquiries
  • Maintain supporting documentation, whitepapers and technical diagrams
  • Capture and compile pertinent reports within Technical Operations
  • Identify opportunities for process improvement, self-service, and automation
  • Build relationships with internal product and operations teams across Adobe to understand and support needs
27

Research Security Specialist Resume Examples & Samples

  • Perform initialization of encryption devices and other communications security equipment
  • Perform custodial duties and educate users regarding security relative to classified communications
  • Advise management regarding proper use and operation of equipment associated with security maintenance
  • Ensure that classified material is handled and safeguarded in accordance with applicable regulations
  • Develop and maintain classified communications procedures
  • Perform periodic physical checks of security containers in assigned areas
  • Education:Bachelor's degree or equivalent combination of education and experience
  • Certifications:DoD Top secret security clearance; valid driver's license; NSA COMSEC training
  • Skills:Application of computer skills including processes involved in installation, configuration and removal of server and client software especially as it relates to COMSEC (security of classified materials and communications) custodial duties; troubleshooting, identification and corrections of computer related problems; industrial security processes and practices; records management; application of government security requirements and policies
  • Preferred Education:Bachelor's degree in Criminal Justice, Security Management, Information Security, Business Management or other related field
  • Preferred Certifications:Industrial Security Professional (ISP) through the National Classification Management Society (NCMS) or Certified Protection Professional (CPP) through the American Society for Industrial Security (ASIS) International
  • Preferred Skills: Microsoft (MS) operating systems, MS office suites, Security Information Management System (SIMS), Joint Personnel Adjudication System (JPAS), Industrial Security Facility Database (ISFD) and Electronic Questionnaires for Investigations Proessing (eQIP), Mechanical aptitude to operate multiple versions of locking devices and safes
28

Tech Security Identity Access Management Specialist Resume Examples & Samples

  • Supporting our application & service portfolio around IAM functions, including Privileged Access Control, Privileged Account Password Management, Virtual Directory Services, and our provisioning platform
  • Engineering solutions such as self-service application enhancements, automation & monitoring/sustainment improvements for our applications & toolsets
  • Developing full featured functionality including UI, Workflow, Connectors, batch processing, scripts, etc. to drive a set of solution services for our end users and application teams
  • Maintain and drive application direction and usage across the organization, including support of application upgrades and migrations, performance and functionality tuning and improvements, as well as best practices for maintaining our solutions
  • Oversee day to day challenges with the application usage, such as workflow or automation errors, anomalies in processes, or general end user functionality issues within our application services
  • Recommend future enhancements & upgrades based on current environment & configuration variables and needs
  • Minimum 6 years in technology organizations with 2-4 years of success in delivering projects and other initiatives
  • Minimum 2 years’ experience with provisioning, directories & federation
  • Minimum 2 years’ experience in standard development technologies such as JavaScript, JQuery, .Net etc
  • Knowledge of Privileged Identity Management tools such as CA PIM/ControlMinder, Xceedium Xsuite, CyberArk, etc
  • Knowledge of Identity Provisioning tools such as RSA Aveksa, CA Identity Minder, IBM ITIM, etc
  • Knowledge of Directories such as Active Directory & Virtual Directory, Federation & other authentication/authorization technologies
  • Strong background & knowledge in data management & database structures
  • BS Degree or equivalent work experience
29

Security Solutions Specialist Resume Examples & Samples

  • Proxy servers
  • Anti-virus and Endpoint Protection services
  • Apply appropriate design methodologies to application and infrastructure solutions, reviewing and highlighting areas for improvement
  • Understand and apply architecture standards and principles, global product-specific guidelines, and local regulatory requirements
  • Recommend opportunities to optimize design and development components (e.g., increase infrastructure utilization)
  • Partner with Service Delivery to design and develop against project roadmaps
  • Fluent English skills in speech and writing
  • Communicative personality
  • Strong teamwork and collaboration skills
  • Self-supporting and independent attitude
  • Deep understanding of security technologies and protocols. Experience in security solution architecture. Experience in transaction analysis and performance analysis
  • Broad understanding of the global security infrastructure: regional issues and differences, as well as a broad understanding of different proxy, reverse proxy, firewall, and anti-virus technologies
  • Understanding of global security architectures, along with hands-on experience in supporting application readiness
  • Awareness of the standard service life cycle, with experience in the transition of designs into production rollouts
  • Must demonstrate leadership in a dynamic, fast paced environment with shifting priorities and tight deadlines
  • Experienced in people leadership, both for future direct management of a technically focused team as well as good partnering skills in influencing and negotiating across organizations
  • Excellent communication skills and negotiation skills
  • Ability to work and team with a multitude of different people to balance demands as well as understanding and integrating cultural differences and motives
  • Ability to work independently in a global organization within the context of a virtual team
  • 7-10 years in security solutions design in an enterprise environment
30

Cyber Security Anaytics Specialist Resume Examples & Samples

  • Monitors and assists in analyzing security systems for routers, switches and firewalls to ensure proper connectivity and configuration
  • Experience working with domain structures and digital signatures
  • Communication skills to interact with team members, management, and support personnel
  • Analytical and problem solving skills for design, creation and testing of security systems
31

ITS Security Specialist Resume Examples & Samples

  • Solid knowledge of security testing tools and methodologies, including vulnerability assessment and penetration testing tools, and associated result analysis
  • Work experience with profiling systems and application, identifying threats, and developing test cases to target identified threats
  • Solid knowledge of network-based and host-based artifacts analysis and forensics
  • Ability to understand, review and advise on secure hardening guides
  • Working knowledge of Security principles, techniques and technologies such as SANS Top 20 Critical Security Controls and OWASP Top 10
32

Info Security Specialist Resume Examples & Samples

  • Implement under the direction of the Director of Attack Surface Recon team utilizing the enterprise-wide strategy for the Attack Surface Management Program with established key initiatives/projects focused on the reduction of technology risk within Visa
  • Operate as a Subject Matter Expert for PCI-DSS Operate as a Subject Matter Expert for Vendor Patch Management
  • Assist in the development of solutions and solving complex/unique problems w/ regard to Visa's Attack Surface
  • Assist in the execution of departmental plans, including business, production and/or organizational priorities and contribute to the Attack Surface Management functional strategy
  • Work with IT and business teams to develop solutions that address root causes.Utilize existing vulnerability management, security configuration management, and web application scanning tools and processes to extend coverage, increase effectiveness and expand capabilities
  • Work with diverse IT and business teams to assist in developing solutions to remediate identified vulnerabilities and misconfigurations in a risk prioritized, effective and efficient fashion
  • Utilize process and tools to provide for the continuous analysis of security information (viruses, malicious code, industry events, hackers and zero day exploits, OEM weaknesses, IDS/IPS and SIEM alerting, etc.) in order to proactively assess and investigate emerging threats and potential impact to Visa
  • Provide support to Audit, Legal, Human Resources, Corporate Security and Executives
  • Possess the ability to effectively identify, evaluate and communicate new and ongoing security threats​
  • Bachelors Degree in Computer Science (or related field) or equivalent work experience
  • 8+ years of experience in Information Security with experience in vulnerability management, security configurations management, or other security scanning
  • Experience with PCI-DSS compliance standards and guidelines
  • Possess strong technical security skills and comprehension of security and risk
  • Be able to work on complex projects and with diverse teams
  • Familiar with Vulnerability Management tools such as Qualys QualysGuard, nCircle IP360, McAfee Foundstone, Tenable Nessus, etc
  • Familiar with Policy Compliance tools such as Qualys QualysGuard, Symantec CCS, Microsoft SCM, etc
  • Familiar with Web Application Scanning tools such as WhiteHat, IBM AppScan, HP WebInspect, etc
  • Familiar with Security Single Pane of Glass implementations or frameworks such as RSA Archer, Modulo, Risk I/O, etc…
  • Knowledge and experience with diverse IT architectures and enterprise IT data centers, large scale transaction processing environments, external hosted services and cloud computing environments. Extensive knowledge and experience with physical and virtual server configurations and implementations
  • Experience working with
  • Security management tools (i.e. vulnerability scanners, file integrity monitoring, configuration monitoring, etc.)
  • Perimeter technologies (e.g., router, firewalls, web proxies and intrusion prevention, etc.)
  • Knowledge of and experience with applying Common Weakness Enumeration (CWE), Common Vulnerability Scoring System (CVSS), Common Vulnerabilities and Exposures (CVE and Open Web Application Security Project (OWASP) processes and
  • Remediation recommendations
  • Strong technical understanding and experience assessing threats to and identifying weaknesses in multiple operating system platforms, database and application servers, and custom and off the shelf applications, etc
  • Must be both a self-starter and team player with the ability to work independently with limited supervision
  • Security-related certifications a plus – CRISC, CISSP, CISM, etc…​
33

Security State Management Vulnerability Specialist Resume Examples & Samples

  • Scanning and identifying vulnerabilities associated with Citi assets connected to the network
  • Assisting with the prioritization and remediation of the identified vulnerabilities utilizing operational best practices to maintain all tools that are used in the scanning and identification of vulnerabilities as well as the tools used to rationalize, consolidate and apply additional contextual information
  • Working with the Citi Architecture and Engineering team in the identification, design and implementation of new tools as requirements arise, consolidating and rationalizing the various vulnerability data from different scanning tools to remove duplicates, apply additional context to provide meaningful information for metrics that help prioritize and drive remediation activities
  • Strong knowledge and experience in the areas of security assessment, vulnerability management, risk based threat analysis, security mitigation techniques and tools like Qualys, Symantec ESM or CCS and Skybox Technical knowledge of desktop and server hardware and software architectures and operating systems including Windows, UNIX, and Mac Technical knowledge of web application server like Apache Webserver, Apache Tomcat and Websphere and databases like SQL Server, Oracle, etc
  • Technical knowledge and familiarity with common business and financial software applications and functionality
  • In depth knowledge of current LAN/WAN network technologies, architectures, principles, operations, and protocols Understanding of vulnerabilities, their impacts and mitigation techniques, and the ability to document and articulate this understanding to a variety of audience using standards like CVE and CVSS Exceptional interpersonal, customer service, communication skills and the ability to ascertain, disseminate information quickly through a variety of channels
  • Experience with network troubleshooting tools and port scanners such as trace route, ping, and nmap Experience with a scripting language such as shell scripting, Ruby, or Perl
  • IT monitoring and reporting technology and tools knowledge like SQL, Tableau and Qlik Sense or Qlikview
  • Bachelor’s Degree in Information Technology, or equivalent experience required
  • 1 year related work experience in financial services and security industry
  • 3 years of experience with Information Security theory and practices
  • 3 years of experience in vulnerability management and penetration testing security tools
  • 3 years of knowledge of OWASP Top 10 and SANS Top 25
  • 3 years of knowledge of Information Security elements and CBK
34

Security State Management Vulnerability Specialist Resume Examples & Samples

  • Keep walking if: You’re new to information security. We’re looking for a highly experienced individual to fill this role
  • Interesting free benefit: Working for a global company that leads the way in financial services
  • The buck stops with you: Making sure our systems are as secure as possible while constantly improving current security
  • Musical group that best defines your team: The Police. You’re our information security watchdog
  • You probably took this elective in college: Intro to business. You’ll be talking with all levels including employees in your department, executives, and stakeholders
  • Reports to Head of SSM and is responsible for the assessment, deployment and management of appropriate vulnerability management tools and assisting with the prioritization and remediation of the identified vulnerabilities utilizing operational best practices
  • Leads the evaluation and ongoing management of network security monitoring tools and processes
  • Interfaces with business units and IT stakeholders to identify and understand vulnerability management requirements and design solutions to meet business unit and IT stakeholder needs
  • Maintains an up-to-date understanding of emerging cyber threats facing financial institutions
  • Applies new techniques and trends that are in line with overall information security objectives and risk tolerance
  • Identifies 3rd parties to provide expertise to support monitoring activities and manage outsourced services related to monitoring and event correlation
  • Builds effective relationships with key stakeholders who own and support IT infrastructure, applications, processes, and operations
  • Gains commitment from stakeholders to implement recommended and agreed information security controls
  • BA/BS in Information Systems or a related technical field, or equivalent experience required
  • Demonstrated experience building and managing vulnerability management programs
  • Demonstrated experience working with senior management on highly sensitive projects that require the utmost discretion and maintaining strict confidentiality on all data, records, and tasks as required
  • Possession of industry certifications highly preferred. Including, but not limited to, Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Global Information Assurance Certification (GIAC)
35

Security Audit Specialist Resume Examples & Samples

  • Schedules and facilitates Information Security audits that will vary in level of complexity from simple to potentially complex
  • Facilitates and coordinates external audits including A&P, ISAE 3402 (SOC-1), SOC-2, and ISO 27001
  • Coordinates internal pre-assessments in preparation for audits and certifications
  • Identifies risks and escalates potential project issues to management as required
  • Coordinates with managers and IT leadership on audit scheduling, evidence gathering, audit interviews and remediation
  • Scoping of audits to meet client expectations
  • Ability to appropriately balance firm security needs with business impact and benefit
  • Experience in coordinating audit activities in a global environment
  • Detailed understanding of assurance audits, certifications and frameworks, including ISAE 3402, SOC1, SOC2, and ISO 27001
  • Maintain awareness of the current security threat landscape
  • Ability to team well with others to facilitate and schedule and coordinate required audit activities
  • Network and/or application pentesting experience a plus
  • Experience in managing complex information security projects
  • Experience in responding to audits in a global environment
36

Security Lab Services Specialist Resume Examples & Samples

  • Design, Implementation and Usage of Security Solutions
  • Continued development of our consultancy services, concepts and solutions
  • Collaboration in international communities
  • Contribution to proposals and presentations
37

Cyber Security Crisis Management Specialist Resume Examples & Samples

  • Present occurring and emerging regional events during daily briefs
  • Triage incidents and determine the course of action necessary for
  • Analyse cyber threat based on intelligence and information and identify potential threats that would impact the business regionally
  • Develop mitigation techniques and processes to prevent attach through the study of threat trends
  • Represent the APAC region and maintain liaison with global counterparts
  • Prepare reports of findings and events for internal and external customers
  • Collaborate with other cyber security teams in developing business continuity plans in the event of crisis
38

Cyber Security Anaytics Specialist Resume Examples & Samples

  • Analyzes, selects, and recommends installation of moderately complex security software, locks, alarm systems, and other security measures to prevent hackers from infiltrating company information
  • Investigates attempted efforts to compromise security protocols. Escalates issues to higher level associates; recommends and implements safeguards and solutions
  • Monitors and analyzes moderately complex security systems for routers, switches and firewalls to ensure proper connectivity and configuration
  • Interacts with client management to understand their security needs. Assists in defining and developing safeguards and solutions based on client's needs; implements procedures to accommodate them
  • Reviews security status reports to oversee system status and potential and actual security violations. Writes reports and communicates to management/client findings
  • Four or more years of experience in information systems security
  • Experience working with Qradar, Arcsight, Splunk, or McAffee Nitro
  • 2+ years experience as an information security/SOC/SIEM analyst
  • Experience with security event log analysis is preferred
  • Data Analysis experience is a plus
  • Good analytical and problem solving skills for design, creation and testing of complex security systems
39

Security Master / Data Integrity Specialist Resume Examples & Samples

  • Providing operational support to hedge fund clients engaged in various investment strategies ex. Real Estate Investment Trust (REIT), Private Equity, Global Macro, Fixed Income, Mortgage, Credit, Distressed, Long/Short, Risk/Stat/Arbitrage, Emerging markets and Fund of Funds
  • Ensure security's static data for various product types are updated and accurate across systems for various products including equity, fixed income, swaps, bank debt, loans, futures, options, FX, mortgages and repos
  • Interacting across regions with various internal SS&C GlobeOp departments such as Fund Accounting, OTC Operations, Investor Relations and IT
  • Processing Corporate actions
  • 3+ years experience with Back Office Operations working for either a Prime Broker, Administrator, Hedge Fund, Mutual Fund, Investment Advisor or Financial/Retirement Planner
  • Prior experience working with vendors for static/reference data as S&P, Bloomberg, Reuters, IDC, Moodys, MarkIT a plus
  • Prior experience with Geneva a plus
  • Attention to detail and adherence to policies, procedures and controls
40

Security Certification Specialist Resume Examples & Samples

  • Capable of conducting application vulnerability assessments
  • Support the team in updating their skill and knowledge
  • MCA/B.Tech Computer Science or equivalent with 2+ experience in application security assessment
  • Usage of various security tools. Should be familiar with various application testing methodology and tools such as Burp Professional, Nmap, Wireshark, Nessus, echomirage
  • Exposure and good understanding of the various manual testing methodologies
  • Knowledge of common security requirements within ASP.NET & Java application
  • Excellent communication skills; written and verbal
41

Security Intelligence Sales Specialist Resume Examples & Samples

  • Maintain a demonstrated knowledge of the specialty sales processes, techniques, and tools, and advises others on their use
  • Analyze IT security requirements of enterprise clients, select IBM solutions, demonstrations, client workshops and presentations, quotes and pricing, and other proposal development activities
  • Maintain knowledge of competition's offerings, strategies, and plans
  • Differentiate the QRadar Security Intelligence Platform from competitive alternatives and creates customer preference for IBM Security Software offerings, based on that differentiation
  • Negotiate with multiple levels of customer management, resulting in closing of the sale
  • Anticipate complex problems relating to specialty offerings, customer sales engagements, and business unit sales results
  • Ability to analyze situation and implements solutions, or develop new approaches/procedures and assess risk in terms of value and exposure to both IBM and customers
  • Ability to define sales activities or other projects within the business environment
  • Proven track-record of building pipeline and growing a territory, as well as managing multiple sales-related activities on a daily basis
  • Ability to work in a team matrix, leveraging extended team resources and managing resources through each deal
  • Demonstrated understanding of client requirements regarding enterprise security policy and standards and how IBM solutions will meet the requirements
  • Ability to present and articulate the differentiated value of IBM Security solutions compared to competitors in the market.IBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status
42

Web Services Security Specialist Resume Examples & Samples

  • External port scan results
  • Internal analysis
  • Application code scans
  • Automate remediation processes as much as possible to allow timely rollout across a large estate. This would look to leverage as much as possible existing configuration management and monitoring tools
  • Determine scope of exposure and drive schedule for remediation
  • Technical support for operational and development issues during security remediation
  • Provide management reporting and tracking for remediation efforts
  • Develop scripts to remediate issues/vulnerabilities in a standard fashion
  • Co-ordinate with business partners and other teams to plan and implement remediation with aggressive timelines
  • Detailed understanding of web technologies and how they function in secure environments
  • Strong influencing skills as majority of effort will require working closely with other teams
  • Used to working in a customer facing role and as part of a geographically distributed team
  • Strong analytical ability and presentation skills
  • Self-motivated and able to deliver in high pressure situations
  • Must be able to work with and leverage skills from other teams in the wider organization
  • Unix/Windows scripting for automation of operational and security related tasks
  • Team player with excellent problem solving skills
  • Working knowledge of enterprise systems/design architectures
  • Application Optimization
  • Local/Global Traffic Management
  • High-availability strategies
  • Experience in Windows, Linux, UNIX and/or AIX operating environments
  • Must be familiar with structured project life cycle disciplines
43

Info Security Specialist Resume Examples & Samples

  • Provide role-engineering activities for various business needs
  • Develop process/procedures for both technology and business functions
  • Good working knowledge of security administration in UNIX/Linux systems
  • Participate in on-call team rotation schedule
  • Bachelor's degree in computer management, information security or equivalent job experience
  • 8 years experience in information security
44

Info Security Specialist Resume Examples & Samples

  • Act as Subject Matter Expertise (SME) on HP NonStop, RACF and XYGATE XOS/XAC/XPQ/XHE products and their use on protecting core components of VisaNet
  • Actively participate in the development of IAM Strategy and strategic planning of IAM Program
  • Translate IAM Strategy and agreed strategic IAM Program goals into tactical and actionable roadmap for Enterprise Systems. Ensure timely delivery of the roadmap and strike a balance between security and operational excellence
  • Manage the fine-grained access controls on Visa’s HP NonStop platform using XYGATE Access Controls (XAC). This includes controlling access to privileged commands and system resources
  • Coordinate with Tandem Engineering team to configure, update, and maintain various XYGATE products (e.g. XOS/XAC/XPQ/XHE) throughout the system lifecycle
  • Design and deploy changes to z/OS resources to provide better security controls within RACF (Resource Access Control Facility)
  • Manage certificates to allow secure remote connection and file transfer between Visa and external clients
  • Lead various Enterprise Systems IAM projects, particularly z/OS RBAC (Role Based Access Control) project to ensure successful migration of users in all LPARs without any service disruption. This includes collaboration with all stakeholders, i.e. IAM Development Team, z/OS Engineering and Operations, and all relevant Line of Businesses
  • Drive IAM projects to automate access management using OIM (Oracle Identity Manager)
  • Administer user access on different operating systems and applications. Examples include: z/OS, HP NonStop, Windows/Active Directory, UNIX/Unix Enterprise Directory, Prepaid, Verified by Visa, Falcon Fraud Workstation, and CATS
  • Mentor and provide guidance to other team members. Provide support to other team members as necessary to drive and implement process improvement to reduce risk and improve operational efficiency
  • Instill global mindset and effective collaboration to other team members
  • Expert level knowledge of the security sub-subsystems and 3rd party security products in use on Visa enterprise systems, specifically HP NonStop, Xygate XOS/XAC/XPQ, and z/OS
  • Sound knowledge and experience in tools used like Oracle Identity Manager (OIM) and its specific deployment in Visa for Role Based Access (RBAC)
  • Proven HP NonStop and z/OS troubleshooting skills, specifically on their security implementation and impacts to the operations of Visa Core systems
  • Excellent knowledge of Identity Access Management lifecycle processes and technology in Visa
  • 7 to 10 years computer security experience required
45

Info Security Specialist Resume Examples & Samples

  • Lead various IAM projects, particularly the Application Governance project to ensure successful enrollment and fulfillment of applications into information security control. This includes collaboration with all stakeholders, i.e. IAM Development Team, application custodians and all relevant Line of Businesses
  • Act as the IAM point of contact for a set of assigned applications and manage the enterprise end to end lifecycle for these applications
  • Sound knowledge and experience in tools such as Oracle Identity Manager (OIM) and its specific deployment in Visa for Role Based Access Control (RBAC)
46

IA Security Specialist Resume Examples & Samples

  • Perform weekly vulnerability audits, submit Plans of Action and Milestone (POA&M)
  • Assist with vulnerability management in order to maintain compliance with operational directives
  • Conduct malicious file scanning and report findings for identification of potentially compromised systems
  • Maintain the certification and accreditation documentation (DoD IA Certification and Accreditation Process / Risk Management Framework) for all specialized network defense systems and software in accordance with applicable DoD policies
  • Support the Host Based team in identifying anomalous network and host activity
  • Support the Host Based team in weekly analysis of systems to identify vulnerabilities, anomalous host behavior, compromised network hardware and advanced malware
  • Vulnerability scanning experience using Retina and/or Nessus
  • Experience with TCP/IP network protocols
  • DoD 8570 compliant by obtaining/maintaining required certifications such as; Security+ CE and CEH
  • The ability to multi-task and work independently or as part of a team
  • Experience with and NIST 800 series requirements
  • Experience documenting technical standards and procedures
  • Knowledge of Federal computer security policies
  • Experience with DIACAP and DoD/DISA security policies
47

Security Investigations System Specialist Resume Examples & Samples

  • Perform application administration of the incident and case management system
  • Develop and maintain business documentation to include status updates of tasks and projects, decision documents, process and procedure guidelines, and other project related material
  • Support the development and implementation of processes and tools relating to the incident and case management program
  • Support scope definition, requirements gathering, and identification of the business needs of clients
  • Engage with the IT technical team to represent end user and business unit needs and requirements
  • Coordinate between business clients and IT Team closely to ensure accurate and reasonable project status and delivery in a timely matter
  • Prepare weekly and monthly project status reports and deliver to appropriate project team members and stakeholders
  • Document, track, and update risks, issues, and change requests
  • Develop and implement training materials and conduct training sessions for clients as needed
  • Support the integrated program plan, project plans and project milestones with timely updates
  • Ensure that clients and peer reviewers maintain deliverables and other project related tasks
  • Assist leadership or team members with preparation of deliverable and project related documents or tasks
  • Perform project-related analytical work as needed
  • Report to and assist the incident/case management Global Administrator in managing the overall program and plan
  • Assist in communicating program details, news, updates, and outages to the business unit community using various communication vehicles like the Backlot webpage, Yammer, or other company approved method
  • Assist with other/future investigative and technology-based projects
  • Special projects meeting coordination and documentation
  • Create presentation materials and present materials relating to special projects
  • 3+ years experience
  • Proficient with Microsoft Office and associated software tools, including Microsoft PowerPoint, Word, Excel, Access and Visio
  • Familiar with creation and implementation of training documentation and execution
  • 5+ years experience
  • Possess a high aptitude with event, incident, and/or case management software, as well as application deployment and onboarding/rollout processes
  • Proficient with creation and implementation of training documentation and execution
  • PMP
48

ICT Security Specialist Resume Examples & Samples

  • Knowledge of security tools including
  • Firewall solutions / Intrusion Detection/Prevention
  • SIEM Tools
  • Systems monitoring and alerting (Safestone , Varonis)
  • Working technical knowledge of current systems software, protocols and standards (TCP/IP)
  • Knowledge of relevant legal aspects, such as software licensing and Data Protection
  • Ability to manage security incidents from start to finish
  • Relevant Third Level education in Information Systems, Computer Science, or a relevant field would be an advantage
  • Knowledge of security principles, models and architectures, including experience with Windows, I-Series and Citrix
  • Strong core TCP/IP skills, CCNA security certification preferable
  • At least 2 to 5 years of relevant working experience in the area of information security
  • CISSP or comparable certification is preferred
49

IAM Security Specialist Resume Examples & Samples

  • Experience in Designing, Implementation and support of : -
  • IBM Security Access Manager for Advanced Access Control (formerly ISAM Mobile)
  • IBM Security Access Manager for Federation (formerly TFIM)
  • Security Directory Integrator (formerly TDI)
  • Integration experience of ISAM with Web, mobile and cloud applications
  • Experience in coding development (Java or REST experience will be a bonus)
  • Experience working with IIS, Apache Web Servers, Application Servers (WebLogic , Websphere) or developing J2EE products
  • 5+ years of strong IAM implementation experience
  • Strong oral, written communications skills in English
  • Oral communications skills in Thai (would be a bonus)
  • Customer Facing Exposure is must
  • CISSP certification is a bonus
50

Graduate Security Specialist Resume Examples & Samples

  • Interest in IT Security
  • Achieved (or is expected to achieve) degree in IT/Computer Science or equivalent
  • Communicative English (B2/C1)
  • Ability to communicate clearly and concisely in both oral and written forms
  • Enjoy working as part of a team and achieving shared goals and objectives
  • Ability to work full time (40 hours per week, standard office time)
  • Ability to build rapport and relationships with individuals at all levels irrespective of background
  • Confidently handle multiple priorities to drive solutions
  • Knowledge of one or more programming languages
  • Strong analytical and numerical skills
51

Digital Specialist Mexico GTS & Security Resume Examples & Samples

  • Experience with digital marketing, experience with paid media campaigns
  • English
  • Media knowledge online media analysis capacity
  • Experience in success fully managing internal and external stakeholders
52

Security Access Management Specialist Resume Examples & Samples

  • Support project approach to managing client’s Access Control Program including Physical Access and Logical Access Control Systems (PACS and LACS) and addressing federal HSPD-13 requirements
  • Work with client to develop charter, project plan, and impact analyses across the program
  • Develop approach as part of team for PIV card Roll-Out and maintenance, including key planning documents in conjunction with client security team
  • Assist client in planning and implementing PIV related tasks such as PIV-enabled email signature and encryption, single sign-on to desktop and laptop computers
  • Assist in planning and implementation of Multi-Factor Authentication across systems
  • Develop conceptual and planning documents for Identity Management operations, and requirements for automated system to manage
  • Work to revamp Identity, Credentials, and Access Management (ICAMS) program
  • Provide business analysis, alternatives analysis documents and support of the Access Control program and projects
  • Align project objectives to the Access Control Program Vision, and assess progress of program against stated objectives
  • 5+ years of experience in Information Systems including Information Technology security (Cyber Security) and project management
  • Experience performing Access Control Program planning and Operations
  • Knowledge of federal HSPD-12 requirements
  • Understanding of PACS and LACS implementation methods using PIV cards
  • Experience with planning and facilitating identity, credential, and access management activities
  • Ability to develop program, project planning and monitoring documents (charter, scope, schedule documents, and related artifacts)
  • Ability to perform research and data analysis, develop program performance reports and provide comparative analysis to develop recommendations
  • HSPD-12 program support experience
  • Identity, Credential, and Access Management (ICAM) process support experience
  • Logical access control planning and design experience
  • Ability to multi-task in a fast-pasted environment and to work independently
53

Test Security Specialist Resume Examples & Samples

  • Investigate security incidents and risks, and proactively own their resolution
  • Make recommendations for technology and process improvements to support security policies and initiatives
  • Pro-actively monitor the APAC-English testing channel for security risks by utilising existing reports/creating new reports/ using techniques like forensic data analysis, remote video recordings and using statistical models and data algorithms to detect patterns of aberrance (anomalies, outliers, person-fit mismatch, candidate demographic analysis etc). to investigate new security trends
  • To run, investigate in conjunction with the global security teams as necessary, and report and document the outcome of such investigation in global share point
  • Act as an escalation point for security issues and in turn, escalate where appropriate to the Q&S Manager-APAC
  • Timely reporting of the status of investigations to all internal sections and testing sponsors
  • Issuing formal warnings to the PVTC sites
  • Formally closing down a PVTC site, following the legal guidance and templates issued
  • Investigating testing channel by identifying and preventing exam fraud & infringement through review of candidate biometrics
  • Keeping informed of all new global security risks by attending global investigation meetings and discussing security trends with the global security teams or reading cases on sharepoint
  • Regular DVR Audit of sites and documenting the observations in sharepoint
  • Experience of gathering and presenting information to support legal actions
  • Attention to detail and a strong level of commitment to a task
  • Sound working knowledge of the Microsoft office suite and associated packages inclusing Word, Excel, Powerpoint, Access and Internet Packages
54

Advanced Perimeter Security Specialist Resume Examples & Samples

  • Working knowledge of Information Technology Infrastructure Library (ITIL) to identify industry standards and procedures for Incident, Problem, Change and Knowledge as required by the role’s remit
  • Takes an active role in building and advancing knowledge of EY’s global data protection policies and compliance directives with specific focus on the perimeter protection infrastructure environment including Firewall, the DMZ or perimeter network, 3rd party connectivity and remote access. Guides members of the team as requested to advance the teams knowledge
  • Solid familiarity of EY’s businesses supported within the location to recognize the impact of perimeter infrastructure technology issues that are restricted to a specific business unit or may be global in nature and to engage and participate with confidence on escalating issues that impact a particular desktop, business or location as well as those that have wider impact
  • Advanced time management skills to prioritize workload and work through issues and incidents with efficiency and guide others in same
  • Advanced knowledge in current and future features of aligned technology to the role’s remit including but not limited to
  • Malware protection software and applications including but not limited to Check Point Secure Appliances, Check Point VSX Appliances, Check Point Clustering, Multi-Domain Security Management (Provider-1), Blue Coat proxy appliances including malware scanning and Uniform Resource Locator (URL) filtering environments and Citrix WAF (Web Application Firewall)
  • Security devices and tools including CheckPoint Secure Web Gateway appliance based URL and anti-virus (AV) filtering
  • IT service management tool, Service Now, to record incidents and remediation as well as guide others in features and functions.IT service
  • Basic management skills and techniques including the effective delegation of work, using appropriate resources, sound planning and with the ability to train & coach staff in technical processes and practices. Resolves team conflicts by implementing and communicating difficult decisions or providing individual or team mentoring as appropriate
55

Security Data Specialist Resume Examples & Samples

  • Forensic data acquisitions
  • Data transfer, processing and management tasks
  • Interacts with services providers required for data acquisition and management
  • Facilitates and engages in data analytics and data review process as well as innovation project
  • Operates the digital investigation lab and cloud infrastructure
  • Works at the direction of the Digital Investigations manager and team leader, facilitates and participates in projects and may be required to assist and accompany other IBM functions
  • Strong IT background, preferably hands on working experiences in administering Windows and Linux servers
  • Experienced with compliance requirements and their implementation
  • At least 3 years of related experience
56

Cyber Security & Networks Business Operations Risk Management Specialist Resume Examples & Samples

  • MCA and Operational Oversight programs
  • Management of control issues, corrective action plans, and risk exceptions
  • Business Continuity Management and Datacenter COB testing support
  • Supplier Risk Management
  • Onboarding of new products and services into CS&N
  • Provide support in preparing deliverables for and meeting with internal auditors, regulators, and external agencies
  • Assist in driving process improvements and standardization across the various CS&N departments
  • Supporting other key directives as applicable (VA, VTM, EOVS, Cross-Border clearance, etc.)
57

IT Operational Security Specialist Resume Examples & Samples

  • At least 2 years experience in IT security, deployment of security tools such as Nessus, IBM Endpoint Manager, QRadar, Active Directory, Identity and Access Management, Unix scripting, Linux security, Transport layer Security (TLS) and Encryption
  • Proven verbal and written communication skills in English
  • Proven ability to problem solving and drive issues to resolution
58

Rdbms Security Specialist Resume Examples & Samples

  • 3+ years experience w/ RDBMS Configuration Management and automated deployment processes
  • 5+ years experience w/ RDBMS Governance Risk & Control Management
  • 5+ years of RDBMS. Experience w/ database patching life cycle including Vulnerability Threat Management, Service Packs, PSUs, etc. for RDBMSs including DB2, Oracle, MS SQL, Sybase, and Sybase IQ
  • Experience w/ RDBMSs security for RDBMSs including DB2, Oracle, MS SQL, Sybase, and Sybase IQ
  • 2+ years experience w/ SQL Server SQL as well as Transact SQL understanding and scripting
  • 5+ years of analytical and organizational skills
  • 5+ years of all phases of Systems Development Life Cycle (SDLC)
59

IA Security Specialist Resume Examples & Samples

  • Directly maintain and evolve network defense detection strategy to keep pace with emerging threats and adversarial techniques, for both internal and external networks, as well as host based security
  • Conduct in-depth traffic analysis of documented covert channels to create tailored response signatures
  • Active DoD TS Security Clearance
  • Expertise in creation, editing, and management of signatures, rules and filters for specialized network defense systems including but not limited to network and host-based IDS, IPS, firewall, web application firewall, proxy and SIEM systems
  • DoD 8570 compliant by obtaining/maintaining required IAT level III certifications such as (CISA or GCIH or CISSP or CASP CE)
  • DoD 8570 compliant by obtaining/maintaining required CND-A certifications such as (GCIA or CEH or GCIH or SCYBER)
  • A Bachelor's degree in computer science or related discipline plus 5 years of demonstrated operational experience; or
  • A Master’s degree in computer science or related discipline plus 2 years of demonstrated operational experience; or
  • Eight years of experience in lieu of degree
60

Research Security Specialist Resume Examples & Samples

  • Certifications:DoD Clearance, Valid drivers license; NSA COMSEC training
  • Skills:Application of computer skills including processes involved in installation, configuration and removal of server and client software especially as it relates to COMSEC (security of classified materials and communications)custodial duties; troubleshooting, identification and corrections of computer related problems; industrial security processes and practices; records management; application of government security requirements and policies
  • Preferred Education: N/A
  • Preferred Work Experience: Six years job related experience
  • Preferred Certifications: Industrial Security Professional (ISP) through the National Classification Management Society (NCMS) or Certified Protection Professional (CPP) through the American Society for Industrial Security (ASIS) International
  • Preferred Skills: Microsoft (MS) operating systems, MS office suites, Security Information Management System (SIMS), Joint Personnel Adjudication System (JPAS), Industrial Security Facility Database (ISFD), Electronic Questionnaires for Investigations Processing (e-QIP), Secure Web Fingerprint Transmission (SWFT) and Electronic Facility Clearance (eFCL) database; loading Crypto, EKMS (Electronic Key Management System); COMSEC Controlling Authority; Central Office of Record/COMSEC accounts management; operation and maintenance of Tier 3 devices, TACLANE, KG 235 and KG 250
  • Perform some HR-related functions (time-keeping, new hire and employee paperwork processing, etc.)
  • Handle logistics and administrative functions for field activity
  • Coordinate visiting researcher lodging
  • Assist in developing activity schedules
  • Handle clerical requirements - edit reports and presentations, plan and coordinate travel, and process travel expense statements
  • Perform Facility Security Officer (FSO) Responsibilities per the National Industrial Security Program Operating Manual (NISPOM)
  • Responsible for all security related tasks associated with the Field Office to ensure compliance with the National Industrial Security Program (NISP). These duties include but not limited to
61

Security Specialist Analyst Resume Examples & Samples

  • Security Operations Center (SOC) analyst
  • Computer Incident Response Team (CIRT),
  • Computer Emergency Response Team (CERT),
  • Computer Security Incident Response Center (CSIRC)
  • Able to work in a shift schedule (24X7X365)
62

Cyber Security Tools Specialist Resume Examples & Samples

  • ) Vulnerability scans and penetration testing which will include periodic scanning reports, risk assessments, vulnerability assessment reports, vulnerability remediation tracking reports, patch management reports, risk rating and prioritization of assets, etc.)
  • ) eDiscovery Investigations which includes performing forensics for required investigations including capturing forensic images of computer and email systems
  • ) Static code analysis comprising the review and vulnerability assessment of applications, remediation of findings and tracking of identified risk
63

SAP & Database Security Specialist Resume Examples & Samples

  • Identify and report recognized or potential Information Security threats and other Information Security issues
  • Ensure the compliance of the projects with the security standards
  • Contribute to assessments by using the Security Assessment methodology
  • Assess changes to Nestlé’s infrastructure introduced via the ITIL Change and Release framework
  • Identify opportunities for improving security services and follow-through or escalate requirements
  • Provide 2nd and 3rd level support on security solutions
  • 3-5 years as DBA administrator and DBA Security Analyst (create and implement security standards and procedures, reviewing their implementation, testing for segregation of duties and gaps)
  • 3-5 years as SAP Basis
  • Proven experience in design and development of security solutions
  • Proven experience in running risk assessments
  • Microsoft SQL/DB2 V9/SAP NetWeaver 7.0 are considered a plus
  • Fluent English, French is a plus
64

System Security Specialist Resume Examples & Samples

  • 3+ years IA systems security experience or 5 years military security experience
  • Experience with Accreditation Process, Risk Management Framework(RMF), a System Security Plans (SSPs), Plan Of Actions and Milestones (POA&M), and other associated Body of Evidence documentation for system certifications and authorizations
  • Experience with vulnerability scanners such as Assured Compliance Assessment Solution (ACAS), Security Content Automation Protocol (SCAP), Windows Automated Security Scanning Program (WASSP), and DISA STIG Viewer
  • Possess a working knowledge of the Enterprise Mission Assurance Support Services (eMASS), Vulnerability Management System (VMS), Security Technical Implementation Guides (STIGs) with associated Benchmarks and Checklists, Information Assurance Vulnerability Management (IAVM), Information Assurance Vulnerability Alerts (IAVAs), Bulletins (IAVBs), and Technical Advisories (TAs)
  • Familiarization with Incident Handling processes and reporting
  • Proficient with Microsoft Office in order to prepare and produce memorandums and all associated documents as required
  • Familiarization with Remedy Trouble Ticket system
  • Familiarization with web portals
65

Cyber Security Authorization Specialist Resume Examples & Samples

  • 3+ Years of experience producing and maintaining DoD Certification & Accreditation Packages (DIACAP) and experience with Risk Management Framework (RMF)
  • 3+ Years of experience understanding and implementing DoD, DISA, Joint Staff, CNSSI and NIST cybersecurity instructions, publications and policies
  • 3+ Years of experience in understanding and validating DISA Security Technical Implementation Guides (STIGs); DISA Security Requirements Guides (SRGs), National Security Agency Security Configuration Guides
  • 3+ Years of experience in understanding and validating NIST 800-53 Security Controls; CNSSI 1253 Security Controls and Overlays
  • 1+ Years of experience with Enterprise Mission Assurance Support Service (eMASS)
  • 1+ Years of experience with DoD Information Technology Portfolio Repository (DITPR); DoD SIPRNet Information Technology Registry (SIPR IT Registry); Ports, Protocols, and Services Management (PPSM) database maintenance as required
  • Demonstrable experience in information systems security assessments, risk assessment/management process, vulnerability assessments, and/or intrusion detection/prevention
  • Operational risk assessment expertise (threat, vulnerability, and impact analysis) of physical, logical, and cyber-persona layers
  • Must be deployment capable as position may require short deployments to the USCENTCOM Area of Operation
  • Experience with Assured Compliance Assessment Solution (ACAS/NESSUS), DISA Security Content Automation Protocol (SCAP), Host Based Security System (HBSS); Continuous Monitoring and Risk Scoring (CMRS) cybersecurity applications and tools
  • Experience with evaluating network devices, e.g., firewalls, switches, routers for STIG compliancy. Experience briefing senior military and civil service employees
  • Have an understanding of the new Risk Management Framework for DoD Information Technology (RMF for DoD IT)
  • Understanding and application of developing, certifying, and employing Cross Domain Solutions on highly complex Combined & Joint Enterprise Networks
66

Security Public Key Infrastructure Associate Specialist Resume Examples & Samples

  • Partner with manager to define and keep the strategy for Certificate Services. Proactively and independently drive projects and support of certificate services projects and operation support. Define tactical plans from the strategy and implement them globally. Determine and refine overtime endpoints that will have certificates. Technically own the development, implementation, support and growth of certificate services globally. Technical subject matter expert for certificate services, HSM, KCLM solutions and support technologies. Partner with Enterprise Architecture to define and design solutions. Mentor the work of other team members. Partner with teams globally to implement/renew certificates
  • Work with Operational teams in driving the understanding of technical requirements for certificate management and ensure the right architecture/design is implemented to enable the business, use cases. Ensure solution satisfy security audit/compliance and control needs. Specifying guidelines and supporting processes for integration, administration and maintenance. Technical leadership of multiple projects and meet deadlines. Communication and presentation of complex IT information in a clear, concise, persuasive manner. Define/implement governance for certificate services area globally. Developing general purpose services, usable by a variety of authorized systems and applications
  • Customization of any product functionality to fulfil requirements that cannot be met with standard out-of-box functionality. Interact with application teams that manage major user repositories and/or need to automate/standardize user access request process, gather requirements, design and deliver solution to integrate with related PepsiCo security projects. Gather requirements and Guide/ recommend the right integration pattern for applications needing services, taking into consideration the impact to the environment and standards set in PepsiCo
  • Recommend improvements/corrections/remediation or requirements for associated projects
  • Create and maintain documentation for security related activities and metric reporting. Advocate secure computing practices and procedures, and communicate Information Security best practices throughout the company. Ability to troubleshoot complex issues and resolve issues quickly identifying the best option in an emergency situation. Ability to work with different teams and interact with technical and business folks across the Enterprise. Provide full life cycle systems development services for certificate services/supporting technologies
  • Bachelor's degree or number of years of exp as alternate. 5-7 yrs of experience with an enterprise level IT environment. 6+ yrs of experience in monitoring/developing/implementation of information security systems. Experience maintaining and operating the Public Key Infrastructure. Experience maintaining, installing, and upgrading certificates from Enterprise Certificate Authorities
  • Strong Unix Bash shell scripting exp. Prior exp working with PKI discovery and mgmt platform such as Venafi Enterprise Director and with Vormetric file level encryption and tokenization technologies. Working understanding of Asymmetric & Symmetric Key Cryptography and Encryption, Hashing and Digital Signatures. Understanding of PKI Policy, Life Cycle management and Auditing of PKI Infrastructure. Experience with Private Key Protection Safenet or Thales Hardware Security Modules (HSMs)
  • Experience with Certificate Policies and Certification Practice Statements. Understanding of how PKI is integrated into HSM and Key Management for some of the following:Basic TLS Encryption/Brocade Load Balancers/IBM WebSEAL/IBM DataPower/BlueCoat/Web Servers (Apache and IIS)/SSH/SAML Gateways (3rd Party)/Splunk/Ironport for Email/Cisco Content Switches/Active Directory Certificate Services (ADCS)
67

Info Security Specialist Resume Examples & Samples

  • At least 3 years experience with processes, tools, techniques and practices for assuring adherence to standards associated with accessing, altering and protecting organizational data. 
  • Mainframe environments 
  • ACF2 or RACF Administration 
  • Information security audits 
68

Security Engagement Specialist Resume Examples & Samples

  • Experience designing, developing, and evaluating training
  • Strong writing and editing skills
  • Comfortable collaborating with subject matter experts and stakeholders
  • Strong project management skills with the ability to work independently
  • A passion for creating engaging and effective learning experiences
  • Expertise designing and developing eLearning, job aids, video, or Webinars
  • Global mindset and experience putting it to practice
  • Creative troubleshooting skills
  • Strong attention to detail and organization
  • Logistics extraordinaire
69

Operational Security Specialist Resume Examples & Samples

  • Executive Order 13526, JAFAN Series, NISPOM, NISPOM Overprint, and other government directives (as required) into the day-to-day operations
  • Classification Review and Marking procedures
  • Test and Deployment Operations
  • OPSEC Plan interpretation
70

Missile Defense Cyber Security Lab Specialist Resume Examples & Samples

  • Installation and configuration of Linux and Windows HW platforms from the OS up to the applications
  • Documentation and verification of all installation and configuration steps
  • Work with software developers and/or vendors as needed to help diagnose and identify the root cause of problems found during system integration
  • Submit problem reports for errors discovered
  • In addition, performing the following tasks on a scheduled basis
  • Auditing and accrediting new systems (as-needed)
  • Developing software policy updates (as-needed)
  • Troubleshooting issues related to IA (daily)
  • Interfacing with LM ISSO/DSS Rep (daily). Updating Dat files and ACAS plugins (weekly). -Reviewing Security Logs (weekly)
  • Auditing the system (User accounts, User activity, Software installations, System changes)
  • Scanning systems/networks and reviewing scan data (monthly)
  • Installing new IA Release (quarterly)
  • Supporting SMR Verification (quarterly)
  • Updating software/firmware on IA servers (quarterly). RCB 16-069
  • Administrator experience installing, testing and configuring vulnerability fixes to Windows and Unix/Linux platforms. Required
  • Experience with Information Assurance policies and procedures as they apply to lab management. Required
  • Basic network knowledge to include routers, switches and firewalls
  • Strong RHEL administrator tasks related to Unix/Linux server platforms
  • Strong Windows administrator tasks related to Windows workstation platforms
  • Good knowledge of Information Assurance policies and procedures as they apply to lab management
71

Computer Security System Specialist Resume Examples & Samples

  • Work with the U.S. government customer in all aspects of Continuous Monitoring including but not limited to: Vulnerability, Patch, Malware, Configuration, Event Log and Account Management as well as Network Segmentation, Network Access Control (NAC) and firewall rules management
  • Provide guidance, policy and reviews for cloud-computing to ensure compliance with the Federal Risk and Authorization Management Program (FedRAMP)
  • Participate in the system design process to ensure the implementation of IT Security policies and controls are incorporated into the information system throughout its entire system Development Life Cycle (SDLC) including but not limited to the implementation, operations, and maintenance requirements, related to software, networks, and applications
  • Establish rapport and develop a relationship across all Federal customer internal teams and all direct customers of the U.S. Government branch to become a recognized and integral member of the team
  • Actas a backup to provide orientations and IT Security Awareness training for new employees of the organization
  • Review specific Statements of Work (SOW) that are provided, to ensure they meet all applicable IT security FISMA requirements and agency policies
  • Maintain knowledge on current Federal, National, HHS and NIH standards, policies, requirements and procedures; update team members and customer with significant changes or developments
  • Evaluate, document and coordinate technical cyber security capabilities of various groups supporting the client, with an emphasis on risk, compliance, controls and logging
  • Assist team in implementation and maintenance of various Cyber Operations systems and applications as needed; for example NAC, IDS, etc
  • An undergraduate degree related to information systems, or equivalent experience can be substituted. Preference given for advanced degrees, such as Masters, or PhD in a related field
  • 8+ years’ experience Cyber Operations, Continuous Monitoring, SA&A (C&A), or ISSO support activities, including 2+ years’ experience in a U.S. Government NOC, SOC, Incident Response Team, or similar environment
  • Ability to effectively communicate with executive levels of federal leadership, such as Director, CIO (Chief Information Officer), Deputy CIO level
  • Demonstrated experience in clear and concise documentation and attention to detail
  • Proven experience in supporting or acting in DAA (AO), DAA-R (AO-R), SCA, SCA-R, ISSO, SO roles
  • Exposure to the creation and management of SSPs, PIAs, POA&Ms and related documentation
  • Knowledge of SDLC and application of FISMA and NIST practices for in-house developed applications
  • Knowledge of FedRAMP, Federal and National standards, policies, requirements and procedures
  • Experience in supporting an Incident Response Team or SOC in an operational capacity
  • Experience utilizing enterprise IDS, AV, Vulnerability Scanning, Patch Management operational systems
  • Excellent communication, presentation, interpersonal, and organizational skills
  • Demonstrated project planning and complex task management
  • Demonstrated knowledge of applying QA and QC approaches to data ingest, exports and processes
  • Must possess or be able to obtain a Secret Clearance
  • Must be able to work full time
  • Must be able to work at customer location
  • Prior experience supporting a U.S. Government Cabinet Level agency is highly desired, with additional preference given to experience involving HHS (Health and Human Services) OPDIV and STAFFDIV elements
  • Prior experience in supporting Focused Operation activities or interactions with Focused Operations teams is highly desired, as well as experience supporting Interagency and IC/LE activities
  • Prior experience in successfully tracking and performing communications on a recurring basis to a wide array of audiences is highly desired
  • In addition to any formal higher education, cyber security training or related certifications are also desired
  • Extensive experience and exposure to different federal civilian government, law enforcement, intelligence and/or military agency system accreditation activities are highly desired
  • Proven experience working with HHS and NIH specific tools and applications will be given strong preference
  • Prior possession of Secret or higher clearance given strong preference
  • Must be able to obtain and maintain a Secret clearance
72

Security Administrative Specialist Resume Examples & Samples

  • Maintain website initiatives to include OS&CI unique applications (i.e. Adjudicators Reference Tool, APICS, etc.)
  • Administer and troubleshoot security databases, to include specialized databases, sets up new user accounts and accesses; run reports; perform databases clean up tasks
  • Ensure security compliance with regulations and procedures of the tasks performed or reviewed by the contractor
  • Track, ensure completion, and prioritize polygraph assignments
  • Track and ensure completion of adverse and foreign travel/contact reports to OS&CI management
  • Perform ad hoc security briefings
73

Security Product Specialist Resume Examples & Samples

  • *Client would prefer candidates local to the Harrisburg, PA Metro Area.***
  • This requisition requires onsite in-person first round interviews only.**
  • Demonstrates competence in teaching/conveying technical and/or functional courses/concepts
  • Actively contributes as a solution designer
  • Coordinates enhancements to business and logical data models with data base administration to make the appropriate changes to the physical data model
  • Confirms that technical architecture will support all changes required by product enhancements
  • Effectively leads product tests and trials
  • Anticipates, identifies, tracks, and resolves issues
  • Develops contingency plans as necessary
  • Determines time estimates and schedule for own work and resolve issues in a timely manner
  • Identifies and tracks issues, risks and action items
  • Makes sound recommendations on functional and technical improvements to the product
  • Tracks and document expected volume and type of use of the product
  • Participates in product design reviews to verify that design meets quality standards and functional/technical requirements
  • Performs impact analyses on production fixes and enhancements to establish priorities
  • Provides effective on-site product support as needed
  • Documents all work for future reference
  • Analytical and customer service skills
  • Strong communication skills; both written and spoken
  • 3 Years of experience in Planning, designing, implementation and maintenance of security systems (Highly desired)
  • 3 Years of Check Point, Splunk, DLP Software (Highly desired)
  • 3 Years of ADFS Security (Highly desired)
74

Technical Specialist, Security Processing Resume Examples & Samples

  • Responsible for handling all court orders that come in from judges due to restraining orders, divorce, and custodial accounts
  • Research and resolve account errors and discrepancies
  • Effectively use knowledge, tools and resources to ensure service and processing output is compliant with current policies, procedures, rules and regulations
  • Respond to inquiries from branch offices and internal departments
  • Responsible for ongoing team efforts and process improvements
  • Use a high level of discretion in decision-making
  • Create and maintain relationships with third parties
75

Program Security Specialist Resume Examples & Samples

  • LI-BH2
  • Ability to obtain and retain a TS/SCI Clearance
  • 3-5 years SCI program security experience
  • Bachelor's Degree or equivalent job related experience
  • In-depth understanding of DCID/ICD directives and the National Industrial Security Program Operating Manual (NISPOM)
  • Excellent problem solving skills and the understanding of unique security needs for technology integration processes and procedures
  • Ability to multi-task and perform well as a team player in a challenging up-tempo environment
  • Excellent communication and interpersonal skills a must
76

Security Product Specialist Resume Examples & Samples

  • Achieve defined sales objectives of Quebec Sales team for next generation products leading with the Rogers Security portfolio of threat, vulnerability and compliance management
  • Qualify and develop opportunities that are identified directly, or by the Account Executives (AE) in line with Rogers long term growth strategy
  • Work strategically with the Account Executives, leveraging your knowledge to position Rogers security solutions, promote and win complex business in competitive situations
  • In conjunction with the Account Executives, create and execute strategic Customer Plans comprised of specific initiatives to achieve defined KPIs
  • Create innovative proposals and deliver strategic sales presentations, including Product demos, Solution presentations
  • Establish productive, professional relationships with key personnel in accounts, specifically at the executive decision making level
  • Clearly communicate the value of the solution to the prospective customer and promote the benefits of and endorse Rogers in collaboration with the AE. Thoughtfully differentiate Rogers against the competition in each opportunity
  • In the role of the Solutions Specialist, actively participate in discovery meetings, reviewing the customer’s technical requirements using a consultative approach. Be capable of looking beyond the Security portfolio to identify opportunities for a more complete customer solution leveraging Rogers Enterprise Grade Networks, Data Center and Cloud, Unified Communication and Collaboration solutions
  • Work closely with Account Executive & Solution Engineering to propose, design, price and close qualified opportunities. Leverage all Rogers resources to help with design and document the best possible Rogers solution(s) based on the customer requirements (business, budgetary and technical)
  • Ensure that all opportunities, processes and procedures are completed and tracked through Rogers CRM (Salesforce.com). Record/document all requirements and outcomes from meetings. Create quotations through Rogers CRM
  • Successfully manage the transition of ownership to the Implementation team post sale and back to the Account Executive post project implementation
  • Review all major deliverables (i.e. strategic brief, function spec, tech spec, etc.) to ensure quality standards and client expectations are met
  • Research and prepare for all customer meetings
  • A track record of results in direct &/or indirect sales in multiple segments and verticals
  • A consistent overachiever who is results driven and customer focused
  • Experience or knowledge of the Information Security industry is highly desired
  • Any experience or knowledge of telecoms networking, data center and cloud and UCC solutions a plus
  • Consultative Sales individual who can complete business cases to support customers in the decision making processes
  • Proven ability to develop and foster senior-level relationships
  • An effective communicator in both French and English, demonstrating poise and confidence with customers
  • Knowledge of the Quebec Market
77

Specialist Security Resume Examples & Samples

  • 2:- Should have expert Knowledge in Juniper NSM and Juniper SRX firewall
  • 3:- Understanding of Checkpoint Provider-1 Architecture, MLM, CLM and Gateway
  • SPOC for Network Security issue
  • Skill require to prepare RCA and justify RCA
  • Should be able to propose Network Security solution
  • Closely work with IBM NOC team, Change/Incident Team and onsite team
  • Should have good knowledge of VAPT
  • Should be Experience in Operation and Maintenance
  • 2- Interaction with Client and TAC
  • 3- Involved in L3 escalation
78

Security Lab Services Specialist Resume Examples & Samples

  • Consulting for setup and operation of SIEM and Identity Management Solutions infrastructures (including Analysis and translation of business requirements into policies, Design and implementation of security guidelines and policies, Coordination of security solutions adopted to the individual client organization, Culture and further client specific conditions; Typical work products are: Classification Models, Risk-Analysis-Reports, Security Policies, Security-Solution-Scenarios, Implementation Plans, Security Services …)
  • Installation of simple and complex Identity Management and QRadar infrastructures(including central architecture for analysis of log, flow and vulnerability data, Real-time correlation and registration of usage anomalies and Exact detection of offenses within billions of data flows)
  • Planning and execution of QRadar Advanced Coaching Workshops
79

Solutions Specialist, Security Resume Examples & Samples

  • Accountable for meeting and exceeding an annual Security product and services quota across a set of named accounts
  • Consultative field sales activity including
  • Government Of Canada Secret Level II Clearance or Above
  • Graduate from University/College, Business, Engineering Degree or equivalent experience
  • Proven Security knowledge and experience plus able to apply technology solutions to business needs
  • Proven success in telecommunications sales; selling complex solutions in a Face to Face environment
  • Experience consulting to executive
  • The following are other preferred qualifications, where available
80

Engineering Specialist, Security Resume Examples & Samples

  • Participates in pre bid reviews and sales to operations turnover meetings to evaluate accuracy of the sales estimate and job layout. Analyzes plans, construction contract specifications and codes to determine project requirements. Follows up with appropriate management to assure understanding and satisfaction of job scope
  • Manages the development of project plans in advance of project activity assuring effective execution by the Project Team. Monitors progress to assure compliance with the pre determined execution plan
  • Prepares engineering re estimate reports. Utilizes financial and monthly forecasting to manage and contain costs. Utilizes financial and monthly forecasting tools members to monitor, manage and control costs. Prepares progress billings, pursues timely payments from the customer and authorizes payments to material suppliers and subcontractors
  • Obtains bids and selects reliable subcontractors to provide wiring, device installation, special construction or other services
  • Participates in job site final walk thru and manages the completion of all close out documentation such as As-Built drawings and system operating instructions, transfers of excess materials, billings, collections and payments, and all project records
  • Supports development of project/program plan
  • Supports delivery of semi-complex project or program
  • Participates in project/program management activities (defining scheduling, budget, risk, change, opportunity and resource management activities)
  • Participates in technical review of system design and documentation
  • Participates in continuous improvement activities
  • May support sales activities and client relationship
  • Associates degree or equivalent with an emphasis in a technical field. Bachelors degree preferred
  • Strong knowledge of industry fundamentals and business operations
  • Excellent contracting skills
  • An understanding of job financial reports and the ability to apply these in managing assigned projects
  • Leadership, listening, verbal and written communication skills
  • BS/BA in related discipline, (Mechanical Engineering, Electrical Engineering, etc.)
  • Previously worked as Design Engineer or System Specialist 2-4 years
81

Corrections Specialist / Security Specialist Resume Examples & Samples

  • Demonstrated skills to write clearly, factually, and concisely
  • Demonstrated effective oral and written communications skills in routine and emergency situations
  • Observation - Observe and strategize personal action, based on environmental conditions and human behavior
  • Technology- Learn and utilize computer based applications in the performance of job duties
  • Stress Tolerance - Remains calm and rational while handling difficult situations to include, but not limited to, volatile, threatening or other crisis/emergency situations. Expertly intervenes in response to threats
  • Professional Standards - Know and apply Corrections related law, policy, procedure, and practice
  • Adhere to productivity standards and timelines established by law and policy. Identify own training needs and proactively seek training opportunities
  • Adaptability - Incorporate new information into an existing framework of understanding. Accept change and support the Agency through changes in law, policy and procedure
  • Consulting: Provides advice on situations requiring immediate attention; exercises knowledge of Security Management issues, leadership principles, and organizational behavior; exercises conflict resolution, proactive intervention, group facilitation, and contract and negotiation skills
  • Analysis and Problem Solving: Facilitates the problem solving process; anticipates problems; acts as a mediator, facilitating effective outcomes for all parties; influences new ways of thinking; understands work group concerns and problems; develops statistical or other data. Problems encountered are complex with potential broad impact
  • Communication and Interpersonal Interaction: Uses independent judgment during challenges. Presents complex ideas and information in a way that is understandable and appropriate for the audience; uses appropriate channels of communication; fosters effective working relationships among divergent groups by proposing solutions to resolve conflict; builds consensus
  • Customer Focus and Business Orientation: Understands customers' organization and mission and provides proactive guidance; exercises knowledge and understanding of processes and proposes efficiency changes; provides services related to diversity issues
  • Change Leadership: Assesses problems and proposes actions and resources needed to accomplish changes; supports organizational change by facilitating the implementation of appropriate change strategies; assists others in dealing with changes
  • Teamwork: Develops and leads or coaches teams using appropriate process planning to achieve goal; applies coaching principles and performance understanding and analysis
  • Research and Analysis: Researches and verifies information; identifies the type of information needed and where to obtain it; applies analytical skills to data and formulates a determination and recommendations; conducts investigations
  • Proficiency in MS Word and Outlook
  • Bachelor's degree in Sociology, Public Administration, Criminal Justice or similar field from an accredited college or university whose accreditation is recognized by the U.S. Department of Education and the Council for Higher Accreditation (CHEA)
82

Research Security Specialist Resume Examples & Samples

  • Understand the behavior of a standard compiler, linker and loader
  • Understand the LLVM intermediate representation
  • Develop software using the LLVM core library C++ interface
  • Design, develop and test using C++ for execution on Linux, Mac OSX and Windows
  • Document research, specifications and design results clearly, with an emphasis on explaining why decisions were made
  • Understand and manipulate the low level format of compiled and linked ELF and MACHO binaries
  • Analyze and debug applications on a variety of different target operating systems and architectures with and without a reproducible test case
  • Write unit and system test cases that verify software functionality
  • Understand and write small pieces of code in ARM and x86 assembly (both 32 and 64 bits targets)
  • Research and break down nebulous requests into smaller, well-defined tasks with accurately estimated effort
  • Think like an adversary that is attempting to attack a binary; utilizing debug tools such as IDA Pro
83

Contracts Specialist, Security Resume Examples & Samples

  • Maintain thorough understanding of the company’s security posture and capabilities
  • Provide subject-matter expert guidance on information security requirements for third parties, business partners or vendors
  • Assess IT security needs/requirements and determine contractual provisions necessary to mitigate potential risks/issues and ensure compliance with policies and standards
  • Collaborate with stakeholders to structure and negotiate security provisions in contracts
  • Clearly communicate or present (in writing or verbally) risks and benefits of negotiating options and contractual provisions to stakeholders, including senior management
  • Collaborate with internal legal counsel to ensure consistency in contractual provisions and escalate key issues
  • Maintain inventory of security obligations and impacted solutions and stakeholders
  • Maintains established service level agreements to meet customer expectations and quality standards
  • 2+ years of experience working directly on information security contractual reviews
  • Demonstrate creative and critical thinking capabilities, attention to detail, and strong time management and organizational skills
  • Ability to exercise sound judgment to make decisions
  • Strong sense of initiative, requiring little direct supervision and a problem solver
  • Ability to handle proprietary and sensitive information in a confidential manner
  • Comfortable working independently or in a team, and ability to balance multiple requests
84

IT Support Specialist / Security Resume Examples & Samples

  • High School diploma or equivalent. Bachelor's degree in Computer Science, MIS, or related field preferred
  • 2+ years of related, current on the job experience
  • Required User account creation and management of access administration
  • User onboarding\off boarding of application access experience is a benefit (Password reset doesn’t fit requirement)
  • Active Directory user and group administration
  • Working in a high volume, fast paced environment where quality, organization and detail oriented is a requirement
  • More complex analysis and troubleshooting skills required
85

Specialist Security Analyst Resume Examples & Samples

  • Operational
  • Responsible for managing the Geo GPS Program that includes but may not be limited to
  • EMEA Program Elements 50% o Security Operations Center
  • Administers and monitors the GEO in-use Visitor Management and GTC Screening to ensure compliance with program requirements
  • Manages and coordinates the Authorizer Process with GPS Security Badging to ensure maintenance of Authorizers in each HDS GEO card access controlled facility. Directs the production of access reports as needed for compliance with SOX Audits, investigations, etc., as directed by procedure and/or Director of GPS
  • Manages the GEO Photo Access Badge Program to ensure that all authorized HDS Colleagues are assigned proper credentials and proper access to facilities and areas as authorized by designated Access Authorizers
  • Manages the GEO Security Systems Vendors for the installation, maintenance and repair of electronic access systems, key and keyways, CCTV systems and sub-systems, intrusion systems, and others as appropriate. All installation work to be coordinated with and programmed through the HDS Sr. Manager of Security/Safety Operations
  • Manages the GEO Traveler Protection Program to ensure Colleagues are properly supported when requesting, preparing, and traveling to High Risk Destinations where pre-trip preparations and approvals are required
  • Manages GEO Security and Safety Awareness to ensure periodic reminders, posters, etc., are published to all GEO Colleagues promoting efficient and effective security and safety in the workplace
  • Manages the GEO Loss Prevention Intervention activities including the use of
  • Works closely with GPS Security Providers and Vendors to ensure best quality service and compliance with Contract performance requirements and standards
  • 5 years of corporate security & safety programs experience
  • 3 years of (in charge) Security/Safety Programs Management experience involving 10 or more sites in different geographical areas
  • 3 years of direct supervisory experience of 25 or more employees
  • Current working knowledge of Enterprise access control systems
  • Current working knowledge of Microsoft Windows, Word, Excel and PowerPoint
  • Strong business level oral and written communication and presentation skills
  • Strong business level customer service skills
  • Ability to travel up to 40% of the time within the EMEA Geo
  • B.A. and/or B.S. or equivalent experience in security/safety related disciplines preferred
  • ASIS PSP and/or CPP Certifications desirable
  • Establish and maintain effective liaison with law enforcement and related agencies
  • On-call 24X7 as required by duties
  • Provide operational back-up as required
86

Info Security Specialist Resume Examples & Samples

  • Ability to perform multiple tasks concurrently and meet established deadlines in a dynamic work environment
  • Strong analytical, problem-solving, decision-making and organizational skills
  • Strong customer services skills, interpersonal, verbal and written communication skills
  • Information security standards, procedures, policy
87

Security Solutions Sales Specialist Resume Examples & Samples

  • At least 3 years experience in Software sales
  • Team player with the ability to leverage & collaborate with the extended team
  • Experience selling into the Industrial Market
  • Passionate about Security technologies and trends in the Industrial Sector
88

Security Administrative Specialist Resume Examples & Samples

  • Oral and written communication skills sufficient to compose and deliver responses to customers' routine questions in a clear and concise manner
  • Experience with personnel security policies and practices
  • Experience working in an environment with compartmented programs
89

Research Security Specialist Resume Examples & Samples

  • Leading research projects with a security focus
  • Assisting with research projects that require security input
  • Work to design and specify security controls for software
  • Be part of Dyson IoT Architecture specification and review team, championing security method for future product and software development
  • Strong background in both leading and contributing to a design process
  • Develop proof of concepts
  • Able to travel to world-wide sites across the enterprise
  • GoLang
90

Security Solutions Specialist Resume Examples & Samples

  • Bachelor’s degree in Information Security/Systems or equivalent work experience
  • Minimum 3 years’ work experience in Information Security
  • Ability to create documentation and customer facing security papers (MS Office, Visio)
  • Knowledgeable in
91

Security Technical Specialist Resume Examples & Samples

  • Monitors and utilizes information security technologies for the identification of suspicious and malicious activities across the network (e.g., analyzes network traffic, vulnerability scans, identification of computer malware, unauthorized user activity) which may compromise the integrity and availability of systems
  • Participate in the evaluation, testing and selection of security applications and systems
  • Implementing, supporting, maintaining, troubleshooting and utilizing all operational security technologies and solutions with company-wide impact and visibility
  • Analyze and monitor security violations, alerts and malware detection events and acts as a liaison regarding all security vulnerabilities reported
  • Identify and initiate resolution of problems that involve analysis of inadequate or conflicting data
  • Utilize anomaly detection, full packet capture, malware analysis systems and others for internal and external threat hunting
  • Participate in investigative efforts supporting requests from human resources, legal, ethics and physical security
  • Communicate effectively both verbally and in written form
  • Collaborate with technology partners, support representatives, and IT management to coordinate and remediate security vulnerabilities
92

Computer Security System Specialist Resume Examples & Samples

  • 8+ years’ experience Cyber Operations, Information System Security Officer (ISSO) and Security Control assessments (SCA)
  • Master degree (Computer science or equivalent stream)
  • IT Security Certificates
  • CISSP or CAP or equivalent industry known Certificate
93

Program Security Specialist Resume Examples & Samples

  • Provide SAP / SCI security interface with contractors and government sites
  • Provide SAP / SCI security function support to the Program Office; meeting support including physical and personnel access security
  • Provide oversight and management of contract close out documentation
  • Process personnel security actions, JPAS entries, Periodic Reinvestigations, Foreign Travel notifications/close-out, Program Access Request (PAR) processing
  • Review and maintenance of multiple facility SOPs, SSPs, ATOs, OPSEC, SCGs, and SETAs
  • Provide assistance in support of PMO security reviews and inspections at remote facilities
  • Provide Physical Security support to include site reviews and close outs
  • Provide support to PSO in facility records management, tracking document status, collecting missing documentation; updating, validating, maintaining facility database and records
  • Provide Security Review for Data Transfer requests
  • Coordinate visitor requests
  • Conduct security briefings and debriefings; develop SETA program/training
94

Program Security Specialist Resume Examples & Samples

  • Maintain program security databases
  • Implement and maintain Top Secret Control Officer (TSCO) Procedures
  • Implement and maintain Media Control Plan
  • Organize and maintain Special Access Program (SAP) Physical Security Paperwork
  • Conduct alarm testing and maintenance
  • Assist with Personnel and Industrial Security Programs (PERSEC)
  • Work under the direction of the task lead and senior team members with feedback from the supported government customer
  • Develop for review, revise, and implement government approved SOPs for various security areas
  • Assist with test planning and support to include: Assisting with conducting research, planning, and analysis to identify appropriate range facilities for technology demonstrations of customer project technologies and assisting with test plans and technology demonstrations
  • High School Diploma or equivalency with 3+ years of related experience
  • Strong computer skills with full command of MS Office applications
  • Familiarity with DoD Security program directives, regulations, and policies for personnel, facility, and information security
  • Ability to pursue Security Professional training toward the completion of professional accreditation
  • Ability to travel up to 10% to locations within the continental U.S
  • Currently possess an active DoD Top Secret security clearance with the ability to successfully complete a post-hire Special Access Program briefing
  • DoD Security Specialist/Professional certification
  • Previous experience within the DoD Special Access Program offices
  • One year of relevant experience in a comparable position with a DoD organization
  • Excellent communication skills with the ability to work in a dynamic environment to organize and analyze information from disparate sources
  • A technical background or professional interest in the customer’s work area (signature management and engineering)
  • Associate’s or Bachelor’s degree or active pursuit thereof
95

IA Security Specialist Resume Examples & Samples

  • Deploy, configure and use Nessus (ACAS) and other DOD-approved security scanning tools
  • Perform remediation actions, mitigate findings, perform systems administration tasks and work with team members to resolve issues for multiple networks and operating systems
  • Assist with formal and informal reports, briefings, and input to the customer regarding security and functionality requirements, system architecture, security designs, policies and procedures. Conduct risk assessments throughout assigned program life-cycle as well as continuously monitoring security relevant changes of the environment
  • Work with system and network administrators to perform assessments in accordance with the latest DISA STIGs and actively maintain IAVA compliance
  • Understand DIACAP and RMF controls with regard to system security posture, policy updates and configuration for information systems with regard to security and event logs
  • Familiarity with Splunk deployment, configuration and use is a plus
96

Program Security Specialist Resume Examples & Samples

  • A minimum of 2 years of experience working with Special Access Programs
  • A minimum of a Secret clearance current within 5 years
  • Excellent organizational, time management, and problem solving skills
  • Exceptional communication skills (both verbal and written)
  • Familiarity with JPAS
  • Familiarization with SIMS or similar databases
  • Experience handling COMSEC
  • Experience working with Government customers
  • Willingness to cross train and work within a team
97

Specialist, Security Resume Examples & Samples

  • Bachelor in Personal Management, Law, Political Science or related field. with minimum 10 years working for HR or Security
  • Have job knowledge in Security or HR function will be advantage
  • Good written and spoken in English
  • High energy, good human relation, strong on leadership and personnel interaction
98

Operational Security Specialist Resume Examples & Samples

  • Business
  • Analytical Skills-Ability to collect data and establish facts and identify trends and variances; Ability to integrate information from a variety of sources with varied levels of complexity
  • PC skills-Microsoft Office
99

IA Security Specialist Resume Examples & Samples

  • Write customer facing Designated Authorizing Official (AO) Risk Acceptances (ARA) documents and Directorate level Plan of Actions and Milestones (POA&M) documents to be accepted by the respective ID4 Branch Chief, Vice Director and AO. A high level of attention to detail is required when writing these documents and our customers are very critical when it comes to all aspects of ARA and POA&M development
  • Complying with the Information Assurance Vulnerability Management (IAVM) process, but is not limited to: Performing Information Assurance Vulnerability Alert (IAVA) and Bulletin (IAVB) applicability analysis, compiling and reporting IAVA and IAVB testing, implementation, and compliance reporting
  • Ability to properly manage multiple customers’ (GS-13 to SES) expectations through daily meetings with Government Program Managers in terms of product deliverables, scope of IA testing, and schedule milestones. Primary candidates should exhibit a confidence in IA that is unmatched and that our customers will not only respect, but will trust
  • Ability to manage multiple (10+) systems at various stages of the DIACAP/RMF process while maintaining a pristine security postures within Continuous Monitoring and Risk Scoring (CMRS) and eMASS
  • Develop customized IA processes and SOPs for capturing and managing the evaluation and IA assessment of products supported by DISA programs and ID4
  • Deliver rapid turn-around for product IA validation through coordinated efforts with Government Project leads and Vendors
  • Mentor junior, intermediate and senior members of the IA staff in the evaluation, assessment, and understanding the security requirements of all associated DISA IA supported programs (i.e., POA&Ms, STIGs, C&A processes, etc)
  • Define C&A content and write Concept of Operations (CONOPS), Tactics, Techniques and Procedures (TTPs), Security Policy and procedures documents (i.e., SSP), to include Continuity of Operations (COOP) or Contingency Plans
  • Execute Security Test and Evaluations (ST&E) on Windows, Linux and Solaris operating systems hosting stand-alone and web applications, as well as various databases (i.e. MS SQL)
  • Analyze the results from DISA-approved security tools and provide recommendations based on vulnerability scan results. This is performed while taking into consideration the asset’s functional environment and business impacts it could have for ID4 and the warfighters
  • Perform system and asset hardening with additional scans to ensure no residual vulnerabilities are present
  • Exhibit expert familiarity with Assured Compliance Assessment Solution (ACAS), McAfee Host Based Security System (HBSS), Enterprise Mission Assurance Support Service (eMASS), Continuous Monitoring and Risk Scoring (CMRS), and various other DISA related products
  • Expert level Security Readiness Review (SRR) experience. Primarily, Windows, Linux, and Database applications. This must accompany formal DISA SRR training certificates. This will ensure the best suited candidate can perform security administration including periodic Security Readiness Review (SRR) and assist in the successful completion of SRRs with zero oversight
  • Expert knowledge of DISA processes, procedures and culture
  • In-depth understanding of the impacts of various Information Assurance (IA) issues throughout the System Development Life Cycle (SDLC) and is able to properly articulate these in professional, timely, and quality fashion
  • Document and maintain system component IA baselines to support Change Management, Configuration Control, and Certification & Accreditation processes
  • Provide assistance to the DISN OSS Certification and Accreditation Team in obtaining IA approvals and Authority to Operate (ATO) from the AO (previously the DAA)
  • Comply with and enforce Security Technical Implementation Guides (STIGS), DoD policies and procedures and Federal IA Guidance
  • Ensure networks and systems being developed implement DoD baseline IA Controls
  • Ensure networks and systems being developed are based on evaluated COTS and GOTS products per policy
  • Enforce agreed-upon controls and mitigation strategies
  • Select, implement, and maintain access control software
  • Maintain existing security related documentation
  • Establish and protect storage and retrieval systems for classified and sensitive data
  • Manage system security services (authentication, access control, encryption, audit trails)
  • Assist in enforcing physical access restrictions to facilities housing system management resources and on-going operations
  • Control and monitor mechanisms that exist to protect selected resources, user information and security objects
  • Control access to encryption processes and to databases that are used for archiving and retrieving network and system management information
  • Protect the confidentiality, authenticity and integrity of network management data (access lists, routing tables, performance data, traffic flow analyses, audit data, accounting and billing data)
  • Generate reports of recorded security violations as they occur
  • Provide information assurance training, certification, and workforce management in accordance with DoD Directive 8570
  • Provide security awareness training, as needed
  • Bachelor’s Degree in IT related field or equivalent experience
  • DOD 8570 Information Assurance Technical (IAT) Level II compliant
  • CISSP or related IA certification
  • Network+ certification
100

Computer Security System Specialist Resume Examples & Samples

  • 4 years of experience with RMF or DIACAP processes
  • Experience with preparing DIACAP or RMF packages and supporting documentation
  • Experience with the DoD Cybersecurity policies and procedures
  • Experience with DoD Multinational Information Sharing (MNIS) programs and initiatives
  • Experience with supporting security control selection and other activity in support of RMF specific steps
101

Security Technical Specialist Resume Examples & Samples

  • Manage compliance with all aspects of the NISPOM, JAFAN, ICD and other security activities, including document control, visitor control, and personnel security
  • Provide oversight of the processing of new employee security clearances including tracking within JPAS (Joint Personnel Adjudication System)
  • Oversight and administration for a comprehensive a security education, training, and awareness program for cleared employees to include conducting Initial Security Briefings, Security Classification Program Briefings, periodic training, and Debriefings Implement and manage procedures and documentation for classified materials, documents and equipment
  • Administration and processing of incoming/outgoing visit requests, including record keeping
  • Responsible for interpreting NISP policies; develop and implement security plans and procedures for compliance
  • Ensure that subcontractors requiring access to classified information have a valid facility clearance at the proper level
102

Program Security Specialist Resume Examples & Samples

  • Support the Government Program Security Officer (PSO) in the management and execution of acquisition program security as it applies to program protection and industrial security oversight of industry locations and personnel involved in the applicable acquisition effort. The individual shall also assist the SMC/SY Facility Security Officer (FSO) in the daily administration of satellite/auxiliary facilities located in the Aerospace complex IAW DoDD 5205.07
  • Review developmental contractor Contract Data Requirements List (CDRL) deliverables for security. This includes but is not limited to, IS & Physical Security plans, management plans, and test plans. Provide comments and recommendations as required
  • Review and provide comments for Statements of Work, contracts, RFPs and security plans
  • Prepare and review DD254s for prime and sub-contractors
  • Develop and update security classification guides during all phases of the acquisition effort. Periodically review proposed industry interfaces, Operations Security (OPSEC) procedures, and cover stories for continued applicability
  • Review operational requirements and system specification documents to ensure applicable national security requirements are addressed and incorporated into the final system design ensuring the resulting acquisition effort delivers a system that meets accreditation standards
  • Attend system design meetings ensuring system security requirements are incorporated into system design. Contractor shall be knowledgeable of ICD requirements, TEMPEST standards and COMSEC requirements providing input to developmental engineers involved in the design solution process
  • Participate in System Security Working Groups
  • Review Public Release and Freedom of Information Act (FOIA) requests and prepare associated correspondence for the staffing of said requests
  • Review and investigate security violation/incident documentation, providing recommendations to the government security official
  • Review industry Standard Operating Procedures (SOP), providing written correspondence for government signature recommending 8 of 39 approval or addressing comments requiring further clarification from the submitter
103

IT Specialist, Security Infrastructure Resume Examples & Samples

  • Familiar with IT Security
  • Understand network protocols
  • Windows and Linux (Strong knowledge helpful)
  • Scripting (Bash / Python)
  • Complex systems and infrastructure understanding
  • Troubleshooting the above
  • Quick learner, Self-starter, Curious, Out of the box thinker, Communicative
  • Responsible for the support of all IT Security Threat Defence infrastructure technologies. Participate in the technical design and implementation of strategies for all activities related to Threat Defence and IT security projects
  • Provide 1ST/2ND level support for TD technologies. Investigate, resolve and eliminate root cause for complex infrastructure problems
  • Work with 3rd party vendors for support of infrastructure solutions
  • Investigate, identify and eradicate root cause of technical problems that are impacting TD technologies
104

Security Assessment Specialist Resume Examples & Samples

  • Knowledge of platforms, products and domains
  • An understanding of relevant industry standard toolsets and processes
  • An awareness of one or more service management disciplines such as incident, problem, change IT, continuity or capacity
105

Operational Security Specialist Resume Examples & Samples

  • Serve as the focal point for operational security
  • Serve as primary point of contact for facility physical security to include development/update and enforcement of facility and equipment (i.e. safes) standard operating procedures
  • Facilitate the scheduling and security conduct of classified meetings and VTCs to include establishing common access levels
  • Facilitate transmission and receipt of visit certification requirements for both personnel traveling and for other personnel visiting the organization
  • Support development of billet architecture, recurring training, and SAP indoctrination materials for personnel
  • Confirm proper measures are taken when a security incident or vulnerability is discovered
  • Five (5) years of SAP security experience within the last eight (8) years at wing level or sister service equivalent required
106

Program Security Specialist Resume Examples & Samples

  • Update and administer Standard Operating Procedures (SOPs)
  • Assist with test planning and support to include assisting with test plans and technology demonstrations
  • Bachelor's degree with 8+ years of related experience. Additional training and/or years of expereience may be substituted in lieu of a degree
  • DoD Security Specialist/Professional certification (SFPC)