Security & Access Resume Samples

4.6 (69 votes) for Security & Access Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the security & access job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
KK
K Kovacek
Kailyn
Kovacek
44268 Orlando River
Philadelphia
PA
+1 (555) 563 4956
44268 Orlando River
Philadelphia
PA
Phone
p +1 (555) 563 4956
Experience Experience
Phoenix, AZ
Security Access Management Analyst
Phoenix, AZ
Herzog Group
Phoenix, AZ
Security Access Management Analyst
  • Ensuring all documentation pertaining to key management policies and procedures reflects current practice within the organization
  • Regular and ad hoc monitoring and testing of standardized Information Security system controls, tools and applications
  • Working with support and project teams to create and implement plans to rectify discovered vulnerabilities
  • Review and design of new information systems requiring the incorporation of cryptographic keys to meet internal and regulatory standards
  • Assisting with documentation of business impact assessments carried out on defective standards, threats and vulnerabilities
  • Preparing scheduled reports on those defective standard, threats and vulnerabilities
  • Coordinating regular and ad-hoc security reviews on high risk applications to identify vulnerabilities
New York, NY
Security Access Administrator
New York, NY
Hamill, Buckridge and Cassin
New York, NY
Security Access Administrator
  • Manage and record resolutions and activities into Service Desk software to ensure effective status updates, as well as to log all administrative activities relevant to future audits
  • Manage Access Management projects
  • Provide training and development of staff
  • Develop awareness and familiarity with issues and events affecting user access at all Fidelis Care New York locations and key management; provide problem determination and resolution for access issues on supported applications and systems
  • Assist with audit support activity
  • Create or update documentation for standards and procedures to keep them current
  • Maintain application feeds to Identity Management application
present
Los Angeles, CA
Information Security Access Management Specialist
Los Angeles, CA
Hagenes-Johnson
present
Los Angeles, CA
Information Security Access Management Specialist
present
  • Work with business management and IT application administrators to manage access roles and profiles for critical applications
  • Work with business management manage default access profiles for employees jobs and departments
  • Supporting the development and implementation of the Technical Access management, Privilege access management, Access lifecycle and recertification
  • Assisting Info Sec Lead in delivering the best use of program management disciplines and approaches
  • Onboard new application into centralized access management processes. Includes development of security administration procedures
  • Acting as a reference point for Project Management Office (PMO) queries and information and an advocate for best practices in program management
  • Assisting in tracking and reporting on portfolio performance
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Washington State University
Bachelor’s Degree in Computer Science
Skills Skills
  • Good knowledge of Risk and Project Management concepts (e.g. COBIT, Prince2, PMP)
  • Ability to maintain professional demeanor under stress
  • Excellent oral and written communication skills
  • Strong relationship building and interpersonal skills
  • Work with business management and IT application administrators to manage access roles and profiles for critical applications
  • Strong numerical & Analytical Skills
  • Demonstrated capability for problem solving, decision making, sound judgment, assertiveness
  • Ability to work independently and as part of a team
  • Work with business management manage default access profiles for employees jobs and departments
  • Excellent customer service skills
Create a Resume in Minutes

15 Security & Access resume templates

1

High Security Access Program Lead Resume Examples & Samples

  • 10 plus years in a technology management position with a demonstrated ability to manage effectively through influence and knowledge
  • 3 plus years of demonstrated experience with Access technologies
  • At least five years Information Technology Risk/Identity and Access Management experience, with Access Request tool experience
  • At least five years product/project management experience and ability to handle multiple programs at once is required
  • Must have demonstrated expertise in verbal and written communication including performing tasks related to relationship management/strategic marketing
  • Strong interpersonal and communication skills (verbal and written) needed to work cross-functionally
  • Must be an excellent team player and with strong leadership abilities
  • Must have strong process management skills and strong PC skills, including MS Office (Word, Excel, PowerPoint and Project), are required
2

Identity & Access Management Security Analyst Resume Examples & Samples

  • Provide support to the Team Lead in the completion of work within cross-functional teams contributing to the success of the Identity and Access Management Onboarding team
  • Coordinate on-boarding activities related to adding new applications to the Aveksa certification tool
  • Assist in the review of IAM Intake requests providing appropriate responses within the established SLAs
  • Ensure all coordination activities are in compliance with Information Security standards and processes
  • Ensure Technology Development (TD) deliverables meet the IAM requirements for integration with Aveksa
  • Escalate technical issues, risks or conflicts to the Team Lead before deliverables are impacted
  • Participate in the analysis and design conducted by TD teams to ensure IAM requirements are addressed properly
  • Participate in development, testing and implementation phase of projects
  • Participate in project and team meetings interacting and collaborating with team members and other departments as appropriate
  • Must feel comfortable conducting virtual meetings and conference calls
  • Ensure all meeting minutes are issued on time and actions are tracked accordingly
  • Assist Team Lead in providing expected costs for assigned projects in order to incorporate in the overall project finances and reporting
  • Provide timely status on assigned projects in order to incorporate in the Program Dashboard and Reporting
  • University degree or college diploma in Computer Science, Engineering or equivalent industry experience
  • Minimum 1-2 years systems analysis
  • Coordination/project management experience is considered an asset
  • Understanding of Identity and Access Management concepts, Systems Development Life Cycle (SDLC) methodology, Information Security and Quality Assurance processes
  • Advanced MS Office skills (Excel, Access, MS Project)
  • Knowledge of T&O platforms and applications
  • Displays knowledge of T&O organization and processes
  • Good analytical skills for complex problem solving
  • Excellent organizational skills and detail-oriented
  • Effective using Microsoft tools such as Word, Excel, Powerpoint and Sharepoint
  • Ability to coordinate multiple concurrent tasks and work under pressure
  • Demonstrates solid problem identification skills and problem solving skills
3

Security Access Management Analyst Resume Examples & Samples

  • Review of design for new information system identity and access management controls
  • Review and design of new information systems requiring the incorporation of cryptographic keys to meet internal and regulatory standards
  • Creation of key management processes to support new information systems
  • Management of key management indices and key lifecycle to internal and regulatory standards
  • Review of information system requirements, design and implementation to ensure Information Security exposures and vulnerabilities are addressed
  • Guidance and recommendations on the design and implementation of new information system within the environment
  • Coordination of validation exercises (such as penetration testing) for new and changed information system to ensure that all changes are implemented in accordance with approved designs
  • Technical SME for project design and implementation of new information system
  • Liaison with other security SMEs (such as infrastructure or network SMEs) to ensure that all aspects of information security are reviewed for new information system
  • Creation and promulgation of risk assessments for exposures that cannot be addressed through appropriate controls
  • Initiate and lead projects to manage and resolve issues
  • Coordinating regular and ad-hoc security reviews on high risk applications to identify vulnerabilities
  • Regular audits to enable the business to meet security metrics reporting, SOX, PCI DSS and other regulatory requirements
  • Preparing scheduled reports on those defective standard, threats and vulnerabilities
  • Assisting with documentation of business impact assessments carried out on defective standards, threats and vulnerabilities
  • Working with support and project teams to create and implement plans to rectify discovered vulnerabilities
  • Regular and ad hoc monitoring and testing of standardized Information Security system controls, tools and applications
  • Creation and maintenance of technical standards and guidelines that will govern the secure, design and implementation of new information systems
  • Ensuring all documentation pertaining to key management policies and procedures reflects current practice within the organization
  • Completion of a tertiary education with an IT or Business Information Management related discipline or relevant industry experience
  • 3 – 4 years’ experience in Information Technology and finance industry
  • 3 – 4 years’ experience in Information Security principles and practices
  • 3 – 4 years’ experience in Information Security auditing principals
  • 3-4 years’ experience in identity and access management technologies
  • Understanding of cryptography principles and practices
  • Understanding of networking principles and practices
  • Strong at influencing others
  • Strong at negotiating
  • Strong at stakeholder management Attributes/Behaviours
  • Self Managed
  • Reliable/Committed
  • Honest
  • Trustworthy
  • Leads by example
  • Understands Integrity
4

Security Architect Identify & Access Management Resume Examples & Samples

  • Depth of knowledge in core security domain IAM
  • Experience in the design and deployment of technology and solutions in core domain Identify and Access Management
  • At least 3 years experience in IAM product knowledge : IBM IAM suite eg. Security Access Manager/Privileged Identity Manager/Security identity Manager/…
  • French: Intermediate
  • Dutch: Intermediate
5

Security & Remote Access Engineering Lead Resume Examples & Samples

  • Network certification(s)
  • 5+ years experience with Cisco ASA and Juniper SA
  • IP Services experience with DNS, firewalls, load balancing, content forwarding, remote access, and wireless
6

F APM Access & ASM Security Engineer Resume Examples & Samples

  • The f5 APM Access and ASM Security Engineer possesses and maintains competencies, applies a depth of technical knowledge and subject matter expertise in f5 APM and ASM Policies and iRules. The f5 Access and Security Engineer is called upon to dependably handle the transformations and manage the transitions
  • Deep experience in custom iRule creation, configuration and management
  • Knowledge of associated industry protocol standards such as: LDAP, Kerberos, RADIUS, SAML, DNS, TCP/IP, x.509, TLS/SSL, XML, HTTP, as well as the e-Mail protocols: OA OWA, SMTP, POP, IMAP
  • Must be able to work with application teams and assist in implementing and tuning services that are reliable, available and performing
  • Bachelors Degree with Major in Computer Science, Electrical Engineering, or Telecommunications
  • Relevant work experience
7

IAM Security Architect Access Management Resume Examples & Samples

  • Design and develop simple, (re-)usable, service enabled, maintainable, and scalable security solutions that meet requirements, adhere to applicable policies, and comply with information security requirements
  • Demonstrate the ability to analyze and understand the EY IAM capabilities
  • 8+ years of experience in IAM - access management field especially on engineering and architecture side
  • Must have an experience of implementing an enterprise level IAM infrastructure
  • Overall security knowledge is required which includes but not limited to encryption, PKI, access control, web access management and others
  • A candidate must have hands-on experience on following technology
  • Single Sign On (SSO) for employee and external users (clients)
  • Identity federation using SAML 2.0 (must), OAuth (should), OpenID Connect (should) for internal and cloud based applications
  • Experience with one of the major access management products like SiteMinder, PingAccess, PingFederate, RSA access manager, etc
  • Team player and individual contributor with good communication skills
  • Mobile and BYOD solution implementation
  • Authorization solution implementation using RBAC and ABAC model
  • Active directory and any type of LDAP stores
  • Software development skills on any major platforms such as .NET, JAVA etc
8

Security Analyst, Access Services Resume Examples & Samples

  • Collects documentation in preparation for analysis related to projects and technology being assessed for security capabilities
  • Configures systems for testing of security resilience and configuration
  • Maintains operational procedures in order to comply with security policy and operational framework
  • Assists in providing existing resources to internal customers upon request to leverage existing guidelines
  • Develops security components for banking systems/networks as required by projects
  • Contributes to BMO Financial Group’s overall business results by making recommendations that significantly improve operational efficiency and effectiveness
  • Basic knowledge of project management processes, documentation, audit and signoff authorities
  • Must possess specific information security skill sets, including a good knowledge and understanding of security classification, security assessment processes, and system hardening
  • Demonstrates basic analysis skills
9

Security Architect Identify & Access Management Resume Examples & Samples

  • IAM product knowledge : IBM IAM suite eg. Security Access Manager/Privileged Identity Manager/Security identity Manager/…
  • At least 3 years’ experience in architectural level design in a particular security domain
  • At least 5 years’ experience working in a professional services firm focused on systems integration projects
  • At least 3 years’ experience working in projects related to the core domain
  • Experience working with Security practitioners
  • Readiness for customer related travel 35% inside IMT
  • At least 8 years’ experience in professional services focused on systems integration
10

Security IT Service Domain BA for Identity & Access Management Resume Examples & Samples

  • Acts as SME of the IDAM service line and is the main contact for the Stakeholders to submit their stakeholder requests
  • Identifies all the correct stakeholders and closely collaborates with them to identify the business needs, problems and opportunities, as well as the underlying regulatory and policy requirements and restrictions
  • Ensures that dependencies and impacted processes / services are identified and taken into account
  • Collaboration with Service Managers and Pre-Inception team in the demand management process for effort estimations
  • Works closely and aligns with IT Account Managers as well as with IT Service Managers in own Service Line (and other Service Lines within SecIT)
  • Contributes to Design Authority in close collaboration with Service Domain Architect
  • Works closely with "business" program managers and supports in project scope definition and control
  • Establishing efficient and unambiguous communication towards Stakeholders, Business Program/Project Management and the colleagues in the IT organization
  • Understanding the business needs of all the stakeholders, including the underlying business and IT processes of the Stakeholders business function as well as the regulatory and policy requirements
  • Responsible for designing sustainable solutions together with Service Domain Architect to address the business needs; and to ensure solutions are aligned with CTO defined standards
  • Is responsible for continuous improvement of business analysis quality in own IT Service and Product Management area, and process improvement across IDAM services
  • Assists in responding to regulatory questionnaires that the IDAM team receive
  • Ability to manage senior stakeholder expectations with a keen sense of what is realistic and achievable in a large, complex environment
  • Good communication skills who can tailor the message to both a technical and non-technical audience
  • Good overall understanding of IT activities such as SDLC, project management and service delivery
  • Ability to take personal ownership
  • Solid understanding of IT risk management principles
  • Familiar with financial industry regulatory and audit requirements with respect to IdM
11

Access Security Analyst Resume Examples & Samples

  • Managing access for business systems
  • Reviewing and approving/rejecting requests for access to applications
  • Reviewing periodically (at least annually) access rights allocated to users
  • Ensuring that mover and leaver events are triggered and addressed on a timely basis
  • Establishing and maintaining successful cooperation with senior business managers from around the world
  • Direct liaison with the business, IT and other groups in all matters related to applications in scope of the team
  • Supporting the business and IT in defining entitlements and access profiles
  • Analysis of access profiles leading to the design of roles: access profile groups appropriate for specific business functions
  • Designing security documentation and access control rules in liaison with the business
  • Maintaining all application security documentation including profile metadata and access control rules
  • Acting as an Expert/SME and initial point of contact for a set of business applications
  • Working with MS Access Database
12

Identity & Access Management Security Analyst Resume Examples & Samples

  • Work with department leaders to understand business requirements, information technology standards, information security policies, and other considerations that influence how identity and access solutions and services should perform and operate using a risk-based approach
  • Understanding of information security and identity and access management controls
  • Understands industry best practices for access administration (Provisioning, de-provisioning), access enforcements (authentication protocols) and access governance (certification, logging monitoring etc.)
  • Well versed with at least one of the following governance items: (SoD analysis, Application access reviews, Privilege user management, User Access Management)
13

Privileged Access Security Resume Examples & Samples

  • Ensure Privileged Access policies and processes are followed across the organization
  • Work closely with Business Units to drive technical and business requirements
  • Assist with the maintenance of IAM technologies/processes in accordance with defined SLAs while providing escalation support for production issues
  • Ensure privileged access reviews are undertaken and support compliance and audit with documentation of completed changes, including MI reporting on process and output
  • Identify and implement improvements to the Privileged Access policies and procedures and affiliated technologies, in order to manage and mitigate key security risks
  • Understanding of Privileged Access Management (PAM) concepts, principals, and processesUnderstanding of information security operations principles, including application and infrastructure security technologies, across a global environment
  • Linux and Microsoft server operating systems
  • Microsoft SQL and Oracle database platforms
  • Network devices (e.g., Cisco, Checkpoint)
  • Understanding of protocols such as LDAP, SSL/TLS, HTTP, SAML, and Kerberos
  • Experience with encryption and 2FA
  • Experience with Active Directory, including Organizational Units, DNS, Group Management, Group Policy Management, Domain Trusts
  • Scripting knowledge preferred (e.g., VB, PowerShell, Python, Java, Perl)
  • Professional certifications (e.g., CISSP, CISM, CISA) preferred
  • CyberArk Certification beneficial
14

Security Cyber Security Idm-identity & Access Technical Lead Resume Examples & Samples

  • Bachelors or degree in Information Technology, a related discipline
  • Master degree OR a minimum of 3 years information technology and security experience
  • Must have 5+ years experience with web application development using J2EE components such as JSP, Servlet, Web and Rest Services, JDBC, JNDI, etc., and experience with web application deployment on WebLogic, TomCat platform; in addition to, performance tuning, configuration, support, and troubleshooting web applications on a Weblogic platform
  • Demonstrated experience with all phases of the system development lifecycle at an enterprise level
  • Demonstrated track record as a team player; and
  • Strong oral and written communication skills
15

Authentication & Access Management Security Architect Resume Examples & Samples

  • Provide technical leadership on large scale implementations of medium to high complexity
  • Work in active partnership with stakeholders to understand business requirements and develop supporting security principles and objectives that will enable the secure growth and evolution of UnitedHealth Group (and communicating those requirements to security and risk management stakeholders throughout the enterprise)
  • Contributing to consistent patterns and frameworks to evolve the company’s security architecture and a clear, comprehensive security framework (and promoting those requirements through partnership with enterprise architecture and IT governance functions)
  • Providing consulting to business leaders in addressing their access management risk posture
  • 3 or more years of experience securing administrative credentials using advanced strategies (e.g. password vaulting, AD domain hardening)
  • Bachelors degree, or equivalent experience
  • Experience architecting, engineering, or deploying (or familiarity with) enterprise access management tools. (e.g. Siteminder, Ping, Sailpoint, Aveksa, Okta, Centrify, or similar)
  • Demonstrable collaboration, communication, conflict resolution, and problem solving skills
  • Familiarity with IT Governance standards including ITIL and CoBIT
16

Security Engineer Access Management Support Resume Examples & Samples

  • Conduct platform or operating system vulnerability scans that assess exposure of system to attacks or hacking. Monitor Security Operations pager and respond to issues of potential viral activity, spam, phishing, etc
  • Administer controls and review their application to ensure that system's controls, policies, and procedures are operating effectively relative to the predicted effectiveness of the controls
  • Confer and collaborate with internal and external auditors to ensure that appropriate controls are installed, operating properly, and being monitored and reported
  • Aggregate metrics of operation of security controls, as well as apparent attacks, breaches, and other pertinent data; track trends and prepare for periodic security reports
  • Participate in projects designed to test defenses against hacking, denial of service, spam, break-ins, or similar attacks. May provide guidance to infrastructure or application staff participating in exercise
  • Extensive and proven experience working on Access Management solutions built around Oracle Access Manager and Oracle Virtual Directory
  • Comfortable working with Architects and Engineers to take their blueprints for implementations and upgrades
  • Comfortable leading implementation, upgrade, recovery, root cause analysis investigations, etc
  • Specific previous experience configuring and implementing Oracle Access Manager 11g, Oracle Virtual Directory Server 11g, OAM Webgate 11g
  • Additional experience with SAML, Oracle Identity Federation, Siteminder, or any other Access Management experience preferred
  • Previous experience of providing production support and investigating system issues, for the same system, and other components associated with a complex system built around Weblogic, Oracle, Siteminder, LDAP, Single Sign-On technologies
  • Aptitude and appetite for researching and resolving complex technical issues
  • Additional desirable support skills are Linux/Unix, Weblogic, Java, SQL, XML, Web Services, and SSL Certificates
  • Must carry a pager and work some evenings and weekends, on a rotational basis, as part of a team that provides 24 x 7 production support
17

Security Eng-identity & Access Management Resume Examples & Samples

  • Architect and lead the delivery of products and services to enable an industry best Identity and Access Management Program
  • Ensure compliance with IAM principals like least privilege access, password management, and AAA solutions
  • Develop automated processes that reduce manual efforts and increase overall efficiency and scalability
  • Adapt and improve operations management systems and processes to accommodate rapid and increasing growth in systems and traffic
  • Monitor and report on the health of services, automating system health, maintenance, and reporting systems as needed
  • Interact with various teams to ensure we meet and exceed all compliance and security requirements
  • Excellent problem-solving skills and development of creative solutions
  • Experience building processes, project management, and release schedules
  • Provides support and implementation for corporate security projects
  • 5+ years of relevant work experience in program management in an enterprise
  • 4+ years’ experience working on large scale systems (as a developer, engineer, or program manager)
  • Knowledge and experience with Identity and Access Management technologies
  • Familiarity with Internet security technologies
  • Experience running and maintaining a 24x7 Internet-oriented production environments across multiple sites
  • Familiar with the challenges surrounding efficient operations and failure mode analysis in large complex distributed systems
  • Solid foundation in service-oriented and web-service technologies
  • Experience with user provisioning, system authorization, MFA, AAA solutions, and password vaulting systems and services
18

Solution Architect Information Security & Identity & Access Management Resume Examples & Samples

  • Proven experience building security reference endpoint architecture
  • Understanding of information security practices and common processes
  • Familiarity of information security frameworks and industry regulations
  • Experience developing systems, templates, tools, and processes to identify and monitor indicators to measure compliance with security requirements
  • Skills in general architecture, operations, and deployment methodologies and techniques (e.g. TOGAF, Zachman, ITIL, MOF)
  • Effective communication skills (written and verbal) to effectively interact with all levels of technology and business partners
  • Infrastructure security skills including SIEM, Log Management, Data Loss Prevention, Endpoint Security, Networking Security Skills & Threat & Vulnerability Management skills
  • Experience in Identity and Access Management- Web SSO, Web security, Web Services and API security using industry standards such as SAML, OAuth and OpenID Connect
19

Access Management Security Analyst Resume Examples & Samples

  • Review, document and champion the file system management process
  • Generate, review and maintain operational and project documentation
  • Reviewing logs an reports for unauthorized access changes and follow BMO processes to resolve
  • Provisioning and fulfillment of access management requests
  • Review existing configurations to ensure compliance with the established guidelines for FS management
  • Interacting with internal end-users within the bank via phone and email
  • Execute Sysadmin operational tasks for applications
  • Participate in service improvement planning and implementation initiatives
  • Resolving service tickets and/or assigning tasks to support groups for fulfillment activities
  • 2 years of risk and/or security related experience
  • 2-3 years of access management
  • Knowledge of Active Directory
  • 5+ years of Unstructured data management/file services - File Server, MS-DFS
  • 5+ years Windows server administration
  • Automation and Scripting (Powershell)
  • Excellent Communication Skills (Oral & Written)
  • Knowledge of Remedy
  • Knowledge of PMP (Password Manager tool)
  • Knowledge of Varonis access management tool
  • MS Sharepoint knowledge
20

Security Analyst, Lawful Access Response Resume Examples & Samples

  • Analyze records and prepare reports containing data stored within business systems in response to court orders
  • Bilingual, French and English (verbal and written)
  • Professionalism and ability to maintain confidentiality of information required
  • Knowledge of Rogers technologies is an asset
  • Knowledge of Vision 21, SGI, AS400, MS Word, Excel and Access preferred
21

Security Access Administrator Resume Examples & Samples

  • Grant user access as requested - Daily
  • Modify user access as requested - Daily
  • Terminate user access – Daily
  • Perform Daily Security checklist
  • Manage escalation tickets to appropriate second and third level support groups in a timely manner
  • Track and monitor tickets to ensure a timely resolution/completion
  • Manage and record resolutions and activities into Service Desk software to ensure effective status updates, as well as to log all administrative activities relevant to future audits
  • Periodic reviews of user access – Daily, Weekly, Monthly, Quarterly, Yearly
  • Assist with audit support activity
  • Create or update documentation for standards and procedures to keep them current
  • Act as a team lead and provide mentoring and guidance to junior staff
  • Manage Access Management projects
  • Provide support for Internal and External exams
  • Provide training and development of staff
  • Provide guidance to junior staff members
  • Add new applications to Identity Management application
  • Maintain application feeds to Identity Management application
  • Assist with creating and maintaining Access Certifications
  • Administrator: one year related experience and/or training
  • Senior Administrator: 3 or more years of experience managing user access in a highly regulated industry
  • 20161118
22

Identity & Access Management Security Consultant Resume Examples & Samples

  • Working with clients to develop Identity and Access Management strategies, architectures and implementation plans
  • Configuration and Implementation of I&AM products and risk mitigation
  • Design and develop automated provisioning and reconciliation of IT resources
  • Request-based application and resource provisioning
  • RBAC authentication to entitled applications and resources
  • Strong authentication and biometrics
  • Mobile Access
  • Single Sign-on
  • Minimum of a Master's degree in a technical field (e.g. Computer Science, CIS, MIS, Engineering)
  • Strong Experience in design, implementation and deployment of IAM platforms
  • Minimum 2+ years of experience with planning and implementing IAM capabilities, including
23

Security Access & Risk Bus Systems Analyst Resume Examples & Samples

  • Conducts research and analysis concerning evolving business processes and the related security access requirements
  • Provides information, and options to stated access problems. Evaluates the impacts of proposed options to management to help make informed decisions, considering technical and business process impacts with support and oversight from more senior associates
  • Supports senior associates to proactively identify areas for improvement within assigned business areas’ role design or enterprise security access processes. Assists with driving process to make changes. Introduces innovative recommendations, factoring in customer needs, external approaches, and security best practices
  • Assists with periodic access review processes (PAR) for the Investment Group to assess continued appropriateness of access to systems containing sensitive data
  • Identifies and evaluates access model set-up in enterprise access tools. Communicates any issues identified with key business and technology stakeholders, provides recommended actions, and tracks any issues identified to resolution
  • Creates analysis, dashboards, and ad hoc reports related to access incidents trends and overall effectiveness of access management processes
  • 1-3 years of work experience
  • Demonstrates intermediate knowledge of industry standard processes, tools, and deliverables for access management and business role analysis. Exhibits knowledge in current and future policies, practices, trends, technology, and information affecting the department/ business area
  • Experience with establishing and maintaining risk and security controls is desired
  • Demonstrates working knowledge of application access models and application and business role design principles
  • Working knowledge of process mapping, process design and requirements gathering
  • Demonstrates ability to lead and manage projects within the team
  • Demonstrates ability to balance periods of high work volumes with high degree of accuracy
  • Demonstrates intellectual curiosity and analytical skills in areas of high complexity
  • Demonstrates advanced skills with Microsoft Office tools (Word, Excel, Visio, and PowerPoint)
  • Intermediate skills with relational databases (Oracle and MS SQL), SQL, and Tableau preferred
  • Ability to travel between the Southern California offices driven by business need
24

Senior Privileged Access Security Engineer Resume Examples & Samples

  • 3+ years of exp. in AD or privileged access management
  • Strong engineering mindset & IAM skillsets
  • Project implementation leadership is a strong plus
  • Familiar with IT architecture
25

Access Control & Security Specialist Resume Examples & Samples

  • Review and assist on any new or changes WIAM integration to Enterprise IT domains
  • Support on Integration/Access topics between systems and I particular WIAM and Security
  • Be the centre of knowledge and expertise on the Integration to WIAM and any IDM system
  • Be the SPOC of knowledge and expertise on the Integration to Security guidelines and the Security Team
  • Expertise and experience in the technical integration of large IT software platforms (Oracle/SAP/OnLine/Web) covering all key aspects of IT Infrastructure
  • Track record of successful service provider integration and delivery in an international context serving multiple parties/customers
  • Good knowledge and experience in IDM and Security systems
  • Good communication skills and a team work person
  • Excellent track record of system technical Integration using recognised integration tools (XI/Web method/Weblogic/TIBCO) and Good understanding in: HTTP/HTTPS protocols. Encryptions and decryptions, SFTP/FTP,Web Services,XML/IDOC
  • Degree or equivalent in computer science or a scientific/technical discipline
  • Experience and expertise of large IT platforms (Oracle/SAP/On-line Applications)
  • Desired: Working experience within one of the major IT systems integrators
26

BAS Access Security Analyst Resume Examples & Samples

  • Standardising ways of working and driving efficiencies by bringing together common skills, technologies, and platforms to encourage reuse
  • Retaining key BP solution IP, ensuring that Applications are designed, built, implemented and sustained to meet current and future business needs
  • Building and managing Technical Environments underpinning the applications/solutions including common Basis administration and DBA layers
  • Assuring the quality of enhancement design, and providing deep-knowledge support to Vendors where appropriate
  • Owning key application technical standards and procedures to be performed by suppliers
  • The effective management of all access problems, incidents, and events for Application Development with a focus on integrating internal and external partners so as to restore adversely impacted operations back to normal service as quickly as possible
  • Assuring activities such as access related root cause analysis and trend analysis are performed over problems, incidents, and adverse events such that permanent fixes to problems, incidents, and negative events are found and implemented
  • Provisioning of pool of skilled resources focusing on Business Application
  • Services Security, Access development and maintenance
  • Monitoring and ensuring compliance to corporate security policies and regulatory guidance with regards to user access and broader information security matters
  • Owning application and database environment security e.g. to include, internet facing and internal certificates, BAS and vendor Keon user class ownership, Firewall single point of contact, Database and Application baseline standard for applicable BAS environments
  • Supporting projects under BAS to implement security solutions. This involves applying expert Security experience to implement security solutions based on the SMART methodology and other BP standard methodologies
  • Supporting Infrastructure and Integration Services (I&IS) to maintain Security Operational Integrity. This involves applying expert Security support experience to undertake Security enhancements (Role administration) and providing L3 SAP Security support for issues as required
  • Supporting Compliance (Group Control, BAS and ASR’s) around SAP and Non-SAP Security Governance, Risk and Compliance (GRC). This involves applying experience to run SOD analysis over roles and users and implement SOD Mitigations
  • Works with the Security Lead on SAP Security design and build activities, in line with the SMART methodology as well as other BP standard methodologies
  • Works with the Security Lead to implement SAP security designs to Projects, including implementing security solutions that meet business requirements within the relevant process areas, and completing relevant security SMART and other BP standard design documents
  • Ensures that SAP Security enhancements (role administration) are delivered in a controlled and timely manner and in line with BP Security standards
  • Works with the Security Lead to deliver Operational, Process and Compliance Reporting to BAS and provide L3 SAP Security support as required
  • Works with the Security Lead to ensure SAP Security Governance Risk and Compliance (GRC) issues are addressed
  • Bachelor degree in Information Technology or other relevant degree
  • Relevant CISSP, CISM, CISA
  • Extensive knowledge of SAP ERP System processes in one or more of the following areas: Finance, Order to Cash, Supply Chain Operations, Transportation/Logistics and Purchase to Pay, Business Warehouse/ Management Information
  • Demonstrated ability to self-direct work and complete tasks independently
  • SAP and Non SAP security skills and experience, with some breadth of experience with multiple SAP products including SAP Ariba, Concur, Fieldglass, GRC (AVM), Success Factor, Cloud solution, Mobility, HANA Security, IAM using IBM Identity solutions
  • Ideally has SAP implementation experience
  • An awareness of BP business and Information Technology and Services (IT&S) strategies
  • Financial acumen/commercial awareness
  • Project Delivery Methodology experience
27

Security Analyst / Identity Access Management Resume Examples & Samples

  • Provide support in account provision and de-provision in Windows and UNIX systems in Active Directories/UNIX Enterprise Directories
  • Identify process automation opportunities on existing access management practice
  • Work with team members to design and develop solutions to streamline and automate existing manual process
  • Flexibility to work adjusted hours with Enterprise Team members as needed to support training and processing needs
  • Exercises independent judgment with minimal direction from supervisor
  • Enthusiastic to find ways to make customers successful
  • Passionate about continuously learning and able to quickly adapt and pivot to win in dynamic environment
  • Visionary that can develop strategies for future IAM capabilities and implement innovative solutions that drive business value
  • Be a self-motivated and results oriented individual with an attention to driving aggressive timelines and schedules
  • 5+ years of relevant general Information Technology experience required
  • 2 to 3 + years of Account Administration experience required
  • Ability to work well within small team focused on rapid delivery of results
  • General knowledge of information security, including network security, infrastructure security, application security, compliance frameworks, and other regulatory requirements such as SOX and HIPAA
28

Identity & Access Security Manager Resume Examples & Samples

  • Manage centralized access request and approval process to increase adherence to SLAs and compliance requirements
  • Add automation and self-service to provisioning / deprovisioning to improve consistency and fulfillment time
  • Develop, administer, and enforce procedures for IT Privileged access at operating system, database, and application layers
  • Review, document and approve appropriate design and changes for roles based positions to ensure precise changes and risk mitigation
  • Act as a subject matter expert in business and IT user access management, SSO integration, and provide a holistic view to Information Security management on current risk exposure, options for remediation, and compliance level with internal policies
  • Define requirements and guide/recommend the right integration pattern for applications needing services, taking into consideration the impact to the environment and standards set at AmeriGas
  • Interaction with application teams that manage major user repositories and/or need to automate/standardize user access request process, to gather requirements, design and deliver solution to integrate with AmeriGas’s current processes and future IAM implementation
  • Interaction with Service Desk in regards to AD user profiles and access
  • Balance risk mitigation with good customer service by providing access within SLAs
  • Define key performance indicators and metrics to monitor risk and customer service
  • Advocate secure computing practices and procedures, and communicate Information Security best practices throughout the company
  • Strong knowledge of enterprise IAM within Active Directory environment
  • Strong working knowledge of SAP and PeopleSoft role design
  • A firm understanding of granting permissions and changing access and rights within roles based access
  • Deep knowledge of IT Privileged access at operating system and database layers
  • Experience with multi-factor authentic solutions
  • Ability to articulate technical security terms to non-technical audiences both verbally and in writing
  • Understanding of current regulatory environment and related implications to identity management and security/audit compliance
  • 5+ years of experience in information security, ideally around identity and access management
  • Minimum of 3 years of experience in at least two or more of the following IAM Functional Skills
29

Manager of Information Security Identity & Access Management Resume Examples & Samples

  • Function as a subject matter expert for successful design and implementation of IAM solutions in a complex environment
  • Act as a liaison to business, technology and project management partners and act as an IAM advocate for technology initiatives
  • Look for ways to optimize IAM processes and recommend opportunities and solutions for improvement, automation and streamlined integration
  • Provide implementation leadership for IAM procedures and products
  • Evaluate new and proposed IAM systems and technologies
  • Develop enterprise wide identity and access management integration architectures, designs and protocols
  • Ensure adherence to compliance regulations and policies
  • Collaborate with ITGRC, Audit, IAM Governance, and other oversight teams to understand and remedy audit findings
  • A passion for and deep understanding of technology risk and information security
  • Bachelor's or Master's degree in Information Systems, Computer Science, Engineering or equivalent work experience
  • Seven or more years of information security experience
  • Demonstrated ability to think critically about risks and clearly articulate prevention and detection mechanisms to key partners
  • Excellent analytical, problem solving and organizational skills with a focused attention to detail
  • Proficient verbal and written communication skills, including the ability to effectively lead discussions and meetings
30

Privileged Access Security Engineer Resume Examples & Samples

  • 750 Riverpoint Dr, W Sacramento, CA
  • 4750 S. 44th Place, Phoenix, AZ
  • 2850 Shadelands Dr, Walnut Creek, CA
31

Senior Identity Access Management Security Engineer Resume Examples & Samples

  • 5+ years plus experience in developing, implementing or architecting IAM systems. Preferably SailPoint IdentityIQ
  • 4+ years plus with technical architecture experience integrating identity management, access management and access governance software into clients' infrastructure and applications
  • 4+ years plus experience with installation, integration and deployment of technology products (Security and/or IAM would be a bonus)
32

Identity Access Management Security Analyst Resume Examples & Samples

  • 2+ years plus experience in documenting, developing, or implementing IAM systems. Preferably SailPoint IdentityIQ
  • 2+ years plus with technical experience integrating identity management, access management and access governance software into clients' infrastructure and applications
  • 2+ years plus experience with installation, integration and deployment of technology products (Security and/or IAM would be a bonus)
  • Identity Management familiarity in one or more of the following areas
33

Security Access Administrator Resume Examples & Samples

  • Accurately and efficiently completes information technology access, modification, and removal requests
  • Process user access requests according to standard operating procedures and service level commitments
  • Works under limited supervision on non-routine, moderately technical assignments
  • Coordinate security administration procedures and provides administration support to document policies and procedures
  • Assist with development, evaluation, and maintenance of procedures to add, transfer, or delete staff access to information technology resources
  • Assist with resolution of user account profile issues, password resets, and files access issues
  • Provide prompt, professional, problem-solving services for each access request to ensure colleagues can perform work related responsibilities using secure information systems
  • Prepare reports related to access control and user provisioning
  • Documentation and management of Information Security internal controls and reviews for SOX compliance
  • Basic understanding of Active Directory and Microsoft Office suite
  • Previous experience with customer interaction and helping customers
  • Excellent problem solving techniques and listening skills
  • Ability to multitask efficiently and accurately.Maintain focus in an environment with frequent interruptions
34

Security Access Control Tech Resume Examples & Samples

  • Installs all components of various security systems, including security monitoring cameras, covert monitoring systems, remote transmitting systems and recording devices and "panic button" control switches
  • Analyzes and troubleshoots system problems. Isolates defective circuits, tests and replaces or performs repairs
  • Maintains supply of electronic and digital circuit boards and components
  • Maintains devices or equipment and repairs schedule records
  • Trained to perform duties of locksmith to include duplication of keys, key replacement, and re-key of locks as necessary
  • A minimum of one year of work experience with low voltage electronic or microprocessor access systems
  • Locksmith experience preferred
35

Identity Access Management Security Consultant Resume Examples & Samples

  • 8+ years of professional IT experience (with at least 5 years of professional experience on positions related to IAM or similar security domains)
  • Expert level, practical knowledge (including installation, configuration, troubleshooting and design) of at least one leading product from IAM technologies; work experience with SailPoint, CyberArk and/or Ping Indentity will be additional advantage
  • Experience in architectural design and implementation of complex IAM solutions
  • Fluency in English and one of CEE languages (i.e. Czech, Hungarian, Polish or Slovak)
  • German and/or Russian language skills will be a great advantage
36

Security User Access Management Consultant Resume Examples & Samples

  • ACIM provides primary governance for all access requests and policies
  • Provide risk assessment for any changes in secondary account access request policies and E2E workflow
  • Act as an expert providing direction and guidance to process related to secondary admin accounts
  • To act as a consultant to HPE internal and external clients on matters of internal control and risk management
  • Identify and analyse new or existing tools, processes, and procedures
  • Understanding of technology in areas of compliance issues
  • In depth knowledge in the technical aspect for privileged accounts
  • Develop/manage ongoing reporting
  • Plan, conduct and oversee audit/compliance/risk management activities
  • First Level University Degree or equivalent combination of education and experience
  • 3 – 8 years relevant IT business experience
  • 2 plus years’ relevant Client Management experience
  • Exposure to managing security related products and technologies
  • Experience in developing executive level customer relationships including good negotiation, presentation and communication skills
  • Proven track record in leading virtual teams, influential, able to work across organizational boundaries, dealing with ambiguity and setting up internal networks
  • ITIL required
  • ITSM is an advantage
  • MBA is an advantage
  • CISM is an advantage
37

Information Security Identity & Access Management Director Resume Examples & Samples

  • Strong understanding of modern IAM concepts
  • Experience with authoring, implementing and maintaining IAM policies and standards
  • Extensive knowledge in governance frameworks including: ISO 27001, NIST, COBIT, ITIL.Extensive knowledge in regulations and/or contractual obligations including: HIPAA, PCI, Sarbanes Oxley, GLBA, SOC /SSAE16
  • Establishes an enterprise IAM strategy and reference architecture including standards and frameworks that are aligned with the overall business strategy
  • Leads the IAM team and is dedicated to overall IAM project management
  • Manages the process of selection of IAM tools and vendor solutions
  • Strategically aligns the IAM program with the overall business needs by driving meaningful collaboration and developing strategic financial budgets and operational plans
  • Acts as a liaison between the business/ process owners, CISO/Senior Management and the day-to-day IAM Architect and team; effectively communicating the benefits of IAM in security, technology administration efficiency, compliance, and business agility while still managing realistic and achievable project plan timeframes
  • Navigates organizational boundaries, collaborating with business/ process owners and other stakeholders, in order to manage project deliverables and timeframe
  • Builds and retain an IAM staff with appropriate experience and expertise. Demonstrates and embeds the behaviors and competencies that create a risk management mindset in the organization
  • Develops and oversees the department budget in conjunction with corporate goals and objectives. This position is accountable for meeting annual budgetary goals. Identifies and prioritizes security program expenditures in coordination with I/T, Audit, Compliance, and Legal
38

Security Architect With Access Management Resume Examples & Samples

  • Create, maintain and drive the technology strategies and roadmaps within the area of the responsibility, e.g. Web Access Management and SSO/OAUTH
  • Partner with the security group to plan and drive the implementation of the technology and its capabilities. Responsible for the architecture of the technology, e.g. IBM Security Access Manager
  • Set up best practices and provide directions and guidance of how to utilize the technology and its capabilities
  • Serve as a security architect to architect and design the security solutions for the applications or systems, and/or provide expertise and consulting to the project teams on security controls needed
39

Identity & Access Management Security Analyst Resume Examples & Samples

  • Establishing minimum security baselines according to level of risk
  • Architecting and Deploying Security Controls
  • Defining a process for certifying that information systems meet minimum security requirements and for obtaining management authorization to operate an information system
  • Monitoring compliance with information security requirements
  • Implementing a program for provision of security awareness and training
  • Ensuring that services provided by third-parties adhere to Hallmark’s information security policy
  • Bachelor's degree OR at least 4+ years' experience in a professional business environment
  • At least 2 years of Java and/or J2EE development experience
  • Bachelor's degree in Computer Science, MIS or related technical or business field
  • Experience with SQL Server
  • Familiarity with leading IAM concepts such as Least Privilege, Privileged Access, Roles and Data mining, Segregation of Duty (SOD), and Role Based Access Control (RBAC)
  • 2+ years of hands-on development experience with SailPoint IdentityIQ. Experience should include integration of application/resources utilizing the SailPoint IdentityIQ out-of-the-box and custom connectors, developing user provisioning/de-provisioning workflows, developing/customizing rules that aid in data collection, and configuration, troubleshooting of SailPoint IdentityIQ platform
  • 2+ years of prior working experience in automating manual and semi-automatic processes via scripting language such as PowerShell, Perl or Python
  • Working knowledge of platform provisioning (groups/roles/accounts/permissions)
  • Experience with C/C++, .NET, C#, PL/SQL
  • CISSP certification a plus
  • J2EE certification a plus
40

Cyber Security Identity Access Management Engineer Resume Examples & Samples

  • College diploma or University Degree and/or 5+ years equivalent work experience
  • 2-4 Years hands on development experience with a focus on Identity Access Management
  • 1-3 Years hands on development/support of enterprise grade identity management software
  • 1-2+ years of experience understanding of financial industry
  • Experience working with internal/external vendors
  • Experience in designing and delivering employee training
  • Knowledge of application servers (Tomcat, WebLogic, etc), databases (Oracle, DB2, SQL Server), General IT Security Tools
  • Experience with Entitlement Management Tools
41

Information Security Access Management Specialist Resume Examples & Samples

  • Work with business management and IT application administrators to manage access roles and profiles for critical applications
  • Work with business management manage default access profiles for employees jobs and departments
  • Design and maintain access groups for Windows domain and applications
  • Design and maintain logical structure and access controls for unstructured enterprise data
  • Design and maintain user attribute structure (e.g. GL and Teller Drawer numbers, officer codes)
  • Design and maintain department and role based Windows login scripts
  • Review and approve security access exceptions
  • Onboard new application into centralized access management processes. Includes development of security administration procedures
  • Provide training, guidance, and support to other security or application administrators
  • Provide oversight of information security requisitions, including day-to-day guidance to Systems Security Administrators
  • Maintain workflow processes for information security requests while meeting department service levels
  • Escalation point for System Security Administrators and Service Desk staff for issues related to user accounts and application functionality/access
  • Escalate security access issues and changes to service providers
  • Address identity and access management needs for acquisition and new/closed site projects
  • Work with server and field technician to troubleshoot user application problems
  • Have primary responsibility for preparing and responding to access management related audits
  • Perform Systems Security Administrator responsibilities when needed
  • Maintaining an accurate inventory of user information in a department database
  • Report monthly metrics for access management activities
  • Undergraduate information security or technology degree required
  • Five years of identity or access management experience
  • Three years conducting security related troubleshooting with operating system and application access controls
  • Experience with developing and managing security access roles
  • SANS or other information security technical certification
  • Ability to maintain professional demeanor under stress
42

Identity & Access Management Security Analyst Resume Examples & Samples

  • 2+ years of experience with an identity and access management system performing auto-provisioning, role based security, and compliance utilizing a strong attention to detail is required. SailPoint IIQ experience preferred
  • 2 years administration experience in Privileged Account Management. CyberArk experience preferred
  • Experience in implementing enhanced security for elevated accounts in LDAP and SAP
  • Knowledge of information security concepts (desired: NIST 800-53, 800-171)
  • Requires strong interpersonal and organizational skills, including the ability to meet deadlines, follow written policies standards and procedures, and provide consistent and superior customer service
  • Requires willingness and ability to adapt to rapid changes in order to support and use emerging technologies
  • Ability to identify process improvements - enhancing optimization and streamlining efficiencies where required
  • Must possess excellent communication skills, both written and verbal
  • Good understanding of Sarbanes Oxley and NIST compliance and information security policies and procedures
  • Excellent verbal, analytical and interpersonal skills
  • Excellent ability to multi task and have proven ability complete deliverables on time
  • Proven ability to work well in a team environment as well as independently
  • Comfortable in being able to correspond with all levels of management including Senior Leadership and Executive Management
43

Security Access & FFD Lead Resume Examples & Samples

  • Provide oversight to site access authorization personnel on normal and review/determine response to low level anomaly issues
  • Ensure proper implementation of Exelon's Access, FFD and in-processing to ensure consistency within the fleet and evaluate individuals requesting unescorted access for trustworthiness and reliability through review of criminal history, derogatory information, interview and collection of documentation for final disposition as to whether a person can be authorized unescorted access. Schedule required psychological clinical interviews. Work performance investigations, as necessary
  • Coordinate final decisions for individuals requesting unescorted access with in-processing and maintain the companies unescorted access denied list
  • Support site In-processing by working with outage management within designated stations to implement cost effective in-processing and interface with Major Mod Contractors, contractors and building trade Business Agents related to process improvements for In - Processing
  • Administrator for PADS / INSS
  • Point of contact for other utilities regarding the transfer of background information for transfers, PADS and suitable inquiry requests
  • Responsible for implementation of records management program
44

Security Manager, Lookout / Access Control Resume Examples & Samples

  • Execute daily operations for the Lookout and Access Control
  • Provide leadership, establish organizational goals, and ensure continual development of Cast Members
  • Maintain awareness of all Resort activities and special events that may impact emergency response. Identify response impediments, establish procedures for mitigation, and communicate changes to Security Leadership
  • Establish and administer all workload and scheduling requirements
  • Assist the Manager Security Operations to develop, administer, and maintain the annual budget as well as associated budget line items
  • Oversee all Lookout and Access Control equipment, software, infrastructure, and supplies
  • Develop strong working relationships and routinely collaborate with internal and external partners
  • Provide analytical and statistical reports on operations and activities
  • Occasional travel required to collaborate with regional business partners and to attend training/conferences
  • Security industry experience
  • Demonstrated experience leading dynamic operations, particularly in a high-volume call-taking/dispatch center
  • Five years of team leadership preferred
45

Cyber Security Manager Identity & Access Resume Examples & Samples

  • Proven experience successfully leading change management initiatives and successfully guiding teams through turbulent times
  • Exceptional resilience. The ability to try new things, fail quickly and move forward at a continued pace
  • Proven ability to build a strong brand for the team across the enterprise
  • Specific technical background in bringing automation to disparate user stores
  • Innovation. Staying on top of trends and technologies and bringing forward new ideas to ensure that the organization has a continuous competitive edge
  • Automation and continuous improvement mindset
  • Collaborative and strong communication skills
  • Proven strategic and innovative thinking
  • Excellent analytical and problem solving skills, anticipates issues and deals with them proactively
  • 7+ years in Cybersecurity
  • Strong understanding of Access Management frameworks and concepts
  • Experience following procedures related to security provisioning in a highly regulated environment
  • Understanding of Active Directory
  • CISSP and or CISM
  • Experience supporting IAM software and infrastructure
  • Experience with the RSA ID Suite (Aveksa)
  • Experience with Saviynt
46

Security Access Administrator Resume Examples & Samples

  • Enable and monitor access on key systems and applications, including creation, deletion, and modification of accounts; assist in the semi-annual recertification and reauthorization process of user access; provide guidance to internal and external customers regarding requests for access
  • Ensure that Company and IT policies and procedures are followed to grant appropriate access levels; assist in the development of automated procedures to manage access in accordance with set policies; work with business units and data owners in the development and maintenance of group access levels; develop procedures to properly and efficiently manage user access; assist in the evaluation and development of corporate-wide policies, procedures, standards, and guidelines for the management of user access
  • Develop awareness and familiarity with issues and events affecting user access at all Fidelis Care New York locations and key management; provide problem determination and resolution for access issues on supported applications and systems
  • Identify opportunities that can improve the efficiency of the logical security access processes across applications
  • BA/BS - Bachelors Degree or equivalent required
  • Three or more years experience required in a progressive role in information security, preferably in a healthcare environment
  • Proficiency in Microsoft Office: Excel, Word, Access; Lotus Notes. Knowledge of Network Security
  • Customer Service: Skilled to communicate with all levels of management, internal and external customers
  • Ability to work well as a member of a team or independently
47

Information Security Identity Access Management Analyst Resume Examples & Samples

  • Any combination totaling two years from the following categories
  • Bachelor’s degree or equivalent level of work experience in IT field and/or IT Security field
  • Basic understanding of TCP/IP and network communications topologies
  • Basic knowledge of computer security forensics and security vulnerabilities
48

Information Security Identity Access Management Analyst Resume Examples & Samples

  • Any combination totaling five years from the following categories
  • Progressively more responsible work experience in IT-related profession
  • College course work in Information Technology (IT), IT Management, or a closely related discipline, as measured by the following conversion table or its proportional equivalent
  • PeopleSoft Security or a similar certification as required by the position
  • Industry Standard Certifications including: Certified Information Systems Security Professional (CISSP), and SANS Global Information Assurance Certification Security Essentials Certification (CSEC)
  • Specialty/Vendor-based Certifications: Penetration Testing, Ethical Hacking, Incident Handling, Forensics, and Mobile Device Certifications
49

System Security Access Adminstrator Resume Examples & Samples

  • Three years previous experience in Data/Information Security
  • Previous ACF2 Security Training, TSO Training and Active Directory experience desired
  • Data processing experience
  • Application Level security experience
  • Previous Mainframe experience
  • Strong PC/skills and knowledge
  • Knowledge of ACF2 security administration
  • Basic understanding of Platform and Application level security packages
  • Self-motivated, well-organized individual
  • Ability to work under time constraints
  • Ability to function professionally at all levels (clients, management, and peers)
  • Must have Banking or Financial experience
50

Information Security Access Management Specialist Resume Examples & Samples

  • Supporting the development and implementation of the Technical Access management, Privilege access management, Access lifecycle and recertification
  • Planning and overseeing the delivery of concurrent, complex, technical access management projects
  • Acting as a reference point for Project Management Office (PMO) queries and information and an advocate for best practices in program management
  • Assisting in tracking and reporting on portfolio performance
  • Assisting Info Sec Lead in delivering the best use of program management disciplines and approaches
  • Developing positive relationships with managers and staff to enable the PMO to provide support including facilitation, tracking and reporting on programs including training as required
  • Developing and maintaining the Major Program Delivery SharePoint and Intranet sites
  • Effective tracking and communication of program status and metrics (program milestones, resource utilisation)
  • Facilitating of key program meetings including the tracking of agreed actions through a program log
  • Maintaining processes to ensure project management documentation, reports and plans are relevant, accurate and complete
  • Taking ownership of program calendars including resource vacation tracking
  • Sharing lessons learned and best practices across programs, building relationships with stakeholders and brokering relationships at all levels
  • Supporting Program Managers in the preparation of weekly and monthly reporting packs, SteerCo and Info Sec packs as required
  • Supporting the creation and improvement of processes, procedures, and tools
  • Understanding of modern Identity & Access Management (IAP) concepts and best practices
  • Proven experience in running Identity & Access Management programs will be an added advantage
  • Understanding of the concepts of brokers (database, windows, unix) SSH key management etc
  • Demonstrated capability for problem solving, decision making, sound judgment, assertiveness
  • Experienced in managing Microsoft (MS) Sharepoint sites for document management
  • Experienced user of MS Office toolset (In particular: Excel and PowerPoint, preferably a working knowledge of MS Project)
  • Familiar with large scale change delivery
  • Good knowledge of Risk and Project Management concepts (e.g. COBIT, Prince2, PMP)
  • Prior involvement in a variety of Information Technology (IT) projects
  • Proven experience in providing service to internal stakeholders to achieve successful project outcomes
  • Senior Stakeholder management
  • Understanding of Global Financial Services environment
  • Understanding of project delivery and acceptance processes within a fast-paced business environment
  • Understanding of the principles and frameworks of successful project management from a support perspective
  • Educated to Bachelor’s degree level or equivalent qualifications / work experience
  • Ideally IT Project Management (PMI / Prince 2 or equivalent) qualification
  • Management Information Systems Reporting
  • Strong numerical & Analytical Skills
51

BAS Security & Access Resume Examples & Samples

  • Delivering end to end support and development services for all BP IT applications and providing the right skills/knowledge to sustain and enhance those applications/solutions
  • Standardizing ways of working and driving efficiencies by bringing together common skills, technologies, and platforms to encourage reuse
  • Owning key application technical standards, governance processes and related procedures, ensuring supplier compliance when performing assigned activities and tasks
  • Provisioning of all AD/AM capability to support projects and L3 support from vendors
  • Owning application risk management, disaster recovery planning, and service continuity outcomes
  • Driving the Identity Access Management (IAM) agenda towards implementing a framework and governance processes that are capable of supporting a standardized approach to Enterprise Role Management in BP
  • Providing Enterprise Role Management insight across all applications to help build an efficient end to end role structure using identity governance and administration tools
  • Designing and implementing security and access control features that support the Enterprise Role Management model BAS across applications
  • Assuring activities such as access related root-cause analysis and trend analysis are performed over problems, incidents, and adverse events such that permanent fixes to problems, incidents, and negative events are found and implemented
  • Monitoring and ensuring compliance to corporate security policies and regulatory guidance with regards to user access and broader information security matters around GRC and AVM
  • Owning the IAM framework and governance processes for Enterprise Role Management
  • Working in the identity governance and administration space to assist in analyzing and providing guidance on enterprise roles across the entire application landscape
  • Maintaining Access Controls for BP roles and users of BAS applications based on the IAM framework and ERM governance process
  • Understanding of general HR processes and functional aspects in order to translate the SAP HR implementation into Workday from an application security perspective
  • A good working knowledge of SAP and non-SAP applications security, with the knowledge of how to challenge and design role based access control models
  • The ability to manage multiple security related activities at anytime across a multitude of different areas
  • Works with the functional and technical architects to design and build enterprise roles across systems and applications in line with the SMART and Agile methodologies as well as other BP standard methodologies across the BAS Applications estate
  • Works with the security architecture team to implement security and access management policies around the Identity and Access Management framework and its relevant governance principles, by completing the relevant BP security and access standard design documents
  • Ensures that Enterprise Role Management procedures and controls are implemented in a controlled and timely manner and in line with BP Security standards
  • Works with the SAP HR and Workday architects and functional teams to deliver enterprise role build designs for BAS and provides the relevant L3 Security support as required
  • Provides support and guidance to suppliers and partners around BP best practices in deploying complex Role Based Access Controls across the BAS application estate
  • Bachelor’s Degree or equivalent
  • Relevant SAP Security Certifications
  • Relevant CISSP, CISM, CISA or equivalent certification
  • Proven self-motivator with ability to network effectively
  • SAP and Non SAP security skills and experience, with some breadth of experience with multiple SAP or Non SAP solutions to include at least one of; Cloud Security with (AZURE/AWS), SAP Mobility, SAP HANA, SAP Ariba, Workday, Identity and Access Management, Enterprise Role Management, Identity Governance and Administration tooling and associated methodologies
  • Has experience of at least 1 SAP implementation and/or Identity and Access Management experience
  • Good understanding of BP policies and industry best practices
  • Ability to work well with geographically dispersed teams
  • ITIL3 awareness