Cyber Resume Samples
4.9
(87 votes) for
Cyber Resume Samples
The Guide To Resume Tailoring
Guide the recruiter to the conclusion that you are the best candidate for the cyber job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.
Craft your perfect resume by picking job responsibilities written by professional recruiters
Pick from the thousands of curated job responsibilities used by the leading companies
Tailor your resume & cover letter with wording that best fits for each job you apply
Resume Builder
Create a Resume in Minutes with Professional Resume Templates
CHOOSE THE BEST TEMPLATE
- Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS
- Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES
- Instantly download in PDF format or share a custom link.
MN
M Nicolas
Mertie
Nicolas
9520 Ryley Via
Phoenix
AZ
+1 (555) 630 1071
9520 Ryley Via
Phoenix
AZ
Phone
p
+1 (555) 630 1071
Experience
Experience
Chicago, IL
Cyber
Chicago, IL
Braun, Cormier and Hodkiewicz
Chicago, IL
Cyber
- Develop and maintain a password policy for deployed systems and networks within the region, and manage a secure password database
- Contributes to the development of intelligence products and performs cyberspace intelligence analyst duties with minimal guidance
- Managed or served as a member on an Incident Response or Security Incident Management Team
- Perform network traffic analysis of web services to analyze raw packet data and verify that the system has no abnormal behaviors
- Monitor logs and events for Windows, UNIX and User identity management platforms to provide views of misuse or malicious activities
- Provide management support to the Perimeter Security Senior Leader
- Develop sound and trusted relationships with internal and external customers by providing accurate and efficient technical/engineering support
Chicago, IL
Cyber Defence Analyst
Chicago, IL
Farrell-Schuster
Chicago, IL
Cyber Defence Analyst
- Working knowledge of the OSI model
- Monitor incidents submitted and establish correlation to broader threats when they may exist
- Participate and assist in identifying and responding to global security incidents
- Incident Management
- Provide training and expertise to junior Incident Responders
- Provide a point of escalation for incidents within various global regions
- Monitor and investigate network and system events to preemptively determine attack
present
Philadelphia, PA
Cyber Program Manager
Philadelphia, PA
Haag, Prosacco and Rutherford
present
Philadelphia, PA
Cyber Program Manager
present
- Act as a key liaison between the cyber tower program, risk managers, application development, and senior management
- Demand management and mapping of project work to business value
- Accomplishments in program leadership, policy/standards development, project management
- Prepares and presents presentations to internal management and to internal and/or external customers to provide reviews and updates on technical aspects, cost, and schedule
- Managing comprehensive projects/programs in software development utilizing an agile process creating tools for Computer Network Operations (CNO)
- Develop presentations for senior management team to articulate program status and issues
- Manages cost, schedule and performance. Implements project change management and control. Establishes project performance metrics that ensure successful completion of the project
Education
Education
Bachelor’s Degree in Engineering
Bachelor’s Degree in Engineering
Virginia Commonwealth University
Bachelor’s Degree in Engineering
Skills
Skills
- Good basic mathematical skills, and ability to apply concepts of basic algebra and geometry
- Ability to solve practical problems and to deal with a variety of concrete variables in situations in which limited standardization exists
- Ability to read, analyze, and interpret general business periodicals, professional journals, technical procedures, or governmental regulations
- Considerable knowledge in monitoring network defense technologies and analyzing the products produced
- Ability to perform essential functions of job
- Ability to communicate complex technical concepts and project information clearly and concisely to both technical and non-technical audiences
- Close vision, distance vision, color vision, peripheral vision, and ability to adjust focus
- Ability to lift items/materials weighing up to 50 pounds
- Ability to move from place to place, to sit, handle, feel, reach, climb, balance, stoop, kneel, crouch, crawl, talk, and hear
- Ability to organize, plan and prioritize multiple tasks so that work is completed on schedule
15 Cyber resume templates
Read our complete resume writing guides
1
Cyber Resume Examples & Samples
- Support the team with managing regional cyber-crime incidents and forensic investigations (includes coordinating incidents involving outsourcing partners)
- Take responsibility for strategic threat intelligence activities, developing/enhancing proceses, and creating periodic threat intelligence bulletins from current incident activity and external threat intelligence data. Ensuring new knowledge and lessons learned from incidents are fed back to relevant teams
- Represent CC/IIF on various internal meetings, boards and steering committees (CTM, Ediscovery, Fraud, Risk, GISO/DISO, etc) providing guidance, recommendations, and requirements
- Proactively ensure cyber-crime investigation capabilities, forensic readiness, and relevant processes are designed and implemented in our IT infrastructure and outsourcing contracts
- Provide support with external (regulatory, Fed, audit, etc.) queries and reporting related to cyber-crime activity
- Provide support with internal (risk, management, audit, etc.) queries and reporting related to cyber-crime activity
- Participate in development of UBS incident response and crisis management frameworks to ensure CC/IIF is appropriately linked into the processes and engaged where required
- Support the resolution of Audit and ORI issues, including the creation of new ORIs where sensible and appropriate. Potentially support Audit as a guest auditor where needed or requested
- Executive Director level candidates will also be considered.*
2
Cyber Forensics VP Resume Examples & Samples
- 8+ Years Information Security experience including
- Malware Analysis and Reverse Engineering
- Digitial Forensics and Investigations
- Operating System Security and Controls for both Windows Unix
- Vulnerability Management
- Intrusion Detection Systems
- Encryption
- Application Security
- Network Device Security
- Antivirus
- A passion for lifelong learning
- Ability to prioritize and manage competing requests
- Ability to pick up project-work mid-stream without losing momentum, structure, or information
- Prior experience in IT, Audit, Access and Identity Management, or Risk
3
Cyber Resume Examples & Samples
- GBO Service Management provides support for SecOps’ security services through end-to-end business relationship management of all Citi business sectors, engineering, 3rd party vendors, and senior business and technology executive management. The organization serves to provide one point of contact to customers & stakeholders and oversight of management processes & systems, while allowing the SecOps operational functions to focus on core responsibilities. The security domains include Perimeter Security; Security Event Monitoring & the Security Operations Center; Authentication, Host, & Application Security; Vulnerability Assessments & Ethical Hacking; Mobile Application Gateway; & Global System Log Review
- Relationship Management: Act as central point of contact for all Citi business sectors, engineering, 3rd party vendors, and senior executive business and technology management to coordinate and/or in support of (but not limited to) strategic planning, client/business interactions and escalations, technology implementations and migrations, issue resolutions, incident/problem management representation. Provide a “white glove” type service to critical customers
- Client and Technology On-boarding: Oversee the end to end life cycle of technology implementation (purchasing to client follow ups) and client on-boarding onto new and existing security solutions with emphasis on time to market
- Project Management: Design and drive large, complex projects to meet client, IS, and regulatory requirements
- Process Management: Responsible for the engineering/re-engineering and oversight of operational and business processes and documentation while developing measurement and improvement processes to continuously drive service maturity
- Change Management Coordination: Measuring and improving upon time to market of business requests and changes
- Financial and Vendor Management: General oversight of the P&L budget and contracts
- Risk, Controls and Compliance: Serve as representative to internal audit, external auditors and regulatory examiners on behalf of the area as well as responsible for oversight of the internal control environment
- Monitoring and Reporting: Creation and management of MIS reporting and Key Performance Indicators (KPI) on operational performance, productivity and IS capabilities
- Provide management support to the Perimeter Security Senior Leader
- Experience in a Business Analysis, Technology Operations, Client Management and/or Project Management role is required. General knowledge/experience in the following Information Security (IS) technology frameworks is required (in-depth knowledge is a plus): ITIL Service Management and/or COBIT Frameworks, networks, network security products (Firewall, Proxy, Remote Access) and common architectures that deliver high performance and resilient solutions (such as systematic trading environments). Computer Engineering/Science Degree is required and MBA is a plus
4
Am-cyber Program Management Lead, ED Resume Examples & Samples
- Leads technical programs and projects from initiation through implementation including phases such as planning, analysis, design development and implementation
- Drive corporate initiatives focused on reducing the risk of data leakage, expansion of encryption usage, response to security scanning, improving incident response, etc…
- A project is defined as a unique endeavor with a defined end result that requires project management skills to deliver successfully
- Program Managers will oversee and report on a portfolio of projects while often simultaneously managing some projects within their portfolio
- Establishes project/program requirements, priorities, and deadlines
- Ensures project/program is completed in accordance with all Risk, Architecture and other relevant firm-wide guidelines
- Coordinates resources (staff, equipment, vendors and consultants) across one or more projects/programs
- Manages budget for assigned project(s), monitors project progress and adjusts resources and priorities accordingly
- Organizational Savvy & Know-how
- Ability to think big picture; view issues and situations with a broad perspective
- Advanced knowledge of Project Management and Business Analysis
- Advanced knowledge of Project Management and Business Analysis tools including Presentation, Word Processing, Spreadsheet & Planning Tools (exp. MS Word, PowerPoint, Excel, MS Project & Visio)
- Ability to work under pressure and within tight deadlines
- Executive Level Communication (written and verbal)
- Experience working on risk or control projects
- Advanced PMO Certification; a Plus
- Advanced Level Education within the Technology, Business &/or Management disciplines
5
VP Cyber Forensic Specialist Resume Examples & Samples
- Perform the execution of complex technical investigations and forensics
- Consult for Group General Counsel and external counsel as to strategic approach to be taken in responding to litigation
- Assists with the development of policies and procedures on e-investigations and evidence collection in order to ensure admissibility
- Ensure strict ethical standards are adhered to in order to ensure expert testimony and avoid impeachment of self or direct reports
- Final investigative reporting to Barclays executives and external organisations / courts of law (criminal, civil & regulatory)
- Build and maintain wide global network of senior relationships to maintain profile and effectiveness of team
- Delivery of a highly specialised business-critical function
- Train world-class investigators and analysts
- Motivate and inspire own team and wider team to deliver excellence in all CFI service offerings
- Be an excellent team-player, always dependable and reliable
- Be obsessive and infectious with control and rigour
- 3+ years experience of international cyber forensics, e-crimes & investigations
- 3+ years with
- Good understanding of wider security technologies including vulnerability management techniques and data protection (encryption)
- Understanding of core Barclays platforms including IBM mainframe, Unix and Windows platforms
- Knowledge and experience in business-critical operations
- GCFA (GIAC Certified Forensic Analyst), AccessData Certified Examiner, EnCase Certified Examiner Certification
- Familiarity with open source forensic frameworks and tools like TSK
- In depth familiarity with forensic approaches like super time lining, file system /registry artefacts
- Malware analysis background
- Business Gravitas
6
Cyber Intrusion Program Resume Examples & Samples
- 3+ years of experience with supporting an Air Force program office or in an Air Force acquisition role
- 2+ years of experience with using Microsoft Office Suite
- 1+ years of experience with conducting research and analysis
- 1+ years of experience with providing briefings, training presentations, or communication to groups of individuals
- Experience with serving as the primary author of analytical reports
- Experience with Air Force programs, weapon systems and technologies, DoD processes, Army, Navy, and Joint Command Programs, and weapon system development programs
- Experience with using and searching SIPRNet, JWICS, or other data repositories
- Experience with using data discovery tools and constructing search strings and queries
- Knowledge of Cyber attack vectors and Cyber threat actors, as recognized by DoD
7
Cyber Tool Integrator Resume Examples & Samples
- 3+ years of experience with designing or delivering standards-based security automation or GRC solutions
- 3+ years of experience with designing or implementing continuous monitoring and risk scoring solutions
- Experience with designing and implementing IT Asset Publishing and Inventory service
- Experience in working with SCAP standard through assessments, policy development, or implementation
- Experience with implementation and operations of continuous diagnostic and monitoring tools, including IBM EndPoint Manager or Big Fix, Tenable, BDNA, nCircle, Archer, McAfee ePO, Core INSIGHT, or ForeScout CounterACT-Ability to obtain a security clearance
- 5+ years of experience with Cybersecurity in risk management or Cyber operations functional domains
- Experience with conducting data gathering and research, analysis, and design and developing recommendations
- Knowledge of measures or indicators of system performance and the actions needed to improve or correct performance relative to the goals of the system
- Knowledge of information security policies, standards, procedures, directives, and frameworks, including NIST and DIACAP, in the federal government
- Knowledge of hardware and software identification and inventory management tools and techniques
- Knowledge of vulnerability and configuration assessment tools and techniques
- Ability to communicate system designs through proposals and marketing decks
8
Cyber Weapon System Analyst Resume Examples & Samples
- 10+ years of experience with IT networking
- 5+ years of experience with Air Force network
- 2+ years of experience with DIACAP and RMF processes
- 2+ years of experience with technical review of requirements
- Experience with Air Force Cyber weapon systems and with roles and missions of 24 AF
- Experience with various commercial vendor IT applications, appliances, hardware, and software
- Experience with OSI model as it pertains to networking
- Experience as an action officer
- Experience with program management offices
- Experience with Air Force acquisition
- Ability to work under pressure, as part of a team, and detailed oriented
9
Cyber Predictive Intelligence Analyst Resume Examples & Samples
- Strong understanding of Point of Sales and digital signage markets and technology trends
- Drive market strategies including SAM/TAM and ROI analysis as well as key customer engagement strategies to develop sub-segments of interest and identify potential opportunity for AMD technologies
- Drive definition of system level value propositions and understand system and market trends to develop market requirement documents
- Define and drive ecosystem engagement strategy with key HW and SW partners as well as evaluate the competitive landscape for AMD solutions
10
Cyber Plans Analyst Resume Examples & Samples
- Experience in working with DoD Cyber security organizations, including CYBERCOM, and service Cyber components, and Geographic Combatant Commands
- Experience with developed concepts of operations and TTP for Cyber operations
- Experience with targeting and air tasking orders (ATO) with specific experience with integrated targeting orders (ITO)
- Knowledge of DoD Cyber security systems, databases and processes
- Knowledge of Joint Concept for Cyberspace, Joint Publication 3-12, Cyberspace Operations
- Experience in working with Pacific Command staff
- Knowledge of Pacific theater
- Security+ or CISSP Certification preferred
11
Cyber Intrusion Analyst Resume Examples & Samples
- Bachelor’s degree in information technology, cyber security, intelligence analysis or equivalent experience will be considered in lieu of educations
- Detailed knowledge of common cyber security incident types such as denial of service attacks, malicious software infections, active intrusion techniques, and misappropriate use scenarios
- Experience utilizing a Security Information and Event Management (SIEM) system and common network monitoring platforms
- Proven ability to analyze network traffic for malicious activity and perform packet analysis
- Possess an industry recognized certification in cyber security such as GCIA, GCIH, CISSP or similar
12
Cyber Resume Examples & Samples
- Network certification(s)
- 4 Year college degree in Computer Science, Engineering, or related technical degree
- 5 years experience with Checkpoint firewalls
- IP Services experience with DNS, firewalls, load balancing, content forwarding, remote access, and wireless
- Proficiency in Python, PERL, Shell Scripting and macro’s
- Strong Experience in Deploying and Operating Linux, UNIX and/or Windows at the SA level with a strong bias towards automated deployment and operations experiences
13
Cyber Intrusion Detection Specialist Resume Examples & Samples
- Bachelor's degree required in Computer Science or related field. Master's Degree will be preferred
- 3+ years' industry experience in intrusion analysis for large-scale enterprise environment
- 2+ years' experience with data mining / correlation & log analysis
- The ideal candidate will demonstrate strong competence with issues relating to IDS/IPS management, network architecture as it pertains to intrusion detection, and event correlation and management
- CISSP or equivalent Certification required
- Expert knowledge and experience conducting detailed audit log analysis and correlation: Analysis of large data sets in real-time
- Advanced understanding of mainstream operating systems & service logs
- Ability to assess security incidents quickly and effectively and communicate a course of action to respond to the security incident while mitigating risk and limiting the operational and reputational impact
- Data extraction from a variety of database containers, including the ability to query in different flavors of SQL
- Understanding of application protocols a plus
- Experience with packet analysis, Splunk, and OSINT reconnaissance a plus
- Experience with STIX, TAXI, OpenIOC, and other threat intelligence schemas a plus
- Advance Security Certification in Security Administration, Forensics, Software security or audit preferred
- Ability to understand complex problems while formally presenting them simplistically
- Ability to identify both tactical and strategic solutions
14
Cyber Solutions Tool Specialist / Engineer Resume Examples & Samples
- Candidate will work with Technical Leadership team on Continuous Diagnostics and Mitigation Task Order RFIs/RFPs, providing expertise on the Enterprise Architecture response for the Technical Volume
- Assist in the evaluation of customer requirements, and development of technical solutions to meet the requirements
- Primary responsibility: Upon task order award, candidate will be part of the delivery team installing and integrating their tools into multiple, geographically dispersed client locations
- Must be capable of routine interaction with senior client leaders, and senior HP leaders, to implement the technical solutions at client locations
- Must be capable of working across multiple clients simultaneously, each potentially geographically dispersed, and each with a unique technical baseline
- Must be experienced in cyber security tools and methodologies, and capable of Subject Matter Expert-level inputs into the solutions
- Must either have, or be capable of, getting and holding security clearances across all of the federal government
- Mandatory: strong background in Symantec product set, plus demonstrable knowledge of other cyber security tools and virtualization technologies
- Must have critical thinking and in-depth troubleshooting skills for integration of security COTS tools
- Prefer candidates live in metro DC area; or Raleigh, NC are possible alternatives
- 5 or more years of experience with Security tools, such as Symantec
15
Cyber Business Management Director Resume Examples & Samples
- Partner with head of business management and strategy in the development and articulation of an organizational strategy/roadmap for the cyber organization
- Establish interface to functional unit business planning to understand strategic objectives and forecast cyber support in anticipation of these
- Build internal relationship with multi-functional and geographically dispersed teams to position the cyber function as being mandatory for firm growth, essential to enhance business value
16
Tier Cyber Investigations Analyst Resume Examples & Samples
- The Tier I Cyber Analyst is responsible for the triaging and administrative processing of reported information and network security incidents (SIRT)
- Review, triage and coordinate all reported SIRT events on a daily basis; working with the Cyber Investigations Manager to ensure each incident is properly identified, updated and assigned to the correct investigator and investigation tier
- Conduct security incident investigations involving potential unauthorized exposure or loss of data belonging to Citi, Citi customers and Citi employees
- Conduct assessments that determine the risk exposure faced by Citi, its customers and employees as a result of security incidents
- Evaluate remediation actions taken by various Citi business units to correct security incidents
- Provide Risk Assessment Evaluations (REA’s) to the appropriate Legal representative for regulatory notification requirements
- Determine root cause of security incidents through the development of investigative steps and coordination with line of business security officer
- Prepare investigative reports, database entries, summaries and other documents in support of security incident investigations
- Collect and store artifacts/exhibits as required for each investigation
- Manage and administratively close all incidents that do not require extensive or additional investigation
- Actively engage with the Cyber Investigation Manager and Security Incident Management Team leads (SIM) to ensure they are kept apprised of any significant changes identified during the investigation of an incident
- Minimum of Associate's Degree, BS Preferred
- 2 years of experience in compuer forensics or Information Security within banking/financial services, law inforcement, or business/military intelligence
- 2 years of work with network and computer technology
- Excellent writing and speaking skills
17
Cyber Forensics Senior Analyst Resume Examples & Samples
- Subject Matter Expert responsible for the performance of end-to-end cyber forensics investigations, performed on a variety of hardware/software (mobile, laptop, desktop, network)
- Set program strategy and operation rhythms
- Coordinate with Legal, HR, CSO, and other organizations to perform investigations and identify lessons learned, including program recommendations
- Interface with security hardware/software vendors ensuring current infrastructure meets or exceeds forensics requirements
- Manage internal communications while assisting with the mitigation and remediation processes
- Develop metrics to track the performance and efficiency of the Cyber Forensics program
- Provide technical consulting on IS and IT projects as needed
- Participate in and drive cross-functional, internal, and external, including customer-facing, meetings and operating rhythms to improve the security posture of the company, its clients and customers
- Identify potential process improvement projects and serve as a change agent
- Interface with fellow team members, colleagues on the security team, business partners, management, vendors, and external parties on best practices
- Responsible to ensure Information Security (IS) tools and processes meet regulatory requirements
- Establish and maintain business/IS relationship
- Understand business objectives, priorities, drivers and technology focus areas
- Develop strategy with business leaders and IS leaders to proactively provide solutions and services to match business needs
- Ensure that expectations are met and ensure high customer satisfaction levels through established metrics against SLAs
- Benchmark and implement industry best practices to mitigate potential threats to Synchrony's digital infrastructure and operations
- Contextualize findings to Synchrony's specific business risks or vulnerabilities and represent the company's best practices and interests to internal and external stakeholders and regulatory agencies
- Design and implement procedures and controls necessary to ensure and protect the safety and security of all information systems assets, including prevention of intentional or inadvertent access, modification, disclosure, or destruction
- Provide expertise and counsel to management, other organizations, and special project personnel
- Direct the preparation of and approve appropriate reports and communication status and results
- Bachelor’s degree in a related field, with a minimum of 5 years of experience in Information Technology; OR in lieu of the Bachelor's degree, a minimum of 9 years of experience in Information Technology
- A minimum 5 years of cyber forensics related experience in a large, complex environment and using forensic analysis tools such as Encase Forensic, HBGary Responder Pro, Volatility, FDPro, FTK Imager, F-Response, Mandiant Redline, Cellebrite, etc
- One or more relevant security certifications (EnCE, etc.)
- Results driven, strategic, conceptual, and innovative thinker
- Prior law enforcement experience and/or experience testifying in forensics matters
- Highly analytical, vision, and strong problem solving with a common sense approach to resolving problems
- Expertise to clearly define complex issues despite incomplete or ambiguous information
- Strong Interpersonal and leadership skills
- Excellent consulting skills and superior ability to develop and maintain effective client relationships
- Proven experience with program and project management methodologies and a solid track record of delivering business value
- Strategic vision with ability to influence and interact with executive leadership team members and experience driving significant change
18
Digital Cyber Program Manager Resume Examples & Samples
- Program management across the Digital Cyber Program
- Demand management and mapping of project work to business value
- Issue tracking, escalation, and impact quantification
- Quantify exposure/severity of vulnerabilities/threats and potential business impacts
- Track and communicate program status to multiple levels of the organization
- Bachelor's Degree in Engineering, Business Management, or Technology related fields a major plus
- Minimum five years experience in program management
- Excellent program management skills
- Accomplishments in program leadership, policy/standards development, project management
- Solid and demonstrable comprehension of Information Security including vulnerability & compliance management, Data Loss Protection [DLP], emerging threats and attacks
- Strong understanding of perimeter and core infrastructure security, including an excellent understanding of web, server, messaging and database platforms
- Ability to drive and craft senior level reporting and metrics
- Ability to build a strong people network within a large organization - effecting change and communicating clearly
- Solid understanding of technology, operations, and business processes
- Information security certifications (such as CISSP, SANS or related certifications)
- Knowledge of Bluecoat, Siteminder, Guardium, Vormetric, and related encryption and tokenization technologies
19
Cyber Coverage Analyst Resume Examples & Samples
- Conduct comprehensive program analysis for specific Cyber/E&O team accounts
- Orient analysis schedule to renewal strategy timing
- Analysis work to include: Detailed coverage analysis of every policy on program
- Recommendations for changes to each policy including rationale for the request and citations to other policies / carriers / insured (for broker's use)
- Benchmarking and Claim updates
- Analysis of in force primary E&O/cyber policy
- Analysis of excess policies
- GAP analysis
- Review latest Cyber/E&O policies from the marketplace comparing the new standard policies to the expiring standard policies and the Willis Cyber endorsements
- Create in-depth comparisons of the most commonly used current policy forms
- Create enhancement requests for each form for Cyber Team, FINEX nationally and client advocates managing middle market accounts
- Technical knowledge of insurance contracts/structure with superior policy and analytical skills
- Knowledge of and experience working with Cyber Risk and E&O
- Insurance broker’s P&C license required
- Enhanced client service skills
20
Cyber Privacy Analyst, Mid Resume Examples & Samples
- 3 years of experience with supporting the stand-up and operations of a federal privacy program
- Experience with applying a variety of program management and business process management concepts, methods, tools, and techniques, including gap analysis, risk analysis, process flow diagrams, identifying processes, performance-based metrics, and lessons learned
- Experience with responding to FOIA requests and designing and managing approaches to the FOIA response process
- Experience with policy analysis and development and with information sharing programs and associated privacy implications
- Knowledge of federal privacy and Cybersecurity related laws and policies, including FISMA, Privacy Act of 1974, and E-Government Act
- Knowledge of federal IT security requirements for information systems
- CIPP Certification, including CIPP/US, CIPP/G, CIPP/IT, CIPP/E, and CIPP/C or CIPM Certification
21
Dir Solution Spec Cyber Resume Examples & Samples
- Key responsibilities
- Responsible for landing large contract vehicles to help accelerate MS Services Sales
- Responsible for landing the million dollar opportunities
- Responsible for landing Solutions with the field sellers and Regional SSSP's
- Responsible for working with the CTO team to develop, market and implement repeatable solutions into the field
- Day-to-Day
- Meet with senior customers
- Influence relevant enterprise sales and marketing initiatives and lead Services-specific marketing initiatives
- Deliver offering and sales/marketing feedback to Leadership
- Key requirements
- Must live in Central Region
- Ability to travel up to 75%
- 15+ years of experience in a related field or industry
- Bachelor's degree with specialty in Business Management, Marketing, or technology
- Successful track record of Sales and Marketing management preferably for Mission Critical areas with technology solutions
- A functional understanding of Services and EPG would be beneficial if an internal candidate, if external similar functional experience; exceptional cross boundary and collaboration skills are needed
- Experience as a senior IT architect and strategist including Program Management, Portfolito Management, Capability Maturity Assessment and Enterprise Architecture
- Ability to lead virtual teams and influence leadership in matrix organizations is essential
22
Tech Ops Analyst So Hygiene Wintel Cyber Q Resume Examples & Samples
- Will be part of production support teamsupporting health and compliance of all Windows physical and virtual servers globally
- Troubleshooting operating system and server hardware issues for windows environment
- Will be responsible for handling critical situations (Priority one issues)
- Managing all service delivery resiliency, efficiency and Audit programs
- Ensuring engineering standards and products are integrated across the Windows physical and virtual platforms
- Will be part of vendor engagement model
- Should be able to create run-books
- Advanced hardware knowledge on HP/Compaq/DELL/IBM systems
- Should possess advanced knowledge \hands on experience on Cluster configuration and troubleshooting
- Advanced knowledge of overall infrastructure technical knowledge & troubleshooting methodologies
- Has good understanding of the following skills/Tools: Virtualization, Monitoring tools like Tivoli, NETSNMP and HPSIM etc
- Should have very good understanding of security best practices for multi-tiered operating systems
- Exposure to windows server patching
- Good Scripting knowledge
- Exposure to ESX environment
- Bachelors degree or higher
- Should possess advanced knowledge hands on experience on Cluster configuration and troubleshooting
23
CIB F&BM Cyber & Technology Controls Business Manager VP Resume Examples & Samples
- Executive Level Presentations on strategy, budget, project delivery, controls, risks, etc
- Assist in driving overall strategic agendas and prioritisation process
- Help to drive CTO Town Halls, off sites, and weekly management meetings
- Partner with senior technology managers in building financial plans with associated budget/forecast/variance analysis and assist in understanding the inputs to and conclusions that can be drawn from, the analysis of performance vs. plan and financial forecasting
- Continuous review of processes providing timely and accurate Management Reporting
- Partner with Senior Management to provide insight and transparency around the technology expense base, delivery schedule, and efficiency and resource agendas
- Provide Senior Manager proper management reporting, communication and client reporting, focusing on the overall business unit performance against objectives. Proactively highlight issues and risks to the objectives, derive solutions and drive remedies to completion
- Act as lead of the planning and forecasting process for the leads within the Cyber & Technology Controls
- Build strong relationships with central accounting, P&A, and reporting to manage
- Extensive proven experience of Technology Business Management (COO/CAO type) and strong Financial Management Background
- Experience with Finance, Accounting, Program/Portfolio Management, managing large scale productivity initiatives
- Experience in working with senior level executives
- Clear communication skills, and the ability to articulate complex issues concisely
- Excellent presentation skills – Strong Excel and PowerPoint skills are essential
- Leadership, relationship-building and influencing skills to drive agenda’s across a number of functions
24
Integration Specialist, Cyber Resume Examples & Samples
- Collaborates with the team to recommend IT solutions that satisfy sponsor/stakeholder needs continually exploring and assessing options for value-add for clients/users/re-use
- Design and implement automated tools to assist with business processes. For example, converting from disparate spreadsheets to integrated tools
- Ability to perform analysis and reporting of information from multiple data sources for the purpose of executive communication
- Documents IT asset management requirements around how data from multiple sources can be integrated and normalized
- Leads requirement workshops and information gathering sessions
- Contributes to successful completion of objectives within budget and on time by identifying risks and developing/recommending mitigation strategies
- Ensures timely completion of requirement-related deliverables
- Work with information from a configuration management team to understand the data model and information coming from the configuration management database (CMDB)Combine CMDB information with other data sources to provide reports to show the bank's overall security risk profile
- MS Office (esp. Word, Excel, Visio, PowerPoint)
- Knowledge of SQL and ability to perform simple queries
- Coordination of business cases and other signing party requirements
- Highly motivated with a proven track record to deliver results
- Collaborative approach; proven ability to influence people at all levels while maintaining strong working relationships
- Solid critical thinking and analytical skills with the ability to proactively follow up on identified issues and gain resolution
- Highly flexible and able to quickly adapt to changing priorities and manage multiple priorities concurrently
- Ability to work in a team with diverse skills, providing ongoing feedback
- Excellent communicator; able to clearly articulate messages both verbally and in writing
- Demonstrated ability to address change management needs in complex environments
- Outstanding active listening skills
25
CIB Cyber Resume Examples & Samples
- Evaluates, architects designs, implements, and evaluates security-focused tools and services such as firewalls, intrusion detection & prevention systems,
- Defines Secure Build Standards across Windows, Unix and other common operating systems
- Provides Subject Matter Expertise on
- Conducts security risk assessments on CIB applications and infrastructure, both new and current, utilizing the appropriate security diagnostic tools. Identifies and assists the remediation of security deficiencies, issues and risks. Maintains documentation of findings and solutions
- Assist with the development and interpretation of security policies and procedures
- Support the execution of Cyber Security projects whether providing SME knowledge or solution design assistance
- Participates in CIB-focused Security Testing, risk analysis, security reviews, Vulnerability Management and Red Team / Blue Team activity
- Evaluates and recommends new and emerging security products and technologies
- Stays abreast of industry trends and latest advancements in application, network and data security
- Assists with creating, updating and maintaining information technology policies, standards, procedures, templates, forms, work instructions, checklists, and other related documents
- Assist coordination and implementation of appropriate Cyber Security governance, metrics collection, and reporting capabilities
- Provide consultancy for analysis and identification of broader systemic issues based on results of security metrics
- Provide guidance on implementing information security objectives
- Partner with SMEs and stakeholders, e.g. Cyber Security Leadership, Corporate Cyber and Information Risk and Technology and business teams
- Work with diverse IT and business teams to assist in the remediation identified issues in a risk prioritized, effective and efficient fashion
- Must have a solid Information Security background, including information and cyber security assessment, risk analysis, privacy, data protection and security architecture
- Significant experience with evolving state-of-the-art information security technologies and approaches
- Demonstrated track record of maintaining currency with technological trends and available security solutions in the marketplace
- Strong interpersonal and communication skills, plus the ability to achieve goals through influence, collaboration, and cooperation
- Demonstrated ability to work effectively with all levels of and organization from executives to technology specialists
- A bachelor’s degree or equivalent experience is required
- Direct experience in the specific technical areas of systems administration, applications development, database administration, network operations, and data center operations
- Information security certifications (such as CISSP, CSSLP, CREST, CHECK, CLAS, SANS or related certifications) would be preferred
26
Cyber Secuity Analyst Resume Examples & Samples
- Bachelor's Degree with 2-3 years Information Security experience or an Associate's Degree with equivalent technical certifications
- 4 years of related business experience
- Strong technical skills across cyber security technologies including; scripting skills and an understanding of network traffic flows, and vulnerability management
- Computer literacy with proficiency in Windows Server, Windows 7, and Microsoft Office Suite
- Ability to effectively interact with customers, support staff, outside vendors and various levels of management
- Demonstrate ability to work in teams in a manner consistent with Company objectives
- Intrusion detection/prevention systems, web application/database firewall systems experience
- Understand privacy regulations including Personally Identifiable Information and Personal Health Information and related security controls
27
Cyber ESX & Virtual Server Operations Analyst Resume Examples & Samples
- General Software: VMware vCenter Server, vCenter Server Heartbeat, vCenter Converter, vCenter Site Recovery Manager, vMotion, DRS, VMware HA, Scripting skills (VB, Perl, PowerShell), vCM, VUM
- 3-5 years of experience maintaining and implementing VMware ESX (versions 3.x 4.x 5.x)
- Relevant training or certifications: VMware Certified Professional (VCP) preferred
- Proficient with performance tuning of Operating Systems, Applications, Databases, Storage, and Networking
- Ability to perform root cause analysis on all VMware products. E.g. ESX hosts, Virtual Centers, and Virtual Machines
- Comprehensive knowledge of hardware platforms that include rack mount servers and blades E.g. Cisco UCS, HP, Dell, and IBM
- Ability to administer, maintain, and troubleshoot Storage Area Networks (SAN) and Network Attached Storage (NAS) attached to VMware environments
- Understanding of Virtual Center Operations Manager for proactive assessment of performance and identification of potential resource bottlenecks
- Provide support in performance monitoring, back-ups, reporting, Root Cause Analysis, and resolution for VMware environments
- Demonstrate good judgment in solving problems as well as identifying problems in advance, and proposing solutions
- Ability to lead, and own projects related to migrations of production assets
- Ability to collaborate with a team working across multiple locations
- Ability and willingness to work a 24x7 on-call rotation schedule
28
EAC Cyber Resume Examples & Samples
- Development of training materials for both internal and external audiences
- Driving the build of our advisory product suite, including the development of boundary protection, architecture design and data protection products
- Development of modern architectures for gateway services, including staging and implementation of new systems
- Lead teams and drive interaction with client stakeholders
- Support the business via the delivery of outstanding advisory services to our clients
- Practical experience managing, implementing, and operating boundary protection devices
- Experience with modern architectures for gateway services, including staging and implementation of new systems
- Excellent working knowledge of eCommerce suite including MySQL, PHP, JavaScript and CSS
- Development and provision of training materials for both internal and external audiences
29
Cyber Forensics Investigators Resume Examples & Samples
- Receive, evaluate and initiate the processing of cyber forensic investigations
- Search and seizure of physical and logical evidence
- Recovery of deleted files and folders, internet history, deleted emails, identification of attached devices, analysis of event logs and proxy logs
- Network packet capture and analysis
- Provision of professional witness testimony at court, tribunal or a disciplinary hearing
- Ability to interact with and lead discussions with senior Bank executives across different functions and lines of business
- Ability to manage high risk regional information security incidents by working in conjunction with response partners in Compliance, Corporate Audit, Corporate Security, Legal, Privacy and other risk teams
30
Cyber Intrusion Analyst Resume Examples & Samples
- Hands-on investigations, event triage & analysis across Network Security Monitoring sensors, managed endpoints and other security controls
- Aggregation, analysis, and production of tactical threat intelligence to be used to further identify compromise
- Finding potential or real signs of security compromise various IT assets such as workstations, servers, network devices and web applications
- Ability to speak authoritatively and confidently while balancing respect & tact with customers
- Customer focused, building first-name relationships and protecting their networks as your own
- Participating in one-on-one hands-on mentoring with peers and senior team members
- Researching new techniques for analysis & developing deeper technical analysis skills
- Contributing to the security community through projects and presenting at conferences
- Working with the research team for new technologies related to investigational services
- Must have extensive technical working knowledge of security controls including IPS, SIEM, Endpoint Protection controls, Web Content Filtering, Email Security systems, Threat Intelligence, Wireless technologies etc…
- Must have at least 5+ years of hands-on technical working experience on responding to cyber attacks
- Must have hands on working knowledge of common attack methods and their detection techniques
- Must have hands on working knowledge of network traffic analysis & related tools
- Familiarity with malware analysis concepts and ability to perform basic static and dynamic analysis is an asset
- Hands on working experience with forensics tools and auditing mechanisms is an asset
- Basic scripting skills to pick up python, perl, or bash and automate analysis tasks is an asset
- Strong interpersonal & communication skills working with remote peers over IM, phone & video
- This position is multifaceted and requires a high degree of organizational skills, analytical capability (system of internal control evaluation, risk assessments and Bank Policies and Standards) and flexibility to effectively work within many complex environments on multiple projects to meet a wide variety of demands, often with short notice and stringent time lines
31
Cyber Incident Mgmt Lead Resume Examples & Samples
- 3+ years of Cyber related fraud experience either with computer security response, fraud prevention, etc…
- 10+ years of technical experience in one or more areas (Network, Distributated, Storage, Mainframe, etc…)
- Minimum of 10 years of IT experience; with an emphasis on Incident Management, including experience with business service operational support and large program management
- Minimum of 7 years of experience working with geographically distributed and culturally diverse workgroups; as well as leading the development and execution of organizational missions, objectives, and milestones
- Experience with Cyber Threat, Fraud prevention, computer security investigation and or relevant computer fraud trends and industry technology
- Familiarity with Distributed Computing, i.e. Windows/Unix Engineering and Administration, Network Engineering, Administration, Operations, Batch Processing, and Mainframe / Large Mid-Range environments
- Ability to influence senior technology managers across organizational boundaries through formal and informal channels and create executive level presentations
- Ability to instantly develop strong rapport and build relationships with individuals and teams at multiple levels of the organization
- Ability to be proactive with a strong desire for action, be naturally inquisitive, and strive for continuous improvement of practices / process
- Superior written and verbal communications skills
- Outstanding interpersonal skills and ability to establish strong relationships with all levels of management
- Good working knowledge of incident tools such as Peregrine, Alarmpoint, CMDB, TAMS or other applications
- ITIL, CoBIT, ITSM and IT Service Skills, especially Incident Management, are advantageous
32
Cyber Resume Examples & Samples
- Performs all administration, management, configuration, testing, and integration tasks related to the on boarding and monitoring of the firms applications within various security products
- Develop, implement, and execute insider project and Intel Fusion deliverables
- Research, analyze and understand log sources utilized for the purpose of security monitoring, particularly security and networking devices (such as firewalls, routers, anti-virus products, proxies, and operating systems)
- Develop, implement, and execute standard procedures for the administration, content management, change management, version/patch management, and lifecycle management
- Provide technical guidance to the Security Operations Center and/or the CyberSecurity Incident Response Teams during investigations or incident response
- Experience in application security for the monitoring of internal and vendor supported applications
- Managed or served as a member on an Incident Response or Security Incident Management Team
- Experience with developing use cases, content building, analyzing security event data, and event correlation
- Robust knowledge of various firewall and proxy platforms to include their logging methods. Various platforms include Web logs, custom application and middleware logs, Check Point, Cisco, Blue Coat, F5 and Barracuda solutions
- Intricate knowledge of Linux/Unix platforms to include standard configurations, FTP/SFTP, and the ability to demonstrate troubleshooting techniques on these platforms
- Broad knowledge of security threats and vulnerabilities associated with large enterprise environments
- Experience with data or behavior analytical tools such as Splunk, Palantir, Securonix, ArcSight, or any other similar applications is preferred
33
Cyber Program Management Professional Resume Examples & Samples
- Understanding client’s risk exposure and developing appropriate information and IT security strategies
- Assessing the maturity of client’s current Cyber Security Program and identifying areas for improvement
- Building a prioritized roadmap for project investments and organizational change initiatives
- Collecting information to create benchmarks based on internal reporting capabilities
- Validating that the client’s security investments have improved its security posture
- Defining and implementing security related frameworks, supported by policies, standards and procedures, in line with internal and/or external (compliance) requirements
- Enhancing the security awareness level within the client’s operating environmentSupporting the client’s team by acting as an interim team member (e.g. security officer, security manager, security analyst…)
34
Lead Cyber Investigations Manager Resume Examples & Samples
- Lead a team of investigators within its Cyber Insider Threat Program
- Further the design and maturation of TIAA-CREF’s Cyber Insider Threat Program
- Develop and document forensic Standard Operating Procedures
- Work closely with key stakeholders to investigate incidents and improve the overall control environment
- Oversee the investigation of user behavior using multiple data sources and systems of record (logs, computer evidence)
- Work with outside agencies and internal stakeholders to discretely conduct investigations and report findings to management
- Bachelor’s degree in Computer Science or related field, or equivalent work experience
- Minimum 3-5 years of leadership experience; including experience leading programs, projects, initiatives, etc
- Minimum 7-9 years of overall experience in IT security
- Minimum 3 Years of Computer Forensic or Cyber Investigative experience
- Experience with industry standard computer forensics solutions (EnCase, FTK, X-Ways, Cellebrite)
- Experience with User Activity Monitoring tools such as SureView or Spector Soft
35
Cyber Hunter Resume Examples & Samples
- Searches dynamic environment to identify compromised systems and adversarial activities that current automated tool sets are unable to detect
- Role is highly focused on finding the unknown using a keen sense of awareness, deep understanding of system operations, networks, and adversaries’ techniques
- Must be able to baseline, analyze, and then baseline dynamic systems again – at scale and across varied technologies
- Finds and investigates anomalies. Applies business knowledge to understand the usage of applications and systems
- Must be motivated to search for the “needle in the haystack”
- Works closely with Cyber Intel Analysts and Cyber Thread Analysts to ingest information on new trends, techniques, and problems facing financial firms and quickly applies findings to their trade
- Maintains situational awareness for cyber threats across the global firm and take action where necessary
- B.S. in Computer Science, MIS, or related degree and a minimum of three (3) years of related experience in Information Security or an equivalent combination of education, training and experience. Preferred experience includes a minimum of four (4) years in conducting Cyber Network Defense, a minimum of three (3) years of experience with incident response methodologies, malware analysis, penetration testing, scripting and/or forensics and four (4) years of experience with in-depth forensic and intrusion analysis
36
Solution Specialist, Cyber Resume Examples & Samples
- Creating and executing a business plan to ensure your services and product revenue, and unit goals are achieved including developing a healthy pipeline of qualified opportunities
- This role requires a seasoned solution sales professional with a deep understanding of solution selling and the ability to solve customer business needs through the innovative application of Cybersecurity business solutions
- Candidates will engage with Enterprise customers working with senior Business Decision Makers (BDMs) and Technical Decision Makers (TDMs). Candidates must be able to build trusted relationships, to understand customer business strategies, to present business value and return on investment (ROI), and new business strategies while being able to demonstrate value and impact of a Microsoft cloud-based solutions
- The successful candidate must have proven experience in driving complex, competitive solution sales scenarios, working in a matrix environment, and leading opportunities to closure. Candidates must be comfortable shaping the solution vision and working with Architects, Engagement Managers and Project Managers to define the overall scope of work across Strategy, Consulting and Support
- An in-depth knowledge of the sales motions that lead to successful deal pursuits combined with a demonstrated track record of closing large consulting/support deals and exceeding annual quota targets is vital
- The successful candidate must possess strategic thinking, communication/presentation skills and organizational agility to guide customers through multi-year initiatives
- Responsible for deal orchestration, deal structure, developing value based propositions, crafting and selling solutions mapped to customer business outcomes
- Develop relationships with customer CxO level Business and Technical Decision Makers. Drive solution sales scenarios through understanding the customer, the industry, and the competition
- Orchestrate both Customer and Microsoft key resources in a virtual team environment to define solution vision and achieve desired business outcomes
- Candidates must have field-based knowledge of competing and winning against solutions and technologies from competitors
37
Cyber Software Developer Resume Examples & Samples
- At least 2 years experience with a high-level programming languages
- Experience in developing server side applications, SQL and OO design
- Highly responsible, self disciplined, self motivated, creative, confident and a quick learner
- Good knowledge of web technologies - JavaScript, HTML, HTTP
- A solid foundation in computer science
- Experience developing/designing large software systems
- Experience with scripting languages such as python, ruby
- Good knowledge of Big Data, NoSQL Databases and development tools
38
Cyber, Technical & Projects Trainee Resume Examples & Samples
- Management of the cybersecurity programme
- Management of Business Security technical activities and liaison with technical teams and suppliers
- Management of Business Security technical projects including mew and upgraded tools
- Interface to key business and technology projects
- Perform the Information Security Officer function for the department, appointed by and reporting to the GM, in accordance with the ISO Accountabilities and Responsibilities attached to this job description. Refer to the "ISO Accountabilities and Responsibilities": for full details on the EMEA intranet at the following page:- https://mizuhoemea/backoffice/emea-it/Business%20Security/SitePages/ISO%20Accountabilities%20and%20Responsibilities%20Summary.aspx
- An ability to work within multi-disciplinary teams in a complex environment, delivering security strategy and targets
- Can articulate their ideas and opinions clearly, concisely and logically
- A desire to attain a professional information security qualification (CISM/CISSP)
- A commitment to cultural diverse environments
- A good standard of education
- Relevant training and experience (cybersecurity / fraud / financial crime) (Desirable)
39
Cyber Digital Forensics Analyst Resume Examples & Samples
- Preserve network and host-based digital evidence in an industry accepted forensically sound manner
- Perform host-based digital forensics on Microsoft Windows based systems and other operating systems as necessary
- Usage of industry standard digital forensic and network monitoring tools in an enterprise environment
- Independently planning and executing forensic support for complex investigations and presenting clear and concise findings to a non-technical audience
- Utilize industry standard tools to preserve mobile devices
- Ability to work independently or with a team during large scale forensic investigations
- 8+ years of experience working in the computer forensics, cybercrime investigation and other related fields with a combination of both public and private sector experience preferred
- A proven track record in digital forensics, electronic evidence collection, log file analysis, and email review
- Ability to independently assess scope of forensic requests, effectively completes required digital forensic analysis, and writes clear and concise reports for the intended audience
- Experience conducting senior level digital forensics examinations on Windows operating systems using industry standard forensic tools (preferably familiar with EnCase, FTK and X-Ways forensic suites)
- Recent formal digital forensics training
- Knowledge of computer forensic best practices and industry standard methodologies for acquiring and handling of digital evidence
- Familiarity of international data privacy laws and required clearances for APAC and EMEA countries
- Bachelor’s Degree in Computer Science or other Technology related fields preferred
- Able to work under pressure in time critical situations
- Experience working with people from different global cultures is a plus
- Strong attention to detail in conducting forensic analysis combined with an ability to accurately record full documentation in support of the investigation
- Ability to communicate effectively with business representatives in explaining forensic findings clearly and where necessary, in layman's terms
- Ability to communicate with other industry forensic professionals to ensure solid partnerships with key external stakeholders to ensure that the forensic investigation process remains at a word class level
40
Tier Cyber Forensic Resume Examples & Samples
- Triaging and administrative processing of reported network security incidents
- Collect, investigate and report on Network Security Incidents
- Prepare timely , detailed, accurate and factual Investigation Reports supported by evidence collected as a result of the investigation
- Collect and document forensic artifacts to support the investigative effort
- Work with internal SME’s and vendors to define signatures and processes for detecting the malware
- Actively engage with the Cyber Investigation Managers and Security Incident Management Team leads (SIM) to ensure they are kept apprised of any significant changes during the progress of an investigation
- Actively engage in liaison activities with, Law Enforcement, Industry Associations, peer institutions, and information sharing communities
- Bachelor of Science degree in a computing-related course of study or a suitable combination of education and experience is preferred
- Minimum of an Associate’s Degree or equivalent in a computing-related course of study
- Minimum two (2) years’ experience in law enforcement, business/military intelligence, computer forensics, network security or information security is a plus
- Familiarity with network and computer technology
- Excellent analytical, technical writing and presentation skills with attention to detail
- Familiarity with cyber-crime and cyber-attacks, responsible groups, motivations and TTP’s
- Knowledge of commonly compromised file formats, for example, PDF, PHP
- Experience with scripting or programming languages, including but not limited to Visual Basic, MySQL, C, C++, Perl, Python and / or SQL Oracle Database development
41
Cyber Director Defense Engineering & Operations Resume Examples & Samples
- Support CME Business Principles and Outstanding Success Possibilities by communicating and integrating them into the projects and teams being managed by this role
- Assess program maturities and help drive planning for improvements; track telemetry and metrics
- Participate in war gaming and continuous testing
- Conduct incident response planning and incident handler program/training
- Develop staff and expand cyber operations capabilities including globalization, 24X7 coverage, and disaster recovery
- Minimum of 7 years of experience in security engineering and operations
- CISSP or equivalent experience
- Several years of management experience in an engineering group
42
Cyber Defence Analyst Resume Examples & Samples
- Analyse information from variable sources; leverage various toolsets to gain awareness of potentially suspicious activity
- Identify and help troubleshoot anomalies
- Participate and assist in identifying and responding to global security incidents
- Provide a point of escalation for incidents within various global regions
- Ability to manage multiple incidents at a single time
- Monitor incidents submitted and establish correlation to broader threats when they may exist
- Conduct root cause analysis to identify gaps and recommendations ultimately remediating risks
- Communicate effectively with representatives of the business, technology specialists, and vendors
- Provide training and expertise to junior Incident Responders
- Bachelor’s degree from a four year accredited college/university but substantial relevant experience could substitute
- Strong understanding of Windows, Unix/Linux operating systems, security administration, network security weaknesses, vulnerabilities and remediation, TCP/IP networking and firewall concepts
- Knowledge of security auditing processes
- Expert knowledge of information security issues, trends and leading practices
- Have a thorough understanding of the common and uncommon threats and vulnerabilities related to applications, architectures and databases, thin clients, thick clients, mobile and virtualized applications
- Prior experience in security development and implementation of tools is desirable
- Working knowledge of EnCase Enterprise is preferred
- Preferred Certifications: One or more of the following certification designations is preferred
- GIAC Certified Forensic Examiner - GCFE
- GIAC Certified Forensic Analyst - GCFA
- Certified Information Systems Security Professional - CISSP
43
Director, Cyber Program Manager Resume Examples & Samples
- Develop, Guide, and Analyze the Cyber Engineering Program at all points in the lifecycle
- Build and direct new programs within the overall program
- Interact with Project Managers to ensure delivery of projects is on time and on budget
- Act as a Product Manager to assist with life-cycle management and strategy of the different technologies and services
- Work with management teams and engineering resources to ensure that we prioritize and coordinate projects related to the program accordingly
- Drive the delivery models as we move to a more Agile method of working
- Develop work intake models and ensure that initiatives are properly aligned
- Report status of the projects and ultimately the program in a way that ensures we show clear alignment
- Provide guidance and decision-making to the staff to help drive success
- Review dependencies within the organization to look at inter-related projects and how to validate and create program structure
- Drive change within the organization to drive motivation and innovation
- Act as a product manager above the program manager to assist the teams with product strategy, marketing, roadmap, life-cycle, etc
- Fiscal responsibility as it relates to ownership of the Cyber Security Engineering budget
- The role is not project management, but the program manager will play an active role in engaging project managers based on deliverables and dates
- In-depth knowledge of Project Management concepts/practical use
- 10 years plus in program management, project/portfolio management, and/or
- Information security
- Strong understanding of governance process
- Operational knowledge of systems, databases and network security engineering best practices
- Detailed understanding and knowledge of requirements gathering
- Solid problem solving and analytical skills; able to quickly digest issues encountered and recommend an appropriate solution
- Building and Sustaining Relationships
- Undergraduate degree in Computer Science, Electrical Engineering or a related technical discipline; advanced degree highly preferred
44
Cyber Investigations & Incident Response Lead-invco Resume Examples & Samples
- Lead highly sensitive, complex, and confidential high-tech investigations into incidents of data loss and intellectual property theft, technology misuse, conflict of interest, external fraud and other types of matters
- Conduct forensic examinations of digital evidence in support of other investigations
- Examine malicious software (malware) in support of investigations
- Conduct and memorialize investigative interviews
- Assist in the collection of electronically-stored information
- Conduct outreach to business partners
- Over 10 years professional experience, including at least seven years of tech investigations experience, a minimum of three of which involving financial services investigations
- Proven experience in computer evidence seizure, computer forensic analysis, and data recovery on Windows, Apple and Linux-based systems and devices
- Proven experience in computer evidence seizure, computer forensic analysis, and data recovery on Android, iOS and Blackberry-based mobile devices
- Proven experience in conducting investigative interviews, including writing memorandums of interviews. Formal interview training is preferred
- EnCE , ACE, CFCE, CISSP, or similar industry-accepted certifications preferred
- Experience using EnCase or similar forensic tools
- Experience in computer intrusion analysis and incident response
- Experience with analysis of security events from multiple sources including but not limited to events from Security Information Monitoring (SIEM) tools, network and host based intrusion detection systems, firewall logs, system logs (Unix and Windows), mainframes, mid-range, applications, and databases
- Experience with and knowledge of typical attack vectors, network exploitation techniques, and exfiltration channels
- Knowledge and understanding of network protocols, network devices, multiple operating systems, and secure architectures
- Knowledge and experience with personal computers, mobile devices, and server hardware, including RAID networked drive storage systems
- Excellent communications skills, both written and oral are critical
- Experience with computer network surveillance/monitoring
- Current experience with network intrusion detection and response operations (Protect, Defend, Respond and Sustain methodology)
- Knowledge of and experience using Blue Coat Reporter or similar Internet proxy reporting tools
- Familiarity with open source intrusion detection systems (IDS) such as snort and Bro IDS
- Experience and/or certifications with industry digital forensic tools such as EnCase, X-Ways, FTK, F-Response, and/or open source tools
- Advanced understanding of Windows and Linux operating systems
- Knowledge of and experience with eDiscovery methodology, best practices, and processing and review platforms (Clearwell, preferred)
- Experience with audio enhancement software
- Familiarity with automation surrounding large collections of data and parsing data
- Experience with current cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks
- Strong knowledge of IBMs Lotus Notes platform, especially of available forensic artifacts
- Ability to conduct in-depth analysis of malicious document files, malicious and protected executables, web-based malware, and malicious browser scripts
- Experience with code and behavioral analysis of malware including building test environments and using debuggers, disassemblers, sniffers, and other useful tools
- Understanding of Windows x86 Assembly code concepts for reverse-engineering
- Knowledge and experience of mobile malware and related investigations
- Advanced experience with Python scripting language; Additional languages a plus
- Experience with applications including WireShark, RegShot, Process Explorer, IDA Pro, OllyDbg
- Experience with dynamic, static and memory malware analysis
- Experience with malware reverse engineering
- Recent and basic programming experience
45
Cyber Vulnerability Management Analytics & Root Cause Resume Examples & Samples
- Analyse large vulnerability datasets to identify trends, changes to normal data profiles and isolate Root Cause issues
- Engage relevant technical support and engineering teams as needed to drive remedial solutions
- Create detailed Root Cause Analysis reports for attention of Cyber and Technology teams and senior management
- Develop, document and manage RCA processes and templates
- Present RCA findings to both technical and non technical audiences
- Minimum 5 years of experience in technical root cause analysis in a large corporate
- Minimum 5 years of information technology and/or cybersecurity experience
- Good understanding of technology concepts across Windows, UNIX, Database (Oracle, MS SQL, Sybase)
- Experience of security best practices and implementation of these concepts
- Previous experience working in large scale environments with diverse technologies
- Able to understand and break down complex problems
- Excellent communication skills (verbal and written)
- Systems Administrator (SA) level of technical ability on at least one platform (Windows, UNIX)
- ‘Big data’ experience or understanding of ‘big data’ techniques
46
Cyber Vulnerability Management Resume Examples & Samples
- Analyze large vulnerability datasets to identify trends and changes to normal data profiles and isolate root cause issues
- Lead and coordinate technical RCA activities and investigations with teams across the globe
- Create detailed RCA reports for attention of cyber and technology teams and senior management
- Develop, document, and manage RCA processes and templates
- Present RCA findings to both technical and non-technical audiences
- Minimum 5 years of experience in technical root cause analysis in a large corporate environment
- Experience with manipulating large datasets and basic statistical analysis
- Significant experience with MS Excel, MS PowerPoint, MS SharePoint
- Good understanding of technology concepts across Windows, UNIX, and Databases (Oracle, MS SQL, Sybase)
- Good understanding of security/vulnerability scanning tools (i.e., Qualys, Symantec ESM)
- Experience with security best practices and implementation of these concepts
- Strong presentation skills that can speak to all levels of the organization
- Excellent relationship/partnering skills with other enabling teams (i.e., other Firmwide technical teams)
- Able to take the initiative, work under pressure to deadlines, and juggle multiple priorities
- Strong attention to detail and data accuracy when undertaking data analysis
- Ability to create and implement RCA processes that can scale firmwide
- Ability to assimilate technical data, work with large datasets, and translate results into layman terms
- Database Administrator (DBA) level of technical ability on Oracle, MS SQL, and/or Sybase
- Experience with Qualys scanning
- Experience with Symantec ESM scanning
- Experience with Tableau to create dynamic reporting and real time dashboards
47
Cyber Vulnerability Management Vulnerability Discovery Resume Examples & Samples
- Works with multiple data sources and inventory to assess impact
- Articulates exposure and coordinates Mitigation solutions
- Works with Cyber Engineering and Security Operations to implement Mitigation solutions and establish monitoring
- Provides constant situational awareness
- Crafts, communicates and coordinates timely remediation of Application vulnerabilities and hygiene issues impacting various aspects the SDLC
- Works with the larger team identify exposure, vulnerability assessment, and root cause of systemic issues leading to presence of vulnerabilities/hygiene issues
- Creates and maintains sustainable processes to track and communicate status of remediation
- Solid and demonstrable comprehension of Information Security including vulnerability & compliance tools and processes, associated vulnerabilities, awareness of emerging threats and attacks mapped to effective controls and/or Mitigation solutions
- Ability to assess and mine using data with correlation and analysis
- Solid and demonstrable comprehension of end to end Vulnerability Management to include industry standards such as CVE, CPE, CVSS
- Sound awareness of leading vendor products/applications from Oracle [Java], Adobe and Microsoft to include product lifecycle & release schedules
- Subject matter expert (SME) in one or multiple areas such as Windows, UNIX, mid-range, mainframe, database,
- Design and implementation experience of Operational process/workflow
- Experience in large scale Enterprise technology environments
- Strong deductive reasoning, critical thinking, problem solving, and prioritization skills
- Experience assisting the resolution of customer escalations, incident handling, and response
- Exposure to Regulatory & Audit compliance management
- Ability to think strategically, work with a sense of urgency and pay attention to detail
- Ability to present complex solutions and methods to a general community
- Previous exposure to the Software Development Life Cycle [SDLC] from design, build and production
- Fully understands and is able to assess and manage output from
48
Cyber Tech Specialist Resume Examples & Samples
- The Security Architecture - Tech Specialist is a key member of the Security Architecture and Consulting Team, who will provide leadership on security through designing & delivery of integrated solution architectures, and will utilize extensive knowledge of multiple technologies and solutions to provide secure technical design recommendations with a goal of delivering business value through successful delivery of projects & programs. The Security Architecture will be responsible for designing systems and platforms to mitigate identified risks sufficiently and to meet business objectives and regulatory requirements. The Security Architecture will also perform duties as department liaison to coordinate information security activities with other departments
- Additionally, the Security Architect will support long-term Security strategy and the evolution of CME Group’s security posture. Review and assist the architecture community with defining high-level security requirements and conducting cost-benefit analysis to maximize use of available resources and make recommendations for the establishment or update of standards and guidelines for the design of secure technical solutions, including integration of security within the infrastructure, application, and database technologies stacks
- This position is the first level in the Architecture family and is viewed as an internal consultant, security and technology advocate, mentor, and change agent
- Strategic Visioning: Develop Security Standards and Reference Architectures to ensure adequate security controls throughout CME Groups systems and technologies.Participate in the development of the security road-map, and communicate securities vision to business partners and IT staff
- Technical Leadership: Provide security leadership to infrastructure and development teams to deliver major projects & programs. Utilizing extensive knowledge of multiple technologies and platforms, provide secure technical design recommendations based on long-term Security and IT organizational strategy and the evolution of security technology
- Mentoring: Takes responsibility for personal and project team security, technical and professional growth.Serves as a technical resource providing guidance and advice to project team members on security, technology and designing effective solutions. Provides technical assistance and follow through to team members on complex problems. Review design and development work, instructing team members as needed
- Analysis/Design: Analyze high level requirements and apply knowledge of business needs and security architecture to determine appropriate course of action. Plan, design, and drive delivery for technologies that reduce costs and improve overall security posture within the organization
- Business Knowledge: Assist the Enterprise Architects in defining high level security requirements.Refine ability to combine knowledge of business environment with the architecture of secure solutions. Bridge the current secure technical capabilities with the business strategy of the organization. Evaluate possible implementation of new technology, consistent with the goal of improving existing security posture and in meeting the needs of the business
- Technology Knowledge: Maintain a strong knowledge of Security, IT systems and architectures.Research, collect and disseminate information on emerging security technologies and key learning throughout the organization
- Communication: Provides input to peers, management and customers for recommendations and alternate security solutions and/or improvements. Conveys and insures the understanding of security strategies and vision to project participants. Conveys problems, solutions, updates and project status to their peers, customers and management.Researches and presents detailed information for cost justification of new purchases to management. Develops and reviews program, systems, user, operations and disaster recovery documentation. Provides feedback on team and individual performance against established assignments. Participates in hiring process, conducts technical interviews, contributes to overall evaluation of candidates and makes recommendations for hiring
- A Bachelor's or Master's degree in Computer Science, Information Systems or other related field; or equivalent work experience. One must have experience coordinating multiple concurrent issues, in high-pressure situations
- 5-10 years of infrastructure/systems/application security analysis and design OR demonstrated ability to meet job requirements through a comparable number of years of technical work experience
- Experience with drafting of Standard, Reference Architecture, and Implementation Guidance
- Previous experience and proven ability to define infrastructure/systems/application architectures is preferred with In-depth knowledge of network protocols, firewall and network architecture, secure software design, Microsoft Windows and Unix/Linux OS, database architecture
- Must have strong understanding of the architecture design process, methodology, and a high level of understanding of business environment, strategy and need
- High degree of understanding in the theories, methodologies and principals underlying secure technical analysis, design and implementation of software applications, systems, and/or databases
- Proven expert analytical and design skills at multi-product/multi-environment levels as well as an in-depth experience in research and analysis, project planning and implementation
- High understanding of entire development process, including specification, documentation and quality assurance
- Aware of business issues as they impact overall project plans. Recognized reference and central point for security and technical issues across groups and products. Strong communications and interpersonal skills
- Must have strong knowledge of job specific technical skills specified in the requisition and be able to apply them to specific software and/or database development efforts
- Candidates must have proven ability to build value propositions, business cases, & drive results as part of a larger project or program team
- Relevant experience designing, implementing, and supporting large scale solutions
- Must have experience designing and architecting secure public cloud infrastructure
- One or more certifications such as CISSP, CISA, GIAC, GSEC, EnCE
- Experience in financial industry and/or trade industry
- Linux/Windows Security
- Oracle Database Security
- Network Protocols
- OWASP
- Preferred experience with Firemon
49
Cyber Transformation Manager Resume Examples & Samples
- Effectively lead and motivate client engagement teams and provide technical leadership in the assessment, design, and implementation of security solutions
- Consistently deliver quality client services. Drive high-quality work products within expected timeframes and on budget. Monitor progress, manage risk and ensure key stakeholders are kept informed about progress and expected outcomes
- Use knowledge of the current IT environment and industry trends to identify engagement and client service issues, and communicate this information to the engagement team and client management through written correspondence and verbal presentations. Stay abreast of current business and industry trends relevant to the client's business
- Generate new business opportunities by participating in market facing activities and developing thought leadership materials. Understand SGV/EY and its service lines. Actively encourage team members to contribute ideas and identify opportunities to introduce SGV/EY services
- Foster an innovative and inclusive team-oriented work environment. Play an active role in counseling and mentoring junior consultants within the firm
- A bachelor's degree in Business, Information Systems, Computer Science, Computer Engineering, or related major
- Minimum 4 years of professional and/or advisory services experience in assessing, developing, implementing or architecting information security systems with a strong understanding of information security regulatory requirements and compliance issues
- Certifications such as CISA, CISM, CISSP, CEH, ISO 27001 LA/LE, SANS GIAC, COBIT, etc., preferred
- Knowledge of general security concepts (COBIT, PCI-DSS, NIST, OWASP, Octave Allegro, etc.) and methods such as vulnerability assessments, privacy assessments, intrusion detection, incident response, security policy creation, enterprise security strategies, architectures and governance
- General understanding of various technologies and trends such as cloud computing, mobile devices, networking, operating/host systems, security technologies (firewalls, IDS/IPS, SIEM, WAF, etc.) and business systems
- Excellent communication and leadership skills, and be able to promote teamwork in a multicultural environment
50
Cyber Vulnerability Management Resume Examples & Samples
- Drives and coordinates timely remediation of security vulnerabilities across Line of Business functions
- Works with LOB representatives to ensure remediation efforts adhere to corporate policies
- Coordinates remediation of specific high visibility, critical vulnerabilities as detailed by the Service Delivery Lead
- Minimum 5 years information technology and /or cyber security experience in a large corporate
- Experience within the Vulnerability Management/Risk Management arena
- Good understanding of technology concepts across Windows, UNIX, Database (Oracle, MS SQL, Sybase) and Web
- Good understanding of security / vulnerability scanning tools (eg. Qualys, Symantec ESM)
- Excellent relationship/partnering skills with other enabling teams (i.e. other firmwide technical teams)
- Strong project management/organizational skills
- Able to take the initiative, work under pressure to deadlines, able to juggle multiple priorities
- Good understanding of technology concepts
- Familiarity with good security practices and implementation of these concepts across complex environments
- Ability to assimilate technical data, work with large datasets and translate into layman terms
- Ability to work well under pressure and juggle multiple priorities
- Self-motivated and operates with a high sense of urgency and a high level of integrity
- Able to understand and breakdown complex problems
- Current Certified Information Systems Security Professional (CISSP) or GIAC Security Essentials (GSEC) certification
- Experience managing physical and/or virtual security programs on a broad scale
51
Manager, Cyber Data Analytics Resume Examples & Samples
- Work with strategic partners to identify opportunities to further enhance cyber investigations using advanced analytic techniques that preempt threats utilizing social, behavioral, cybersecurity information, etc
- Define and manage the process to onboard new systems into our cybersecurity analytics portfolio
- Work with investigators and data scientists to develop advanced analytic techniques for cybersecurity and fraud analysis, including anomalies, account takeover, misuse, etc
- Lead creation of standard analytic dashboards for use by investigators and operational teams
- Work with cybersecurity personnel and application owners to define and implement standards for access and activity logging to support operations and security analytics practices
- Act as an internal consultant on cyber fraud analytics to business stakeholders, data owners, and fraud operational teams
- Define models that describe appropriate and inappropriate use of information systems
- Provide senior leadership teams with insight as cybersecurity and fraud transforms to implement a comprehensive data-driven, intelligence-based cyber investigations program
- Bachelor’s degree in Computer Information Systems or Management Information Systems strongly preferred. Candidates with no degree must have a minimum of 10 years relevant work experience
- Minimum 3 years’ experience managing and developing a team
- Minimum 5 years’ cybersecurity experience
- Minimum 2 years’ experience utilizing Machine Learning statistical analytics techniques for anomaly, intrusion detection, social and behavioral analysis, etc
- Advanced knowledge of cybersecurity concepts, best practices, and procedures
- Expert-level knowledge of cybersecurity architectural designs,requirements development, and solutions definition
- Expert-level knowledge of Security Information and Event Management (SIEM), log management, or threat monitoring systems
- Strong working knowledge of system and application logging
- Experience with one or more Big Data tools (Splunk, Greenplum, Hive, Impala, Hadoop)
- Experience with Perl, R, Python, and the use of regular expressions
- Experience with a visualization software (Tableau, OBIEE, QlikView)
- Experience with building and designing useful and actionable dashboards
- Broad understanding of all aspects of IT and enterprise systems interoperability
- Excellent verbal and written communication, problem solving, and analytical skills, including the ability to produce usable and maintainable documentation
- Time management skills with proven ability to effectively coordinate multiple tasks under pressure
- Ability to learn complex computing environments quickly
- Ability to learn quickly and adapt to changing environment
- Ability to communicate with both technical and non-technical personnel
- Expert-level knowledge of security architectural designs, requirements development, and solutions definition
52
Cyber Defence Detection Analyst Resume Examples & Samples
- Investigate, Document events and escalate security events to incidents, as required
- Act as a participant during Cyber Hunt activities at the direction of one or more Incident Response Analysts
- Monitor SIEM and logging environments for security events perform event triage to identify incidents requiring further response
- Responsible for understanding the global threat landscape by working with CME Group’s Cyber Threat Intelligence Team
- Escalates cyber security events according to CME Group’s Standard Operating Procedures
- Knowledgeable on current security related issues
- Ability to aggregate and correlate alerts from systems and/or SIEM / analytics tool to provide context, environmental awareness, baselines, and root cause analysis
- Utilize forensic resources to understand event impacts and generate incident reports
- Monitor and investigate network and system events to pre-emptively determine attack
- Proactively provide feedback on operational processes and procedures
- Document event analysis procedures and write comprehensive reports of incident investigations
- Security awareness in network/systems/physical security, authentication, authorization and usability
- Knowledge of networking principals
- Working knowledge of IT best practices
- Working knowledge of Intrusion Detection/Prevention Systems
- Strong investigation and analytical skills
- Familiarity of the Cyber Kill Chain
- Strong familiarity with security issues surrounding network computing and experience in implementation of security systems and controls
- Must have knowledge of information security components, principles, practices, and procedures
- Must have general knowledge of IT architecture infrastructure, web application, and internet security along with a general understanding of common operating systems, networking protocols, database, and application development
- Have a firm understanding of outside security threats and risks to an information technology infrastructure and use those skills to develop custom incident response protocols as deemed necessary
- Thorough understanding of fundamental security and network concepts (Operating systems, intrusion/detection, TCP/IP, ports, etc.)
- Willing to work in a team-oriented 24/7 CDT environment; flexibility to work on a rotating schedule (including overnight shifts)
- Experience with enterprise SIEM or Incident Management systems
- Experience with network monitoring in a CDT environment
- Experience working in a 24/7 CDT environment
53
Senior Manager Offering Sales Cyber Resume Examples & Samples
- Directs the organization and performance of assigned sales group and the activities of senior sales personnel. Provides staff direction and guidance with an understanding and following of established company policies and procedures
- Collaborates with executive management to determine the market development strategy, account-level sales priorities and areas of focus within Cybersecurity capabilities, and full life cycle application management
- Owns the sales plan and is responsible for a quota aligned with the scope of the Cybersecurity-specific territory, offerings or services and assigns individual quotas, and goals for each team member. �Drives the achievement of sales targets by ensuring the use of good sales practices and actively monitors performance of individuals and the team
- Leverages significant sales knowledge, experience, and client relationships to support team members in closing new business engagements. Develops strategic business relationships with key decision makers
- Establishes and communicates goals and objectives, defines methodologies, tasks, and activities, and clearly describes roles and responsibilities for performing to personnel. Communicates broadly to help ensure overall coordination for cross-functional teams. Builds and enhances the team capabilities by coaching, developing, and mentoring sales force. �
- Acts as capture executive on key Cybersecurity pursuits to enhance company position and gain new business
- Provides pre-sales support to client relationship personnel to drive Cybersecurity pipeline of qualified leads across the assigned sales territory. Engages with the same to qualify leads into opportunities. Executes the standard sale process through to closure
- Addresses complex client business problems through the application of Cybersecurity offerings. Develops a compelling value proposition for our solution(s) based on a solid business case and its overall impact on the client agenda as well as company goals
- Bachelor's degree in business administration, or related field preferred
- Twelve or more years of business development and sales experience
- Nine or more years of supervisory or management experience included
- Experience working with the technology industry, specifically emerging markets like cybersecurity, various areas of business operations and company products and services
- Experience with contract interpretation, negotiations and project management
- Experience working with company products and services and ability to articulate to client
- Experience working with company sales methodology and supporting tools and applications
- Strong communication skills to interact with executive management, staff, vendors and clients; executive presence
- Strong leadership skills to lead and mentor the work of subordinates; ability to create a vision and a path for the team
- Organization and time management skills to balance and prioritize work
- Strong sales skills
- Strong networking skills to create and maintain formal and informal networks
54
Director Offering Sales Cyber Resume Examples & Samples
- Defines, develops, promotes and manages a portfolio of strategic solutions and offerings (either global or to an industry), combining business, solutions, IT, sales and marketing expertise
- Works closely with business developers, account managers, competency managers, and executive management to develop and grow their portfolio of solutions and offerings and is responsible for the financial performance of the portfolio
- Manages the organization and performance of specific functional areas and the activities of senior managers. Provides staff direction with an understanding and following of established company policies and procedures
- Oversees business activities to ensure a high standard of professional excellence is maintained among staff members
- Manages business function including approval of overall strategy and plans, budgets, and work breakdown structure
- Establishes and implements short and long-range strategies to deliver services to customers within reasonable schedules and budgets
- Establishes and communicates goals and objectives, defines methodologies, tasks and activities, and clearly describes roles and responsibilities for performing personnel. Communicates broadly to help ensure overall coordination for cross-functional teams
- Selects and hires employees. Trains and evaluates employees to enhance their performance, development, and work product. Addresses performance issues and makes recommendations for personnel actions. Motivates and rewards employees including providing salary increases, bonuses and promotions within allocated budgets and company guidelines
- Prepares, recommends and oversees development of operating and personnel budgets. Monitors spending for adherence to budget plans, develops and recommends variances. Performs and/or oversees budget analysis
- Master's degree or equivalent combination of education and experience
- Master's degree in business administration or related field preferred
- Twelve or more years of computer science and/or project/program management experience
- Seven or more years of leadership experience included
- Experience working with past and present company business environment
- Experience working with management implications of various forms of financial data
- Experience working with vertical markets and horizontal functional areas
- Experience working with existing information technology environments including trends, best practices and company preferred architectural frameworks and alliances
- Strong communication skills needed to interface with high-level customer representatives
- Strong strategic management and planning skills
- Ability to use own judgment and initiative in problem resolution
55
Principal Offering Sales Cyber Resume Examples & Samples
- Leads sales cycle from start to finish for delivery of customized business solutions to large or difficult clients. Meets or exceeds annual new business revenue target for an assigned Cyber offering within a defined sales territory
- Works closely with the client relationship and account management to develop an account development plan for accounts within Cybersecurity
- Works across a medium territory to create a market for defined Cybersecurity offerings and services, and to qualify and develop opportunities within those markets
- Provides pre-sales support to client relationship personnel to drive Cybersecurity pipeline of qualified leads across a medium sales territory. Engages with the same to qualify leads into opportunities. Executes the standard sale process through to closure
- Addresses complex client business problems by applying Cybersecurity offerings. Develops a compelling value proposition for our solution based on a solid business case and its overall impact on the client's agenda as well as company goals
- Develops strategic business relationships with key decision makers including customer senior management. Builds relationships while positioning company for future prospects
- May provide leadership and work guidance to less experienced personnel and sales support team
- Ten or more years of business development or sales experience
- Experience working with the technology industry, specifically emerging markets like cybersecurity
- Experience working with a standard sales methodology and supporting tools and applications
- Strong communication skills to listen to the client and articulate back for solutioning
56
Public Sector Privacy & Risk Cyber Senior Associate Resume Examples & Samples
- Intrusion Detection/Prevention Systems
- Participating actively in client discussions and meetings
- Providing candid, meaningful feedback in a timely manner to the Cybercrime team; and
- Keeping leadership informed of progress and issues.This role supports client work contractually requiring US Citizenship and a Secret level Security Clearance
57
Public Sector Privacy & Risk Cyber Manager Resume Examples & Samples
- Firewalls
- Proxy Servers
- Creating a positive environment by monitoring workloads of the team while meeting client expectations and respecting the work-life quality of team members
58
Cyber Defence Analyst Resume Examples & Samples
- 3+ years of Information Security experience in some but not all of the following areas
- Incident Management
- Event analysis
- Penetration testing
- Log Analysis
- Forensics
- Working knowledge of the OSI model
- Must have a thorough knowledge of information security components, principles, practices, and procedures
59
Cyber SME Resume Examples & Samples
- Provide cybersecurity and risk management expertise for various initiatives and programs
- Research, review and report various best practices, industry cyber security developments, standards, and guidelines
- Coordinate with internal and external partners to assess stakeholder needs and increase program congruency
- Hold active DOD Secret clearance or above; DOE-Q clearance preferred
- A Bachelor’s degree with 12 years’ experience in cybersecurity and risk management best practices and Program process management experience
- Demonstrated experience in Project Coordination, serving as a Lead
- Experience with Department of Energy, energy sector organizations, or energy sector associations
- Any of the following certifications and understanding of security controls: CISA, CISSP, GSEC CISM, Security +, PMP
- C2M2 or risk management framework experience and Cyber framework experience NIST 800 XX, NEI 08 09, NRC REG Guide 5.71, NERC CIP
- Writing and analysis skills (Technical papers, Graduate level work)
- Understanding of electrical power generation and distribution players and issues
- 3 or more years direct technical experience with cybersecurity technologies such as firewalls, intrusion detection, intrusion protection or related technologies
- Program or project management
- Strong customer facing experience
- Ability to multi-task and prioritize according to changing circumstances
- Robust interpersonal skills
60
Cyber Defence Engineer Resume Examples & Samples
- Ownership of the firms F5 Application Security Manager (ASM) environment, including, but not limited to, Installation, Implementation, Administration, Content Creation (rules, reports, dashboards, etc…), and Engineering Operations support
- 4+ years’ experience with F5 Application Security Manager (ASM) including, but not limited to, Installation, Implementation, Administration, Content Creation (rules, reports, dashboards, etc…), and Engineering Operations support or equivalent with other WAF tools (ie: Imperva, Citrix, Radware, Trustwave, Akamai, etc..)
- Must have hands-on experience with iRule creation and maintenance, F5 ASM administration, report analysis and providing recommendations of future configurations and iRules
- Exposure \ knowledge of F5 ASM integration with SIEM technologies (ie: Splunk, HP ArcSight, etc..)
- Expert knowledge of SSL Inspection, Access Control, Policy Management, TCP\IP layer 3-7 and general networking structures
- Previous experience as a Network Administrator \ Network Engineer a plus
- Understanding of Network Firewall technologies and operation
- Knowledge of programming languages a plus (ie: Java, .NET, Python, etc…)
- Knowledge System hardening concepts and techniques
- A good understanding of Industry Security standards ( ie: ISO27002, NIST Cyber Security Framework, etc..)
- Operating knowledge of ITIL (ITIL Certification a plus)
61
Advisory Manager Cyber Transformation Resume Examples & Samples
- Serve as a subject-matter resource (SMR) in one or more technical disciplines
- Effectively lead and motivate client engagement teams and provide technical leadership in the assessment, design and implementation of security and IT risk solutions
- Stay abreast of current business and industry trends, as well as developments in advisory services capabilities that are relevant to clients’ environments
- Establish relationships with client personnel at appropriate levels
- Assist with cultivating and managing business development opportunities. Understand EY and its service lines and actively assess/present ways to serve clients
- Coordinate work across different business areas, departments, and work groups. Build and deploy high-performing teams; actively drive great teaming in each assigned role
- Develop cost estimates and implementation plans; support statement of work (SoW) and proposal development activities; achieve operational excellence; deliver profitable growth
- A minimum of 1–2 years of experience in one or more of the following: strategy and governance, risk management, compliance, data privacy, supply chain and technology implementation
62
Manager of Cyber Products & Services Resume Examples & Samples
- Provide technical wording analysis to the entire Cyber team
- Provide education internally and externally on Cyber product/market specific trends, issues
- Oversee the industry verticals within the Cyber team and work in alignment with FINEX and WTW verticals for consistency
- Bachelor’s Degree or higher; JD preferred
- Knowledge and understanding of global marketplace
- Strong leadership and mentorship skills
- Skilled at interfacing with customers, colleagues, and other third parties
63
Cyber Watch Analyst Resume Examples & Samples
- Maintain the body of documentation that describes Computer Network Defense (CND) Watch Support and Incident Response tactics, techniques and procedures
- Receive and analyze network alerts and reports from multiple sources and determine possible causes of such alerts
- Analyze log files from a variety of sources to characterize anomalous activity
- Perform event correlation using information gathered from multiple sources to gain situational awareness and determine the impact of a network attack
- Notify managers and appropriate parties of critical network incidents articulating the event’s history, status, and potential impact
- Support post-mortem analysis of the magnetic and optical media collected from compromised systems
- Active DoD Security Clearance
- A bachelor's degree in computer science or related discipline; or 2 years of related experience. This may be an entry level position
- Familiar with TCP/IP network protocols
- IAT II & CNDSP-IR DoD 8570 compliant by obtaining/maintaining required certifications such as; Security+ CE and CEH
- The ability to multi-task
- Provide quality customer service and problem solving skills
64
Cyber Malware Specialist Resume Examples & Samples
- Model cyber-attack patterns for discovery of new attack vectors
- Provides direction and management of the processing of existing cyber detection capabilities and analytics products
- Directs analytics resources in the delivery of cyber analytic services in line with agreed KPIs and SLAs
- Accountable for delivery of activities to support onsite incident response and forensic activities
- Operates various commercial and open source tools to monitor, detect, and respond to IT security incidents in accordance with key operating procedures
- Perform security event monitoring and correlation, review and analyze SIEM and Syslogs to identify incidents, events, issues, trends, outliers, and summaries
- Identifies and develops threat signatures from all available sources
- Conducts applicable research and analysis to support recommendations regarding cyber threats, threat vectors, threat actors, and threat trends
- 8-10 years of experience working in an information security or IT operations related field in an enterprise environment with experience in computer security or network technology
- Expert knowledge in the field of IT security, incident response, and/or computer forensics
- Excellent analytical skills to evaluate root, cause, and solution of a problem
- Strong knowledge of common software vulnerabilities, attack vectors, and exploitation methods
- Strong knowledge of software reverse engineering techniques, particularly with regards to Microsoft Windows systems
- High familiarity with common software disassemblers, preferably IDA Pro, and of at least one of the following debuggers: WinDBG, OllyDBG, ImmDbg
- Good knowledge of higher-level languages such as C/C++, Java, Objective-C, and at least one scripting language (preferably Python)
- Good knowledge of network protocols, and at least basic knowledge of system administration tasks as well as forensic applications, e.g., EnCase, FTK, Volatility or Rekall
- At least basic knowledge of malware code packing, obfuscation, and anti-debugging methods
- Knowledge of Windows kernel structures is considered a significant plus
- Knowledge of penetration testing techniques is considered a plus
- Knowledge of mobile operating systems, e.g., Android or iOS, is considered a plus
- Fluency in English is required for this position, candidates should also be strong team players and possess excellent communication skills
- Excellent planning, organizing, scheduling, and progress reporting skills
- Excellent teamwork skills to collaborate with a diverse team of skilled systems engineers and cybersecurity professionals
- Ability to work with minimal direction
- Self-Motivated and Pro-Active
65
Cyber Watch Analyst Resume Examples & Samples
- Perform weekly vulnerability audits, submit Plans of Action and Milestone (POA&M)
- Assist with vulnerability management in order to maintain compliance with operational directives
- Conduct malicious file scanning and report findings for identification of potentially compromised systems
- Maintain the certification and accreditation documentation (DoD IA Certification and Accreditation Process / Risk Management Framework) for all specialized network defense systems and software in accordance with applicable DoD policies
- Support the Host Based team in identifying anomalous network and host activity
- Support the Host Based team in weekly analysis of systems to identify vulnerabilities, anomalous host behavior, compromised network hardware and advanced malware
- At least 4 years' experience in Information Assurance
- Demonstrated experience in supporting CND and/or network systems and technology
- Vulnerability scanning experience using Retina and/or Nessus
- Experience with TCP/IP network protocols
- DoD 8570 compliant by obtaining/maintaining required certifications such as; Security+ CE and CEH
- Provide quality customer service with excellent problem solving skills
- Experience with and NIST 800 series requirements
- Experience documenting technical standards and procedures
- Knowledge of Federal computer security policies
- Experience with DIACAP and DoD/DISA security policies
66
Consultant Cyber Resume Examples & Samples
- Partnering with customers to deliver deep insight into the threat status of their networks using Advanced Threat Analytics
- Knowledge transfer to other analysts within the Threat Monitoring and Detection team as well as our peer Incident Response team
- 3+ years deep Active Directory and Windows Credential Management experience
- 1+ years’ experience understanding and mitigating Credential Theft threats
- 3-5 years’ network experience (TCP/IP, Windows networks, network devices)
- 2+ years’ experience working with malware and/or antimalware technologies
- 2+ years’ experience working with vulnerabilities and exploits
67
Lead Cyber Resume Examples & Samples
- Lead and own the Implementation Project and Program delivery
- Implementation of Software, Configuration Changes and Infrastructure as required
- Validating Solutions against Business and Technical Requirements as a Quality Gate
- Testing Solutions and Tracking Defects with the Engineering teams
- Ordering and preparing infrastructure for development, pilot, UAT and production use
- Deploying Solutions into Production while minimizing operational risk to the environment
- Handover to relevant Operations Teams in a controlled and well documented manner
- Understand all the dependencies of projects within the Program and the touch points/dependencies on other bank and third party initiatives
- Negotiating contracts with Implementation Service Providers
- Single Point of Contact into the IT Infrastructure Groups for Implementation topics
- Provide weekly formal submissions for Program reporting
- Partner with Solutions Engineering teams to build and maintain a comprehensive Implementation Roadmap
- Be responsible for ensuring there are clearly defined decision making processes
- Closely partner with the Solution Engineering and Operations teams for seamless handover and interaction between teams
- Actively contribute to the development of sound ideas for to enhance the Information Security posture of the bank
- Influencing, negotiating and facilitation skills, including at Director /Managing Director level
- Be the primary contact for status of Security Solutions Implementation
- Evaluate, appreciate and manage the implications of all technical changes to projects within the Program
- Ensure all Security Projects and Programs are delivered to scope, quality and time
- Background in Financial Services, Banking and IT security
- Strong and proven track record of delivering a variety of complex end-to-end business and Security Programs
- Project and/or Programme leadership and relationship building skills
- Experience of responding to Internal Audit and Regulators (ECB, MAS, SEC etc)
- Budget management of Project and Programs of €20M+
- Proven experience in the field of Project and Programme delivery
- ITIL V3 Certification and Experience
- Prince 2 Practitioner or PMP
- Bachelor's degree in Information Systems, or Computer Science or equivalent
- Good working knowledge of security solutions such as infrastructure security, endpoint security, data security, authentication, intrusion detection and prevention architectures, Identity Access Management, application security, cryptography and network security
- Experienced in using Clarity
- Proven industry experience in the field of IT Development and/or IT Security
- Awareness and understanding of ISO 21500:2012 guidance on project management
- Prefer at least one of the following certifications: Member of the British Computer Society (MBCS) ideally Chartered IT professional (CITP) or comparable , Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), or Certified Information Systems Manager (CISM) or equivalent
- Able to make decisions quickly and outline clearly the rationale behind the decision
- Able to work well in a global team environment and directly influence others teams
- In possession of excellent written and verbal communication skills
68
Public Sector Cyber Icam Manager Resume Examples & Samples
- Supervision and development of staff on multiple projects, business development, and communications with executives
- Utilizing the Identity Management suite of products (CA, SUN, IBM, Oracle) and of their design and implementation
- Identifying and addressing client needs: building solid relationships with clients; developing an awareness of Firm services; communicating with the client in an organized and knowledgeable manner; delivering clear requests for information; demonstrating flexibility in prioritizing and completing tasks; and resolving potential conflicts as a leader
- Performing as a team member: understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback; providing guidance, clarification and feedback to less experienced staff
- Managing a team and/or work stream on an engagement(s), staying educated on current trends and assisting in the development of knowledge capital
- Contributing to business development opportunities and/or engagements from pre-sale and initial scoping through final delivery and sign-off
- Leading teams to generate a vision, establish direction, and motivate team members
69
Cyber Lead-investor Services Resume Examples & Samples
- You will drive a Static Scan Remediation Program across Investor Services and Securities Processing Technology
- You will work across the AD community and the CIB Access Uplift team to remove any blocking items to help deliver this important program of work by the end of 2016
- You will lead the IS and SPT "ASC Team" (Application Security Champion Team) which will provide cyber consultancy across these two technology organizations
- You will work very closely with the IS and SPT TCO organization, focusing on the Cyber aspects of our Technology Controls
70
Cyber Attack Analyst Resume Examples & Samples
- Bachelors Degree (Physics, Applied Mathematics, Comp Science or Statistics preferred) or Equivalent relative cybersecurity experience
- 1-3 years years of experience in a Security Operations Center (SOC) functioning in a Security Analysis, Incident Response, Attack Analysis, or Computer Network Defense capacity in a in a large, mission-critical environment
- Experience in any of the following (minimum 1-3 years, if more then great)
71
Cyber Business Operations Senior Manager Resume Examples & Samples
- Oversee the Cyber Business Operations function, which includes spend management, technology portfolio management, finance & invoice management, service optimization, resource capacity management, controls management, and group logistics
- Manage the metrics & reporting competency for the group for GSS and TLT consumption covering operational, infrastructure, and executive reporting requirements
- Liaise with GSS Planning & Business Management office for aspects financial forecasting, communications, talent management, training & awareness, program management, and business operations
- Work directly with the Global Cyber head and tower leads to facilitate cross functional directives and initiatives to include, but not limited to; strategic planning, process optimization, audit tracking and program definition
- 7+ Years of Information Technology experience
- 5+ Years of direct Business Operations, Finance, or Product Management experience
- Possess a Bachelor's degree or higher in the field of information systems, technology management, business administration, finance or equivalent field of study
- Clear communication capability with the ability to translate cyber security threats from a technical perspective to business-line understanding and execution
- Strong work ethic and motivation with a demonstrated history of ability to lead a team and develop talent
- Well-developed analytic, qualitative, and quantitative reasoning skills and demonstrated creative problem solving abilities
- General technical background surrounding Information Security, IT Operations, Compute Technology, and/or Service Management
- Strong presentation, information design and technical documentation skills
- Demonstrated experience managing a technical service portfolio for optimization
- Ability to anticipate and respond to changing priorities, and operate effectively in a dynamic demand-based environment, requiring extreme flexibility and responsiveness to colleague/client matters and needs
72
Cyber Red Team Lead-VP Resume Examples & Samples
- Network penetration testing
- Application (web, mobile, etc.) penetration testing
- Social engineering (e-mail phishing, phone, physical, etc.)
- Red Team operations
- Strong understanding of networking fundamentals (all OSI layers, protocols, etc.)
- Strong understanding of Windows/Linux/Unix operating systems
- Strong understanding of Red Team and Penetration testing methodologies and tools
- Strong understanding of operating system and software vulnerabilities and exploitation techniques
- Strong understanding of web application vulnerabilities and exploitation techniques, covering the OWASP Top 10 as a minimum
- Strong knowledge of and experience with commercial or open-source offensive security tools for reconnaissance, scanning, exploitation and post-exploitation (e.g. Nmap, Nessus, Metasploit, Burp Suite, etc.)
- Ability to deliver high quality reporting on technical issues identified and providing remediation guidelines
- Master’s Degree in Engineering or Technology related fields a major plus
- CREST Certified Simulated Attack Specialist (CCSAS), CREST Certified Simulated Attack Manager (CCSAM), CHECK Team Leader (Application/Infrastructure), Offensive Security (OSCP, OSCE), SANS (GPEN, GXPN) or equivalent strongly desired
- Knowledge of malware packing, obfuscation, persistence, exfiltration techniques
- Knowledge and experience in using interpreted languages (Ruby, Python, Perl, etc.) and/or compiled languages (C, C++, C#, Java, etc.)
- Experience in developing in house tools / scripts to improve delivery and facilitate testing operations
- Ability to perform targeted, covert penetration tests with vulnerability identification, exploitation and post-exploitation activities with no or minimal use of automated tools
- Well versed in security technologies such as Firewalls, IDS/IPS, Web Proxies and DLP amongst others
- Knowledge of application reverse engineering techniques and procedures
- Understanding of financial sector, or other large organization, security and IT infrastructures
- Ability to articulate and visually present complex penetration testing and red team results
- Ability to work effectively independently and in a team
- Ability to coordinate, work with and gain the trust of business stakeholders to achieve a desired objective
- Strong attention to detail in conducting analysis combined with an ability to accurately record full documentation in support of their work
73
Manager, Cyber / E&O Sales & Operations Resume Examples & Samples
- Assists in development and implementation of the broking and thought leadership strategy
- Coordinates with regional cyber team leaders on
- Strategic vision with the ability to think medium and long term, anticipates future consequences and trends, and incorporate them into the organization’s plans
- Experience in working within the insurance broking business and understanding of the industry and processes
- Technical and financial understanding of insurance / brokerage operations
- Experience, aptitude, and effectiveness in matrix environment
- Strong leadership skills and operational management expertise
- Strong communication and presentations skills
- Working knowledge of relevant federal and state regulations and requirements
- In depth understanding of challenges that face brokerage/ insurance industry and Cyber product in general
74
Cyber Incident Responder Resume Examples & Samples
- Organizational and self-directing skills – ability to initiate, coordinate and prioritize
- Responsibilities and follow through on tasks to completion
- An approach to work that includes initiative, sound judgment, diplomacy and Discretion
- Ability to work independently on a variety of assignments with minimal supervision
- Ability to work without supervision with senior managers, supervisors, VIPs and Users
- Advanced knowledge of scripting knowledge, Malware investigation and remediation, IDS support, Firewall support, Network traffic analysis, SIEM support and log review and URL and web traffic inspection
- Expert knowledge of EnCase, Netwitness and other Forensics tools
- Completion of a Bachelor’s degree or equivalent program in Computer Science, Management Information Systems or similar field is required
- Completion of at least three of the following: GCIA, GPEN, GWAPT, GCIH, GSEC, CCNP, CISSP
- Demonstrates expert problem diagnosis and resolution techniques in the IT environment
- Demonstrates expert knowledge of IT development processes and techniques
75
Cyber CoE Engagement Leader Resume Examples & Samples
- Minimum 8 years of total work experience
- Bachelor's Degree in Computer Science, Information Systems or related technology
- Management Consulting experience
- Demonstrated capability as project manager, technical lead, and solutions architect
- Successful experience in entrepreneurial businesses serving Industrial and Infrastructure Sectors (e.g. Oil & Gas, Energy, Water, Aviation, Locomotive, Healthcare); proven track record delivering successful analytics solutions to Industrial or Infrastructure customers
- Strong influencing, communication and presentation skills
- Business development experience in new regions or new strategic accounts
- Proven experience working with internal and external groups to deliver world-class solution and products
- Ability to embrace and drive change Self-motivated and able to work effectively in a matrixed, globally-based teams
76
Cyber Senior Manager Resume Examples & Samples
- Support the development of new offerings, develop opportunities and manage complex Cyber Risk projects in a people-oriented and mentoring culture
- Manage the delivery of Cyber Risk Strategy based solutions
- Manage project metrics such as financials, utilization and budget expectations
- Develop/maintain productive relationships with client management
- Assist with the development of training, recruiting, and staffing programs, and/or other practice-wide needs
- Develop long-term relationships and networks
- Generate new business opportunities, operate in a matrix environment, and work in a cross-functional team to drive $1-3 million in sales and manage projects and teams that contribute $500K to $2 million in revenue
- Ability to communicate difficult subject matter in a clear and concise fashion is important
- Ability to work with different delivery teams to support Strategy capabilities as part of larger projects is required
- Experience with utilizing and managing offshore teams is preferred
- Motivate others to perform at maximum efficiency without sacrificing quality of the services delivered
- Assist practice leadership in creating proposals, budgets, and workplans. Participate in other business development activities as appropriate
- 10+ years of related work experience in a similar consulting practice or function, servicing cross-industry clients at a national level
- Must have, or be willing and able to obtain, one or more of the following certifications: CISSP
- Five plus years of hands-on experience assisting clients address Cyber Risk challenges
- Solid proficiency in Microsoft Office Suite, Microsoft Word and Microsoft Power Point
- Experience working with client’s to define their vision, strategy and business objectives
- Ability to integrate regulatory requirements into frameworks, methodologies and other Strategy related capabilities
- Ability to be a high-impact player on multiple engagements
77
Cyber Vulnerability Analyst Resume Examples & Samples
- Identify remediation plans for known system vulnerabilities
- Track, prioritize, and monitor closure of vulnerabilities and POA&Ms
- Facilitate responses to FISMA audit requests and other system assessment request (e.g. OIG audits)
- Conduct pre-production assessments including vulnerability scans, web application scans, and code reviews for new releases
- Proactively execute vulnerability scans, web application scans, and code reviews on a defined schedule to identify and remediate vulnerabilities ahead of third-party assessments
- Experience with vulnerability scanning tools required
- Experience with POA&M management required
- Self-starter that can work independently with minimal direction
- Experience with information assurance processes and the NIST Risk Management Framework desired
- Ability to be self-motivated and demonstrate excellent time management and organizational skills
- Ability to write report segments and present research/findings to the team and/or client
- Ability to work both independently and as a member of a team
- Strong initiative
- Prior Big 4/consulting experience a plus
- Work well under pressure, can meet tight deadlines, and is committed to work as and when required to complete projects
- Consulting experience in support of systems development, technical administration or design
- CISSP, CEH or CISA certification a plus
78
Cyber Automation Consultant Resume Examples & Samples
- Compliance scanning using Tenable SC4 and IBM EndPoint Manager
- Vulnerability scanning using Tenable SC4
- Automated custom content development for Tenable SC4 and IBM EndPoint Manager
- Enterprise secure configuration benchmark development using CIS/DISA/USGCB
- 2+ years of experience
- Experience with the following tasks
- Application, Server and Network scanning for vulnerability and compliance. Analysis of the scan results
79
Cyber Policy Specialist Master Resume Examples & Samples
- Experience in areas such as: access control, governance / risk management, privacy / data protection, configuration management, and continuous monitoring
- Strong analytical, organizational, and time management skills
- Ability to drive action to achieve results with minimal direction and lead others
- Keen attention to detail, grammar, and formatting
- Advanced Project, Excel, Word, and Power Point experience
- Strong communication (written and verbal) and issue resolution skills
- Ability to work in a cross-functional team and lead junior staff
- Ability to write clearly, often about complex topics (e.g., process workflows, technology assessments, policy guidance)
80
Cyber Resume Examples & Samples
- Identify opportunities to improve engagement profitability
- Participate in and actively support mentoring relationships within practice
- BA/BS preferred in Computer Science, Computer Engineering, Finance, Information Security, Technology or equivalent work experience
- 3 plus years’ experience implementing PAM solutions
- 3 plus years of technical architecture experience integrating PAM software into clients' infrastructure and applications
- Identity Management familiarity in one or more of the following areas
- Analyze discovered privileged and functional user accounts for risk, ownership and access appropriateness using various analytical tools or platforms
- Installation of CyberArk vault including multiple CPMs and PVWAs
- Creation of policies and reports in PAM solutions
- Provide support to the entire PAM /PIM environment
81
Cyber SME / CND Engineer Resume Examples & Samples
- Minimum Secret clearance
- Strong communicator - complex cyber issues for senior staff
- Organized – ability to work autonomously, drive actions/deliverables, manage multiple people/projects/tasks
- Can be handed technical documents and diagrams on first day and be able to identify issues regarding cybersecurity and recommend fix actions/COA’s for redesigning/remediating
- Candidate must be technical and have an understanding of core cyber tools to include SIEM, vulnerability assessment, infrastructure (firewall, IPS/IDS, proxy, network capture), host based security, penetration testing/external assessment tools, etc
- Strong technical/infrastructure background and a solid cyber foundation
- Experience in the Air Force and specifically supporting Space Command missions is a huge plus
- Computer Network Defense
- SIEM
82
Senior Associate, Cyber Services Resume Examples & Samples
- Operate Governance Risk & Compliance platforms and deliver services, including Policy, Risk, Compliance, Enterprise, Incident, Vendor, Threat, Business Continuity, Audit, and Security Operations Management
- Assist with Quality Assurance/testing of use cases and working with requirements traceability matrices
- Function as a single contributor or in a dynamic team environment as a work stream lead
- Programming with vb.net, ASP.net, java scripts, JSON, SQL Scripts, XML (SOAP, XLST), AJAX, C#, and Perl
- Bachelor’s degree from an accredited college/university or equivalent professional experience
- Prior participation in the solution development process for an internal business unit
- Established self and project management skills to manage deliverables in a timely manner
83
Associate / Senior Associate, Cyber Archer Resume Examples & Samples
- Develop a design and architecture for enterprise or business unit deployment
- Integrate various platforms and applications via automated or manual methods
- Administer the RSA Archer 5.X platform
- Assist with integration, implementation, and administration of systems with solid understanding of the RSA Archer solution
- One year of Information Security experience (with minimum of two years of RSA Archer experience)
- Familiarity with the RSA Archer security structure, data feeds/API, workflow, and process to configure RSA Archer with content data feeds
- Archer Certified Professional certification
84
Associate / Senior Associate, Cyber PAM Resume Examples & Samples
- Support the design and development of PAM solutions that adhere to applicable policies and comply with access management requirements
- Help assist with functionality of Powerbroker, Centrify, e-DMZ, Hitachi ID, and CA ControlMinder
- Identify and communicate findings to client personnel
- Understanding of the implementation and functionality of Privileged Access and Account Management systems and controls
85
Associate / Senior Associate, Cyber Services Resume Examples & Samples
- Develop and configure one or more eGRC/ITGRC platforms, such as RSA Archer, MetricStream, or BWise
- Develop Archer solutions to support one or more of the following: SOX, PCI DSS, ISO 27001/27002/27005, HIPAA, Unified Compliance Framework, Enterprise Risk Management, Vendor Risk Management, Vulnerability Risk Management, Security Operations Management, Business Continuity Management, Audit Management
- Specialize in Archer Data Feeds, Questionnaires, Complex Calculated Fields, Custom Work Flows, Access Controls , Custom Objects , Reports, Dashboards, and I-Views
- Support proposal development, thought leadership, and go-to market activities in the information security domain
- Experience in problem solving, coding, scripting, management and development of applications, and workflow design utilizing the RSA Archer SmartSuite Framework software for integration with RSA Archer’s GRC solution framework
- Three years of Information Security experience (with minimum of three years of RSA Archer experience)
- Experience in supporting and documenting requirements, use cases, analysis, design, development, data integration, and testing of enterprise web applications
86
Associate, Cyber Services Resume Examples & Samples
- Implement one or more of the data protection products, such as Symantec Vontu, McAfee DLP, IBM Guardium, Varonis, Voltage SecureData, or Informatica Dynamic Data Masking
- Support the execution of Information Security and privacy inherent to client engagements
- Help assist with scoping prospective engagements and developing proposals
- Demonstrate integrity within a professional environment, provide guidance to team members, and participate in performing project procedures
- Bachelor's degree from an accredited college/university and one year of work experience in an Information Security role; Master's degree preferred
- Advanced written and verbal communication and presentation skills, teamwork, and client service skills
- Ability and willingness to travel 80% of the time, work in a fast paced, results driven environment, grasp new technology, and contribute at a rapid pace
- Bachelor's degree from an accredited college/university and three years of work experience in an Information Security role; Master's degree preferred
- Strong analytic skills for problem analysis and resolution
87
Director Americas Cyber Bizdev Resume Examples & Samples
- Deliver year over year sales orders growth for the HPS Industrial Cyber Security Solutions business in the Americas and worldwide for partner products
- Effectively lead and manage a team of Cyber Security Business Development and Technology Partner Managers to build sales pipeline, win business and deliver results for this high growth business
- Develop and maintain understanding of our Industrial Cyber Security solutions and service offering and the security we embed in Honeywell Process Solutions (HPS) products
- Understand customers’ business goals, operating objectives and cyber security risks, and marry that understanding with Honeywell cyber security solutions that best meet customer needs
- Develop and sustain strategic relationships with clients at all levels from senior executives to operational personnel that relate to Industrial IT, Networking and Cyber Security, such that Honeywell's Cyber Security Solutions and services become strategic to the client
- Understand competitors’ regional value propositions and go-to-market approaches and lead the Cyber Security Business Development team to develop and execute winning sales strategies
- Manage his/her team to partner with HPS Sales Leadership to map and align Honeywell’s industrial cyber security solutions and capabilities with clients’ strategic and tactical Cyber Security goals and objectives
- Ensure that the value of Honeywell's Cyber Security Solutions are clearly understood by his/her team and effectively communicated to all appropriate IT, OT and executive personnel in the client organizations
- Utilize the regional cyber security operations teams of Solutions Architects, Estimators and Field Cyber Security Specialists to support clients’ cyber security requirements, and the growth of Honeywell's business with them
- Identify, establish and manage global technology and go to market partnerships with leading cyber security vendors
- Minimum 10 years technical sales, sales management and/or business development experience
- Minimum 10 years experience with cyber security, information security, IT, networking technologies, and/or software products and services
- Demonstrated executive presence, influence and leadership having worked with various levels of customer organizations
- Experience with industrial control systems, process control networks, DCS, SCADA and/or industrial automation
- Has interacted with and has business knowledge of HPS customers and their Industrial Process
88
Cyber Assessment & Authorization Engineer Resume Examples & Samples
- BA/BS in Information Systems Management, Computer Science or related discipline plus 3 years of experience. In lieu of formal education, at least 10 years of related experience. Specific contract requirements regarding education and experience will prevail
- Network Devices
- Group Policy
89
Cyber Fusion Analyst Resume Examples & Samples
- Strong understanding of mainstream operating systems & service logs
- Strong programming/scripting experience using Python or similar
- Ability to develop alert prioritization, incident response and handling processes and procedures
- Ability to develop and deliver training content related to newly deployed capabilities to operations personnel
- Ability to work independently and in a cross functional team
- Ability to work with a high level of ambiguity
- Experience with Netflow, Stealthwatch, Threat Connect, Damballa or Arc Sight a plus
- Bachelor's or Master's Degree in Computer Science or related field and 3+ years industry experience in intrusion analysis or response for large-scale enterprise environment
- 2+ years experience with security tools tuning / correlation & analysis
- BS in CS, CE, IT, Sys IE, or EE
- Thorough understanding of the Information Security Common Body's of Knowledge
90
Lead Specialist Advisory, Cyber Services Resume Examples & Samples
- Support the design and development of security solutions that adhere to applicable policies and comply with information security requirements
- Provide support with respect to building, configuration, and architecture of one or more Identity platforms, such as Oracle (11g+) and SailPoint (IdentityIQ)
- Understanding of RBAC methodologies
- Ability and willingness to travel up to 80% of the time, work in a fast paced, results driven environment, grasp new technology, and contribute at a rapid pace
91
Cyber Consultant Resume Examples & Samples
- Understands elements of client financial decision-making; prepares business case (Business)
- Enrolls and coaches executive sponsors in the strategy development process (Business)
- Understands value discipline analysis and applies it to analyze client market-facing orientation and related operational implications (Business)
- Understands practice specific preferred methodologies and associated work products and works in conjunction with internal methodology experts to stay current on methodology enhancements and changes (Methodology)
- Leads a team of 6-10 resources (company, client and third-party resources) in area of expertise to conclusion of a project phase (Management)
- Stays abreast of emerging technologies that are new to the company, clients and the industry (Technical)
- Manages client expectations and balances the needs of the company and the client to ensure satisfaction for both (Relationship Management)
- Participates in proposal efforts and sales calls (Leverage)
- Six or more years of consulting experience with management and/or operations strategy
- Two to six years of additional relevant experience in one or more business or industry specialty areas
- Experience working with client's mission, vision and key performance requirements
- Experience working with several business areas, industry segments and practice areas
- Strong skills in business development and delivery excellence procedures
- Ability to anticipate problems and take decisive action, giving regard to the impact on both the client and the company CSC
- Ability to adjust personal style to different situations
92
Florida Cyber Charter Academy Middle Resume Examples & Samples
- Minimum six (6) months of student teaching experience
- Appropriate state certification
- Ability to travel at least once per month within and between assigned geographic areas to support students, attend regularly scheduled meetings, and participate in school activities, open houses and orientations
- An ability to learn new technology tools quickly (e.g., database and web-based tools)
- Experience working with the proposed age group
- Experience working in a virtual environment
- Ability to quickly learn new technologies and tools
93
Florida Cyber Charter Academy Compliancy Coordinator Resume Examples & Samples
- One (1) year of relevant experience OR
- Organizational and time management skills
- Experience with sampling and auditing practices
- Experience using a student management database
- Professional experience using Microsoft Excel, Word, Outlook and PowerPoint
- Ability to travel up 40% of the time as required by the charters, board members, and Head of School, often with little notice
- Ability to pass required background check including obtaining required fingerprint clearance
- Public school audit experience
- State reporting experience
- Grant management experience
94
Cyber Academy of South Carolina Resume Examples & Samples
- Minimum six (6) months teaching experience
- Appropriate State certification
- Meets state’s NCLB’s Highly Qualified Teacher requirements
- Proficient in MS Excel, Word, and Outlook
- Experience supporting adults and children in the use of technology
- Experience teaching online (virtual) and/or in a brick-and-mortar environment
- Familiar with Blackboard Collaborative or other online platforms
95
Cyber Analytics Payments Integrity Senior Manager Resume Examples & Samples
- Lead the design and development of tools to utilize on Fraud Management engagements
- Lead the preparation and presentation of complex written and verbal materials, including reports, findings, presentations, and project planning
- Supervise, lead, and train junior associates in the aforementioned activities as well as career counseling with junior staff
- Provide input with respect to practice technology initiatives and investments
- Support engagements assisting organizations with optimizing their fraud detection infrastructure
- Lead analytics optimization exercises to find the proper balance between alert generation and staffing levels
- Cooperating with specialists in data mining, business intelligence, and industry experts
- Bachelor’s degree from accredited university
- 10+ years of subject matter experience helping to develop anti-fraud strategies
- Experience in banking, commerce and/or payments
- Operations experience in e-commerce, digital marketing, or mobile payments environment
- Expert understanding of potential fraud and risk issues in a payments organization and digital environments
- Defining and management practices in line with group policy, regulatory requirements, portfolio performance, operational & market risk policies and overall company risk appetite
- Sound background in new technologies, payments innovation, mobile devices and emerging authentication and risk management technologies
- Thorough understanding of global anti-fraud standards, especially for the payments solutions Industry
- Thorough knowledge of enterprise risk management, various risk frameworks and strategic / business planning
- Ability to direct teams in analysing processes and technology for potential fraud
- Demonstrated ability to communicate effectively to all levels of engagement management
- Strong history of formulating and implementing strategy
- Focus to effectively collaborate with leaders across the corporation to identify and address potential fraudulent activity
- Demonstrated ability to provide anti-fraud analytic consulting services
- Proficiency with Microsoft Excel, Word, and PowerPoint
- Professional demeanor and strong communication skills, both written and oral
- Flexibility to travel up to 100%
- Commitment to personal and professional growth, including the development of peers and junior staff
- Sense of responsibility to self, team and client
- Outstanding integrity, initiative, creativity, and passion
96
Info / Cyber Sec Risk Specialist Resume Examples & Samples
- Plays a support role in incident response efforts to include technical investigations, evidence gathering, log event analysis, and stakeholder interviews
- Maintains and updates Information Security policies and procedures, as needed
- Monitors and responds to various alerts utilized to detect potential anomalous activity, and escalates when necessary
- Maintains and updates Information Security risk assessment documentation
- Researches and reports on emerging trends, threats and technologies
- Assists with gathering documentation in connection with internal audits and regulatory examinations
- Performs documentation gathering in connection with system risk assessment program
- Creates management reports in connection with information/Cyber-related security and monitoring activities
- Prepares various reports including vulnerability management reports, End-of-Life management reports, and configuration hardening oversight reports
- Utilizes ticketing system to ensure that logged incidents and/or requests are resolved in a timely fashion
- Assists with preparation of Information Security Awareness training reporting
- Assists with performance of cybersecurity-related risk assessments
- Assists with new security system evaluations
- Assists with integrating information security systems into the environment
- Performs special projects and additional duties and responsibilities as required
- Where applicable and when performing the responsibilities of the job, employees are accountable to maintain Sarbanes-Oxley compliance and adhere to internal control policies and procedures
- Associate's Degree with concentration in computer science or equivalent related work experience
- Three years relevant work experience in business or technology
- CISSP and or CISM, CISA, CCIE certifications are advantageous as well as other Microsoft, Linux, Cisco, or security certifications are preferred
- Knowledge and understanding of current information and cyber security-related threats and risks
- Computer literate with proficiency in Microsoft Office applications
- Excellent written and verbal communication, interpersonal, and organizational skills
- Ability to work both independently and as part of a team to deliver high quality work product in a fast-paced environment
- Ability to multi-task, prioritize projects, and exercise good professional judgment
- Ability to work well with people from different disciplines with varying degrees of technical experience
97
Counterintelligence Cyber Specialist Mid-level Resume Examples & Samples
- Support evaluating current and future cyberspace requirements and capabilities
- Identifying possible improvement opportunities and identifying and characterizing threat actors
- Planning, designing and implementing projects to improve overall cyberspace security/posture
- Cover an extensive range of cyberspace related products and services
- Reviews, evaluates, and provides analysis to CI support to Cyber Operations strategic plans and activities
- Deliver products that are timely, actionable and conducive to protection of critical information
- Prepares and deliver briefings to senior leadership regarding CI support to Cyber Operations
- Good writing skills
- Able to analyze raw data for trends and patterns
- Able to provide logical conclusions through critical thinking
- Basic understanding of cyber forensics
98
Sigint Cyber Discovery Analyst Resume Examples & Samples
- Provide expert analysis and reporting in response to time sensitive requirements for support to Army and Intelligence community customers
- Prepare analytical products and reports in response to requests for information
- 12+ years of analytic and reporting experience for the specific work role or demonstrated education/experience equivalency
- Fully understand all requirements/ qualifications for the work role
- Experience managing a team of analysts in successfully accomplishing team missions
99
Cyber Fires Planning Analyst Resume Examples & Samples
- Minimum five (5) years of Fires/Targeting experience
- Significant experience on or in support of a major staff, i.e.; Joint Staff or CCMD staff
- EDUCATION
- Bachelor’s Degree or higher from an accredited college or university in Information Technology, Computer Science, Computer Engineering, or related discipline Graduate of military IDE
- Master’s Degree may be substituted for two (2) years of relevant experience
- DoD 8570 Level II or CND Information Assurance Certification is required
100
Cyber Info Analyst Resume Examples & Samples
- Bachelor's degree, preferably in Computer Science, Cyber Security, Information Technology, Computer Engineering, or related IT discipline
- Hands-on experience through coursework or intern position
- Ability and obtain and maintain a SECRET Security Clearance
- Willing to live and work in the Huntsville, AL area
- Computer based training system development
- Candidate should be a self-motivated, independent, detail oriented, responsible
- Ability to multi-task& support multiple priorities
101
Cyber Solutions Architect Resume Examples & Samples
- At minimum, must be able to determine project scope and specifications; provide research and analysis to support Cyberspace operations and cybersecurity solutions
- Knowledge of Navy and DoD Cyberspace and Cybersecurity initiatives is required
- The ability to support policy and procedures development and support scenario development for cyber solicitation responses is desired
- CISSP- ISSAP (Information Systems Security Architecture Professional) is a desired
- Retired military or veteran is a plus
102
Cyber Vulnerability Management Resume Examples & Samples
- Oversee the maintenance and continual improvement of vulnerability management infrastructure, initiatives, integration, processes, and technical assessment support
- Be accountable for the vulnerability management process
- Classify and prioritize the risk of new vulnerabilities according to the specifics of our unique environment’s risk level, mitigating factors, and assessment of the impacts of internal and external threats
- Facilitate proactive remediation of new vulnerabilities by collecting information from threat and vulnerability feeds, analyzing the impact/applicability to our environment and communicating applicable vulnerabilities and recommended remediation actions to the impacted teams
- Work closely with both business-oriented executives and leads as well as technology-oriented personnel to ensure adequate processes are in place and actions are being taken to mitigate identified risks proactively
- Provide technical support to system owners to propose mitigation and remediation solutions to identified issues
- Provide input to the department’s leadership for enhancing the information security strategy
- Assist departments across the organization in understanding and implementing security policy objectives in ways that are cost effective, and align with business objectives
- Stay current on security industry trends, attack techniques, mitigation techniques, security technologies and new and evolving threats to the organization by attending conferences, networking with peers and other education opportunities
- Develop expertise to function as subject matter expert in multiple technical or business disciplines; and
- Develops strong partnerships with business clients, application developers, software vendors and other technical resources
- BS in a related discipline and 5+ years of Information Security Experience, working with Vulnerability management tools and security testing
- Strong knowledge of threats and vulnerabilities associated with application and network security
- Sense of urgency to address new technologies being deployed
- Demonstrated ability to work effectively in a challenging environment
- General knowledge of system and network forensic tools and techniques
- CEH, CISSP, SANS, and other security related certifications a plus
- Expert level familiarity with Enterprise Vulnerability Management tools such as Tenable Security Center
103
Cyber Policy Analyst Resume Examples & Samples
- Review requirements for cyber capabilities to ensure appropriateness and adequacy of requirements, de-confliction of development resources, and the plans for development, testing, and evaluation for cyber capabilities
- Develop assessment methodologies for USCBERCOM missions
- Create and maintain paper and electronic files and libraries of strategy, policy, and doctrine documents and meta-data concerning such documents
- Create assigned workflow tasks thoroughly and timely following reporting formats
- Five years of experience with research, analysis, development, and coordination of strategy, policy, and doctrine for cyber operations, at the national, DoD, Service, and command level
- Demonstrated experience contingency and crisis planning functions and operational planning
104
Cyber System Exploitation Engineer Resume Examples & Samples
- Experience teaching technical computing concepts at the institutional and/or collegiate level
- Experience contributing in the open source community, examples include, published tools, reports, publications, repositories, etc
- Hands on technical experience installing, operating, and maintaining systems
- Experience reverse engineering software and hardware, analyzing malware, statically and dynamically, or managing such similar projects
- Experience in forensics, including computer forensics, memory forensics, network forensics, forensic data analysis and mobile device forensics or managing forensics projects
- Experience conducting legally sound forensic analysis and creating legally attestable digital forensic documents
- Experience attributing attacks based on forensic evidence and analysis
105
Cyber Solution Architect Resume Examples & Samples
- A minimum of a Bachelor’s degree from an accredited college or university in Computer Science, Engineering, or an analytical field (or equivalent experience)
- Ten (10+) years of related experience
- Must be able to determine project scope and specifications
- Provide research and analysis to support Cyberspace operations and cybersecurity solutions
- The ability to support policy and procedures development and support scenario development for cyber solicitation responses
- Knowledge of DOD and Federal Cyberspace and Cybersecurity initiatives
- Knowledge and experience in proposal development and preparation, developing Basis of Estimates, understanding of contract documentation, technology roadmaps, concept of operations, and program plans are all a plus
106
Cyber Internal Threat Analyst Resume Examples & Samples
- Monitor real-time incidents, perform additional data analysis to validate infraction, access business impact and escalate to internal/ external support teams to enable issue resolution
- Interact with security and risk officers across center and lines of business to resolve and mitigate issues
- Apply enterprise lens & risk based thought leadership while crafting solutions
- Inventory of current state controls & policies against tools & ownership mapping
- Review/participate in monitoring tool development; participate in testing and POC efforts
- Document and maintain insider threat alerts, procedures, analysis and investigations accurately
- Acquire and constantly increase subject matter expertise in insider threats, understanding competitive positioning for Fidelity
- Engage investigative computer forensics where required, continuously enhancing Fidelity’s Insider Threat detection program
- Bachelor degree in IT or related discipline
- 1-2 years of information security experience analyzing patterns of non-compliance and recommending appropriate actions to minimize security risks and insider threat
- Experience with Guardium, Securonix and/or DLP solutions would be a plus
- Experience / familiarity in alert review and triaging
- Understanding of Information Technology and Information Security concepts (System Entitlements, Application Security, Privileged Access, Database Administration)
- Familiarity in creating and maintaining policies to identify potential insider threat and/or data leakage activity
- Strong technical and data analysis skills using security analytics tools
- Excellent communication skills and collaboration
- Collaborative, team player focused on timely execution
- Outstanding customer service
- Self-starter with strong interpersonal and problem solving skills
- Adapt and champion positive team culture
107
Cyber Program Manager Resume Examples & Samples
- Requires flexibility and the ability to quickly adapt within a dynamic environment and handle multiple project effectively to ensure Cybersecurity processes and technology are deployed within CTR with a consistent and informed view of risk
- Manages deliverables pertaining to CTR global Cybersecurity reporting
- Ensures that CTR global Cybersecurity initiatives and processes are successfully and consistently implemented globally with an informed view of risk and available options
- Partners closely with CTR sub lobs to manage project deliverable expectations
- Leads progress status meetings at the operational and project level
- 7+ years Cyber Security or IT Risk experience, including 3+ years experience with Technology Control functions
- 5+ years experience with project management processes; including project planning, issue management, risk management, resource tracking and management score-carding
- 3+ years experience with Operating System Security and Distributed Security
- Broad technical knowledge of Cybersecurity is required; Data Protection & Privacy disciplines are a plus
- Must have a high degree of technical expertise to interface with technology stakeholders and recommend CTR Cyber based process improvements
- Strong analytical and problem solving skills are required
- Knowledge of Access Administration functions and cybersecurity toolsets,
- Strong knowledge of technology risk management and industry best practices
- Strong written and verbal presentation skills to a wide variety of senior managers across the organization and proven track record of influencing and leadership skills
- Proficient experience with MS Excel and Access is required
108
Cyber Vulnerability Analyst Resume Examples & Samples
- Conducts vulnerability assessment of Vanguard internal infrastructure and perimeter
- Performs network and web application ethical hacking assessments on the infrastructure and application systems. This involves performing penetration testing or vulnerability assessments of web applications, networks, wireless implementations firewalls and other endpoints or services. The analysis includes recommendations on how to improve the security of vulnerable systems
- Performs both manual and automated pen testing and vulnerability techniques to discover attack vectors
- Configures network scans, schedule network scans to run within allowable time frames, and ensure accurate vulnerability assessment results are generated and made available to appropriate personnel
- Produces actionable reports on security testing results with recommendations
- Works collaboratively with other cyber crew member on research projects that involve event analysis to complex exploit point analysis
- Compiles and executes emulated malware to validate attack vectors and risk assignments
- Works with internal Vanguard managers to define application changes, negotiate priorities and implementation dates, agree on service level standards, and 'partner' for success with regards to predefined remediation mandates
- Updates Risk tracking system with vulnerabilities risk rankings
- Bachelor's degree or equivalent experience required
- Five years of experience performing vulnerability analysis, Information Assurance analysis, or Red Team penetration testing against operational computer networks including experience in Windows Security, Network Security, Linux/Unix Security, Database security, or Mainframe Security
- CEH and CISSP required
- Must have technical knowledge to validate any finding that automated tools alert or find
- Experience with Vulnerability Management tools like Qualys or Nessus
- Experience with Web Application Pen testing
- Experience architecting, writing and compiling simulated malware code to validate vulnerabilities and compromise complexity
- Experience with Data Loss Prevention solutions like Digital Guardian, McAfee or Symantec
- Demonstrates excellent communication skills, analytical ability, strong judgment, and the ability to work effectively with others
- Demonstrated ability to understand strategic objectives and vision, and work towards those goals
- Demonstrated ability to remain calm and professional while working in a high pressure incident situation
109
Senior Product Cyber Resume Examples & Samples
- Support the establishment and dissemination best practices for the creation of secure systems, the implementation of techniques that are free from logical design and technical implementation flaws
- Support the capture of key requirements and performance metrics, identify and down select cyber security technology options; architecture design, implementation, integration and testing of the proposed solutions
- Stay updated on latest cyber security technologies and methodologies including
- Knowledge of the state of the art in security analysis tools and various product cyber security safeguards
- In-depth experience and knowledge of threat modeling and systematic discovery of threats, as a part of SDLA
- Knowledge of security vulnerabilities and safeguards at the embedded layer and system layer
- Experience with product development and stage-gate processes
- Knowledge and experience in various security protocols such as HTTPS, TLS, IPSec
- Implementation experience of encryption standards such as RSA and AES and various cryptographic elements
- Superior communication skills required. Adept at communicating with globally disperse cross functional teams of design, marketing, service, manufacturing, aftermarket and R&D, including non-native English speaking team members
- Knowledge of the Java & C languages
- Knowledge of software development methodologies and the software development lifecycle
110
Cyber Resilience Resume Examples & Samples
- Participate in training efforts
- Be an active member and have visibility in professional & civic organizations
- Make meaningful contributions to the development of new and improved industry based solutions and methodologies to grow the practice
- Minimum of three yearsof information security experience in one or more of the following areas: ITsecurity, incident handling and response, exploit analysis, networkintelligence gathering, digital forensics methods and procedures
- Familiar with one ormore of the following forensic security tools: EnCase Forensic, EnCaseEnterprise, AccessData FTK, HBGary, Volatility, SANS SIFT, Bit9, InternetEvidence Finder
- Solid organizationalskills with the ability to multi-task various initiatives and activities including the ability to document and explain technical details in aconcise, understandable manner
- BA/BS in information technology, business administration, orrelated field preferred
- Prior Big 4 or other relevant consulting experiences desired
- Willingness to travel extensively
111
Cyber Counter Measures Analyst Level Resume Examples & Samples
- Creation and implementation of custom Proxy, HIPS, NIPS, and/or DLP rule sets in order to further protect the enterprise
- Creation and implementation of custom alerting rules in SEIM and disperse Logging infrastructure that will feed into a Cyber Security Operations Center for review and investigation
- Ability to review proposed firewall, proxy, and other network infrastructure changes in order to determine the most restrictive rules, while still fulfilling the needs of the business
- Leveraging sound IT knowledge to identify/respond to common attacks through common vectors and methods with support from senior team members as needed
- Gathers structured data for the purposes of metrics and reports
- Implementation of technical responses to identified Indicators of Interest in Security tools related to cyber-attacks to aid in blocking or alerting on future activity
- Ability to participate in cyber investigations while maintaining integrity of evidence
- Ability to review cyber/digital evidence and make inferences about possible outcomes / motivations
- Ability to competently describe and document system functionality, problem areas, and feature gaps in new and existing analytical tools
- Actively attempts to enrich team value by sharing knowledge
112
Cyber Program Analyst Resume Examples & Samples
- Cyber Program Analyst will coordinate activities and briefings across multiple Army programs (PEOs/PMs/PdMs) in support of cyber and force development activities
- Communicate and work well with others in a dynamic team environment while sitting at the customer site
- Coordinate defense architectures with Army programs
- Prepare presentations for senior staff
- Cyber Program Analyst will be involved with coordinating, synchronizing, and integrating capabilities, resources, and requirements focused on enhancing cyber security and resiliency across materiel developments and missions
113
Cyber Program Manager, Lead Resume Examples & Samples
- 7+ years of experience with serving in a lead role, including as a supervisory or program manager and managing tasks, schedules, resource allocation, and communication with key stakeholders
- 7+ years of experience with strategic IT security planning
- 3+ years of experience with developing and presenting formal presentations and executive summaries to senior management
- Experience with core PM tools, including Microsoft Project, SharePoint, Microsoft Office, and Basic Programming
- BA or BS degree and 3 years of experience with ISSP or 9+ years of experience in Information Systems Security Program (ISSP) operations
114
Cyber International Engagement Planner Resume Examples & Samples
- 6+ years of experience with Cyber or planning
- 6+ years of experience with planning and integrated employment of Cyberspace capabilities
- 6+ years of experience with international engagement and security cooperation
- Ability to demonstrate analytical expertise at the strategic and operational command
- Ability to travel as necessary within Europe and the US
- Experience with working in EUCOM AOR
115
Cyber Response Planner Resume Examples & Samples
- 15+ years of experience with working in Navy IT, DoDIN, and Cyberspace strategic and operational environments
- 7+ years of experience with working in DoD IT, DoDIN, and Cyberspace tactical environments
- 5+ years of experience with developing operational-level major incident Rapid Response Plans or Cyber Playbooks
- 5+ years of experience with developing standard operating procedures (SOPs)
- 3+ years of experience with DoD Cyber planning processes
- Active TS/SCI clearance with a polygraph
- BS degree or 10+ years of experience in Cyber in lieu of a degree
116
Cyber SME Resume Examples & Samples
- Experience with instructor and Instructional Systems Development (ISD)
- Knowledge of defensive and offensive Cyber operations effects
- Knowledge of defensive and offensive Cyber TTPs
- BA or BS degree and 7+ years of experience with Cyber operations
- Ability to obtain an instructor certification
- Graduate of an Air Force or Joint Cyber Operations Formal Training Course or completion of applicable courses taught by the IO and Cyber FTU
- Experience with at least one of the following instructor SME-related areas: Internet Protocol (IP) networks, wired and wireless networks, telephony networks, Industrial Control System (ICS) networks, space networking and control, Integrated Air and Missile Defense Systems (IAMDS) networks, Tactical Data Link (TDL) networking, or network and signals intelligence
- Possession of excellent research and analytical skills
- Commercial Cyber Certification commensurate with DoDI 8570.1m - IAT Level II
117
Cyber Requirements Program Analyst, Senior Resume Examples & Samples
- 5+ years of experience with successfully leading large and complex information technology programs
- Experience with Air Force and DoD staffing processes
- Experience with the Microsoft Office Suite of applications and productivity tools
- Knowledge of DoD network infrastructure, including the Non-classified Internet Protocol Router Network (NIPRNET) and Secret Internet Protocol Router Network (SIPRNET)
- Knowledge of ABSS, CRIS, and WAWF applications and productivity tools
- Experience with the Air Force Cyberspace Weapon Systems
- Experience with Headquarters Air Force Space Command
- Experience with Weapon System Sustainment processes
118
Cyber Application Engineer, Senior Resume Examples & Samples
- 10+ years of experience in supporting information assurance activities in a DoD environment, including DITSCAP, DIACAP, and RMF
- 5+ years of experience with designing, deploying, and maintaining enterprise Web application technologies in DoD environments
- 3+ years of experience with designing, deploying, and maintaining database information systems that handle personal identifiable information (PII)
- Knowledge of industry best practices for designing, implementing, and maintaining network security and service availability throughout the system life cycle
- 8570 IAT Level III CISSP, CASP, CISA, GCIH, and GCED Certification
- Experience with supporting a DoD agency
- Possession of excellent client service skills
119
Cyber Mobility Engineer Resume Examples & Samples
- Experience with configuring, troubleshooting, and testing wireless networks using 802.1X authentication, including RADIUS or TACACS authentication servers and with capturing, analyzing, and interpreting raw network traffic
- Knowledge of layer 2 and layer 3 technologies, including Ethernet, VLAN, bridging, STP, 802.1q, 802.3ad, TCP/IP, DHCP, and MPLS, SNMP, HTTP, Linux, UNIX, or Mac OS X and Windows operating systems
- Knowledge of cryptography, including protocols, such as IPSec, TLS, key exchange protocols, and key or certificate management solutions
- Ability to program techniques to evade network-based intrusion detection systems
- Experience with mobile integrity checking solutions, including Fixmo Sentinel
- Experience with reviewing and correlating logs and other artifacts from network security devices, appliances, and applications, including ePolicy Orchestrator (ePO), Splunk, ArcSight, Proxy servers, firewalls, threat management appliances, such as FireEye or McAfee, and tcpdump or Wireshark
- Experience with red or blue teaming exercises of national security systems
- Knowledge of WIDS or WIPS technologies, VPNs, firewall theory, and packet analysis principles and techniques applied in securing operating systems and LAN or WAN networks
- Knowledge of wireless and mobile attack or exploitation techniques
- CWNA, CWSP, CWAP, CWDP, CWNE, ACMA, ACMP, CCNA, CCNP, CCNA Wireless, or CCNP Wireless Certification
120
Cyber Mobility Engineer, Senior Resume Examples & Samples
- 10+ years of experience in interacting with clients, deploying on collection missions
- 10+ years of experience with performing technical analysis and preparing technical analytic reports
- BS degree in Engineering, CS, IT, or a related field preferred; MA or MS degree in Engineering, CS, IT, or a related field a plus
121
Cyber Engagement Leader Resume Examples & Samples
- 12+ years of experience with leading the implementation of complex Cyber architectures solutions for federal or commercial clients, including defining, establishing, and leading business development and solution delivery
- Experience with delivering solutions in threat intelligence, Cyber analytics, incident response, and Cyber operations
- Experience with the development of new products, service offerings, and game-changing innovations in the Cyber domain
- Experience in business development and delivery with a focus on market aligned organizations
- Experience with leading proposal work and responding to RFPs
- Experience with mentoring, developing, and managing highly productive leaders who can win new business, develop technical solutions, and lead large-scale, complex captures and proposals
- Knowledge of information system life cycles and the functional expertise to tailor solutions to meet client Cyber solution requirements
- Ability to align solutions with business needs, create innovative approaches to address client requirements, and build collaborative internal and external relationships
- Experience with the Cybersecurity area in federal and commercial financial services
- Experience with leading teams and developing staff
- PMP or CISSP Certification preferred
122
Joint Cyber Center Intelligence Analyst, Mid Resume Examples & Samples
- 5+ years of experience with Cyber analytics and writing intelligence assessments, including researching, organizing, collaborating, analyzing, writing, reviewing, coordinating, and disseminating intelligence products
- 5+ years of experience with assessing adversary capability and intent against USSTRATCOM missions and Cyber Key Terrain
- 5+ years of experience with supporting deliberate and all aspects of crisis action planning and conducting the Cyber portions of JIPOE, including System of System Analysis (SoSA)
123
Cyber Long Range Planner Resume Examples & Samples
- 5+ years of experience with planned and integrated employment of Cyberspace capabilities
- 5+ years of experience with JOPP and JIPOE
- 5+ years of experience with planning
- Experience with integrated Joint technical operations planning
- Experience with the EUCOM AOR
- Possession of excellent analytical skills at the strategic and operational level
- Graduate of a Joint Cyber Operations Planners Course (JCOPC)
124
Sigint Cyber Discovery Analyst, Mid Resume Examples & Samples
- 8+ years of experience with SIGINT
- Knowledge of Hacker TTPs
- Knowledge of packet analysis
- Knowledge of applicable SIGINT databases
- SIGINT Certification
- CEH or related Certification
125
Cyber Hunt Specialist Resume Examples & Samples
- 8+ years of experience with assessing APT threats, attack methodologies, forensics analysis techniques, malware analysis, attack surface comprehension, and Cyber hunt operations and research, identification, and verification of new APT TTPs
- Knowledge of Cyber hunt operations, Security Operations Center (SOC) support, and coordination with security teams to strengthen the overall security posture to develop mitigations, including signature development and working with incident management teams to better design and implement signatures and response policies and procedures
- MS degree in CS, Information Systems Management, Information Security, or Engineering
- CEH, CISSP, CAP, SANS GSEC or GCIH, CCNA, or Security+ Certification
126
Cyber Response Analyst Resume Examples & Samples
- Experience with Army operational and exercise planning methodologies
- Experience with incident response methodology in investigations and the groups behind targeted attacks and tactics, techniques, and procedures (TTPs)
- Knowledge of system administration, network engineering, and security engineering
- Ability to perform analysis with close attention to detail and display solution orientation to learn and adapt quickly
- Ability to lead and serve in a team to complete the mission and work well under pressure to rapidly scope and investigate incidents
- Ability to apply originality and creativity in problem solving
- Ability to be a self-starter, quick learner, and detail oriented
- Possession of excellent oral and written communication skills to communicate effectively under normal and stressful situations
- BA or BS degree in Engineering, CS, Information Security, or Information Systems
127
Enterprise Cyber Site Lead Resume Examples & Samples
- Experience with developing requirements
- Experience with core Cybersecurity operations
- Experience with software delivery, including Cybersecurity COTS tools
- Experience with federal agencies and key players in the federal network environment
- Knowledge of the collective federal Cybersecurity policies issued by OMB, DHS, and NIST
- Knowledge of system accreditation and authorization, risk management framework, and FedRAMP
- Experience with networking, system administration, GSS, and shared services, including hands-on Cybersecurity partnering or supervising and directing these positions
- BA or BS degree in an IT or business field
- Project Management Professional (PMP) or Certified Scrum Master (CSM) Certification
128
Cyber Policy Analyst Resume Examples & Samples
- 2+ years of experience with working in a Cybersecurity role
- Experience in working with Cyber, intelligence, IT, and critical infrastructure policy and standards
- Experience with developing Cyber strategies
129
PIT / ICS / Scada / Cyber Planner Resume Examples & Samples
- Experience with developing CONOPS, CONPLANs, OPORDs or OPLANs, fragmentary orders, execute orders, other MDMP and JOPP planning products, and policy and doctrine
- Experience with analyzing and contributing to Joint and Army Cyberspace operations and CO-related PIT, ICS, SCADA, OT, Cyber-physical system, critical infrastructure policy, plans, strategies, orders, and concepts
- Knowledge of the Army Cyberspace operations enterprise and DoD CO stakeholders
- Knowledge of current CO and PIT, ICS, SCADA, and OT guidance, including PPD 21, tactics, techniques, and procedures (TTPs), and emerging Joint and Army Cyberspace doctrine
- Experience in coordinating Cyberspace operations with other Army, DoD, and National Agencies
- Knowledge of USSTRATCOM, USCYBERCOM, HQDA, and Joint Staff processes and procedures
- Knowledge of CO-related Defense Industrial Base (DIB) efforts and Cyber resiliency efforts
- Security+, CASP, CEH, or CISSP Certification
- Completion of the Basic Computer Network Operations Planners Course (BCNOPC), Army Cyber Operations Planner Course (ACOPC), or similar courses
130
Cyber Policy & Doctrine Analyst / Planner Resume Examples & Samples
- Experience with developing CONOPS, CONPLANs, OPORDs, OPLANs, FRAGOs, EXORDs, estimates, mission analyses, COAs, or other MDMP and JOPP inputs and outputs
- Knowledge of all principal Joint and Army Cyberspace operations (CO)-related policy, doctrine, statutes, regulations, directives, C2 guidance, and strategic-level operational plans, orders, and concepts
- Knowledge of the Army Cyberspace operations enterprise and the DoD CO enterprise
- Knowledge of current Cyberspace operations tactics, techniques, and procedures (TTPs) and emerging Joint and Army Cyberspace doctrine
- Knowledge of USSTRATCOM, USCYBERCOM, HQDA, and Joint Staff (JS) processes and procedures
- Knowledge of Global Force Management Implementation Guidance (GFMIG)
- Completion of the Army Cyber Operations Planner Course (ACOPC) or its predecessor, the Basic Computer Network Operations Planners Course (BCNOPC)
131
Cyber O&M Lead Resume Examples & Samples
- 6+ years of experience with information security and technology management, network operations, IT strategy development, Cybersecurity, or computer forensics
- 2+ years of experience as IT management or leadership in a US federal government operating environment
- Knowledge of federal legislation, regulatory guidance, and best practices for Cybersecurity and data protection, including NIST 800-53 and NIST 800-37
- Information Assurance and Cybersecurity Certification, including Certified Information System Security Professional (CISSP)
132
Cyber Planner Resume Examples & Samples
- 7+ years of experience in working with DoD IT, DoDIN, and Cyberspace
- 7+ years of experience with working in strategic and operational environments
- 5+ years of experience with tactical environments
- 5+ years of experience with revising DoD Joint planning doctrine and processes
- BS degree or 10+ years of experience in a professional work environment in lieu of a degree
- Experience with developing organization and regulations manuals, including MILDEP organization and regulations manuals
- Experience with developing Cyber OPORDs, CONOPs, CONPLANs, EXORDs, and FRAGORDs
- Experience with EW, IO, SIGINT, space, DoD Information Network (DoDIN), Defensive Cyber Operations (DCO), or Offensive Cyber Operations (OCO) operations and planning
133
Cyber Incident / Forensics Analyst Resume Examples & Samples
- Identifies vulnerabilities; participates in the development of recommendations for remediation
- Identifies and collects intrusion data
- Participates in the analysis of log files to identify and collect artifacts related to security incidents; analyzes malicious activity to determine weaknesses, methods of exploitation and effects on systems and information
- Participates in the analysis of threat information from external sources
- May participate in determining whether a security incident requires legal action
- Must be to work on-call rotation as needed
- Typically requires a bachelors degree in a related discipline and two or more years of progressive professional experience in cyber security or a related field. Equivalent professional experience may be substituted in lieu of education
- Must demonstrate a general understanding of cyber security incident and forensics analysis principles, theories, concepts and techniques
- Must have experience organizing, planning, scheduling, conducting, and managing work assignments to meet project milestones or established completion dates
- Must possess the ability to understand new concepts quickly and apply them in an evolving environment while contributing to the development of new processes
- Must be customer focused and possess: (1) the ability to identify issues, analyze data and develop solutions to a variety of technical problems; (2) good analytical, verbal and written communication skills to accurately document, report, and present findings; (3) good interpersonal skills enabling an effective interface with other professionals; and (4) good computer skills. Ability to work independently or in a team environment is essential as is the ability to work extended hours as required
134
Cyber Operation Planning Resume Examples & Samples
- Active DoD TS/SCI clearance and eligible for C/I Polygraph
- Experience in network and/or computer network defense operations
- Experience with planning and developing Operational Plans at an organizational level
135
Cyber Incident Handling Manager Resume Examples & Samples
- 10 or more years in IT Security and Computer Network Defense (CND) Incident Response experience
- 5 or more years in IT Security and CND Incident Response experience in DOD or IC
- Demonstrate expert-level knowledge in planning, directing, and managing Computer Incident Response Team (CIRT) operations
- Demonstrate expert-level knowledge of industry accepted standards, response actions and best practices related to CIRT operations
- Demonstrate a successful track record on delivering on time and within budget for with large/complex projects
- Demonstrate experience with researching and fielding new and innovative technology
- CEH or GCIH certification required
136
Cyber Detection & Prevention Infrastructure Engineer Resume Examples & Samples
- At least 6 years experience deploying various network defense tools (ie. IDS, IPS, Packet Capture, Flow, Session, SEIM, Proxy, Web Content Filtering, SSL Decryption)
- Demonstrate knowledge of modern solution development techniques and test principles, processes, and procedures
- Demonstrated knowledge of industry accepted standards and best practices related to demonstration, pilot, and test management and operations
- Demonstrate ability to implement, administer, configure, troubleshoot and maintain network security devices
- Demonstrate experience with “cloud” technologies such as infrastructure as a service, platform as a service, and software as a service
- International Software Testing Qualifications Board (ISTQB) or equivalent certification
- 10 or more years IDS experience with 5 years in DoD or IC
137
Cyber Siem Lead Resume Examples & Samples
- Advanced experience administering and maintaining a large enterprise ArcSight implementation
- Troubleshoot issues with ArcSight ESM, Logger, and SmartConnectors
- ArcSight Certification
- 8 or more years ArcSight IDS experience with 4 years in DoD
- Take requirements from customers and analysts and implement necessary changes improvements to the ArcSight infrastructure
- Develop future ArcSight Implementation capabilities that include a robust, resilient deployment that captures host based as well as network based traffic for analysis
- Incorporate storage capabilities to support DOD log retention requirements
- Develop future capabilities that incorporate virtual technologies without impeding operational capabilities
- DoD 8570 IAT Level II CND Analyst certification
- Bachelor’s degree in an IT related field, or equivalent experience
- DoD 8570 Compliant for IAT II CND Auditor and possess an approved an approved Computing Environment Certification
138
Technical / Cyber CI Analyst Resume Examples & Samples
- Perform technical vulnerability and risk assessments
- Prepare analytical and technical reports and publications, create graphics, provide client ready material, and be the primary writer of this material
- Support decomposition of government missions relating to critical infrastructure protection
- Perform independent assessment of technical projects
- Support development of strategic plans and methodologies
- Review documents, including standards and policies, for technical counterintelligence concerns
- Identify, document and recommend mitigations to security events of technical CI significance
- Document requirements and drive application of technical CI practices
- Conduct assessments of technical requirements and system architectures and document the results
- Report changes, trends and implications of evolving technical counterintelligence issues
- Integrate research results and analysis into standards and policies
- Establish liaison with Government agencies
- Bachelor’s degree in Engineering, Computer Science, Information Systems, or related technical discipline and 12 years related experience. M.S. preferred
- Knowledge of commercial and/or military telecommunications systems and networks
- Knowledge of technical surveillance and countermeasures mission and methodologies
- Must be capable of conducting independent technical research, as well as, work with team members and partner agencies
- Must be able to develop technical reports geared toward a senior technical audience and executive-level reports of technical information
- Must possess excellent verbal and written communications skills, and have experience in developing reports and briefings
- Demonstrated creativity, innovation, flexibility, and analytical skills in problem solving are also desired
- Security Clearance: Active TS/SCI with polygraph security clearance is required to be considered for this position
139
Cyber Systems Deployment Specialist Resume Examples & Samples
- KMI Operating Account Manager (KOAM)
- Active Secret Clearance (TS preferred)
- Information Assurance Technical (IAT) Level 1 in Windows Operating System
- A High school degree and three years of experience installing networked C4I systems
- One year experience as an EKMS Manager or EKMS Installer
- 1 year experience installing information technology systems at Navy Sites or Afloat is preferred
- Experience with meeting requirements outlined in the SPAWAR Shore Installation Process Handbook preferred
140
Technical & Cyber Threats Analyst Resume Examples & Samples
- Support the development, oversight and continuous refinement of technical and cyber counterintelligence programs across the U.S. Government to assist in ensuring the processes, resources, capabilities, and service offerings meet core objectives as established through national policies, to include performance measures to better evaluate effectiveness of technology impact to defensive and offensive counterintelligence activities
- Support technical counterintelligence program management efforts across the U.S. Government to ensure efforts support Intelligence Community and CI related Directives, policies, guidelines, and procedures to create an integrated and effective enterprise that supports the U.S. government and national interests
- Develop and maintain innovative methodologies, performance measures, program management solutions, and uniform approaches to ensure that counterintelligence elements work collaboratively to meet the needs of the President, and all who make and implement U.S. national security and economic policy including partners in law enforcement, homeland security, military and defense, intelligence, and international relations
- Support substantive review of a heavy volume of written material, and prepare or contribute to written and verbal products such as congressional testimony or responses to queries, senior-level issue papers or briefings, and letters and memoranda
- Analyze business and technical requirements and create high-level technical architecture and design
- Develop processes and procedures to properly manage requirements to include interdependency between requirements
- Solicit requirements and user stories through interviews, workshops, workflow analysis and/or existing systems documentation or procedures
- Develop project plans and communications documents, conduct analysis of alternatives, and develop white papers, roadmaps and case studies
- Develop concept of operations, requirements, high-level architecture and other system documents
- Bachelors Degree and a minimum of 10 years in positions of increasing responsibility and demonstrated experience in cyber mission areas, to include computer engineering, systems engineering, computer science, telecommunications, information technology, information security/assurance, and/or computer network operations
- Currently possess an active TS/SCI Poly
- Experience within an Intelligence-focused operational environment (defense, national security, and/or law enforcement)
- Experience drafting documents on systems operations, functional requirements, processes and methodologies
- Demonstrated leadership and strong initiative
- Experience translating and communicating complex subject matter between technical and non-technical audiences
- Ability to work effectively under time constraints and potentially changing priorities, while maintaining a high level of attention to detail
- Knowledge of cloud-based technologies including Hadoop, Pig and Hive
- Technical understanding of Amazon Web Services and other USG or emerging cloud frameworks
- Knowledge of counterintelligence and identity intelligence issues
141
Cyber Developer Resume Examples & Samples
- Must have a Bachelors degree with a minimum of 2-5 years of professional development experience, or if no degree must have equivalent experience/combined education (8-13 years of experience)
- Understanding of mobile protocols
- Reverse engineering of mobile operating system components
142
Cyber Developer Resume Examples & Samples
- Must have a Bachelors degree with a minimum of 5-9 years of professional development experience, or if no degree must have equivalent experience/combined education (13-17 years of experience)
- Understanding of Windows development
- Ability to navigate and control Windows networking stack
143
Cyber Developer Resume Examples & Samples
- Linux development experience (C, C++, Python)
- Understanding of Linux internals
- Low-level familiarization with Linux file systems
144
Cyber Developer Technical Lead Resume Examples & Samples
- Strong software development background (C/C++)
- Understanding of the Computer Network Operation (CNO)/Computer Network Exploitation (CNE) mission space
- Solid technical leadership experience in a Development Team Lead or Chief Architect type role
- Previous low-level code development experience
- Understanding of vulnerability analysis tools (IDA Pro, WinDbg, Ollydbg, ADB, JTAG, Wireshark, etc…)
- Knowledge of Operating System (Windows, Linux, Mac, etc…) internals
- Experience setting up and running innovation workshops
145
Cyber Project Planning Engineer Technical Specialist Resume Examples & Samples
- They must have demonstrated experience with
- Providing direct customer support
- Systems Engineering and the Systems Engineering Life Cycle (SELC)
- Planning Projects to include tailoring overall project milestones as well as preparing for and assessing readiness for Gate Reviews
- BS degree in technical field Masters degree a definite plus
- 5+ years of Project Planning experience
- 5+ years of systems engineering experience
- Certification preferred in one of the following: CISSP PMP ITIL CSEP or ESEP
146
Cyber Resume Examples & Samples
- TS/SCI with Poly required
- Proven record of effective analytical tradecraft
- Proven record of effective technical writing and oral communication skills
- Ability to present large data sets and technical information concisely, precisely and clearly
- Ability to multitask and produce high quality products under tight deadlines
- Ability to work both individually and in a team environment with limited oversight
147
Cyber Incident Analyst Resume Examples & Samples
- This requisition may be filled at either a level 2 or a level 3. Basic Qualifications for a Cyber Incident Analyst 2 is a Bachelor's Degree with 2 years experience OR 6 years experience in lieu of degree. Basic Qualifications for a Cyber incident Analyst 3 are Bachelor's Degree with 5 years experience OR 9 years experience in lieu of degree
- 2 years of applicable network experience
- 1 year of CND experience
- Must hold a Secret Clearance
- Must have at minimum the Security+ CE and/or the C|EH certification to start. Both certifications are required 180 days after official start date
- GCIH is required for this position 180 days from start
- Basic Packet Analysis experience
- Familiarity with and ability to investigate Intrusion Detection System alerts
- Understanding of functionality and capabilities of computer network defense technologies, to include: Router ACLs, Firewalls, IDS/IPS, Anti-virus, Web Content Filtering
148
Cyber Systems Admin Resume Examples & Samples
- Responsible for installing, configuring and maintaining Oracle Sun Server X4 Series, x86 and including virtualized servers
- Perform regular day-to-day Systems Administration activities such as User Administrations, Disk Management, Package Install, Patch Management, Storage Management, NFS Administration and disaster recovery/fail-over
- Identify, analyze, fix, and determine root cause, follow-up and coordinate changes to resolve complex problems involving hardware, software, networking and applications
- Ensure backups are completed successfully. Perform backup restores from NAS and tape for system users
- Monitor and ensure adequate security for hosts and provide access control for file systems
- VMWare: Assist in maintenance of virtualized server environment. Create and configure hosts and VMs and allocate corresponding system resources as required. Maintain and patch existing hosts and VMs using VMWare COTS product
- Application Administration: Support a variety of server and desktop COTS, agents, and GOTS applications
- Other duties: Maintain operational procedures and guides and create tickets to document all break/fix incidents
- BS Degree in a technical field and three (3) years of related experience OR an additional four (4) years of experience in lieu of degree
- Implementing and troubleshooting within UNIX environment
- Experience in administering VMWare and ESXi 5.0 or later
- Active Top Secret with SCI eligibility and ability to obtain Poly
- BS Degree in a technical field and six (6) years of related experience OR an additional four (4) years of experience in lieu of degree
- Implementing and troubleshooting within a UNIX environment
- Experience in administering VMware and ESXi 5.0 or later
- Familiarity with COTS products like Mac OS X, Oracle 11g r2, Netbackup, Atlassian Confluence
- Possess the ability to read shell scripts
- Experience with NAS and SAN technologies, EMC2 or Isilon
149
Cyber Operator / TS / SCI w / Poly Required Resume Examples & Samples
- Monitoring, detecting, and taking immediate actions on events or incidents as they occur on the network, using defined System Operating Procedures
- Providing triage using logical problem solving methods by analyzing multiple equipment inputs to determine if system operations are out of normal specifications; performing troubleshooting procedures to determine discrepant equipment
- Interpreting, analyzing, and reporting all events and anomalies in accordance with standard procedures, including initiating notifications and acting on technical responses, and up-channeling reports
- Creating detailed problem descriptions (Discrepancy Reports) into a reporting database for prioritization and work-off
- Supporting and monitoring customer hardware and software upgrades; providing detailed post-installation monitoring for any deviation from expected operations
- Providing detailed watch logs that provide aground truth of technical actions and multi-organizational notifications
- Knowledge and experience with SATCOM systems, Network protocols, UNIX/LINUX and command line entry is very helpful
- Able to work comfortably in a technical environment
- Proficiency with attention to detail is very important to successfully becoming certified
- The successful candidate is a self-starter, able to master a broad skill set
150
Cyber Software Developer Resume Examples & Samples
- This position is contingent upon proposal/task award, funding, customer approval and clearance
- Bachelor’s Degree in Computer Science, Information Systems, Software Engineering or other related discipline and 9+ years of overall experience. An additional 4 years of related intelligence experience may be considered in lieu of degree
- Knowledge of designing, installing, configuring and testing both HW and SW
- Ability to support 24/7/365on-call
- Ability to program using any or all of the following: C, C#, C++, Python, Pearl, Java, Ruby, SQL, Visual basic and object oriented programming
- Experience in writing program code, compiles, debugs, tests, deploys, documents, and implements programs for new and existing systems (COTS/GOTS custom developed)
- 7+ years of Software Development experience within the IC
- Demonstrated experience working the operation life cycle and a strong understanding of the customer's classified programs
- Ability to learn and utilize customer tools
151
Cyber Incident Analyst Responder Resume Examples & Samples
- Bachelor’s Degree in Business Administration, Information Technology (IT) or other related technical field and a minimum of 5 years’ experience required for the level 3 role
- Bachelor’s Degree in Business Administration, Information Technology (IT) or other related technical field and a minimum of 9 years’ experience required for the level 4 role
- Knowledge and understanding of customer service techniques and a willingness to learn new tools and technologies and take on new responsibilities, as assigned
- Must be customer and detail oriented and possess good decision-making ability
- Ability to support multiple shifts and 1-2 weekend days a month is required
- Experience in using the Remedy ticketing suite
- Experience working with a customer service oriented environment
- Experience providing service desk/call center support
- Knowledge of Microsoft Office suite
152
Cyber Watch Operations Manager Resume Examples & Samples
- Strong understanding and ability to learn technical specifications, system requirements and other application design information across the US-CERT and NCCIC security watch floors is needed
- Cybersecurity experience
- Ability to learn new technologies as required
- Ability to produce results in a fast-paced environment with the ability to meet iterative deadlines
- Strong Operations background in variety of environments and areas – security, patching, scanning, and software distribution
153
Cyber Technologist / Strategist Resume Examples & Samples
- Develops plans, processes, and technology requirements to advance US-CERT strategic vision
- Align US-CERT's capability to departmental strategies, policies and technology capabilities
- Recommend system security requirements as part of a technology roadmap
- Provide Cyber operational strategy, planning and technology integration support
- Develops plans, processes, and technology requirements to advance US-CERT towards its strategic vision
- Provide Cloud based service and operations expertise
- Identification and development of mission enhancement opportunities
- Communicate new requirements or systems deficiencies via papers, meetings, gap analyses, and troubleshooting/ diagnostic efforts
- Develop cybersecurity research papers and presentations
- Bachelor’s Degree in Engineering, Computer Science, or other related technical discipline with a minimum of 20 years related technical experience required
- An active Top Secret Security Clearance with the ability to obtain a TS/SCI is required. In addition, selected candidate must be able to obtain and maintain a favorably adjudicated DHS background investigation (EOD) for continued employment
- Solid understanding of software testing methodologies, as well as software security engineering
- Previous experience creating and executing strategic road maps
154
Cyber Malware Analyst Resume Examples & Samples
- A Bachelor’s Degree and a minimum of 5 years related technical experience required
- Experience serves as an organizational spokesperson on advanced projects and/or programs
- Debugging and Debugger experience
- Disassembling/disassemblers experience
- Experience developing advanced technological ideas and guiding their development into a final product
- DHS EOD
- MSCE, CCNA, CCNO, or CISSP Certification
155
Cyber IA Analyst Resume Examples & Samples
- Conduct evaluations of the network via DISA STIGs and ACAS scans, submitting reports on security issues and providing potential recommendations for fix actions
- Ensure all documentation related to Network Topology Diagrams, Ports, Protocols, and Services Management (PPSM) and Hardware/software inventory are accurate, precise, and complete
- Review and validate compliance audits & vulnerability assessments along with the mitigation statements associated
- Ensure all supporting documentation towards remediation actions are accurate, precise, and complete
- Continued interaction with technical engineers, management, and customer
- Perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy
- Conduct in-depth research pertaining to security standards, policy and IA requirements
- B.S. in Computer Science, Computer Engineering or related STEM discipline & 9+ years applicable experience
- 8570 IAT III level security credential such as Security+ or CISSP with Operating System (OS) certification of CCNA/CCNP
- 5+ years of experience with Security Technical Implementation Guides (STIG)s
- 4 + experience with CISCO devices or similar technology
- 2 + years experience with firewalls, Ports, Protocols, and Services Management (PPSM)
- Masters Degree, CISSP, CISM
- Experience working with CollabNet TeamForge with a strong background with both infrastructure and applications are a desirable fit
- Experience submitting and processing Certification & Accreditation packages
156
Cyber Incident Analyst Responder Resume Examples & Samples
- 9 Years with Bachelors in Science / 7 Years with Masters / 4 Years with PhD
- Thorough understanding of the Information and Incident Response process
- Understanding of Legal/Regulatory requirements as they relate to National Security Systems (NSS)
- Understanding of National Security Systems (NSS) management, operation and data protection capabilities
- Hands-on experience with Incident Detection Techniques including the use of Vulnerability Assessment Tools
- Experience with Forensic data collection
- Experience preparing and presenting final reports
- Any of the following certifications: CISSP, CASP, GPEN CRISC, CASP, GCIH, CSIH, CEH or E|CIH
- Expert knowledge of security tools such as: eMASS, HBSS, ACAS, Nessus, Kali Linux, SPAWAR SCC
157
Cyber Incident Analyst Rsponder Resume Examples & Samples
- Thorough understanding of the Information and Incident Response and Forensics processes
- Thorough understanding of NIST/CNSS Risk Management processes, Controls Application/ Test, Incident Response, Forensic and related guides
- Hands on experience with Incident Response, Forensics, Incident Data Analysis, Network Defense and associated analytical tools
- Understanding of National Security Systems (NSS) change management processes
- Hands-on experience with Incident Detection Techniques including the use of Vulnerability Assessment Tool
- Experience with incident categorization based on client baselines and parameters
- Experience handling Host and Network sourced incidents
- Experience with Forensic data collection, media management and data handling
- Experience with Media Examination and analysis techniques including the use of Forensic tools for Networks, Network components, Hosts and Host components, Software and software use
- Experience with Data Recovery techniques and Analysis of recovered data (low and high level)
- Participated in no less than six (6) security assessment projects in the previous two (2) years (avg. 1 every 3 months)
- Any of the following certifications: CRISC, EnCE GCIA, CEH, GCED, CFCE, or CCE, GREM, GPEN
- Top Secret required to start with ability to obtain and maintain Poly
- Experience with cybersecurity technologies and advanced threat management solutions
158
Linux Cyber SW Engineer Resume Examples & Samples
- Deliver high quality Linux software solutions for industrial systems
- Co-ordinate with Product Owner, team members and other stakeholders to meet business objectives
- Participate in project planning sessions and provide estimates
- Understand the product and domain in order to write technical specifications
- Deliver C/C++ code as well as unit and component tests within a continuous integration environment
- Develop scripts to automate and streamline development activities
- Configure and maintain release and deployment environments
- Participate in end to end system QA testing
- A Bachelor’s degree in software engineering or equivalent plus a minimum of 9 years professional experience
- At least 5 years’ experience in Linux application development in C/C++
- Practical knowledge of commonly used C++ design patterns and libraries
- Knowledge of source code revision control
- Practical experience with C++11, QT, Boost
- Experience using unit test frameworks
- Knowledge of interprocess communication mechanisms e.g. D-Bus, sockets
- Experience with Linux systemd
- Knowledge of networking and serial protocols e.g. TCP/IP, Modbus, CANbus, HDLC
- Experience using Python
- Basic knowledge of relational databases e.g. MySQL, SQLite
- Practical experience developing for embedded platforms
- Experience working in an Agile environment with continuous integration
159
Cyber Developer Resume Examples & Samples
- 5 Years with Bachelor’s degree in Computer Science or related technical field; 9 years professional experience without degree
- 4+ years of PHP development experience (preferably PHP 5)
- 4+ years’ experience maintaining MySQL database administrator (preferably MySQL 5)
- Experience maintaining ApacheHTTP Web Servers
- Experience working with Mac OS X or Linux
- Comfortable with code integration of 3rd party APIs
- Experience working independently and in a team environment programming in a government environment
- Experience with cross-browser HTML5, CSS3, JavaScript, multi-platform desktop and mobile website development
- Comfortable debugging PHP and JavaScript
- Experience setting up and customizing a local web development environment
- Self-supportive debugging and problem-solving skills including cross-browser and OS compatibility
- Assist in gathering requirements and project specifications
- Communicate project status and deliverables with managers
- Active secret clearance
- Army approved Computing Environment Certification (CEC) in a related field
- Experience working with version control systems (SVN, GIT, etc.) as part of a structured development environment
- Experience with designing webpage layouts and creating functional user interface design
- General computer/network troubleshooting skills
- Experience with Code Igniter Framework, Drupal and/or Expression Engine CMS
- Experience with vulnerability testing tools and knowledge of SQL injection/XSS prevention techniques and/or Web design experience
- Experience with security vulnerability scanning and penetration testing of websites manually and using automated tools (e.g. Fortify, AppScan, Metaploit, Retina, Skipfish)
- Experience working with Amazon Web Services (AWS)
160
Cyber Test Automation Engineer Resume Examples & Samples
- Work as a member of an agile software development test team in a dynamic, fast-paced environment learning new tools and processes
- Test software applications in various environments (e.g., Windows, Linux, Mac OS, Android, iOS), and verify software integration with web services and custom hardware technologies
- Validate software requirements through functional, usability, performance, security, stress, compatibility, internationalization, ad-hoc, and regression tests
- Apply analytical and problem solving skills to clarify user stories and determine appropriate testing scenarios to validate the iterative development of products against functional and technical specifications
- Develop, maintain and execute test plans and procedures for software systems
- Effectively communicate and track issues discovered during testing and work directly with test lead, software developers and project manager toward issue resolutions
- Demonstrate work at the completion of sprints to key stakeholders to ensure solutions meet customer requirements
- Work closely with development teams to define product functionality
- Participate in test case reviews and provide feedback
- Configure hardware and software test equipment as required for the test environment and assist with troubleshooting issues
- Support the completion of software and documentation deliverables
- NOTE: This requisition may be filled at a higher grade based on qualifications listed below
- An active TS/SCI with Polygraph is required for this position.**
- Experience with various aspects of software or hardware testing (e.g., component, integration, system and acceptance testing)
- Experience with test automation and automation tools
- Proficiency with computer hardware and software systems (e.g., Windows, Linux, Mac OS, Android, iOS or any combination thereof)
- Extensive knowledge of Microsoft operating systems
- Considerable experience translating requirements and user stories into functional test plans
- Demonstrated strong troubleshooting experience isolating system failures
- Development Test experience working with integrated product teams
- Familiarity with Agile Scrum methodologies
- Experience with testing web services and mobile applications on iOS or Android devices
- Experience with TargetProcess agile management software
- Demonstrated ability to install and configure Virtual Machines
- Experience with modifying system BIOS settings
- Familiarity with computer security measures
- Proficiency with UNIX command lines
- Proficiency with multiple computer hardware and software systems (e.g., Windows, Linux, Mac OS, Android, iOS or any combination thereof)
161
Cyber Incident Anlyst Rspndr Resume Examples & Samples
- Perform DNI analysis for specified target sets and format the information for dissemination
- Perform technical metadata and content analysis of threat adversary automated information systems
- Perform Network Analysis to develop data sources
- Utilize linguist skills to characterize, analyze and reconstruct threat digital networks
- Utilize target development databases, analyze social and telecommunications networks and exploit high priority targets
- Perform sustained target analysis through the use of DNI/DNR analytic techniques
- B. S. degree in math, science, engineering, intelligence, accounting, or language AND a minimum of three (3) years of language or SIGINTexperience specializing in DNI
- An additional two (2) years of language or SIGINT experience specializing in DNI may be substituted for the Bachelor’s degree
- Experience with DNI/DNR analytic techniques
- Familiarization with networking principles, infrastructure and routing protocols
- Experience with gathering, compiling and reporting multi-source intelligence information and daily use of reporting, research and SIGINT development tools and databases in support of national-level requirements
- Familiarization with SIGINT collection, processing, analysis and reporting cycle
- Experience with data forwarding and collection
- Fluent in a language (such as Russian, Farsi, Chinese, Korean, Pashtu)
- Ability to work non-standard hours when needed or work shift work
- Familiarization with Basic GSM principles and infrastructure
162
Cyber Poly Applicants Resume Examples & Samples
- *Jobs in all Cyber Disciplines****
- Cyber Operations
- Defensive Cyber Operations
- Operations Research Modeling & Simulation
- Network Security
- Mobile Security
- Cross Domain
- Data Center Security / Big Data Arch
- Cloud, Windows, Unix / Linux
- Security developers (Java, PIG, Scala, Hadoop, MapReduce, Python, Perl, Ruby etc.)
- Software and Systems Reverse Engineering
163
Lead Cyber Strategist Resume Examples & Samples
- Ability to work closely with a wide range of leaders at the GS-15 and SES levels from over twenty agencies, each with their own particular culture
- Technical understanding of cyber environment and technologies at a layperson’s level useful
- Understanding of/work experience in government intelligence and/or law enforcement community a plus
164
Cyber Policy Planning Lead Resume Examples & Samples
- Expertise in interagency coordination, CT operations, cyberspace operational planning, law enforcement, intelligence, and/or homeland security
- Candidate needs in-depth information domain knowledge and experience, particularly regarding national security as it relates to cyberspace operations, and infrastructure operational & practical expertise, threat and incident collection & analysis, and strategic planning in support of planning activities for cyberspace activities
- Cyber policy background
- Demonstrated ability to work in a highly collaborative, multi-disciplinary environment
- Strong written communication skills and ability to communicate effectively to a variety of audiences to include Government leaders and policy-makers at all levels (federal, state, local, and territorial), and corporate/private industry leaders
165
Cyber Technologist Resume Examples & Samples
- Develop agile technical solutions to address sponsor initiatives
- Conduct forensic analysis of assorted media (hard drives, USB drives, mobile devices, etc.)
- Identify, extract, and analyze malware from media or network (PCAP) data
- Develop signatures for the detection of malicious activity
- Develop scripts/code for parsing large amounts of data (e.g. log files) in order to facilitate analysis
- Provide consulting to sponsor personnel on best practices pertaining to the above
166
Cyber Technologist / Forensics Resume Examples & Samples
- Ability to identify C2, dropper files, registry key modifications, DLL injection, etc. based on malware analysis
- Capable of reading PCAP and conducting network traffic analysis
- Ability to identify malicious traffic in PCAP that may be a beacon, file upload, SQL injection, or password brute force attack
- Ability to conduct Netflow analysis, packet analysis, and network traffic manipulation
- Ability to develop other technical solutions to further cyber investigative goals
- Ability to work on site and interface positively with sponsors at all levels. Must be a self-starter with excellent communications skills and the ability to positively represent MITRE
- Must understand the fundamentals of TCP/IP communication
167
Lead / Principal Cyber Technologist Resume Examples & Samples
- Leverage and apply existing strong technical skills and expertise to contribute to a dynamic technical investigative, analytic, and cyber-focused work program
- Define, develop and deploy new ways of addressing the cyber threat including novel network and host-based tools
- Take on tough challenges and work through problems with as yet unknown solutions. Jump in and learn new skills as needed to address evolving sponsor activities
- Multi-faceted experience with the technical depth to identify and implement practical technical solutions
- Experience with multiple operating systems (Linux, Windows, OS X)
- System-of-systems development and rapid prototyping
- Advanced knowledge in the following
- Experience working in a sponsor cyber operations and/or intrusion response environment
- Low level knowledge of how operating systems work including the network stack, file systems, binary executions and memory analysis and the Windows kernel
- Static/dynamic malware analysis including experience with x86 assembly
168
Cyber Hunt Analyst Resume Examples & Samples
- Support the development of new cyber data analytics techniques
- Analyze threat intelligence (e.g. actors, hack tools, exploits, malware, etc.) and determine techniques, tactics, and procedures (TTPs) of Threat Actors, including detailed technical analysis of the TTPs
- Analyze events/ data feeds for event detection, correlation from monitoring solutions, triage and classify the output using automated systems for further investigation
- Translate analytical findings into security “use cases” that can be implemented within available surveillance capabilities
- Recommend improvements and assist in the setup of cyber assessments, processes, protocols, skills and tools
- Serve as a data analysis expert for output from a wide variety of digital assessment tools to include expansion into Big Data Analytics
- Analyze and report on threats based on assessment and intelligence data both internally and externally generated
- Proficient with analysis/triage of Windows malware to obtain technical indicators
- Provide detailed and accurate technical reporting of analysis results
- Using a high-level scripting/programming language to extract, de-obfuscate, or otherwise manipulate malware related data
- Providing mitigation suggestions in the context of a security incident, as it relates to the technical analysis of malware or other attack artifacts
- Providing oral briefings on complex technical subjects to senior management and other non-technical audiences
- On one hand this will be a hands-on and very technical cyber security role and on the other hand it will require good communication & relationship skills to ensure technical issues can be translated into business terms for appropriate decision making around mitigating actions by communicating findings
169
Cyber Protection System Lead-saudi Arabia Resume Examples & Samples
- Works under general and limited direction to independently complete tasks
- Serves as a liaison between the RSAF DCIT and the Cyber Protection Contractor team
- Organizes, directs, manages, and coordinates the activities of all Contractor Team on-site personnel under this effort
- Competent to work independently on multiple phases of complex projects
- Coordinates activities with superiors and client personnel to resolve technical and/or business issues
- Coordinates and manages the preparation of analysis, evaluations, and recommendations for proper implementation of programs and systems specifications
- F-15SA Cyber Protection & Related Facilities Program SOW 20 Nov 15 154
- Bachelor’s or Master’s degree in computer science, information technology, information assurance/cybersecurity, or a related technical discipline
- Capable of professional-level spoken and written communications in English with a minimum documented score of 80 on an English Comprehension Level test for nonnative English speakers
- At least fifteen (15) years’ experience in the information technology field supporting National / Federal level Government customers
- At least ten (10) years of combined technical engineering experience in a security governance, information assurance, information security operations, or cyber security operations role within the past
170
IA / Cyber SME Resume Examples & Samples
- Position if Full Time 5 days 40 hour work week embedded and present in the PdM Radars Office Bldg 6006 APG MD – No Exceptions
- Experience and Knowledge Working IA/Cyber Support in a PM and/or PEO Office with Product Teams – Preferably in an Acquisition Weapon Systems Environment
- Working Knowledge and Experience working, implementing and securing the DOD & NSA IA Certification and Accreditation process (DIACP/NISCAP) is mandatory, and Familiarization with the new IA Cert Process of Risk Management Framework (RMF) is mandatory. Working Knowledge and Experience with RMF is a significant plus
- Knowledge and experience working with IA vulnerability scanning software tools – Gold Disk process, Security Risk Analysis
- Perform research and assess impacts to IA in terms of system hardware/software modifications, technological upgrades
- Review and assess systems’ security documentation for security weaknesses, recommend improvements to amend vulnerabilities and implement and document relevant and approved security changes
- Participate in risk assessments to periodically re-evaluate sensitivity, risks and mitigation strategies
- Provide timely notification to PM Chief Engineer and Leadership Team in the event of a
- Radar systems security related incident and/or breach. Recommend and initiate appropriate protective and/or corrective actions
- Knowledge and experience writing and preparing DIACAP Documentation such as but not limited to: Security Classification Guides (SCG), Program Protection Plans (PPP), Certification of Net Worthiness, Test Reports, Security Operational Approvals, IATO, ATO
- Provide comprehensive Information Assurance Cyber Protection support services which are fully compliant with IA regulatory and policy requirements. Identify, define, create and maintain the program security posture and documentation required for certification and accreditation (C&A) of Radars weapon systems
- Develop and maintain cooperative and productive relationships across the Radars Program Office and with the Original Systems Manufacturers/Integrators
- Ensure configuration management (CM) for security relevant Radar systems software and hardware is maintained and documented
- Information Assurance Cyber Protection SME Advisor in areas related to Radar Systems Development, Sustainment and Disposal (Total Lifecycle Management)
- Communicate in Writing and Verbally at a High Quality Level – Drafting, Reviewing and Revising Written Documents is Important
- Strong work ethic, ability to manage high op temp with multiple priorities
171
Cyber Readiness & War Plans Analyst Resume Examples & Samples
- Recognized mastery in selection and application of IA concepts, methods and tools to develop M&S capabilities in support of cyberspace planning, operations and assessment
- Substantive and technical expertise to enable collaboration with cyber security SMEs to devise, develop and implement precedent setting M&S methodologies and tools, in support of cyberspace missions and functions
- Recognized high level of expertise to resolve disagreements among SMEs, and to appropriately represent the interests of the Command in enterprise-level working groups
- Recognized high level of expertise/knowledge regarding Industrial Control Systems and a familiarity with M&S capabilities of those systems
- Strong technical and analytical skills
172
Requirements & Plans Cyber SME Resume Examples & Samples
- Experience with the POM process, including Joint and Service Staff, Combatant Command, Major Command, or C-NAF, Wing levels
- Experience in working with DoD contracts, including contract office, PMO, and multiple vehicles in excess of $10M
- Experience with a record of developing and presenting POM and contract and budget recommendations to senior leaders, including general officers and senior civilians
- Experience with taking on a task of coordinating and setting up multiple meetings and VTCs
- Current TS/SCI clearance
- Experience with AFSPC MAJCOM Staff working POM and budget inputs
- Experience with USCYBERCOM Staff working POM and budget inputs
- Experience with the Requirements Authorization Document System (RADS) for Category I and II contracts
- Experience with financial management, including initial distribution of funds, year-end closeout, and execution review
- Experience in directly supporting to Cyber Forces or coordination with organizations conducting Cyber Operations
- BA or BS degree in related field
173
Cyber Incident Analyst Responder Resume Examples & Samples
- U.S. Citizenship and an active final SECRET security clearance are required. In addition, the candidate must be able to obtain and maintain a TOP SECRET clearance and pass a DHS background investigation / suitability determination for continued employment
- 5 years of professional experience with Bachelor’s degree; 3 years with a Master’s degree; (4 additional years of experience is considered equivalent to a Bachelor’s degree)
- 3 years of experience in network security and/or systems engineering with networks, protocols, firewalls, and enterprise software in various IT infrastructures
- 1 year of operational experience in SOC and/or CND environments, performing incident response functions including conducting packet-level analysis
- Excellent communications skills to articulate complex technical issues orally and in writing
- Must be able to work independently as well as collaboratively with a diverse team of highly skilled cyber and information assurance engineers
- Must be able to support a flexible schedule and have the skills to interact at both the staff and management level of an organization, and be able to work within tight deadlines
- Hands-on experience in network/security technologies and protocols, including: SIEM, VPN, router/switch, netflow, firewalls, proxies, IDS/IPS, network management tools, incident response tools
- Network/security architecture experience
- Knowledge of Trusted Internet Connection (TIC) infrastructures, methodologies, and networking tools with experience evaluating risk and security controls
- Experience conducting detailed audits/assessments (e.g., FISMA, ST&E, C&A) against National Institute for Standards and Technology (NIST) 800-53 and 800-61, or similar best practices standards
- Software development and/or scripting experience
- Experience with requirements management, configuration management, document management with SharePoint, risk management, scheduling with MS Project, Agile techniques, issue/action tracking with Redmine, process development, measurement and analysis, QA and/or technical editing
- Current CISSP, CCNA, CEH, GCIH or equivalent certification(s)
- Active Final Top Secret Clearance with SCI eligibility
174
Cyber Incident Anlyst Rspndr Resume Examples & Samples
- Research various technologies used in penetration testing; Perform pen testing utilizing automated tools such as Core Impact and MetaSploit for various operating systems as requested
- Provide in-depth analysis of incidents utilizing Guidance Software's Encase and similar tools when required
- Support and coordinate daily vulnerability assessment, threat assessment, mitigation and reporting activities in order to safeguard Agency information assets
- Develop incident response functions when appropriate and coordinate activities with site personnel when directed by management
- Provides expert level support for security monitoring and analysis
- Coordinate incident response functions when appropriate and coordinate activities with field site personnel when directed by the Enterprise Operations Manager
- Support Security Operations in publishing incidents, alerts, advisories and bulletins as required
- Bachelor's degree in Computer Science, Information Systems, or related field ... or 4 additional years of equivalent professional experience required
- Minimum 7 years IT experience
- Minimum 4 years experience in penetration testing and vulnerability assessment environment
- Requires experience working with multiple operating systems and an understanding of TCP/IP, network protocols, firewall theory, and packet analysis
- Requires a working knowledge of network security analysis using industry standard intrusion detection systems (e.g., Snort, McAfee, IBM, Cisco)
- Requires an expert level of understanding of common TCP/IP-based services, including DNS, DHCP, HTTP, FTP, SSH, SMTP, etc
- Candidates should be proven team players with excellent oral and written communications skills
- Encase Certified Examiner (EnCE)
- GIAC Certified Intrusion Analyst (GCIA)
175
Midwest Cyber Center of Excellence s Resume Examples & Samples
- Coordinate activities to implement Cyber Patriot
- Establish and maintain partnerships with colleges/universities to implement Cyber Patriot
- Create and maintain partnerships with schools, student organizations, and youth serving community based organizations
- Participate in community events and activities on behalf of MWCCOE (set up booth displays, pass out bracelets and t-shirts, etc.)
- Assist in the coordination of volunteers for community events
- Create and maintain partnerships with colleges, student organizations, and youth serving community based organizations
- Assist in the creation and implementation of youth engagement strategies
- Assist with event coordination for MWC² programs, TEC training, and Cyber Patriot volunteer events
- Support overall project monitoring, evaluation, and development for programs
- Track program financial data including program expenditures and vendor payments
- Contribute to proposal development, program reporting, and MWCCOE program impact stories
- Monitor and update online resource portal
- Other duties as assigned to advance the mission of MWCCOE
- Ability to manage difficult situations with tact and diplomacy
- Excellent facilitation and interpersonal skills
- Excellent writing and editing skills
- Strong contributor in team environments
- Applicants must possess strong analytical, interpersonal, and communication skills, with the ability to manage multiple projects simultaneously. Candidates must be self-directed and require limited oversight in performance of duties
- Passion for the mission of cybersecurity
- Possess outstanding administrative and community outreach skills
- Excellent communication and presentation skills (oral and written)
- Exceptional interpersonal skills with the ability to inspire and lead volunteers
- Ability to manage multiple tasks under aggressive timelines and expectations
- Strong networking skills and the ability to work with a variety of partners, including governmental, nonprofit, educational, faith-based, and corporate agencies
- Ability to operate with a minimum of direct supervision
176
Cyber Incident Analyst Responder Resume Examples & Samples
- 9 years of professional experience with Bachelor’s degree; 7 years with a Master’s degree; (4 additional years of experience is considered equivalent to a Bachelor’s degree)
- 5 years of experience in network security and/or systems engineering with networks, protocols, firewalls, and enterprise software in various IT infrastructures
- 3 years of operational experience in SOC and/or CND environments, performing incident response functions including conducting packet-level analysis
- Hands-on experience in network/security technologies and protocols, including: SIEM, VPN, router/switch, netflow, firewalls, proxies, IDS/IPS, network management tools, and incident response tools
177
Sigint Cyber Discovery Analyst Resume Examples & Samples
- Experience with Digital Network Intelligence (DNI) analysis
- Experience with writing SIGINT product reports
- Knowledge of packet analysis and SIGINT databases
- Knowledge of DoD INFOSEC procedures
- HS diploma and 12+ years of experience with SIGINT analysis and reporting or a BA or BS degree and 8+ years of experience with SIGINT analysis and reporting
- Experience with network mapping and visualization
- Experience with a SIGINT field station
- Network +, Security +, or Certified Ethical Hacker (CEH) Certification
- Completion of a Joint Cyber Analysis Course
178
Cyber Program Manager Resume Examples & Samples
- Managing comprehensive projects/programs in software development utilizing an agile process creating tools for Computer Network Operations (CNO)
- Defines program requirements that identify all elements of cost, schedule and technical performance. Leads development and refinement of the program Work Breakdown Structure to a level sufficient to identify all the work required for project completion. Directs estimation of project costs
- Manages cost, schedule and performance. Implements project change management and control. Establishes project performance metrics that ensure successful completion of the project
- Assesses the project impacts of scope, schedule and budget change requests and takes requisite action. Ensures that the project is maintained within the scope, budget and schedule of the baseline agreement and changes the baseline when appropriate client directed changes are approved
- Recruits, selects, and negotiates with line management to build a project team. Continuously assesses strength of team and makes changes as required
- Proactively communicates with clients to ensure they are an integral part of the project for clarification of requirements and regular assessment of implementation progress. Builds relationships to sustain and expand business opportunities
- Collaborates with the Business Development staff to establish overall proposal strategies and themes which clearly differentiates Battelle from other potential providers of service
- Impacts contract negotiation activities and has a strong working knowledge of contractual issues relative to the project being managed relevant to scope of the work and scheduling and subcontracts
- Prepares and presents presentations to internal management and to internal and/or external customers to provide reviews and updates on technical aspects, cost, and schedule
- Directs project risk planning. Applies processes and procedures to identify, analyze, classify, prioritize and manage program risks to formulate a risk management plan that assigns responsibility, determines approaches and specifies mitigation approaches and contingencies in the risk management process
- Active Top Secret/SCI
- M.S. in a computer science, computer engineering, or systems engineering is a plus
- Current Project Management Professional certification (PMP)
179
Cyber Anst Prin Resume Examples & Samples
- Identify targeted and persistent threats on customer networks and make recommendations for managing the threats
- Conduct network and digital forensics
- Create IDS & SIEM content to identify attacks
- Lead and/or assist incident response efforts
- Convey, both orally and in writing, analytic information in appropriate reporting modes suited to particular situations
- Provide dynamic client support in the form of planning and/or execution
- Assist with the evaluation of new products and technologies
- Make recommendations for improving procedures
- Create content (correlation rules, queries, dashboards, reports, etc.) in industry leading SIEM tools such as Splunk
- Support and participate in engineering efforts such as tool integration, development of automation scripts, testing of new tools and evaluation of new technologies
- Technical skills proficiency in the following areas: network communication using TCP/IP protocols, basic system administration, basic understanding of malware (malware communication, installation, malware types), intermediate knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch, open source information collection
- Report writing proficiency
- Basic to intermediate ability to build intrusion related data visualizations and perform analysis
- Strong understanding of US Intelligence Community and how cyber intelligence organizations work together
- Experience performing security assessments for Intel and DoD organizations as required by Director, Central Intelligence Directive (DCID) 6/3, DoD Joint Security Implementation Guide (DJSIG), Risk Management Framework, ICD 503, CNSS 1253, NIST 800-53, 53(a), 800-37, 800-39
- Recent experience (last 3 years) performing NETFLOW or PCAP analysis using common analysis tools (Wireshark, etc)
- Ability to present technical information and analysis to large and small groups depending on the customer requirement
- Self-starter with the ability to engage with CI and cyber intelligence analyst counterparts across the US Intelligence and Law Enforcement communities
180
Cyber Eng Resume Examples & Samples
- Analyze output from various security devices and malware and incident reports to improve detection of and to minimize future incidents
- Assess and analyze system security to identify and mitigate risks and vulnerabilities
- Recommend countermeasures to mitigate risks and vulnerabilities
- Prepare documentation, including incident reports, security recommendations, etc
181
Cyber System Hardening Engineer Resume Examples & Samples
- Disabling unwanted SUID and SGID Binaries
- Experience with cyber security development projects and programs for U.S. Government and/or commercial clients
- Experience with process development and deployment
- Experience with and knowledge of network, security and IT best practices
- Experience with NIST-800 (Series) - specifically NIST 800-123, DoD STIGS
- Familiar with sysctl.conf
- Experience with SSH Hardening
182
Cyber Policy Lead Resume Examples & Samples
- Develop information security policy compliance strategic plans, project plans, and measures for maturity
- Manages a dedicated team of Cyber Policy Specialists
- Develops executive level briefings
- Builds and maintains project schedules
- Identify policy and teams resource needs
- Coordinating regularly with various client leadership organizations as well as subject matter experts to ensure that documents support required security goals, will be adhered to by the organization, and are reasonable and fair for members to follow
- Serving as a key resource in promoting cybersecurity policies and ensuring they are followed
- Assisting in collecting and analyzing relevant metrics, measures of effectiveness, and planned actions associated with cybersecurity policy for reporting to CISO
- Ensuring that appropriate personnel are informed of relevant policy publications and updates
- Ensuring that documents meet federal law requirements to include (but is not limited to); Privacy Act of 1974, The Sarbanes–Oxley Act of 2002, Contract Work Hours and Safety Standards Act, and the Fair Labor Standards Act
- Analyze complex physical security issues and provide cost-effective recommendations that meet policy requirements
- 10+ years directly related experience
- 5+ years of technical supervisory experience
- Subject Matter Expert (SME) with NIST 800-53 Security and Privacy Controls for Federal Information Systems and Organizations
- Subject Matter Expert on FedRAMP requirements
- Significant experience developing the following types of documents
- Policies
- Configuration baselines
- Hardening standards
- Standards
- Forms
- Templates
- Familiarity with applicable U.S. Government Polices, standards, and Executive Orders
- Expertise with existing standards for access control, intrusion detection systems, locks, destruction devices, and communications systems
- Ability to work within a multi-disciplined team
- Familiarity with the customer organization and the roles and responsibilities of the component organizations
- Ability to assist others in solving problems and work with them to implement the solution
- Ability to use interpersonal skills, along with knowledge of the Agency structure and organization to identify the proper resources to apply to current problems
183
Cyber Solutions Engineer Resume Examples & Samples
- Defining and developing cybersecurity requirements, design and architecture artifacts, strategy, plans, and policies
- Perform and/or provide guidance and oversight on vulnerability assessments; defining, negotiating, and executing Certification and Accreditation (C&A) programs
- Collaborating with program and engineering disciplines and ensuring the cybersecurity solution alternatives
- Conduct cybersecurity audits to ensure appropriate implementation and compliance of the security posture
- Define security development and test efforts implementation of security controls of networking devices, databases, operating systems, and hardware and software components
- Conducting technical and nontechnical trade studies, analysis, reviews to identify
- Technical (hands-on) experience related to Information Assurance/Cyber Engineering requirements, determination, development, and implementation
- Experience in security systems engineering involving various computer hardware and software operating system and application solutions in both a stand-alone and in LAN/WAN configurations
- Experience with security features and/or vulnerability of various operating systems as defined by NSA, NIST, DISA (STIGs) and USCYBERCOM
- Experience with IA vulnerability testing and related network and system test tools; e.g., Retina, NMap, Nessus, Security Content Automation Protocol (SCAP)
- Experience with information security toolset including anti-virus, Vulnerability Assessment, HIDS/ NIDS
- DoDI 8570.01-M IAT Level-II Compliant Certification
- Minimum, U.S. Government Secret clearance
- Ability to organize, multi-task and prioritize tasks in a fast paced, deadline driven environment
- Familiar with NIST Risk Management Framework as described in NIST Special Publication 800-37
- Familiar with Program Protection Plan (PPP) required by DoDI 5000.02 and DoDI 5200.39
- Security related Network (e.g., Cisco) and Operating Systems (e.g., Solaris) certification or training
- Bachelor’s Degree in Engineering or related technical field
184
Cyber / Systems Integrity Solutions Engineer Resume Examples & Samples
- Completed training in Anti-Tamper technologies, methodologies, and policies
- Familiarity with C, C++, Ada
- Able to work in a dynamic, fast-paced environment
- Experience developing AT related BOEs
- Experience in using DOORs to generate and manage requirements
- Experience leading teams and IPTs
- Bachelors of Science degree (BS) in Engineering, Physics, Mathematics, or Computer Science; advanced degree(s) preferred
185
Cyber Operator Resume Examples & Samples
- BS Degree in Cyber Security, Computer Science, or other related discipline with 9+ years of overall experience. An additional 4 years of experience may be considered in lieu of BS degree
- Demonstrated administrative experience in computer and network operating systems including at least one of the following: Windows, Linux, Mac, Cisco, Juniper
- Candidates must be knowledgeable in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access
- Demonstrated experience in information systems security with an emphasis on penetration testing and vulnerability assessments
- Demonstrated strong fundamentals in security engineering, network protocols, as well as computer and network security
- Current TS/SCI w/ Poly Clearance
- Technical certifications that support pen testing such as OSCP/OSCE, GPEN/GXPN
- In-depth understanding of commonly used layer 2-7 communication protocols, encoding and encryption schemes and algorithms
- Previous experience countering threats to large enterprises (USG or commercial), such that there is familiarity with techniques and tools employed
- Previous software development to support penetration testing including vulnerability research, tool modules, tunneling, scanning scripts, passive collection, etc
- Experience using scan/attack/assess tools and techniques, including proficiency in at least one of the following frameworks: Metasploit, Core Impact, Immunity Canvas, etc
- Experience conducting full-scope assessments and penetration tests including: social engineering, server and client-side attacks, protocol subversion, physical access restrictions, web application exploitation
- Proficiency in at least two of the following languages – C, C++, C#, Python, Ruby, Perl, Bourne/Bash, Powershell, Visual Basic, VBScript, PHP, Javascript
- Demonstrated experience in technical report writing
186
Cyber Intern Resume Examples & Samples
- Reverse Engineering
- Embedded systems analysis and development
- Familiarity with various hardware architectures (e.g., PowerPC)
187
Cyber Incident Anlyst Rspndr Resume Examples & Samples
- Responsible for daily intrusion detection monitoring and advising on information security issues related to the Commonwealth’s wide area network and datacenters
- Ensures the internal security controls are appropriate and operating as intended, determine malicious or unauthorized activity by checking logs from security devices, and coordinate the response to Incident Response Team or Cyber Security Operations Manager
- Provides first level support for security monitoring and analysis
- Provide incident response functions when appropriate and coordinate activities with field site personnel when directed by the Cyber Security Operations Manager
- This position will work the third shift which is composed of four ten hour shifts per week
- Associate's degree and 2 years related experience; or Bachelor's degree; OR 4 years related experience is accepted in lieu of degree
- Requires a practical level understanding of common TCP/IP-based services, including DNS, DHCP, HTTP,FTP,SSH, SMTP, etc
- Security +, GSEC, CEH or GCIH
188
Head of Cyber Forensics Resume Examples & Samples
- Strong understanding and hands-on experience in cyber forensics and fraud investigations
- Evaluate network security vulnerabilities, malware, hacking and exploits
- Put in place appropriate security controls, tools and techniques for information gathering purpose
- Experienced in conducting investigations relating to data breaches, or cyber security incidents
- Experienced in firewalls, DNS & DHCP and networking system, with knowledge of TCP/IP network functions
- Knowledge of Data Loss Prevention security controls
- Experienced with DDos Mitigation, Netflow Analysis, common network protocols, packet formats and security vulnerabilities
- Integration of project and change management methodologies into project design
- Maintain strong business relationship with the many business and technical stakeholders spread out globally
- Function as Subject Matter Expert for all queries in the area of expertise during security incidents
189
Cyber / Reverse Engineer, Mid Resume Examples & Samples
- 2+ years of experience with developing in C++ or other high-level languages
- 2+ years of experience with developing hardware and software systems in Assembly, C, C++, or other low-level proprietary languages on UNIX, Linux, VxWorks, or vendor-proprietary operating systems
- Experience with Linux operating systems and related software development environments
- Knowledge of software development life cycle
- Knowledge of system engineering principles
- BS degree in Computer Electrical Engineering
- 2 years of experience with performing protocol analysis
- 2 years of experience with CNO, CAN, CNE, and CND
- Experience with computer and network security
- Experience with algorithm development in an academic or professional environment
- Experience with military communications systems, protocols, architectures, security, or waveforms
- Experience with scripting languages to perform post processing analysis
- Knowledge of reverse engineering and vulnerability analysis of software binaries using IDA Pro or similar software for performing dynamic analysis of software binaries using OllyDbg, WINDbg, or similar software
190
Cyber Economist Resume Examples & Samples
- Lead exploratory work on the quantification of financial risk associated with large-scale cyber attacks
- Develop market models and projections for the cyber threat landscape
- Provide thought leadership on the impact of cyber attacks on the economy through peer-reviewed publications and industry-leading white papers
- Collaborate with a cross-functional team consisting of actuaries, product managers and researchers to advance Symantec’s cyber insurance solution
- Advanced degree(MS/PhD) in Economics or Applied Mathematics from a top university with a track record of publishing in leading academic journals/industry publications
- 5+ years of experience in finance or technology industries leading quantitative research on market modeling and experimental design
- Demonstrable expertise in identifying important signals and building models based on limited information
- Demonstrable expertise in communicating assumptions and methodologies used for estimation to a broad audience through compelling written collateral and presentations
- Experience in applied mathematical modeling and estimation techniques
- Delivering quality output at a fast-paced startup environment strongly preferred
- Experience with insurance or cyber security strongly preferred
191
Director, Cyber Resilience Resume Examples & Samples
- Develops a high performing leadership team by providing strategic leadership and vision and professional development of technical and business management staff
- Oversees the development and, once established, maintenance of a Cyber Resilience Center and supporting staff
- Governs an overall risk register of technical threats and exposures related to cybersecurity that the organization uses to prioritize investments
- Oversees large remediation programs such as Vulnerability and Security Configuration Management
- Identifies and remediates control risks impacting cybersecurity and regulatory commitments
- Develops, designs and implements metrics/dashboard reporting for key business management initiatives, and/or other ad hoc needs to support cybersecurity governance. Strategically advises and/or distributes/shares reports with stakeholder groups to optimize visibility of cybersecurity risks and initiatives
- Develops communication approaches and strategies, determines presentation focus and emphasis, and prepares executive-level presentations in support of the Chief Information Security Officer. Primary audiences include the IT Executive Committee, KP business leaders, Executive Sponsor Group, business operations governance bodies, and other key audiences, as needed
- Plan and leads designated people processes and organization performance reporting, and goal-setting on behalf of Cybersecurity governance, including performance management, process coordination, and talent reviews
- Develops long term resource and employee development strategies to ensure workforce is equipped and available to support the execution needs of Cybersecurity governance
- The successful candidate is a highly effective communicator and influencer, with the ability to develop business solutions that garner stakeholder sponsorship to support organizational objectives and project deliverables
- Minimum eight (8) years of progressively responsible management experience in planning, budget/financial management, and staffing
- Minimum eight (8) years of related IT experience including IT Project Management
- The successful incumbent must have at minimum 10 to 12 years of broad experience and deep knowledge in several of the following key areas with at least two year in a senior leadership role
- Subject matter expertise on information security governance, strategy development, standards, and controls
- Knowledge of security issues within a regulated industry
- Experience in compliance issues such as SOX, COBIT, HIPAA, etc
- Experience implementing and enhancing security in large-scale multi-location environments
- Proven track record initiating and leading performance change through line management and operations
- Demonstrated success in developing effective working relationships with business and physician leaders
- Strong business acumen with excellent strategic and business and analytical thinking
- Proven leadership, communication, partnership and collaboration and influencing skills are essential
- Develop and lead large organizations inclusive of directors, managers and individual contributors
192
Cyber Academy Project Analyst Resume Examples & Samples
- Project management skills with a focus on detailed execution; must be able to self-initiate to perform a wide array of project tasks independently, drive projects to completion, and develop creative solutions
- Problem-solving and analytical mindset, interested in process improvement
- Monitor and contribute to internal website and online employee training site
- Team player with the ability to build productive working relationships and collaborate cross-functionally; as well as self-directed to complete individual deliverables
- Strong verbal and written communication skills with ability and interest in interacting with a globally distributed, multi-cultural team and effectively interface with all levels of staff and management
- Technically savvy with Microsoft Office Suite willing to learn new software; LX, LMS, etc
- Develop marketing and communications materials or internal employee development programs, tools, and resources and coordinate, facilitate instructional development projects with internal design group
- Facilitation of meetings experience required with willingness to speak in front of groups
- Bachelor’s Degree and a minimum of 3 years of project/event management experience
- Prior experience in academia with knowledge of learning theory
- Knowledge of communications and public relations best practices
- Experience with data collection, analysis and reporting
- Ability to travel up to 25% CONUS and OCONUS
193
Cyber Solutions Resume Examples & Samples
- Minimum 4+ years of progressive technical (hands-on) experience related to Systems/Software Engineering architecture, requirements, determination, development, and implementation
- Experience with Anti-Tamper (AT) Techniques, implementations, and US Government System Security guidelines and provisions
- Knowledge of cryptography and cryptographic applications
- Technical writing experience, in generating technical documents in support of CSI related program and proposal documentation, to include CONOPS, Test Plans, etc
- Technical experience in multiple Engineering Disciplines (such as Systems, Software, Hardware, Electrical, Mechanical, etc)
- Experience in using tools and metrics in managing activities
- High degree of professional acumen associated to working in agile and dynamic customer and program environments
- Demonstrated ability to manage multiple and competing priorities
- Experience working U.S. Government contract proposals as an Anti-Tamper/Systems Integrity subject matter expert
- Knowledge of Program Protection Plan (PPP) required by DoDI 5000.02 and DoDI 5200.39
- Ability to create and deliver both informational and technical briefings
- Experience with real-time operating systems
- Experience with COTS secure products
- Bachelors of Science degree (BS) in Engineering, Mathematics, or Computer Science; advanced degree(s) preferred
194
VP Cyber Innovation Lead Resume Examples & Samples
- Facilitating an Innovations capability and culture within Global Information Security
- Leading Innovation initiatives to deliver new cyber capabilities within Barclays
- Broad and comprehensive understanding of Cyber Security concepts and principles
- Broad (though not necessarily deep) knowledge of IT technology
- Understanding of trends in IT / Cyber and can anticipate future directions
- Proven ability to be innovative and demonstrate thought leadership in a start-up or enterprise environment
- Ability to leading the delivery of major projects/programs; e.g. consults on project management issues or methodologies; promotes the use of business cases and upfront benefit realization; draws upon lessons learned across the company
- Knowledge of threat technologies, architectures and business operating models
- Detailed knowledge of Cyber-crime technical solutions, products and methodologies globally
- Experience in creating and developing vendor relationships and influencing product roadmaps
- Proven track record of influencing and challenging technology investments at senior levels
- Experience of delivering benefits across different time horizons, aligned to an agreed strategy whilst balancing the risk of failure
- Capability to evaluate complex technical products and weigh competing requirements in evaluation decisions
- Strategic and commercial mindset with some experience in commercial negotiations
- Strong communication skills and the ability to constructively challenge the present way of working
- Highly capable in managing own performance and that of the team
195
Junior Cyber System Hardening Engineer Resume Examples & Samples
- Work within the CISO team to promote best network security engineering practices supporting this network while focusing on cyber device hardening
- Produce regular status reports
- Serve as resource supporting the Chief Information Officer through the team leadership
- Experience with large organization networks
- Experience in the roles identified above
- Experience with device hardening
- Experience with NIST-800 (Series), DoD STIGS
196
Cyber Software Engineering Intern Resume Examples & Samples
- Requirements definition and refinement
- Software design and architecture validation
- Application of modern object-oriented methods
- “Hands-on” software engineering, software development and database design and development
- Software Engineering of enterprise frameworks, Web Services and Service Oriented Architecture
- Mobile computing platform application development
- Application of Information Security principles
- Assessment and management of software risk and development of software quality metrics
- Software engineering process improvement
- Software innovation and technology insertion
- Concept validation and feasibility analysis
- Strong fundamental knowledge of computer science, especially algorithms and data structures germane to the development of high-quality, efficient software
- Understanding of enterprise platforms (JavaEE, .NET), Cloud Computing, Web Services principles and Service Oriented Architecture (SOAs) and frameworks such as Spring
- "Hands-on" skills in at least one of the following: Java, XML, HTML, C#, NodeJS/io, JavaScript and RESTful design Objective C; Database design & development including SQL
- Mobile platforms (iPhone, Android, QNX) and mobile software development
- Experience in using mobile development tools and methodologies (XCode, RESTful interaction, Application Sandboxing, Mobile UI design, etc)
- Experience using software development processes (RUP, Agile, TDD, SCRUMM) and tools (UML, Rational System Architect, Rational Rhapsody
- Experience working with reverse engineering environments, such as IDAPro
- Securing data at rest and in motion
- Internet of Things knowledge
- Experience leading small teams
- Hands on experience with system attack and penetration testing tools, such as metasploit and others
- Experience with malware analysis tools and techniques
- Experience in the security of telematics systems
- Experience developing in QNX and other embedded operating systems
- Experience in developing personal and enterprise security products
197
Global Head of Cyber Attack Analysis Resume Examples & Samples
- Oversight and direction of attack analysis team that monitors JPMC networks and systems from 3 strategic Security Operations Centers (New York City, London, Singapore)
- Oversee a team of 60+ analysts providing 24x7x365 follow the sun coverage
- Build out of global team including integration with Lines of Business
- Developing tight integration with threat intelligence to accelerate ability to uncover and track advanced cyber threats
- Development of firm wide operational processes for incident response
- Significant process development and improvement to focus on effectiveness of threat identification and detection
- Significant integration with cyber technology and engineering to ensure operational capabilities are aligned to threat environment
- Full concept of operations development, leadership of all attack analysis operations, presentations to executive leadership
- This role will have supervisory responsibilities. As such, the individual must have a minimum of ten years’ experience in the area of people management
- 10+ year's Cyber Security Incident Response, Security Operations Center and/or Attack Analysis in a large, mission-critical environment with a background in the following
198
Cyber SME, Lead Resume Examples & Samples
- Experience with taking on the task of coordinating and setting up multiple meetings and VTCs
- Experience with budget development and financial analysis
- Experience with Microsoft Office
- Experience with AFSPC MAJCOM and USCYBERCOM Staff working POM and budget inputs
- Experience in directly supporting Cyber Forces or coordinating with organizations conducting Cyber Operations
199
Cyber Marketing Engineer Resume Examples & Samples
- Minimum of 5 years of Information Technology related design, architecture, and systems implementation experience
- Minimum of 3 years of operational or Business Development experience as a technical lead
- Experience as a lead systems designer, architect or implementation lead for a Threat-Based, Intelligence-Driven, Cyber Security program or project in the past 5 years
- Strong understanding of security design, architecture and all facets of cyber defense
- Experience establishing and maintaining good working relationships in all levels of the organization, including customers, prime contractor organizations, internal management, and support organizations
- Security Information and Event Management
- Insider Threat Monitoring
- Malware Analysis
- Architecture frameworks (DODAF / MODAF)
- Currently hold at least 1 industry-standard information security management certification from a vendor or product neutral certification entity (e.g. ISC2, ISACA, GIAC)
200
Cyber Forensics Resume Examples & Samples
- Perform system and network analysis of suspected or potential security incidents
- Audit and report all F-35 Program It systems and subsystems
- Use DoD provided and required tool suites and other approved tools/methods to perform vulnerability assessments to support C&A compliance and security controls
- Provide evidentiary requirements such as executing forensics technical and gathering results on any computing assets such as mobile devices to support any investigation, inquiry, or litigation
- Assist in the process of systems certification as directed by the F-35 CIO
- Evaluate target systems to analyze results of scans, identify resolutions, develop POA&M, make recommendations, and continuously monitor requirements
201
Cyber Incident Anlyst Rspndr Resume Examples & Samples
- BS in Computer Science, Information Systems, or related degree with 5 years experience OR 9 years experience in lieu of degree
- Knowledge of CND policies, regulations and compliance documents specific to the DoD
- Familiarity with CJCSM 6510.01B
- Must have a DoD Secret Clearance
- System and file analysis
- 8570 Compliant for IAT III CND Analyst or ability to become compliant within 180 days of hire: One of the following: CISA, GSNA or CEH AND one of the following: CISA, GSE, SCNA, GCIH or CISSP
- One of the following: CISA, GSNA or CEH AND one of the following: CISA, GSE, SCNA, GCIH or CISSP
202
Cyber Infrastructure Engineer With Vmware Resume Examples & Samples
- Plan and design infrastructure (e.g., hardware, software, telecommunications, IT security), network services, desktop services, shared services need to support management of cyber security tools and services capable of 24x7x365 near, real-time central monitoring, alerting, administering, managing, reporting, and controlling all infrastructure activity, including Cloud services
- Design, deploy, and maintain Windows Server environments primarily hosted in VMware vCloud Suite, vCenter, ESXi
- Leverage existing VMware TAM to maximize the VMware technology investments
- Assist in moving existing private cloud workloads to public clouds
- Remain in compliance with appropriate Government data center capabilities and IT regulations and guidelines (e.g., FISMA, NIST)
- Provide alternative design approaches for Disaster Recovery and Continuity of Operations (COOP)
- Support core business and operational activities (e.g., Data Networks, backbone/core networks, Storage Networks, Software Defined Networking, interoperability with IPv4 and IPv6, external connectivity to Cloud)
- Provide storage requirements (e.g., performance, level of data segregation, data classification, storage tier, backup, restore, archival, data retention, reliability, encryption, security, scheduling, access control)
- Effective backup and recovery program consistent with customer requirements, procedures, industry best practices, and Government regulations including off-site storage and retrieval from such storage facilities
- Acquire software licenses required to support the (System of Systems), as necessary
- Clearly communicate engineering approach and designs
- Work as part of a team – collaborate on engineering designs contributing to multiple projects from a technical perspective with minimal supervision
- Recommend system components, upgrades and replacements
- Work independently with minimal supervision; mentor less senior team members
- Work with vendors and service providers – designs, product evaluations
- Understand project lifecycle
- Resolve/triage problems and determine root cause and implement resolution
- Define and maintain infrastructure product and component standards for the software stacks that deliver a flexible, scalable, secure, reliable, resilient, and cost effective set of cloud services
- Collaborate with Enterprise Architecture (EA) in the definition, implementation and evolution of EA frameworks, reference architectures, and overall strategies
- Provide third level support to operational teams
- Requirements gathering and translation into engineering designs: physical, logical, dataflow
- Assist in strategic direction and planning for growth to support our increasing business needs based on ever-changing business requirements
- Assist in troubleshooting network and storage issues and make recommendations for growth
- Keep on top of industry trends and cloud technology
- Detail-oriented with an ability to approach problems from different angles
- Develop a Concept of Infrastructure Design and Operations that at a high level outlines the technologies that will be used; the compute, storage, network architectures; and provides rationales for all choices
- Develop and maintain an Infrastructure Architecture that
- Includes hardware, software, and security
- Provides development, test, staging, and production environments
- Fulfills Disaster Recovery, Backup, and Continuity of Operations requirements
- Provides high availability and automatic failover capability
- Scales efficiently to meet the needs of the security services
- Validates solutions architecture
- ICD-503 A&A experience
- 10-12 years w/Bachelors Degree
203
Lead Cyber Solution Architect Resume Examples & Samples
- Technical oversight of development of managed security services and mentoring of Deployment and Support team members
- Collaborate with other Security Solution Architects and management to grow and evolve CGI’s Managed Security Service offerings
- Maintain awareness of trends in IT security technology and regulatory requirements
- Use deliverables from vision and strategy phase to develop conceptual, logical and physical technical models
- Create best practice technical architecture models utilizing knowledge of industry and technology trends
- Identify and evaluate technical architecture to ensure solutions satisfy business requirements and performance objectives
- Use industry best practices framework, activities and tasks as a basis for developing cost and ROI estimate and develop overarching program plans
- Interpret business requirements and translates them into technical requirements
- Manage client expectations and balances the needs of the company and client to ensure satisfaction for both
- Influence decisions and project direction at the executive level
- Foster collaborative relationships with the suppliers, practitioners, and industry organizations. Analyzes, designs, and facilitates implementation of work processes and job responsibilities associated with R&D
- Continually identify, assess, and improve technology implementation and delivery mechanisms
- In-depth understanding of emerging security threats
- Advanced competencies in managed security services architecture, operating and service models
- Demonstrable expertise in architectural frameworks such as ITIL, SABSA, etc
- Mature understanding of networking stacks such as OSI, interconnectivity protocols and integration strategies
- Hands-on experience dealing with Public Cloud environment particularly AWS and Azure
- Knowledge of auditory frameworks such as HIPPA, PCI, NIST, etc
- Experience leading security architecture team
- Subject matter expert in leading security technologies such as NGFW, intrusion detection systems, audit log monitoring systems, compliance monitoring systems, security management and reporting systems, security incident management systems, anti-virus & anti-spam systems, virtual private network technology, Web application firewall, remote access technology and vulnerability assessment technologies
- Ability and experience in writing clear and concise technical documentation
- Experience working with network software and hardware, data or voice
- Experience working with proprietary software and hardware
- At least 12 years of Cyber Security and IT Systems architecture, engineering, integration and deployment experience to include architecting and development of information security systems and applications
- Security certifications: SANS/GIAC (GCIH, GCIA or GCUX), CCNA, CISSP, or CISA certifications
- At least 8 years of experience creating technology models particularly for mentioned technologies
- Ability to speak and communicate effectively with peers and management
- Ability to deal with aggressive timelines and the associated pressure
- Strong writing and oral skills
- Strong skills in time, priority and task management
- Strong interpersonal skills to interact with customers and other CGI members
204
Cyber Anst Prin Resume Examples & Samples
- BS in CS, Info Systems, or related technical field with 5 years experience
- Experience working with classified systems
- Software integration of COTS and Government Off-the-Shelf (GOTS) products
- Penetration testing and analysis
- Prior experience working with DoE and NSA requirements
- CISSP or CISSP Associate (or can obtain certification within 12 months)
205
Cyber Opportunities Resume Examples & Samples
- Have a strong desire to work in a M&A environment operating across the transaction lifecycle,
- Be familiar working in a large-scale consulting environment or industry role where you can demonstrate the ability to perform and summarise Cyber analysis into management insights and recommended actions at pace
- Have working knowledge of Digital transformation, IT transformation, Big Data, Internet of Things and Mobile technologies
- Be familiar with data protection regulations including EU GDPR / UK DPA as well as industry standards and frameworks such as PCI, ISO27001 and SANS Critical controls
- Should preferably have knowledge of SDLC and one or more software development languages, such as Java, C/C++, .Net
- Be flexible to support on broader IT & Operational transaction work not necessarily related to Cyber Security
- Lead meetings with senior client stakeholders to advise, shape and drive the strategy and planning for integration, carve-out / separation and operational restructuring
- Take ownership for Quality and Risk Management (Q&RM) to ensure client work is delivered consistently and in compliance with EY's quality standards
- Lead and manage internal practice development including development of tools, accelerators, methodologies and market propositions
- Strong written and verbal communication skills and experience of producing and reviewing high calibre reports, papers, presentations and thought leadership
- A track record of successful project delivery in corporate businesses where you are responsible for managing project team members and vendors
- Have a broad range of IT experience including, infrastructure, applications, databases and networks
- Have deep knowledge of Cyber Security risks, controls and governance within corporate environments and how these support and can enhance business operations
206
Cyber Business Resume Examples & Samples
- 10+ years of experience in engaging customers to develop cyber resilient Systems designs, including architecture, Conops, and deployment options for both classified and unclassified processing and communications systems
- Experience in capture and pursuits processes including proposal development experience
- Strong experience in providing solutions for programs and pursuits in the areas of IT and Cyber related systems
- Commercial Dev\Ops environment experience with cyber security/Information assurance experience
- The candidate must have strong technical skills across multiple disciplines including cyber resilience both domestically and internationally both for general purpose and Tactical networks
- Experience Architecting secure solutions, including commercial cyber tools, NSA Level 1 encryption equipment, IPsec/3DES AES firewall solutions, for captures and pursuits worldwide Systems security experience in an integrated software development environments
- ISC2 and\or CISSP certification(s)
- The candidate must have strong technical skills in hardening Servers, Storage, Virtualization / Cloud technologies
- Negotiations skills
- Candidate must be an innovative and strategic thinker
- Security Operations Center, fusion centers experience desirable
- Info Security Specialist (ISS) EP for US Govt work with a systems engineering view of security
- Secure coding Best practices and tools experience
- Active Secret Clearance or the ability to obtain a Secret Clearance
- Bachelor's degree in Computer Science, Cyber or equivalent plus related hands on technical experience
207
Public Sector Cyber Director Resume Examples & Samples
- Communicating a broad range of Firm services
- Preparing concise and accurate documents, leveraging and utilizing MS Office (Word, Excel, Access, PowerPoint) and Lotus Notes to complete related project deliverables, as necessary; and,
- Balancing project economics management with the occurrence of unanticipated issues
208
Consultant Cyber Resume Examples & Samples
- Lead customer recovery engagements post an incident response investigation
- Produce repeatable processes and assist in training the field to support recovery execution
- Work independently and effectively, and manage through ambiguity
- Active Directory subject matter expertise, to encompass management, security and identity
- Experience with system monitoring and log analysis with an emphasis on interpretation and response
- Experience with application specific security hardening primarily within the Microsoft Stack
- A BS in Computer Science or Engineering or 5+ years of comparable security experience
209
Senior Consultant Cyber Resume Examples & Samples
- BS in Computer Science, Computer Information Systems, a related degree, or 4+ years of equivalent industry experience
- 4+ years’ experience designing and implementing databases utilizing Microsoft SQL Server
- 2+ years’ experience designing, architecting, and developing enterprise class systems using the .NET Framework with advanced knowledge of the C# programming language
- 2+ years’ experience debugging complex systems, tuning workloads, and profiling data
- 1+ years’ experience developing web applications using JavaScript and other web technologies
210
Senior Consultant Cyber Resume Examples & Samples
- Excellent understanding of Windows internals and where trace evidence can be found
- Exposure to the common forensic toolsets, such as FTK, EnCase, HBGary Responder Pro, Volatility, etc. and their application in incident response is a plus
- Familiarity with enterprise computer network defense systems, such as NIDS, HIDS, SIEM/SEMs, web proxies, antivirus, and specialized-purpose security systems is necessary to assist clients during a response
- Scripting experience and knowledge of the Microsoft Server stack is preferred
211
Cyber Mission Force & Sigint Analyst Resume Examples & Samples
- 8+ years of experience with current Air Force Cyberspace and ISR capabilities
- Experience with Microsoft Office applications
- Experience with US Cyber Command (USCC), Air Force Cyber, or the Air Force Service Cryptologic Component
- Knowledge of Air Force ISR or Cyberspace Policy Directives and Guidance
- Ability to think logically and act decisively in critical situations leveraging problem solving techniques
212
Cyber Secuirty Analyst Resume Examples & Samples
- Review and interpret alerts, events and system alarms while providing evolved emergency response services, incident management and analysis (according to sector and contractual requirements) to support customers 24/7
- Implement mitigation measures to ensure that appropriate treatment is applied depending on the nature of the security threat perceived as well as ensure that the customers and management notifications as is appropriate
- Take proactive measures to manage all security perimeter equipments, intrusion detection systems, manage identity and access programs, data correlation tools and or system components as may be required to interrupt or affect the above threats
- Suggest possible improvements to business processes while meeting and maintaining stringent security protocols associated with all practices in security management
- Completion of University or College program in Computer Science or three years of equivalent industry experience in the information systems field
- Knowledge of security event/incident management systems
- Knowledge of offensive and defensive security operational tactics and supporting SIRT tactics
- General comprehension of mitigating system controls, networks and applications (VPN, Firewalls, Intrusion detection, server hardening and encryption technologies)
- Excellent communication, presentation and relationship skills, especially the ability to articulate advanced technical topics and build consensus among business and technical constituents
- Self starter with excellent organization and interpersonal skills
- Excellent communication skills in both English and French (written and spoken)
- Comprehension of NIST, ISO 27001, ITIL and/or other compliance frameworks
213
Cyber SME / Architect Resume Examples & Samples
- Researches Internet sources and threat intelligence feeds and try to find evidence in customer logs
- Investigates evidence of threats against Windows, Linux, Database,Applications, web servers, firewalls or other relevant technologies
- ShareIOC models with trusted parties for validation and collaboration
- Support shift work (1 st, 2 nd, or 3 rd shift) as assigned
- Must beeligible to obtain a sensitive clearance – Position of Public Trust – and maybe required to obtain a higher security clearance
- 12+years of relevant work experience
- Statistical modeling and analysis experience to infer possible cybersecuritythreats
- Experience in analysis in investigations, such as in IT, law enforcement,military intelligence, or business analytics
- Interest in learning about Windows, Linux, Database, Application, Web server,firewall, SIEM etc. log analysis
- Verbal/written communication and interpersonal skills to effectivelycommunicate with team-members
- Must behighly motivated with the ability to self-start, prioritize, multi-task andwork in a team setting
- Digitalanalysis and forensics experience using Encase, Palantir, i2 Analyst’sNotebook, FTK or similar tools or extensive statistical analysis toolexperience (including extensive use of MS Excel)
- Demonstrable interest in learning SQL and shell scripting
- Demonstrable interest in learning some programming skills
- Experience evaluating systems and network devices and enterprise networks forIA vulnerabilities
- Experience evaluating enterprise networks for IA/security vulnerabilities
- Splunk query-development expertise
- Experience on an Incident Response team performing Tier I/II initial incidenttriage
214
Cyber Application Team Program Lead Resume Examples & Samples
- Defining selection criteria and prioritization framework for application testing
- Ensuring coverage of applications (Web, mobile, client sever) assets
- Ensuring coverage of current and prevalent threats in the application testing field
- Ensuring the program approach and goals take into account regulatory driven needs assessments of the firms’ applications and application environments
- Conducting or over see application assessment at senior level
- Lead technical streams with in the application testing team (SME for Client server, Mobile or Web application security assessments)
- Hands on application testing experience (up to CCT App level)
- Experience designing, running and maturing over time for a similar multi year program
- Demonstrable experience in briefing exec levels on threats and vulnerabilities, advising on best practices for their identification and mitigation (possibly from technical presales background)
- Defining analytical process, identifying requirements and scoping assessments
- Experience working in a highly matrixed work environment
- Must have an in depth cyber security background with a thorough knowledge of risk frameworks, threats, vulnerabilities and attack patterns as well as application and network security
- Significant experience with evolving state-of-the-art cyber security technologies and approaches
- Experience with information system auditing including computer security reviews, control selection, and evaluation of systems using a risk based approach
- Direct experience or familiarity with penetration testing techniques and cyber attack methods as well as conceptual cyber attack chains and attack paths
- Good consultancy background and skill set
- Ability to motivate, mentor and develop talent
- Highly responsive with an ability to handle escalations quickly and professionally
- Ability to create, communicate and implement strategies
- Ability to work both independently and perform as a leader in a team environment
- Demonstrated ability to work effectively with all levels of an organization, from executives to technology specialists
- Integrity and high standards of personal and professional conduct
- Masters Degree in Engineering, Business Management, or Technology related fields a major plus
- Information security certifications (such as CRISC, CISM, CISA, CISSP, CSSLP, CREST- CCT App, CHECK, OSCP, CLAS, SANS or other related certifications)
- Demonstrable understanding of financial sector, or other large organization’s security and IT infrastructures
215
Cyber Resume Examples & Samples
- Construct and exploit threat intelligence to detect, respond, and defeat advanced persistent threats (APTs)
- Fully analyze network and host activity in successful and unsuccessful intrusions by advanced attackers
- Piece together intrusion campaigns, threat actors, and nation-state organizations
- Manage, share, and receive intelligence on APT adversary groups
- Generate intelligence from their own data sources and share it accordingly
- Identify, extract, and leverage intelligence from APT intrusions
- Expand upon existing intelligence to build profiles of adversary groups
- Leverage intelligence to better defend against and respond to future intrusions
- Conduct advanced threat hunt operations using known adversary tactics, techniques and procedures as well as indicators of attack in order to detect adversaries with persistent access to the enterprise
- Create and add custom signatures,to mitigate highly dynamic threats to the enterprise using the latest threat information obtained from multiple sources
- Conduct initial dynamic malware analysis on samples obtained during the course of an investigation or hunt operation in order to create custom signatures
- Develop and produce reports on all activities and incidents to help maintain day to day status, develop and report on trends,and provide focus and situational awareness on all issues. Reports shall be produced on a daily, weekly,monthly, and quarterly basis capturing and highlighting status, preparedness,and significant issues
- Correlate data from intrusion detection and prevention systems with data from other sources such as firewall,web server, and DNS logs
- Notify the management team of significant changes in the security threat against the government networks in a timely manner and in writing via established reporting methods
- Coordinate with appropriate organizations within the intelligence community regarding possible security incidents. Conduct intra-office research to evaluate events as necessary, maintain the current list of coordination points of contact
- Review assembled data with firewall administrators, engineering, system administrators and other appropriate groups to determine the risk of a given event
- Maintain knowledge of the current security threat level by monitoring related Internet postings, Intelligence reports, and other related documents as necessary
- TS/SCI clearance with polygraph
- Experience in cyber security analysis, incident response, or related area
- 8570-compliant IAT Level I or CND-A certification
- Prior experience in threat research or intelligence analysis
- Experience in tracking cyber threat and malware campaign activity
- Ability to conduct preliminary malware analysis
- Ability to create, modify and implement SNORT and YARA signatures
- Experience in network forensics with emphasis on detection of malicious activity
- Scripting and task automation skills
216
Senior Associate, Cyber Services Resume Examples & Samples
- Develop Information Governance and Information Security Strategy plans, and perform assessments using industry framework, such as ISO 27002 or NIST 800:53
- Identify technological opportunities and evaluate the Information Security and privacy impacts on the client's business
- Provide support with four or more of the following areas: Information Security Risk Assessment, Data Protection and Privacy Impact Assessment, Data Classification, Information Governance, Enterprise Information Security Strategy, Compliance Monitoring and User Awareness campaign, Data Leakage/Content Monitoring and Filtering, Data Encryption, and Compliance Readiness, such as PCI and HIPAA
- Bachelor's degree from an accredited college/university and three years of work experience an Information Security role; Master's degree preferred
- CIPP or CIPP/IT certified; non-certified hires are required to become certified within one year from the date of hire
- Prior Big 4 Consulting or Advisory experience preferred
217
Associate, Cyber Services Resume Examples & Samples
- Assess vulnerabilities in a variety of systems and applications
- Exploit vulnerabilities as a proof-of-concept for inherent weaknesses
- Execute penetration tests against infrastructure and applications in accordance with pre-defined scope and client needs
- Proficiently utilize penetration testing tools such as Nessus, nmap, WebInspect, Burp Suite, and/or Retina
- Assist with security configuration and testing of networking and operating systems, such as TCP/IP, WAN/LAN routing, VLAN architecture, and a wide array of large-scale environments, including various major web application servers
- One year of experience in Information Security or in a technology related field
- Knowledge base in wireless network security protocols, operations, systems evaluation and architecture
218
Senior Associate, Cyber Services Resume Examples & Samples
- Support Information Security projects involving strategy, implementation, technical delivery, software/hardware optimization related to IT operations, business processes, business resiliency, security, and data integrity
- Assist with planning, designing, implementing, testing and operating cyber security processes and systems
- Evaluate current threat landscape and mitigations
- Facilitate business process design, as it relates to identities and access privileges, such as architecture, delegated administration models, workflow models, and access control models
- Utilize Cyber technologies, such as RSA NetWitness, Damballa, FireEye, Mandiant MIR, HBGary Responder Pro, EnCase, MITRE CRITS, ThreatStream, ThreatConnect, home-grown intelligence or collection management systems
- Articulate business risks of technical vulnerabilities to client personnel
- Functional certification such as MCSE, CCNA, CNE, CCIE, Archer, ArcSight preferred
- Three years of experience with Information Security or in a technology related field
219
Cyber ISR Analyst Resume Examples & Samples
- 3+ years of experience as an Air Force targeteer
- Experience with Analyst Notebook, link analysis, Falconview, AMHS, Intelink, JWICS or SIPRNet, GCCS, C2PC, Internet relay chats, Gale-Lite, Coastline, Pathfinder, Wrangler, and Anchory
- Knowledge of SIGINT, IMINT, and HUMINT databases and tools for analysis and target development
- Completion of Basic, Intermediate, or Advanced Digital Network Analysis Courses
- Experience as a counter-terrorism analyst
- Experience in an Air Operations Center, 624th Operations Center, or on 24th Air Force staff
- Experience with a military operations command
- Experience in the support of combat operations
- Knowledge of national intelligence programs or systems
- Ability to work in a fast-paced environment and adapt to changes in tasking
- Ability to work independently and analyze Air Force Cyber targeting requirements
- Ability to prepare clear, concise, and visually enticing documents for senior leaders
- Possession of excellent organizational, interpersonal, teaming, and analysis skills
- BA or BS degree in Intelligence or a Cyber-related field
220
Cyber Anst Prin Resume Examples & Samples
- Strong understanding of the hardware and software in support of the mission
- Convey, both orally and in writing, proposed solutions
- Strong ability to evaluate the timelines and level of effort for technical tasks
- BA/BS degree in Information Technology or Information Security or Computer Science or another related field of study or equivalent 9 to 12 years performing cyber threat intelligence analysis
- Technical skills proficiency in the following areas: network communication using TCP/IP protocols, basic system administration, basic understanding of malware (malware communication, installation, malware types), intermediate knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch, open source information collection.- Report writing proficiency
- Ability to modify the architecture of the system to gain efficiencies for both data collection and the ability to avoid system bottlenecks
221
Cyber Sec Analyst Resume Examples & Samples
- Operate and troubleshoot network security infrastructure to include firewalls, intrusion detection and prevention systems, content filtering and spam filtering systems
- Recommend network security architecture changes to mitigate risks while maintaining operational capabilities
- Interpret, analyze and implement Cybersecurity policies and orders on an operational network
- Analyze network or system changes/reconfigurations for security impacts
- Participate in Cybersecurity risk analysis and assessments, as required
- Candidate must have experience managing firewalls. Experience with Cisco firewalls is a plus
- Candidate must have experience working with switches and routers. Experience with Cisco systems is preferred
- Candidate must have a solid familiarity with application and network security
- Candidate must be able to provide technical subject matter expertise for a wide range of security technologies including, but not limited to Intrusion Protection and Intrusion Detection Systems (IDS/IPS), web content filtering, perimeter access controls, logical access controls, identity and access management, and data loss prevention
- Candidate must have an understanding of vulnerabilities, exploits, and practical working knowledge of DoD Cyber Security program
- Candidate must have strong communications skills, both verbally and in writing
- Candidate must be able to interpret and apply DoD Cyber Security orders, policies and procedures
- Candidate must have good analytical and creative problem solving skills
- Military Experience (Active Duty or Reserves)
- Experience with Cyber Security in a Joint and Coalition Partner environment
222
Cib-cyber Resume Examples & Samples
- Work with the rest of the CIB Cyber leadership team to drive risk reduction and demonstrate value-added from the Cyber function within the Banking division
- Act as primary point of contact to Banking leadership for all Cyber issues
- Work closely with global and regional leaders across Banking to successfully manage the Cyber risk posture and messaging
- Partnering with senior business and technology stakeholders across multiple geographies
- Communicate and gain support for Cyber strategic uplift programs and roadmap
- Conduct Cyber Risk Assessments in partnership with the control office functions
- Engage directly with Banking clients on Cybersecurity related topics
- Regularly attend key governance forums as part of the extended Banking Technology management team
- Advise the Business on additional technology innovation, efficiency and best practices including automated testing, by leveraging the broader BISO organization
- Work effectively and efficiently with multiple business partners, functional teams, and technology partners to deliver projects
- Ensure projects are executed within agreed upon timeframe and successfully adopted as part of ongoing operations; implement effective operating model / process responsibilities; be accountable for change and perform post-implementation health checks
- Communicate at senior levels, attend and present information at global / regional steering meetings using excellent inter-personal skills
- Influence decision making through analysis; articulate business benefits and be storyboard driven to secure stakeholder buy in
- Critical thinking to proactively identify and develop new ideas / innovations / approach that will add values to the business and the team
- Strong data analysis, both quantitative and qualitative
- Proficient with Microsoft Project, PowerPoint and Excel
- People Management Experience - Previous experience of running a small team, ability to coach and lead more junior members of the team
- Good reasoning and logic, problem solving skills
- Extensive industry experience with knowledge of Investment Banking back office functions
- Exposure to financial services environment preferably in Investment Banking or from Consultancy
- Highly energetic self-starter with a relentless focus on execution
- Self-motivated individual, comfortable working without close supervision and with ability to meet or exceed deadlines
- Program Management Experience – With a proven track record of running multiple streams of work simultaneously covering business / regulatory change
- Exposure to Cyber and information security regulatory requirements
- Experience leading technology projects within CIB business a plus
223
Cyber Software Architect Resume Examples & Samples
- BS in Computer Science / Electrical Engineering or related discipline with 14 years of experience; 12 years with MS, 9 with PHD
- Active DoD 8570 Certification or willingness to obtain within a year of starting (e.g., CISSP)
- Applicant must be able to obtain and maintain a DoD Top Secret Security clearance and be able to achieve Tier 1/2 access for SAP/SAR program
- Understanding of networking and OSI reference model
- Flexibility to multi-task in a fast-paced environment supporting multiple customers in different domains concurrently with travel required
- Strong Java development skills
- Deep understanding of secure software development processes, methodologies and tools
- Strong understanding of computer architecture and software development skills including design patterns, threading/concurrency, resource pooling, memory management, defensive programming and socket I/O development
- Developing external interfaces in compliance with Interface Control Documents such as IETF RFCs for network protocols
- Java, C/C++, XML and related technologies and automated tools for continuous integration
- JavaFX, HTML5/CSS3
- Familiarity with Trusted OS configuration for Mandatory Access Control (MAC) and secure virtualization (e.g., SELinux and Kernel-based Virtual Machine)
- UNIX sockets experience
- IP, UDP, TCP Protocol understanding
- Advanced Unix knowledge and experience for system hardening
- Knowledge and familiarity with Boot Integrity (TPM)
224
Senior Consultant Cyber Resume Examples & Samples
- Accountable for the quality of own work; to be delivered within agreed procedures and timeframes, and focused on internal and/or external customer needs
- Maintain proficiency in Security tools and processes used by Microsoft in order to thoroughly answer customer concerns
- Continually refine and update recovery IP based on security best practices and attacker trends
- Familiarity with real-world APT tools, tactics, and procedures used for malicious intent
- Familiarity with deploying and building solutions in Microsoft Azure both PaaS and IaaS
- Experience with automation and scripting, preferably with PowerShell
- Ability to work across multiple organizations, to identify and execute solutions
- A BS in Computer Science or Engineering or 6-8 years of comparable security experience
225
Cyber / Nuclear Expert Resume Examples & Samples
- 9 – 13 years experience with BS degree in nuclear engineering, electrical engineering, computer science or related field; 7 – 11 years experience with MS; or 4 – 8 Years with PhD
- Demonstrated knowledge of nuclear facility operations, the nuclear fuel cycle, and electrical engineering
- 3 + years experience writing code in C++, Java and/or other languages commonly used in industrial control system environments
- Experience with cyber threat assessment and mitigation strategy development in industrial control systems
- Experience with computer forensics and cyber security assessments
- Demonstrated network of technical contacts
- A demonstrated ability to express ideas clearly in oral and written form
- Knowledge of control systems security, especially as it relates to process control and digital instrumentation & control systems in a nuclear facility
- Knowledge of international nuclear power plant technologies and cyber security
- Experience working with the IAEA and member states
- Experience with nuclear, cyber security, or non-proliferation policy
226
Cyber Vulnerability Analyst Resume Examples & Samples
- Draft System Security Plans
- Design, implement and monitor Intrusion Detection Systems for anomalies and perform further network forensics/analysis as necessary
- Perform penetration testing against system test beds to evaluate effectiveness of system configurations to include validation of system software and hardware configurations
- Perform in depth inspection of networks focused on TCP/IP protocol analysis
- Serve as the SME on incident response and coordination in response to any Information Assurance concerns
- Assist with vulnerability assessments including evaluation of specific configurations of network devices and network enabled software applications on both Windows XP/7 and Linux platforms
- Expertise in running and analyzing results of NESSUS scanning tool
- Securely configure Linux and Windows XP/7 platforms and maintain currency on relevant best practices
- Deploy and integrate ISD Sensors/taps, packet capturing, and port spanning in a Cisco ASA environment
- Implement approved One Way Transfer systems and coordinate with Sponsor review boards of same
- Operate at the advanced level open source security tools and vulnerability scanners including Wireshark, ngrep, nmap, Metasploit, tcpdump, and Snort
- Operate at the advanced level propriety security tools including Netflow, CS Mars, and Scrutinizer
- Understand and operate at the advanced level Cisco ASA and PIX devices, iptables and IPSEC VPN implementations on Linux Kernels 2.6 and beyond
- Understand and the advanced level network data exfiltration issues and physical computer forensics including live memory exploitation
- Information Security Certification such as: Cisco Certified Security Professional (CCSP); Global Information Assurance Certification (GIAC), Cyber Security Essentials Certification (GSEC), Penetration Testing Certification (GPEN), or GIAC Security Expert (GSE) Certification
- Cisco CCIE, CCNP, CCNA certifications
- Bachelor’s degree in information technology and/or an engineering discipline
- Previous IC information security work experience
227
Cyber Proposal SME Resume Examples & Samples
- 5+ years of experience with Cyber management consulting or business development
- Experience with creating Cyber proposals
- Knowledge of Cybersecurity trends and advancements across the industry
- Ability to articulate requirements into actionable plans and desired outcomes
- Knowledge of OTIS and CRM tools
- Knowledge of the Booz Allen proposal development process
- Ability to be a self-starter and set and attain goals
- Ability to handle, maintain, and respond to requests quickly, as required
- Ability to be organized and respond rapidly to leadership requests for information
- Ability to analyze and report on data in Excel, SharePoint, and database tools
228
Cyber Targeter Resume Examples & Samples
- 3+ years of experience in a threat intelligence analysis role as a targeter, threat analyst, or intelligence analyst
- Experience with federal law enforcement and the intelligence community
- Experience with conducting strategic and tactical intelligence analyses
- Experience with identifying, enumerating, and targeting of persons of interest related to Cyber network exploitation, foreign intelligence, and counterterrorism
- Experience with identifying Cyber tactics, techniques, and procedures
- Experience with source operations and collection
- Experience with sociocultural and sociopolitical affairs pertaining to Asia, MENA, and Eurasia
- Experience with a foreign language, including Mandarin, Russian, Korean, Arabic, or Farsi
- Experience with Cyber technical expertise, including Netflow analysis, forensics, and malware
- Experience with all-source analysis
- BA or BS degree in Cyber, Law Enforcement, or an Intelligence-related field
229
Cyber ISR Analyst Resume Examples & Samples
- Experience as a counter-threat analyst
- Experience in an Air Operations Center, 624th Operations Center, or 24th Air Force staff
- Experience with supporting combat operations
230
Cyber Project Planning Engineer Resume Examples & Samples
- Candidate must be capable of working on multiple projects simultaneously
- They also must be willing to do local travel to Arlington, VA on a regular basis while working primarily in Chantilly
- They must have demonstrated experience with: -Systems Engineering and the Systems Engineering Life Cycle -Planning Projects to include tailoring, preparing for and assessing readiness for Gate Reviews -Coordinating with project teams to ensure timeliness of deliverables and actions -Understanding of project dependencies and associated impacts -Identifying risks across the program and resolving systems engineering issues -Writing and reviewing project artifacts with an eye toward improving the quality of deliverables -Developing process flows and documenting standard operating procedures to ensure processes are clearly defined and communicated
- The candidate must be: -A strong communicator (Verbal and Written) - able to understand and communicate technical concepts in non-technical terms. -Execution-focused -Detail-oriented to ensure that projects stay on-track
- 3+ years of Project Planning experience
- 8-10 years of systems engineering experience
231
Cyber Eng Prin Resume Examples & Samples
- 10+ years experience in hands-on CND operational and/or security analysis position
- Experience working on and supporting classified networks in the IC
- Experience working in a team environment on similar tasks
- Experience in cyber security tactics, techniques, and procedures
- Master’s degree in IA, Computer Networks, or Cyber Security
232
Cyber Eng Resume Examples & Samples
- Act as a trusted advisor to senior leadership with extensive evidence of ability to provide strategic and tactical direction in leading activities in support of team and enterprise objectives
- Bachelor’s degree in IA, Cyber Security, or a technical field
- 5+ years experience in hands-on CND operational and/or security analysis position
- SOC and/or CIRT operational experience
- Network LAN experience
- Bachelor’s degree in IA, Computer Networks, or Cyber Security
- IT certifications--managerial or technical certifications such as Cloud Security, PMP, CISSP, MCSE, RHCE, CCIE, SANS, etc
233
Cyber Lifecycle Management Resume Examples & Samples
- Accountable for developing, coordinating, and maintaining process documentation library
- Standard operating procedure gap analysis and creation
- Documentation, management, & tracking of patch and vulnerability management processes
- Conduct research on patch and vulnerability management process best practices
- Develops process diagrams, workflows, and workflow automation of end to end patch and vulnerability management processes
- Business and process improvement: Identifies opportunities for business or process improvement; makes associated recommendations as appropriate
- Develops business cases with cost-benefit dimensions of proposed work efforts to be used at management and executive levels for funding and scope decisions
- Evaluate and recommend alternative operational efficiencies
- Work under limited direction, plan schedule and arrange own activities in accomplishing objectives
- Identify and document cross-functional functional requirements, workflows, information sources and distribution paths
- Identify process risks and participate in mitigation activities
- Communicates and escalates issues promptly and to the right level of management
- Prepare accurate presentations and reports from verbal and written directions
- Maintain internal Wiki sites and other job aids/toolkits
- Exercises limited discretion within defined boundaries
- Total of 6-8 years, to include two or more years in a risk management or cyber security consulting role
- Preferred Six Sigma, ITIL or equivalent certification
234
Cyber Resume Examples & Samples
- Interface with IT/IM Department management and cyber workforce as required to provide written Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) and/or the Risk Management Framework (RMF) Validation strategies for NAWCWD using acceptable practices, processes and approaches
- Provide information as necessary to the Command IAM to ensure validation compliance
- Become familiar with the technical requirements for IA controls on hardware and applications
- Serve as a member of the IA Scanning and Hardening Team that provides system security scanning and system and application hardening in support of system certification and accreditation
- Provide analysis of validation findings to the IA Division Head and Command IAM to identify IA trends and provide recommendations for IA posture improvements
- Assist clients with developing and maintaining IA and IT programs required to establish and maintain compliance with DoD directives
- Ability to plan, organize, prioritize, track, manage, learn new skills, and communicate orally and in writing is required
- Familiarity with DIACAP and RMF processes, experience with providing IA or IT support to a Navy or USMC client desirable
- Proficiency with using the internet and with Microsoft Office products including e-mail, Word and Excel required
- Current driver’s license, car registration and auto insurance required
- Requires the ability to possess a government CAC card
235
Northrop Grumman Cyber Hiring Event Resume Examples & Samples
- Cyber Incident Response Analyst
- Cyber Information Assurance Analyst (aka Network Security Analyst)
- Malware / Digital Forensics Analyst
- Cyber Threat Intelligence Analyst
- Technical Writer
- Cyber Exercise Planner
- Cyber Systems Administrator
- Cyber Software Engineer
- Business Process Analyst (Process improvement, CMMI and ITIL experience)
- Cyber Project Manager
- An active Top Secret Clearance with SCI eligibility and a Bachelor’s Degree is required for consideration**
236
Cyber Lessons Learned Analyst Resume Examples & Samples
- 15+ years of experience with Cyber, communication, or network operations
- Experience with conducting threat analysis
- Experience with the operation of C2 applications through the effective integration of air, space, and Cyber capabilities
- Experience with planning, leading, and completing complex projects
237
Cyber O&M Site Lead Resume Examples & Samples
- 5+ years of experience with information security and technology, network operations, IT strategy development, Cybersecurity, systems administration, or computer forensics
- Experience with leading troubleshooting efforts and escalation issues to advanced technical teams, OEM vendors, or management
- Ability to interface with CISO-level agency executives on a regular basis and manage scope through enforcing processes and procedures
- Experience with integrating Cyber security data using enterprise or custom tools and data aggregation and analysis tools, including Splunk
- Experience with operating Cyber security tool consoles
- Experience with using IT Service Management tools, including BMC Remedy or ServiceNow
- Professional Certifications in IT service management or project management
238
Cyber Protection Product Owner Resume Examples & Samples
- Strong background in one or more Hosting technologies (Wintel, Linux, Mainframe and Databases)
- The ability to work as part of a team with architecture, development and operational responsibilities
- Initiative and a passion for all things security-related, and a willingness to go the extra mile
- Experience in utilising and extending standard security protocols
- The ability to drive the DevSecOps mindset in the team
- A background in architecture, and/or experience as service owner
- Experience in a DevOps environment, particularly in product ownership
- Database, Linux or Windows configuration
- Hosting endpoint protection tools (Host Firewall, Antivirus, application White listing)
239
Cyber Mobility Engineer, Senior Resume Examples & Samples
- 5+ years of experience with wireless implementation and support of advanced network design and architectures, including 3G or 4G cellular and 802.11a, b, g, or n and PAN technologies, such as 802.16 Bluetooth, ZigBee, near field communications, and ANT
- 5+ years of experience with designing, implementing, and supporting wireless access points and controllers, including Cisco, Aruba, or other major vendors
- 4+ years of experience with wireless network and with analysis of host data at rest, operating systems, file hashing, forensic acquisition and analysis, packet capture and analysis, and mapping and discovery
- Experience with packet or protocol fault analysis for common IP and Ethernet protocols and with troubleshooting wired and wireless connections using wireless traffic analyzers, including Wireshark, TCPDUMP, or OmniPeek
- Experience with mobile sensors and related analytic
- Experience with using or integrating Telecommunications Expense Management (TEMS) solutions and Mobile Device Management (MDM) solutions
- Experience with reverse engineering or binary analysis a plus
- Knowledge of IC or DoD Cyber defense authorities, doctrine, and policies
- BS degree in Engineering, CS, IT, or a related field preferred or MA or MS degree in Engineering, CS, IT, or a related field a plus
240
Cyber Incident Responder Resume Examples & Samples
- Vulnerability/Compliance Scanning and Remediation
- SIEM Management and Information Security Incident Response
- Consults WC Infrastructure team on infrastructure operations and security related topics
- System File Integrity Management
- System Policy Compliance Management and Auditing
- Antivirus Endpoint Administration and Web Filter Management
- Security Exception Documentation and Implementation
- Enterprise Risk Assessments
- Application Firewall Management
- PEX/Risk Request Submission and Ownership
- 10 – 20% travel anticipated for this role
- Bachelor's Degree (or higher) or a High School Diploma/GED with 4+ InfoSec experience
- Certification: CISSP (Certified Information Systems Security Professional) or CISM (Certified Information Security Manager)
- Ability to obtain favorable adjudication following submission of Department of Defense form SF86 NAC form SF86
- Experience with administering SIEM technologies (i.e. Splunk, ArcSight, LogRhythm)
- Experience with Information Security/Cyber Incident Response
- Experience with endpoint solutions and integrity monitoring (i.e. Sophos, Tripwire Enterprise, HBSS, McAfee ePO)
- Experience with managing a vulnerability scanning solution (i.e. Nexpose, Tripwire, Qualys, Nessus)
- Knowledge of NIST 800-53 rev 4
- GCIH or OSCP Security Certification
- Knowledgeable in Linux Server and Web Server Administration
- Patch and Patch Compliance Management
241
Cyber Incident Auditor Vulnerability Analyst Resume Examples & Samples
- BS Degree +4 Years managing a technical task or projects, three (3) of those years managing information assurance tasks or projects / MS Degree +3 Years managing a technical task or projects, two (2) of those years managing information assurance tasks or projects
- Thorough understanding of the Information and Incident Response and auditing process
- Hands on experience with Audit Planning and data collection techniques
- Hands on experience with Incident Detection Techniques including the use of Vulnerability Assessment Tools
- Hands on experience Auditing Network Architectures, Microsoft Domains/Protocols and UNIX network environments, Also auditing Microsoft OSs, UNIX/Linux based OSs, Network IOSs and other operating systems (e.g. Mainframe, CDS, SAN Fabrics Custom configurations, etc.)
- Knowledge of Auditing of databases, Auditing WEB/Mobility Services, Auditing Applications and Auditing Supply chain security
- Experience working with Client CSIRTs
- Participated in no less than two (2) security assessment projects in the previous two (2) years
- Any of the following certifications: GSNA, CEH, CISA, CRISC, CISSP, CISSP-ISSEP, CISSP-ISSAP
- Top Secret Clearance required to start with ability to obtain and maintain a Poly
- Experience with Red-Teams, vulnerability and assessment, and penetration testing
- Degree in management, management information systems or computer science
- TS/SCI clearance with full scope polygraph
242
Cyber Resume Examples & Samples
- Provide a high level of customer service that meets customer expectations and delivers quality products and services. Deliver high quality solutions based on customer concerns and requirements. Provide accurate and timely response to customer questions or concerns
- Responsible for conducting validation procedures to confirm or establish by testing, evaluation, examination, investigation, or competent evidence that the assigned IACs are implemented correctly and are effectively
- Perform the requisite preparatory steps and conditions, validation steps, compare results, and analyze impact and risk
- Responsible for providing the CA and the DAA with an accurate technical evaluation of the application, system, or network, documenting the security posture, capabilities and vulnerabilities against relevant IACs, and a drafting a statement of preliminary or residual security risks for system operation
- Serves as a trusted agent of and reports to the CA while working with the Program Manager and User Representative
- Completion of Navy Certifier Course a plus (Basic, Intermediate or Expert Level Fully Qualified Navy Validator)
- Experience with supporting annual FISMA requirements
- Experience with system vulnerability management or security patch implementation
- Experience with the implementation of National Institute of Standards and Technology (NIST) special publications, federal regulations, and DoD policies
- BA or BS in Computer Science or a related discipline is degree a plus
243
Lead Cyber Resume Examples & Samples
- Serve as the creative technical leader of large groups containing FFRDC, contractor, and government personnel at multiple sponsor sites battling common problems
- Engage with experts within MITRE and from the IC and DoD to identify and resolve big data analytic challenges
- Engage with MITRE and Government leadership to communicate the reality of big data analytics within sponsor spaces
- Represent MITRE and sponsors at external engagements including high level technical exchanges and community conferences
- Lead the creation of emerging technologies, perform selections and integrate capabilities to discover and establish new analytic techniques and procedures on behalf of MITRE and sponsors
- Identify, acquire, apply, and discover creative capabilities for new and advanced analytic technologies
- Provide leadership within a strong and established community of analytic tool users, developers, and data experts internal and external to MITRE
- Leverage and grow significant relationships within the IC and DoD for collaboration
- Continue professorship engagements within the academic community
- Advise peers and colleagues through influence, advanced expertise, and collaborative approaches to problem-solving
- Serve as the leading subject matter expert in a broad field of future analytic capabilities
- Demonstrate advanced capabilities directly with users
- Expert C, C++, Java, Python, and SQL
- Knowledge/experience with mobile technology, wireless and cellular technology
- Operational knowledge/experience within the DoD and/or IC
- Research published in recognized conference proceedings or journals
- Knowledge/experience as an academic researcher and professor
- Experienced, recognized expert in the DoD and IC communities
- Experienced, recognized expert in the field of analytic tools and technology development for multiple and diverse applications, missions, and purposes
- Experience gathering and understanding end user needs and requirements and translating them into sound engineering products, and then delivering on those expectations is a must
- Previous experience in geographic information systems (GIS) applications, geospatial information, data, and technologies, and/or geo-information science
244
Cyber Application / Software Developer Resume Examples & Samples
- Bachelor’s Degree in Cyber Security, Information Technology or a related technical discipline with a minimum of 9 years related experience required
- Active Top Secret Security Clearance is required. In addition, selected candidate must be able to obtain and maintain a favorably adjudicated DHS background investigation (EOD) for continued employment
- Demonstrated experience in developing and deploying software platforms used across multiple products
- Demonstrated experience with database query based web applications and programming using languages such as Java, Python, HTML, CSS, JavaScript, JQuery, JSON, PHP and APIs
- Demonstrated knowledge or hands on design experience with Web Services/Environments such as REST, SOAP
- Strong grasp of security principles and how they apply to web applications (e.g. customized ldap authentication)
- Demonstrated experience ensuring accuracy of code through testing, requirements analysis, writing clear documentation & assisting with problem resolution
- Demonstrated experience analyzing and translating functional specifications & change requests into technical specifications
245
Cyber Response Analyst Resume Examples & Samples
- 3+ years of experience with performing host or network incident response
- Experience with system administration, network engineering, and security engineering
- Knowledge of host and network log sources to apply to investigation, IR methodology in investigations, and the groups behind targeted attacks and tactics, techniques, and procedures (TTPs)
- Ability to perform analysis with close attention to detail and to display solution orientation to learn and adapt quickly
- Ability to lead and serve a team to complete the mission and work well under pressure to rapidly scope and investigate incidents
- Ability to apply originality and creativity in problem-solving
- Ability to be a self-starter, quick learner, and detail-oriented
246
Csfc Global Cyber Crisis Management Head-svp Resume Examples & Samples
- 15-20 years of security or intelligence experience particularly in regard to understanding threat actors and their tactics, techniques, and procedures
- Demonstrated ability to lead globally diverse teams focused on security challenges
- Proven written and oral communication skills essential. Writing samples will be required
- Previous experience in education or training essential
- Operational planning experience that includes cyber/technical disciplines
- Strong background working with law enforcement and intelligence organizations
- Demonstrated ability to understand, collate and explain complex information to a variety of audiences
- Background leading a writing or analytic teams that met hard deadlines
- Understanding of cyber security topics, the internet, and security with a passionate desire to learn more
- Experience working in a security operations, military operations, intelligence assessment or cyber fusion center environments preferred
- Demonstrated ability to collaborate on information technology related topics with multiple teams
- Ability to quickly review information to determine its significance, validate its accuracy and assess its reliability and present findings to both technical and non-technical audiences
- Demonstrated capability to produce written products on a reoccurring basis incorporating findings from cross-functional and cross-enterprise teams
- Strong understanding of the tools and sources available to conduct cyber security alerting, analysis, and enhanced situational awareness
- Some foreign language proficiency a plus
247
Cyber Graduate, Consulting Resume Examples & Samples
- We offer the chance to carry out information and cyber security risk assessments
- You will assess compliance against security frameworks
- The opportunity to have insight into the appropriateness of such security frameworks
- The prospect of helping clients understand legal and technical issues related to data privacy
- An environment enabling those of a technical nature the opportunity to perform penetration testing services, “breaking into” client systems to identify weaknesses
- Very strong academic record (strong grade point average from a reputable school)
- A demonstrable ability to solve complex problem objectively, using an appropriate combination of analysis, experience and judgement
- Demonstrable interest in the topic of cyber security
- History of leadership amongst your peers and an outgoing and enthusiastic personality
- Highly fluent English skills, both written and verbal, are required; German or French skills are strongly desired. One of these three languages must be native-level
248
Cyber Leader Resume Examples & Samples
- Serves as a subject matter expert with regard to cyber security system
- Interlock with key stakeholders to develop cyber secure solutions
- Cyber solution presentation and clarification
- Provide inputs into the design of cyber systems and plant floor networks
- Conduct compatibility tests of hardware and software, ensuring compliance with security requirements
- Lead team to ensure successful delivery and take part in pre-sales actives
- Working experience with Automation vendor (Honeywell, ABB, Siemens, etc.), or its SI partner systems
- SCADA/ICS background, understand industrial network infrastructure & protocols, basic understanding of various industrial setup
- Currently or previously in project based role, understand project methodology
- Worked in cyber security projects or currently held OT cyber security position
- Minimum 5 years of cyber security related work experience
- Knowledge of networks, risk management, security threats and techniques
- High level of interpersonal skill required to collaborate with project engineers and other organizations
- High level of communication skills, both written and oral
- Engineering Bachelor Degree, Electrical or Computer Engineering. Exceptions may apply based on past experience/job profile
249
Cyber Capabilities & Requirements Analyst Resume Examples & Samples
- Perform cyber weapon system analysis and develop strategic METs and CONOPS
- Perform activities to support the development of Joint and Air Force emerging cyber requirements
- Perform ISR capabilities analysis to determine ISR enterprise health of current and emerging AF and DOD ISR requirements
- Perform policy development support for full spectrum cyberspace operations
250
Cyber Technologist Resume Examples & Samples
- The ability to quickly learn new skills and gain expertise across our qualifications spectrum
- Self-starter who is energized by new problems
- Collaborative personality
- Knowledge of or ability to learn Python strongly preferred