Senior Information Security Resume Samples

4.6 (101 votes) for Senior Information Security Resume Samples

The Guide To Resume Tailoring

Guide the recruiter to the conclusion that you are the best candidate for the senior information security job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.

Craft your perfect resume by picking job responsibilities written by professional recruiters

Pick from the thousands of curated job responsibilities used by the leading companies

Tailor your resume & cover letter with wording that best fits for each job you apply

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Resume Builder
CHOOSE THE BEST TEMPLATE - Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS - Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES - Instantly download in PDF format or share a custom link.

Resume Builder

Create a Resume in Minutes with Professional Resume Templates

Create a Resume in Minutes
KD
K Dach
Kraig
Dach
69605 Kiley Inlet
Houston
TX
+1 (555) 699 0717
69605 Kiley Inlet
Houston
TX
Phone
p +1 (555) 699 0717
Experience Experience
New York, NY
Senior Information Security
New York, NY
Breitenberg, Waelchi and Sipes
New York, NY
Senior Information Security
  • Provide recommendation for continuous improvements to the risk management process, controls monitoring and TRM program
  • Provide guidance for technology processes and procedures to be documented and assist in collecting necessary documentation to facilitate the process
  • Execute risk identification, quantification, and management efforts related to the technology organization
  • Provide input to periodic updates on risk management projects for senior executives
  • Assist with network and application security penetration testing activities, including scheduling, resources, tool execution, and reporting
  • Develop reports using data that is hosted in multiple sources (e.g. spreadsheets, databases) and communicate clearly to management and other team members
  • Performs technology risk assessments and reports on findings, consult on remediation plans, track status, aggregate results and report to Management
Chicago, IL
Senior Information Security & Privacy Analyst
Chicago, IL
Keebler Inc
Chicago, IL
Senior Information Security & Privacy Analyst
  • Prepare, validate, and maintain security documentation including, but not limited to: system security plan (SSP), risk assessment (RA), contingency plan (CP), privacy impact assessment (PIA) and FIPS categorization
  • Provide support for the security life cycle of major applications and the general support system to the CGI Federal project team and client stakeholders
  • Work with all levels of CGI Federal and client project team members and establish and maintain a strong customer-focused working relationship
  • Advise the CGI Federal project team to address security and privacy weaknesses identified when working with the team
  • Prepare and deliver security and privacy awareness training to different CGI Federal project team audiences
  • Identify and mitigate security risks especially if different from risks managed at the project level
  • Collaborate with the CGI Federal project team to manage security assessments (Security Assessment and Authorization [SA&A] or Certification and Accreditation [C&A] activities) and audits
present
Chicago, IL
Senior Information Security & Risk Portfolio Manager
Chicago, IL
Champlin-Tremblay
present
Chicago, IL
Senior Information Security & Risk Portfolio Manager
present
  • Project management fundamentals: advanced knowledge of schedule, risk management, issues management, leadership, and can train others
  • Develop and maintain program and project level status and reporting to stakeholders and management
  • Ensure communications within project/program teams, portfolio teams, and others are of highest accuracy, and consistent with overall messaging the organization supports. Ensure communications are considered within the larger context of organizational change and organization credibility, and drive staff and project/portfolio teams to carefully consider and measure communications in this light
  • Facilitate development of t-shirt estimate for all new demand. Ensure all groups/teams provide input to the estimation process, and all assumptions are captured
  • Ensure compliance with project framework, and adherence to established project lifecycle
  • Ensure project reporting, data and controls are handled effectively and quickly by the project manager assigned to the projects
  • Develop high level and detail schedule for project implementation
Education Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
University of South Florida
Bachelor’s Degree in Computer Science
Skills Skills
  • Working knowledge of common operating systems (Windows, Linux, etc.) and basic endpoint security principles
  • Knowledge of software licensing, product and vendor evaluation, technical troubleshooting, and process improvement
  • Knowledge of common networking services and protocols (TCP/IP, SSH, FTP, DNS, DHCP, SMTP, SSL, etc.)
  • Expert level knowledge of common security technologies (IDS, Firewall, SIEM, etc.)
  • Working knowledge of IT audit and control, governance, asset management, change control, training delivery, and technical writing/documentation
  • Knowledge of regular expressions
  • Demonstrated ability to analyze and correlate information from a wide variety of enterprise technologies
  • Knowledge of data science, data visualization, mathematics, and/or statistics
  • Knowledge of common security analysis tools & techniques
  • Understanding of common security threats, attack vectors, vulnerabilities and exploits
Create a Resume in Minutes

15 Senior Information Security resume templates

1

Senior Information Security Business Process Analyst Resume Examples & Samples

  • Define and manage the GC IS (Global Consumer Information Security) Reengineering Playbook and Roadmap
  • Drive execution of reengineering actions to ensure that GC IS meets productivity and expense targets
  • Identify large process standardization initiatives that will improve value and efficiencies
  • Supports design and implementation of GC Information Security service delivery model to drive execution of strategic and BAU (business as usual) IS activities
  • Support GC IS PMO to drive the successful and timely completion of multiple change programs and reengineering initiatives
  • Support and provide guidance in determining functional staffing requirements via capacity planning and value management
  • Superior level of persuasive skill, coupled with the ability to engage directly with delivery teams and senior stakeholders
  • Redesign processes to reduce risk, improve standardization and improve productivity
  • Establish and leverage cross-functional relationships to strengthen communication, improve productivity, and resolve issues
  • Independently analyzes activities/processes supporting projects and programs; captures data through interviews, workshops and studies; constructs recommendations and action plans based on findings
  • Facilitates problem root cause analyses and identify action plans to address root causes to solve various business and process issues to achieve project/ program objectives
  • Keeps abreast of developments in the industry relating to productivity skills/tools and applies it to projects
  • Ensure effective project closure including the validation of successfully meeting/exceeding project objectives, post project assessment (i.e. lessons learned) and provision of feedback on project resource performance
  • Ability to design and implement quality measures to gauge process effectiveness both baseline and post-improvement including ownership and management of benefit realization
  • Manage GC IS capacity plan
  • 8 yrs experience in relevant function/role
  • Good understanding of consumer banking products, business operations and how Information Security can support banking strategy
  • Thorough understanding of shared services model with understanding of value and efficiency drivers
  • Very high level of thought leadership; ability to engage senior stakeholders; results leadership; driven to succeed
  • Experience in complex transformational initiatives desirable
  • Must have outstanding analytical abilities and a discliplined methodical approach to problem-solving
  • Understanding of process reengineering discipline and strong drive to deliver it by working closely with the stakeholders many of which may not be part of GC IS organization (e.g., technology, business partners, etc.)
  • Exposure to Lean Six Sigma desirable
  • Ability to work under pressure and adjust to changing focus and/or priority. Must be able to organize and prioritize multiple, concurrent priorities to completion without significant guidance
  • Self-starting, self-motivating, and able to work independently, multitask, and take ownership of various parts of a project or initiative
  • Strong verbal and written communication skills, as well as the ability to listen effectively and interpret results accurately
  • Relationship management skills with the ability to handle conflict and negotiations. Persuades and influences others through developed communication, facilitation, and diplomacy skills
2

Senior Information Security Ambassador Resume Examples & Samples

  • Client relationship building
  • Client Contract Reviews/Negotiations
  • Client Due Diligence Discussions
  • Engagement with business teams and leadership to raise awareness, garner support, and promote the IT Risk and Information Security program
  • Oversight of strategic, CISO sponsored projects
  • Participation as needed in cross-functional executive projects/committees
  • Able to converse with individuals and teams at any level within Northern Trust
  • Extensive knowledge of systems security architecture, excellent consultative skills, strong analytical ability and ability to work effectively with clients and IT management and staff. Analytical skills are needed to analyze and evaluate technical information
  • Knowledge of Information Assurance (IA) principles and tenets (confidentiality, integrity, availability, authentication, non-repudiation)
  • Knowledge of network security architectures, Defense-In-Depth principles, and technology administration security concepts
  • Knowledge of what constitutes a security or technology “threat” to a large enterprise
3

Senior Information Security Risk & Cyber Operations VP Resume Examples & Samples

  • VB Development Experience
  • DLP and behavioural analytic tools, such as Symantec DLP and Palantir
  • SIEM frameworks, such as ArcSight
  • Knowledge of Information Security pertaining to Vulnerability & Compliance management, Data Loss Protection [DLP], emerging threats and attacks
  • The ability to design, compose and present metrics, reports and summary analysis
  • Good attention to detail, strong analytical, quantitative, and investigative problem-solving abilities
  • Excellence with Microsoft Excel for data analytics is mandatory
4

Senior Information Security & Risk Portfolio Manager Resume Examples & Samples

  • Run complex security projects from design and development to production
  • Define and document project scope, requirements and plan
  • Develop high level and detail schedule for project implementation
  • Define resource requirements and work with functional managers to book required resources for projects
  • Proactively identify and resolve issues
  • Plan, schedule and monitor project deliverables, goals and milestones
  • Recognize opportunities for improvement and take initiative to implement changes
  • Develop and maintain program and project level status and reporting to stakeholders and management
  • Oversight of project/program success
  • Ensure compliance with project framework, and adherence to established project lifecycle
  • Drive project scoping activities. Ensure comprehensive turnover of learnings from scoping discussions to PM ultimately assigned to the project
  • Oversee project detailed estimation to ensure adherence to standard processes
  • Ensure communications within project/program teams, portfolio teams, and others are of highest accuracy, and consistent with overall messaging the organization supports. Ensure communications are considered within the larger context of organizational change and organization credibility, and drive staff and project/portfolio teams to carefully consider and measure communications in this light
  • Work collaboratively across the organization to ensure project/program plans, strategies/approaches, and resource deployment optimizes the intended result
  • Facilitate development of t-shirt estimate for all new demand. Ensure all groups/teams provide input to the estimation process, and all assumptions are captured
  • Facilitate partnership between IT and business to define technology projects/roadmaps which meet business planning and strategy objectives
  • Develop/maintain and publish portfolio level dashboard of project and portfolio health
  • Ensure project reporting, data and controls are handled effectively and quickly by the project manager assigned to the projects
  • Ensure valid decisions made with proper project actuals/forecast, portfolio data
  • Project data reporting to portfolio; utilization of standardized analysis approach for KTLO, enhancement, project, portfolio data
  • Cost/data analysis, trend analysis; brainstorm solutions to identified trends and issues in data
  • Capacity/resource planning and allocation at the portfolio level
  • Bachelor's degree or equivalent work experience required, preferably in IT Project Management
  • PMP desired (or comparable PM certification), Six Sigma certification strongly desired
  • 10+ years IT experience, 7+ years’ project management experience, 2+ years’ program management experience
  • 3+ years’ leadership experience, 3+ years’ personnel management experience
  • Experience with agile project management and process improvement methodologies (e.g. Scrum, Kanban, Six Sigma)
  • Experience managing Enterprise Security projects
  • Experience leading and participating in technical and cross-functional projects
  • Persuasive, encouraging, motivating and detail oriented
  • Must be able to learn, understand, and apply new technologies in a fast-paced environment
  • Strong organizational, presentation and communication skills
  • Experience in either Software as a Service or Consumer Web Organizations a plus
  • Supervision: demonstrated experience in supervising functional and technical staff
  • Mentoring: extensive experience in mentoring and guiding functional and technical staff
  • Budget management: extensive experience in maintaining and using project budget and actuals tracking to ensure costs are maintained within the specified tolerance level, and can train others
  • Impact analysis: extensive experience in independently assessing impact for each project aspect and determine if project can expand or not to address new idea, and can train others
  • Project planning: extensive experience in independently translating functional requirements into project plans, and can train others
  • Project implementation: extensive experience in effectively implementing all project phases, and can train others
  • Project management fundamentals: advanced knowledge of schedule, risk management, issues management, leadership, and can train others
  • Documentation: consistently clear, accurate, and can train others
  • Communication: consistently demonstrates advanced clear, articulate, concise; verbal and written
  • Organization/prioritization: consistently utilized and effective over own work
  • Demonstrated experience in facilitating components of organizational change management
  • Data and decision analysis: extensive experience as applied in project, program and/or IT portfolio environment
  • Demonstrated effective (intermediate level) use and experience with MS Project, Visio, Excel
5

Senior Information Security Associate Resume Examples & Samples

  • Knowledge of information security, privacy, and risk management principles
  • Strong knowledge the Retirement business and the application suite used to support them
  • Must have strong communication skills, both written and verbal and the ability to present technical concepts to all levels of management and associates
  • Proficient in MS Office products, specifically with Excel and MS Access
  • Project management experience is a plus
  • Familiarity with the System Development Life Cycle (SDLC)
  • Understand risk management concepts around information security design and implementation
  • Knowledge of security access and permissions are applied is a plus, particularly, ITAM/ITIM, LDAP, Active Directory, RACF, Windows, UNIX, database
  • Knowledge of user authentication and access controls
  • The ability to maintain confidentiality is essential
  • Able to work independently and be a self starter; manage multiple tasks according to priorities; results oriented and ability to meet deadlines
  • Ability to work in an extremely fast-paced environment with high expectations
6

Senior Information Security Analysts Resume Examples & Samples

  • 1) Programming languages: C#, Java, JavaScript, Objective C, C, C++, and Ruby
  • 2) OWASP Top 10 and CWE 25
  • 3) Implementing and integrating remediation strategies
  • 4) Web applications, web servers, layer 7 application technologies, frameworks, and protocols, with respect to application development and deployment
  • 5) Secure development practices in to SDLC (SSDLC)
  • 6) Ability to successfully integrate security into a developer world
  • 7) Implementing effective Secure SDLC frameworks across a large corporation
  • 8) Mobile application and platform security
  • 9) Waterfall and Agile development processes, including integrating secure development practices into both models; and,
  • 10) SAST, DAST, and Fuzz testing tools
7

Senior Information Security Contract & Support Specialist Resume Examples & Samples

  • Demonstrates deep knowledge of a functional area and broad general knowledge
  • Supports small or medium projects or performs support, documentation, or research tasks. Mentors or guides other non-technical employees
  • Requires minimal review; consistently delivers quality results
  • Decisions have impact on success of project team, department, or work group
8

Senior Information Security Audit Resume Examples & Samples

  • Participate in a primary capacity for audits, compliance, and regulatory activities, including, but not limited to: FFIEC, GLBA, SSAE16, PCI, Sarbanes-Oxley (SOX), Internal Audit, & Customer/Client Inquiry
  • Possess knowledge of the information security, financial, and/or technology regulatory environment and risk management practices
  • Provide oversight and align resources for program activities across a global security organization
  • Advises Information Security leadership on the status of technology risk and compliance issues based on assessment results and information from various monitoring and control systems
  • Bachelors Degree in Business, Information Systems Management (or related field) or equivalent work experience
  • Proven experience working with multiple individuals on internal and external delivery and communication initiatives
  • Strong executive presence and communication skills - experience in Audit/Compliance/Regulatory discussions and proactive readiness activities with internal partners and external customers/clients
  • Delivers effective and strong documentation to support compliance and certification audits
  • CISSP, CISA Certifications preferred
9

Senior Information Security Analysts Resume Examples & Samples

  • 1) Minimum 5 years of experience in database security configuration management and vulnerability management
  • 2) Knowledge of security configuration management, change control and problem management integration, risk assessment and acceptance, and exception management
  • 3) Knowledge of security baselines including CIS baselines, NIST, and vendor security technical implementation guides
  • 4) Hands-on administration experience with database platforms including Oracle, DB2, UDB and MS SQL
  • 5) Knowledge of security flaws and resolution including OWASP and SANS
  • 6) Experienced with implementation & administration of Database Security tools
  • 7) Knowledge of database hardening and remediation of security miss-configuration; and,
  • 8) Experienced with diverse IT architectures and enterprise IT data centers, large scale transaction processing environments
10

Senior Information Security Analysts Resume Examples & Samples

  • 1) Experience with the following programming languages: C, C#, Java, JavaScript, Objective C, C++, PHP, Grails, ASP.NET, and Ruby
  • 2) Experience in building ENTERPRISE web applications
  • 3) OWASP Top 10 and CWE 25
  • 4) Architectural risk assessment (ARA) at all phases of SDLC and risk categorization
  • 5) Implementing and integrating remediation strategies
  • 6) Web application secure design
  • 7) Agile SDLC processes
  • 8) Mobile and web application penetration testing, red teaming
  • 9) SAST, DAST and fuzz testing tools; and,
  • 10) Data Analysis
11

Senior Information Security Incident Manager Resume Examples & Samples

  • Coordinate the response to information security incidents by working with response partners across the organization
  • Establish oversight of information security incidents and communicate analysis, containment, and remediation efforts to all involved business partners
  • Determine the root cause of incidents and work with business or technology groups to remediate any identified control gaps or failures
  • Escalate incidents to management in a timely manner with appropriate information regarding risk, action times, and root cause analysis
  • Utilize an incident playbook
  • Exercise independent judgment in methods, techniques and evaluation criteria for obtaining results
  • Periodic on-call weekend rotation; the rotation is distributed across the entire team throughout the year with the schedule forecasted 12 months in advance
  • 5+ years of information security experience with progressive technical advancement
  • 3+ years of event and or incident response experience in a high paced operations environment
  • Mastery of incident response methodologies, best practices and routines
  • Mastery at directing and coordinating technical response teams to develop quick containment solutions to cyber security incidents
  • Expert at identifying various types of events and incidents and applying the right response framework for each (i.e. information mishandling, security vulnerability, system exploit, malware infection, etc.)
  • Exceptional verbal and written communication skills, with mastery of the ability to tailor the context of the conversation to the audience
  • Must be able to think outside the box and develop solutions to accomplish seemingly impossible tasks, while remaining risk and objective focused
  • In-depth familiarity with work flow tools and ability to develop and improve tools/processes
  • Familiarity with SIEM tools and abilities a plus
  • Quick and agile critical thinking (thinking outside the box)
  • Digital forensics or enterprise investigation experience is a plus
  • CISSP or CISM preferred - GCIH, CEH, CFE desired
12

Senior Information Security & Privacy Manager Resume Examples & Samples

  • Monitor and ensure the activities involving customer data access and storage are within the risk appetite of Group Hubs
  • Ensure overall compliance with reporting and escalation processes in accordance with the Group Operational Risk Measurement and Management Framework (ORMMF), IS Standards and in-country regulatory needs
  • Ensure actual/potential operational losses are treated in accordance with the Operational Risk Measurement and Management Framework for material losses across group hubs, identifying trends, systemic issues and progress on remediation, which lowers Group Hubs risk exposures in this area
  • Engage with hub and business stakeholders to understand the data protection and privacy requirements / challenges
  • Pro-actively provide advice / guidance on data protection and privacy requirements, procedures to hubs/business stakeholders
  • Regularly communicate and educate business stakeholders/Hubs on data protection and privacy requirements
  • Develop and maintain collaborative relationships with key business and risk stakeholders to ensure the data protection and privacy management in hubs are in line with Group and current in-country requirements
  • Perform the role of subject matter expert in the areas of data protection, privacy domains for Group Hubs
  • Develop and maintain currency and alignment of data protection & privacy procedures, by working closely with ANZ Information Security Office and Group Data Office
  • Setup processes to monitor and test compliance to creation, retention, handling, storage and destruction of customer / privacy data procedures across the hubs
  • Undertake data protection and privacy compliance audits in accordance with applicable requirements, with deep dives were required
  • Develop and maintain a knowledge base of in-country privacy and data protection requirements as applicable to the hubs
  • Keep track of changes in the relevant legislations/requirements, interpret, convert these requirements into controls relevant to hubs and provide guidance on its implementation
  • Strong knowledge and exposure to Information Security, Data Protection & Privacy
  • Strategic management and thought leadership skills
  • Influencing Outcomes with senior business stakeholders
  • Senior stakeholder management skills including CROs of BUs and Group Hubs Leadership
  • Makes timely decisions in rapidly changing and high risk situations
  • Strong collaboration, relationship, network and communication skills
  • 12F Solaris One Building 130 Dela Rosa St. Legaspi, Makati City
13

Senior Information Security Resume Examples & Samples

  • Identify network, system, and application security vulnerabilities through the use of scanning tools and notify the appropriate team to take necessary action. This may include defining the security controls and parameters that will be measured. An understanding of current web application development languages is necessary to communicate compensating controls and potential remediation activities
  • Assist with network and application security penetration testing activities, including scheduling, resources, tool execution, and reporting
  • Identify potential security exposures that may currently exist or may pose a potential future threat to the U.S. Firm’s networks or systems. Ensure IRC management is notified when these exposures are identified, as well as a proposed solution for remediation
  • 2+ years of information security experience, preferably in the areas of application security, vulnerability scanning, or penetration testing
  • Solid understanding of networking (WAN, LAN, wLAN), network domains (Internet, intranet, DMZ), communication techniques/protocols (IP and others), and their combined effects on network and host systems security
  • Good written and verbal communication skills, fluent English
14

Senior Information Security Leader Resume Examples & Samples

  • Provide technical lead, managerial and business operations support to the customer
  • Operates with frequent guidance from the customer CISO. This role may also lead and direct one or more project teams engaged in the design, implementation and modification of Information Security programs that span across functional organizations
  • Provide program management and oversight to ensure that customer goals are met
  • Following risk management practices, the candidate will prioritize security issues and create follow-up projects with roadmaps to resolve the issues
  • Provide the information and analysis to assist in making strategic security decisions and purchases
  • Coordinate the development and delivery of the information security awareness and training program, security incident response exercises, and role-based training
  • Coordinates engagement with functional managers including staff meetings, business / operational reviews, overhead program budgets
  • Bachelor's degree in Computer Science or related field
  • CISSP, CISM, or similar advanced security certification
  • 10+ years of experience working in Information Technology
  • 5+ years of experience working in Information Security
  • 5+ years of experience in a leadership and project management role, including information security planning, scheduling, assignment, and monitoring of staff and resources
  • Ability to collaborate effectively and orchestrate solutions across teams organizational boundaries
  • Above average verbal and written communication skills, and experience presenting data to senior levels of management
  • Proficient with the Microsoft Office suite of applications
  • Must be adept at developing and presenting executive briefs, enterprise communications, and whitepapers which are logical and concise with only general guidance from the CISO and others to support senior executive reviews and initiatives
  • Must be proficient in leading cross-functional teams of senior employees to achieve objectives
  • Should be adept at dealing with senior executives and constructively challenging ideas and products to achieve desired results
15

Senior Information Security & Privacy Analyst Resume Examples & Samples

  • Providing direct support to project teams and client stakeholders
  • Experience with Protected Health Information (PHI) and Personally Identifiable Information (PII) in Federal healthcare programs
  • Experience with VA healthcare programs is a plus
  • Experience conducting a gap analysis to move to new version of NIST 800-53 or agency equivalent
  • CISSP, CISM, CISA, Security+ or equivalent security certification
  • Knowledge of and experience with a FISMA tool such as RSA Archer or Xacta
  • LI-SS1
16

Senior Information Security Analysts Resume Examples & Samples

  • 2 years of experience in mobile security, including code review, penetration testing, and mobile security research on iOS, Android or Windows Ph platforms
  • Knowledge of mobile application development frameworks and tools
  • Knowledge of standard and advanced security issues and vulnerabilities – OWASP Top 10 and SANS Top 25
  • Proficiency in at least one mobile programming language: Java, C, or Objective-C
  • Knowledge of MDM solutions, provisioning profiles, device data protection and platform security features
  • Experience with de-compilation, reverse engineering, malware analysis and forensics tools
17

Senior Information Security & Privacy Analyst With Hitrust Resume Examples & Samples

  • Experience with Protected Health Information (PHI) and Personally Identifiable Information (PII) in Federal or healthcare programs
  • Experience with industry standard security frameworks such as NIST 800-53 Rev 4, ISO 27001/27002, NIST Cyber security Framework, PCI, COBIT
  • Preparing security documentation
  • Evaluating and documenting security and privacy controls
  • Working with third-party assessors
  • Completing non-technical analysis activities
  • Experience with FedRAMP
  • Certified CSF Practitioner certification
  • Knowledge of and experience with a Governance, Risk and Compliance (GRC) tool such as RSA Archer and Xacta
18

Senior Information Security & Privacy Analyst Resume Examples & Samples

  • Prepare, validate, and maintain security documentation including, but not limited to: system security plan (SSP), risk assessment (RA), contingency plan (CP), privacy impact assessment (PIA) and FIPS categorization
  • Provide support for the security life cycle of major applications and the general support system to the CGI Federal project team and client stakeholders
  • Work with all levels of CGI Federal and client project team members and establish and maintain a strong customer-focused working relationship
  • Advise the CGI Federal project team to address security and privacy weaknesses identified when working with the team
  • Have strong analysis, oral and written communication, change management and communications skills
  • Prepare and deliver security and privacy awareness training to different CGI Federal project team audiences
  • Identify and mitigate security risks especially if different from risks managed at the project level
  • Collaborate with the CGI Federal project team to manage security assessments (Security Assessment and Authorization [SA&A] or Certification and Accreditation [C&A] activities) and audits
  • Identify and manage POA&Ms through remediation as well as develop corrective action plans for each POA&M
  • Work independently and proactively while being flexible and prioritizing competing priorities, often under time constraints
  • Participate in writing proposals
  • Support projects from CGI Federal’s Fairfax office and project offices outside of the Metropolitan Washington-Baltimore area (some travel may be required)
19

Senior Information Security Analysts Resume Examples & Samples

  • 5 years of experience in at least 2 of the following firewalls and router platforms: Checkpoint, Cisco, or Juniper
  • 5 years of experience in Vulnerability management, pen testing or security assessment including either PCI, or NIST
  • 3 years of scripting experience using either: Shell, Perl, Python, or Windows Scripting
  • 5 years of experience working on different operating systems including either: Windows, or Linux/Unix
  • 1 year of experience with data encryption standards including either: IPSec, SSL, or PKI
  • Security-related certifications including either: CCNA security, CISSP, or CRISC; and,
  • Large scale IT operations environment
20

Senior Information Security Incident Responder Resume Examples & Samples

  • Supervise record maintenance for all incident response activities
  • Develop and contribute to incident response framework, requirements and strategy
  • Develop and maintain standard operating procedure (SOP) documentation
  • Analyze threats and vulnerabilities to determine their impact to US Bank's operations
  • Establish and maintain cohesive working relationships with team members, management, key strategic business partners, and vendors
  • Conduct Investigations and eDiscovery efforts involving court-proven forensic processes and technologies
  • Conduct post-mortem evaluations on cyber security incidents and lead table-top incident response exercises
  • Lead bank response and mitigation of major security incidents including clear and concise communications to senior executives, regulators, and auditors
  • Proactively researches emerging cyber threats. Applies expert understanding of hacker methodologies and tactics, system vulnerabilities and key indicators of attacks and exploits
  • Acquires and applies expert knowledge of the business, its products and processes
  • Directs analyses and root cause identification; develops and recommends business solutions impacting the enterprise
  • Must possess strong analytical & evaluative thinking
  • Bachelor's degree and minimum 5 years of experience in information security
  • Conceptual understandings of the cyber kill chain
  • Awareness of the latest cyber-intelligence collection trends and developments
  • Experience developing threat briefings for consumption by senior management
  • Strong understanding of Windows API and internals
  • Ability to complete dynamic analysis of malware
  • Ability to extract host and network-based IOCs to provide requirements for detection and prevention
  • Ability to work nontraditional working hours when necessary
  • Understanding of networking, system administration, architectures and security elements
21

Senior Information Security Group Know Your Client Intmd Analyst Resume Examples & Samples

  • Lead local team providing support and guidance
  • Point of escalation for team
  • Work with Business Support Unit to assess documentation requirements for client legal entities
  • Contact client personnel to obtain KYC information and documentation
  • Review and evaluate recent news related to clients
  • Liaise with internal Compliance personnel on the application of KYC policy
  • Interact with parent and subsidiary bankers and product sales and service on AML-related risk issues
  • Coordinate with account operations on account maintenance issues
  • Prepare client-specific KYC-related analyses as required
  • 3-5 years of professional work experience, financial services preferred
  • Client services experience, front office experience preferred
  • Experience with MS Office tools: PowerPoint, Excel and SharePoint
  • Familiarity with AML/KYC regulatory and compliance issues
  • University Degree in a related discipline
  • Ability to work independently and under deadline
  • Strong teamwork skills in a small local setting, as well as across different geographic locations
22

Senior Information Security An Resume Examples & Samples

  • As a key member of the UK Information Security team, contributes to the strategy and plan for information security which addresses the evolving business risk and information control requirements
  • Contributes to the development and maintenance of the information security policy, standards and guidelines for Unum Group in accordance with best professional and industry practice
  • Contributes to the activities which ensure compliance to information security policies and standards, including the use of third parties for relevant testing and works closely with Internal Audit, Risk and Compliance to ensure holistic assessment. Recommends appropriate action and adjusts the Information Security Plan where required
  • Contributes to Supplier Security oversight, including initial security assessments, assessments throughout the relationship and incident management of any Information Security incidents should they occur
  • Contributes to the responses required for client due diligence questionnaires with respect to Unum Information Security strategy, policy and plans
  • Contributes to the design and development of specialist security education and training to management and staff
  • Participates in local and corporate incident response processes, including incident response planning and management of security incidents and events to protect IT assets
  • Contributes to the Identification and categorisation of strategic and operational risks
  • Works closely with Risk, Internal Audit, the Data Protection Officer, Legal and the Financial Crime Manager to ensure that a consistent approach to Information Security is understood and applied across the organisation
  • Works closely with colleagues in the Group Information Security team as required
  • Produces appropriate and practical performance measures as required, to ensure that information assurance priorities set by the business can be effectively monitored
  • Provides information security consultancy to staff across the organisation
  • Maintains a strong understanding of developments in new technology and the associated security controls
  • Remain up to date and fully conversant with any relevant legislation/regulatory requirements applicable to the role and business area. This also includes having an understanding of the Company policies contained within the employee handbook
  • Makes Effective Decisions
  • Strong Influencing Skills
  • Information Security certifications
  • Operating Infrastructure
  • National/International Standards
23

Senior Information Security Resume Examples & Samples

  • Monitoring of events & alerts from a multitude of technologies to detect malicious activity
  • Data mining of log sources to uncover and investigate anomalous activity, along with related items of interest
  • Proper escalation and hand-off of security incidents for containment and remediation
  • Expert level knowledge of common security technologies (IDS, Firewall, SIEM, etc.)
  • 3+ years of experience in Information Security, Incident Response, etc. (or related field)
  • Prior experience detecting, analyzing and/or responding to security incidents
  • Knowledge of data science, data visualization, mathematics, and/or statistics
24

Senior Information Security Technologist Resume Examples & Samples

  • Partnering with the IT Architect teams during the initial stages of the project/solution to ensure the accuracy of business cases and that the solution will meet the business need
  • Adhering to the established life-cycle methodology and practices in accordance to project plans while carrying out their responsibilities. This may include maintaining program libraries and technical documentation of the individual applications
  • Using current programming language and technologies, writing code, completing programming, performing testing and debugging of applications
  • Training users in conversion and implementation of systems
  • Evaluating program modules for performance scalability and openness of design
  • Predicting application development requirements based on changes in underlying architecture
  • Developing programming guidelines/standards and making them accessible to other programmers
  • 8 or more years of experience in a software development or related role with experience with Identity and Access Management preferred
  • Demonstrated expertise in: ColdFusion, VB.NET, Java /J2EE, API/Web Services, and RDBMS such as MS SQL Server and Oracle
  • Experience working with several of the following platforms: Windows, UNIX, Mainframe
  • Experience building enterprise ready web applications for a production environment
  • Demonstrated strong written and interpersonal communication
  • Experience with WebSphere or WebLogic
25

Senior Information Security Resume Examples & Samples

  • Provide input to periodic updates on risk management projects for senior executives
  • Provide input for plans, roadmaps, and prioritization for projects
  • Contribute unique mix of skills and experience to further development of the Risk Management program
  • 2+ years in IT governance, risk or control (i.e., IT risk management, security, or internal or external audit)
  • Basic understanding of IT risk management, compliance and regulatory requirements
  • Professional experience utilizing relevant risk management frameworks (i.e., NIST, ISO, COBIT 5, etc.)
  • Understanding and ability to articulate risks associated with technology processes and IT general controls and proactivity identify process and control gaps and provide risk-based recommendations
  • Professional certification (i.e., CISSP, CRISC, or CISA) within 18 months of employment
  • Effective communication skills both written and verbal to collaborate and provide documentation across the organization
  • Compliance/Governance experience (i.e., SOX, SOC,PCI)
  • Ability to coordinate and motivate other people, especially those outside of a direct reporting relationship
26

Senior Information Security Associate Resume Examples & Samples

  • Ability to perform information security risk assessments of Bank systems based on NIST framework
  • Developing metrics to capture information security risk posture for individual projects, products, and company as a whole
  • Strong knowledge of current security threats, techniques, and landscape
  • Ability to understand and synthesize technical issues to technical and non-technical business representatives
  • Exceptional analytical, critical thinking and decision making skills
  • Knowledge and actively practice of information security fundamentals
27

Senior Information Security Consultantlocation Resume Examples & Samples

  • Serve as a strategic adviser to clients seeking to improve their security capabilities and mature their organization
  • Review policies, standards and procedures to understand client capabilities and current security environment
  • Assess the maturity level of client organizations against best practices and drive desired changes
  • Perform interviews, evidence collection, and artifact review along with facilitated workshops to ensure future improvements are driven through collaboration
  • Review security event data utilizing our proprietary technology to develop comprehensive threat reports for the client
  • Provide high level recommendations and security roadmaps for short and long term goals
  • Intuitively and proactively understands client concerns and facilitates escalation to the appropriate resources to address and resolve each situation
  • Operate as a client advocate to ensure all service issues are resolved and the client experience is enhanced
  • Build and strengthen client relationships at multiple levels of the company
  • Serve as a client advocate internally within Mandiant to provide the right contact points and solutions to assist in solving the client’s problems
  • Candidates must be bilingual with strong written and verbal communication skills in English and Spanish
  • Ability to travel up to 60%
  • Quickly master, simplify, and communicate the value proposition of complex subjects to clients
  • Use formal project management skills in planning, tracking, and reporting on project progress
  • Evaluate customer needs, coordinate design for a solution, and clearly communicate solutions
  • LI-KB1
28

Senior Information Security Software Analyst Resume Examples & Samples

  • Bachelor’s degree in computer related field, or equivalent work experience in software development
  • Proven experience as a developer, and/or as an IT security professional (4+ years)
  • Information Security certifications strongly preferred (CISSP, CISM, GIAC Certs, others)
  • Strong communication and collaboration skills. Needs to work well in a team environment and with difference audiences
  • Strong informal leadership skills such as building relationships, influencing, coaching, mentoring, decision making and personal accountability
  • Understanding of secure software development lifecycle practices, including static code analysis, architecture risk analysis, and penetration testing
  • Ability to think strategically and align security strategy with business strategy
  • Cyber security experience and/or knowledge of NIST cyber security framework preferred
  • Professional ability to conceptualize activities in business terms, and present to executive audiences
29

Senior Information Security SW Engineer Resume Examples & Samples

  • Provide technical leadership to an agile team
  • Work with product owners to understand product vision and requirements
  • Experience applying principles of SDLC and methodologies like Lean/Agile/XP, CI, Software and Product Security, Scalability, Documentation practices, refactoring, and testing techniques
  • Write code that meets standards and delivers desired functionality using the technology selected for the project
30

Senior Information Security Resume Examples & Samples

  • Performs technology risk assessments and reports on findings, consult on remediation plans, track status, aggregate results and report to Management
  • Performs deep-dive controls testing for high risk areas for independent validation of issues and remediation efforts
  • Provides guidance / education across Technology functions for technology security and compliance requirements according to regulatory requirements, firm policy, data classification, client commitments, etc
  • Provide guidance for technology processes and procedures to be documented and assist in collecting necessary documentation to facilitate the process
  • Provide recommendation for continuous improvements to the risk management process, controls monitoring and TRM program
  • Provide notification of updated controls requirements to technology functions due to regulatory and firm policy updates
  • 3+ years of experience with information technology security programs, audits, controls, assessments, risk assessments, or remediation management
  • Demonstrated proficiency in Security and Compliance, Regulatory Requirements (SOC 2, ISO27001, NIST800-53, PCAOB, CSA, etc.) and / or Risk Management programs / performing risk assessments
  • Requires CISSP, CISA, CISM or other applicable certification or willingness to obtain within 1-2 years
  • Strong communication, report writing and presentation skills
  • Ability to work independently and cross-functionally
  • Excellent time management and related organizational skills including appropriate sense of urgency and a proactive approach
31

Senior Information Security Technologist Resume Examples & Samples

  • Demonstrating technical leadership aligning application functionality with business requirements and strategy
  • Anticipating issues and challenges affecting application functionality while reviewing and validating new application solutions and establishing effective monitoring of software processes
  • Developing functional, technical and user interface designs for applications that meets the defined requirements (business, system performance and standards)
  • 10 or more years of experience in a software development or related role
  • Demonstrated expertise in: VB.NET, Java /J2EE, API/Web Services, and RDBMS such as MS SQL Server and Oracle, ColdFusion
  • Experience with IIS, WebSphere or WebLogic
  • Proven experience with Identity and Access Management
  • Demonstrated strong written and interpersonal communication skills
32

Senior Information Security Control Access Program Analyst Resume Examples & Samples

  • Data Analytics: Identity and Access Management conceptual understanding
  • Directs delivery of project milestones, ensures projects stay on target, escalating and identifying roadblocks
  • Ability to work independently on initiatives and build skilled virtual teams with little oversight. Motivated and willing to learn
33

Senior Information Security Data Analyst Resume Examples & Samples

  • Lead development of stakeholder data source requirements
  • Lead data modeling to meet or exceed stakeholder and data governance requirements
  • Lead creation, management, and support of knowledge objects (alerts, reports, dashboards)
  • Provide level 2 and 3 technical support
  • Facilitate customer education, including appropriate use and sharing of knowledge objects
  • Lead development, monitoring, and reporting of platform and service metrics
  • Develop strategies for proactively addressing search performance, service risks and issues
  • Provide thought leadership on platform and operations enhancements
  • Manage and contribute to operational support documentation
  • Ensure all standards including change and risk management policies are followed
  • Ensure service level agreements are met or exceeded
  • Represent team as a subject matter expert at meetings
  • Bachelor's Degree in Computer Science or other related field or equivalent work experience
  • 5 – 10 years of related work experience
  • Solid customer service and presentation skills
  • Critical thinking and problem-solving skills
  • Attention to detail in a well-controlled environment
  • Strong knowledge of message logging
  • Strong knowledge of query languages
  • Strong knowledge of various operating systems
  • Knowledge of scripting and automation
  • Knowledge of various programming languages
  • Knowledge of various Business Intelligence (BI) tools
34

Senior Information Security Controls Analyst Resume Examples & Samples

  • Controls Assessments: IT risk assessments, IT general controls reviews, and various compliance assessments. Reviews tactics, processes and controls implemented to protect organization from threats. Interprets findings to determine if controls are in place and operating effectively to sufficiently protect an organization. Identifies policies and procedures that are supporting control objectives. Recommends multi-layered approach to build a defense in depth by improving controls, defining compensating controls and determining an acceptable level of risk
  • Incident Response/Business Continuity& Disaster Recovery Planning: Evaluates response procedures to identify, assess, and properly address threats and/or recover from an incident. Reviews procedures for disaster response, recovery, and restoration, and recommends enhancements. Structures tests and exercises to prepare recovery teams
  • Technical Knowledge: Knowledge of IT security concepts, best practices, and procedures. Knowledge of Windows, Unix/Linux, or Novell operating systems. Knowledge of network infrastructure hardware and software. Knowledge of IT control requirements associated with FFIEC, GLBA, Sarbanes-Oxley, HIPAA, and, PCI. Knowledge of security audit techniques, processes, and services. Professional experience with consulting and/or operations of Financial Institutions is a plus
  • Performs consulting activities that include conducting interviews, control evaluation, effectiveness testing, reviewing documents, performing a variety of analysis, and preparing client deliverables such as findings and recommendations, and reports
  • BS/BA degree in business, management information systems, computer science, or related field preferred. Associates degree with equivalent experience may be acceptable in some cases
  • Minimum 3+ years’ experience in operational IT and audit/consulting
  • Experience in an IT or IT security role, analyzing multiple aspects of information security for organizations. Previous experience in a support or development role, related to applications development, desktop, server, or network infrastructure preferred
  • Preferred certifications include, CISA, CISM, and CISSP
  • Travel: This position requires frequent local travel to/from client sites and may require occasional non-local or overnight travel for client visits, training, meetings and/or other business-related purposes. Travel is estimated to be 40-45%
35

Senior Information Security Resume Examples & Samples

  • Participates in developing and maintaining a complete and accurate understanding of how business lines are impacted by IAM program initiatives
  • Assists in developing and maintaining detailed knowledge of the current technology and infrastructure from a functional perspective. Provides guidance concerning business implications of development projects
  • Provides consulting services to internal business groups on process improvement projects designed to improve their business results. Involved in training and implementation of applications
  • Assists, and at times, may lead clients and technical staff to investigate, analyze, and resolve application problems related to system functions. Often first point of contact for user support and problem solving
  • Works with business representatives to identify, refine, and document detailed business needs
  • May manage complex to routine projects. Frequently interfaces with business lines, including management, and/or internal resources to ensure quality, timeliness, and testing of all project/release work
  • Works with technology and application development teams to design functional solutions that appropriately meet the business needs
  • Reviews and validates test plan approaches for proper functionality coverage. May coordinate and execute test plans. Looks for an opportunity to improve testing process. Ensures that test cases and results meet business requirements
  • Works with internal business lines to document, analyze, and redesign business processes
  • Analyzes and evaluates user needs
  • Bachelor's degree in business or IT
  • Six or more years of experience working as a Business Analyst
  • Five or more years of experience in Excel (Advanced), Visio, MS Project, SQL, UML Modeling Software
  • Six or more years of customer interfacing experience – project oversight, customer presentation, requirements elicitation, etc
  • Six or more years of documentation experience including Current State Analysis, Use Cases, Functional Requirements Spec, Wireframes, Process Flows, Standard Operating Procedures, Test Plans, Test Cases, UAT Test Plans, Business Rules, et al
  • Advanced conceptual, organizational, analytical and problem solving skills
  • High level of attention to detail and accuracy
  • Advanced ability to communicate clearly and concisely (both written and verbal, presentation and interpersonal skills)
  • Advanced skills in analysis, visual modeling, and facilitation/elicitation
  • Proficient verbal and written skills required to effectively communicate in the English language
  • Demonstrated understanding in formulating strategies, alternatives and recommendations in information security management
  • Advanced skills in evaluating risk and communicating the information in a fact-based manner
  • Knowledge of Information Security including security architecture, industry trends and direction, system and technology integration, and standards, procedures and policies, and emerging technologies
  • Knowledge of software licensing, product and vendor evaluation, technical troubleshooting, and process improvement