- Featured in:
Find out what is the best resume for you in our Ultimate Resume Format Guide.
Additional Architecture Resume Samples
Security Architect Resume Samples
No results found
0-5 years of experience
Part of a cross-divisional security team using a multi-disciplinary focused approach to cyber and information security and compliance, operational risk management, client security management, workforce protection, and business resilience.
- Partnered with internal teams to protect employer and client information by the delivery of security analysis, recommendations, projects and compliance methods and practice.
- Developed and communicated 40+ security standards and policies for global implementation.
- Designed an e-Fraud strategy and partnered with vendors to create a custom automated methodology for identifying potential payroll fraud providing increased early detection capabilities.
- Created standards for physical access control and video management systems for 350 sites in North America resulting in increased efficiency, standardized access and protocols for investigations and audits.
- Investigated and developed multiple security projects both cyber and physical.
- Collaborated with investigative team and local law enforcement on cases including investigating strategy and interviews. Collected, handled and secured evidence including security video reviews.
0-5 years of experience
Executed role of PeopleSoft Security Architect and lead developer for the PeopleSoft HCM module enhancements:
- Reviewed and documented PeopleSoft security using “Current State†versus “To Be†methodology for identifying the security gaps.
- Redesigned and implemented PeopleSoft security for the entire organization by creating new Permission Lists and Roles using PeopleSoft best practices and industry standards that enforce SOX controls.
- Created new Data Permissions utilizing organization structure by designing Department Security Trees.
- Created new Query Trees and Access groups to address Query Security requirements.
0-5 years of experience
Lead Enterprise Security Architect in charge of building, maintaining and promoting an enterprise security view of the IT architectural blueprint and roadmap.
- Oversaw the IT Security Center of Excellence (COE) comprised of 10-15 cross-functional members.
- Developed an based information security management program and strategy, associated security policies, procedures and SDLC integration activities.
- Created an IT security technical reference architecture and documented current state security capabilities, current state gaps and future state roadmap aligned with IT and business strategies.
- Created a risk assessment process with templates and conducted system design reviews as lead security representative on the Enterprise Architecture Review Board.
- Conducted a security risk assessment and defined security requirements for a new Joint Venture in China.
- Planned, designed and implemented enterprise-wide Data Loss Prevention (DLP), Security Information and Event Management (SIEM) and vulnerability management services.
0-5 years of experience
Developed and deployed innovative and concise technical security solutions as senior enterprise security architect dedicated to the HP Imaging and Printing business during the HP Data Center Consolidation.
- Created and managed the security approval process framework in the Architecture Compliance Review for each phase of projects in the development lifecycle for all new Imaging and Printing projects including threat and vulnerability management strategies.
- Designed custom compartmentalized secure local risk networks for Ireland, Spain, Germany, and other locations to minimize risk to standard networks.
- Put in charge of PCI (Payment Card Industry) compliance for systems that take credit cards for payment in a $66 million per year revenue market.
- Security Architect reviewer and approver of Factory Systems Line Standards and Policies used for internal and new contract manufacturing project, a $200 million cost-saving project.
- Responsible for contributing to IT Security Governance company security Policies and Standards adhered to by the global company
- Onsite security vendor security reviews for U.S. and international business partners using ISO 27001 specifications
0-5 years of experience
Responsible for running a chain-wide hardware upgrade initiative. This included negotiating contracts with vendors, documenting the entire process for field technicians, building and verifying configurations.
- Implemented a new IPAM/DNS/DHCP solution. This allowed the company to better utilize their IP address space as well as move away from an antiquated DNS/DHCP platform.
- Managed PCI Compliance for eighty-six dealerships. Completed self-assessments (SAQ-D), project plans and external scans to bring the company into compliance with PCI-DSS requirements.
- Designed and implemented a new store design consisting of 2900 series ISR G2’s, 2960S stacks, and Palo Alto firewalls.
- Implemented OTV between data centers in order to increase application availability in preparation for a future LISP deployment.
0-5 years of experience
IT Architect and information technology security expert with 6 years of experience in the financial, manufacturing, insurance, and public sectors. Customers include Kraft, Zurich, American National Insurance Company (ANICO), CIGNA, State of California, State of Georgia, Fluor, Coca-Cola, IBM, Roche, State Compensation Insurance Fund (SCIF), Marathon Oil, St. Paul Travelers, Volkswagen/Audi, United Healthcare Group, Sampo Bank (Finland), Watkins Motors, and others.
- Expert in architecting secure solutions for identity and access management solutions with a focus on IBM Tivoli products. Proven ability to conduct security assessments of applications and current IT environments at customer sites.
- Consistently recognized for outstanding management and service delivery performance, as well as unique and creative perspectives on problem resolution. Expert leadership and communication skills. Received numerous professional performance awards from the IBM Corporation, including recognition for leadership, planning, and technical ability. Mentor new hires and existing employees to further careers and enhance skill sets.
- Designed and facilitated classes to train workforce on Tivoli Security Solutions as well as Digital Video Surveillance (DVS) and Service Oriented Architecture (SOA).
- Lead architect for Tivoli Access Manager for e-Business 6.0 deployment to replace Entrust GetAccess at government insurance agency. Implemented highly available and scalable solution built on WebSphere Network Deployment technology including IBM Tivoli Access Manager Session Management Server and IBM Tivoli Common Auditing and Reporting Service.
- Redesigned backend directory for the new IBM Tivoli Access Manager 4.1 upgrade. Guided the effort to redesign security controls within Access Manager to meet the security guidelines of the corporation. Integrated the new WebSphere 5.1 environment into the redesigned Access Manager security environment to ease the security administration and control access from a single, central location.
- Devised assembly lines for Tivoli Directory Integrator to determine last login in Active Directory in a world-wide forest in real-time. This information is not replicated in Active Directory environments in real-time.
- Architected identity management solution based on Tivoli Identity Manager for a global engineering and construction firm to comply with Sarbanes-Oxley Act (SOX) as well as European data privacy laws.
0-5 years of experience
[company name] needed to take ownership of their end users’ online experience by consolidating access to disparate web applications into one common login. During the discovery phase we demonstrated that customers both expected and required single sign-on, which would require making user data available to every application and business within the [company name] brand.
- Educated client regarding unified customer experience and need for accessible user data across client applications and business divisions
- Led a Proof of Concept project which integrated all IBM Identity and Access Management products (TIM/TAM/FIM/TDS) with Siebel and Active Directory
- Brokered the software purchase and built multi-year plan to implement the one login experience
6-10 years of experience
Providing analyst and system administrator services through conducting technical analysis related to information operations and cyber security for the Intelligence Community; primarily to include electrical power SCADA systems and networks.
- Design, build, test, and deliver computers, electrical power SCADA systems and modeled test bed substations to clients.
- Configure and maintain PLC and HMI and establish protocol and communication parameters between electrical power SCADA systems, PLC, HMI, and Remote Terminal Unit (RTU) using MODBUS and DNP3.
- Developed computer hardware suites, tools, technologies and reports for policy and technical audiences.
- Research, design, develop, assemble, modify, train on, and test (sometimes to failure), isolated networks of computers, software applications, and miscellaneous associated hardware and software components.
- Ensured that training methods were developed, based on assembled systems and unique design.
- Implemented and provided detailed evaluation of assembled systems for training, to include on and off site training.
- Administered threat assessments, network intrusion detection, computer network defense, and secure network architecture in support of client Intelligence Community.
- Evaluated and updated several Classified System Security Plans, to prepare client system upgrades.
0-5 years of experience
Implemented Sherwood Applied Business Security Architecture (SABSA) process.
- Defined the baseline security architecture framework for North America 10 new security projects
- Implemented the PKI framework within [company name] Tech for smart card and lap top encryption.
- Managed the Sarbanes-Oxley compliance management program.
- Introduced the Security Lifecycle Management Process for project management.
- Designed security risk and work measurement for global data center consolidation.
0-5 years of experience
Chaired monthly Executive meetings consisting of Legal, Business, and IT team leads to discuss open security issues and propose solutions.
- Managed personnel to remediate risk, threats, and vulnerabilities (SOC and Operational Teams).
- Created project budgets and timelines for security initiatives.
- Led regulatory and audit reviews, developed and implemented audit plans for assessing security risks.
- Provided updates and presentations to executive-level personnel on security position and project statuses.
- Coached and mentored junior staff. Provided assistance and work direction to other employees.
- Promoted data security awareness by developing and maintaining a security-conscious environment.
- Engineered, designed, and implemented information security controls to ensure the confidentiality, integrity, and availability of corporate data.(AV, HIDS, NIDS, Encryption, Firewalls, DLP, etc ).
0-5 years of experience
Designed current and future security architecture for the integration of multiple technologies such as NIDS, VPN, Active Directory and firewalls into the Blue Cross network
- Created roadmaps for the integration of future technologies such as encryption, Single Sign-on solutions and vulnerability scanning solutions.
- Conducted gap analysis of internal/external network environments and implemented security controls to mitigate vulnerabilities.
- Created and led corporate Incident Response team of three analysts in security event remediation.
- Conducted vendor evaluations of new technologies and created strategic technical recommendations based on corporate/business unit requirements and competitive business drivers.
- Created security awareness program and conducted end user corporate security awareness training.
6-10 years of experience
- Extensive experience in Security Program, Security Policies & Standards, Risk Management, IT Governance IT Compliance, Incident Management, Vendor Evaluation, Data Discovery & Classification.
- Collaborated with key business and IT leaders to develop security policies, standards, guidelines and procedures to ensure the confidentiality, integrity, and availability of the corporate infrastructure.
- Trained and mentored business users and IT professionals in proper IT security and computer standards. Designed security awareness training program which assisted in achieving the goal of a properly secured network.
- Managed the creation and implementation of vulnerability and patch management using Microsoft WSUS, SCCM 2012, MBSA and BeyondInsight CS Vulnerability Management System.
- Implementation and management of McAfee ePolicy Orchestrator with VSE, HIPS, and SA for 2500 client computers.
- Developed an SCCM 2007 infrastructure which lead to the upgrade to a SCCM 2012 infrastructure for 22 locations, 3000 users, 2500 computers and 600 servers.
- Experience in rolling out End User training and awareness using Wombat Security Technologies Anti-Phishing and Training platform.
- Experience with open source tools such as Kali Linux, Snort, and SANS Investigative Forensics Toolkit.
0-5 years of experience
Architected security controls and systems to meet and surpass banking industry regulations.
- Lead role in audit compliance with Fannie Mae, GLBA, Mass 201 CMR 17, Red Flags, & SAS70 type II.
- Project lead for disaster recover / business continuity with C-level management.
- Deployed security controls primarily with open source products including IDS/IPS, SIM, centralized logging, & correlated security event monitoring.
- Developed and implemented data leakage controls for enforcement through AD & group policy, email encryption, and mass storage device security.
- Architected perimeter security and connectivity for remote locations.
- Authored corporate technical security policies, directives, and white papers.
- Trained junior engineers and interviewed potential candidates for positions.
0-5 years of experience
Responsible for scoping and developing project proposal and plan to structure work arrangement
- Gathered business partner requirements and designed an Internet Security Installation covering all internal systems
- Developed and managed initial implementation of internal Internet Security Installation
- Resourced hardware for Main Office and 11 Branch Offices
0-5 years of experience
Monitored and tracked Commission vulnerabilities and patch management.
- Reviewed NFx Sim reports providing SOC analysis.
- Monitored and analyzed Riverbed reports
- Identified database security issues.
- Investigated assorted Incidents and interfaced with agencies as needed.
0-5 years of experience
- Created, proposed and implemented a risk assessment methodology for all internally developed applications
- Defined, proposed, built and implemented an enterprise digital forensics and e-Discovery capability, integrated with the legal and HR departments
- Directly investigated more than 100 individual complaints using tools built in Linux
- Worked with multiple development groups to integrate risk assessments into their SLDCs
0-5 years of experience
Lead and managed the PCI-DSS and SOX audits/projects in [company name] environment
- Provided tier4 technical support to various internal groups including operations, software development, product development and sales.
- Architected secure packets flow in [company name] virtual call center environment
- Analyzed complex layer3/4 technical issues and provided weekly status reports of progress to CSO(Chief Security Officer)
- Provided on job training to other team members of Tripwire(version 7.1 and 10.0) monitoring tool
- Installed and configured different security platforms in [company name] Data Centers including firewalls, load balancers and monitoring devices
- Drafted layer1/7 security requirements/policies/procedures to be enforced across internal/external organization departments
- Handled end to end security administration functions including OS hardening, codes inspection, router/switch security configuration and disaster recovery roll backs.
- Performed scanning(nmap/nessus/rapid7) and penetration testing functions on monthly basis
0-5 years of experience
Transforming business segment from resource-based to alternative pricing/costing models.
- Lead Security resource on IT total outsourcing engagements – Fortune 1000 client base.
- Presenter and Speaker to C-suite on Cyber/Cloud/IT Security.
- Supported large telecom client move into the USA from regulatory/compliance/billing effort.
- Developed & Implemented new working model for cross-functional security support on large/complex deals.
0-5 years of experience
Provide technical security architecture guidance and serve as an information security advisor on business applications and infrastructure supporting GE’s Power & Water and Capital businesses
- Develop and drive security standards to ensure adequate protection. Translate standards to baseline security requirements for IT teams derived from industry best practices from SANS and OWASP
- Significantly improved the IT application security posture by threat modeling high risk applications. Managed team of consultants (penetration testers) on the end-to-end penetration testing and remediation
- Partner and collaborate with other IT and security architects to create, maintain and drive technology strategies and roadmaps, lead larger and complex projects and simplify process workflows.
- Support application and operations teams are delivering secure code and infrastructure by ensuring high risk vulnerabilities from IBM AppScan, HP Fortify & WebInspect and Qualys scans are remediated.
- Simplified team’s risk assessment review process by eliminating steps improving cycle time by 40%
- Supervise offshore team. Interview and hire staff and interns onshore. Coach, mentor and manage team performance.
- Lead POC and evaluate security technologies like DB Activity Monitoring, Web app firewall, malware prevention tools. Compile recommendations for SLT based on research from sources like Gartner/Forrester.
0-5 years of experience
Architected a security solution with password digest by developing custom OWSM Policies
- Provided an end-to-end Web Services security architecture for internal and external facing web services
- Integrated security mechanisms from WLS, OSB, Oracle SOA Suite and Oracle Web Services Manager (OWSM)
- Architected SOA Suite and Coherence to use Unicast Cluster so that they use consistent architecture
- Developed services over OSB and SOA Suite using SOAP and JMS transports
- Mentored client resources on WLST scripts for OSB, OWSM and SOA Suite
0-5 years of experience
Monitored and tracked Commission vulnerabilities and patch management.
- Reviewed NFx Sim reports providing SOC analysis.
- Monitored and analyzed Riverbed reports
- Identified database security issues.
- Investigated assorted Incidents and interfaced with agencies as needed.
0-5 years of experience
- Managed vendor risk assessment projects from project initiation through remediation.
- Coordinated with stakeholders and relationship managers to identify, document and remediate risks at 3rd party locations in accordance with Target Information Security standards.
- Developed repeatable and defensible process for identifying risks, determining recommendations and assigning risk levels.
- Collaborated with business leaders to refine documentation and reporting to better address repeatability and consistency.
- Worked with various business units to establish a vendor manager training process for security and compliance.
- Addressed compliance issues related to GLBA/FFIEC, PCI, HIPAA, NIST 800-30 and internal controls requirements.
- Utilized the BITS SIG and AUP to document vendor IT Controls and document risks.
0-5 years of experience
Responsible for the day to day security best practices for the [company name] security infrastructure
- Responsible for the management, architecture, deployment of over 100 checkpoints VSX firewalls.
- Evaluating the Network Sentry NAC solution ( Bradford Networks) and its integrations with the checkpoint firewalls.
- Assisted in the security design efforts of the new Data center in regards to the firewall deployment that utilizes over 30 virtual VSX clusters built on 12000 series firewalls.
- Responsible for developing the new security airport design standard to be implemented globally on all [company name] airports.
- Created the engineering and troubleshooting guide for the new checkpoint R77.20 release.
- Designed the new PCI and PII data DMZ zones to house the new c7000 HP VM servers for the new data center [company name] reservation department.
- Working with the server team to create the new deployment for the Hadoop (big data) deployment.
- Responsible for the role out of zscaler cloud based solution for all of North America airports to be integrated with the 12000 and 4800 checkpoint series firewalls.
0-5 years of experience
- Developed a risk-based enterprise security architecture framework (TOGAF, ISO 2700x) for security program assessment.
- Prioritized remediation strategies for critical security gaps, including incident response, risk assessment, enterprise data encryption, and identity and access management domains.
- Assessed and developed strategic security plans around key capabilities, including web services, cloud computing (AWS), and mobile devices.
0-5 years of experience
Responsible for providing architecture guidance on an Active/DR datacenter utilizing the Cisco Virtualized Multiservice Data Center Reference Architecture
- Responsible for integrating Cisco Nexus, Cisco 6500-E, Cisco ASA 5585-X with SSP-20, Cisco UCS servers, and Checkpoint R75 firewalls entering thousands of lines of code into the devices during the duration of the successful project
- Review and implement all changes on 70+ firewalls across three datacenters and seven remote offices
- Configured site-to-site and remote access VPNs for application access, business partners, and employees
- Responsible for the planning of the Cisco ISE deployment on the wired, wireless, and VPN networks
- Provide security recommendations, including Cisco ASA Botnet filter, Cisco hardware configuration standards, auto-conflict detection, and policy object manager
- Utilized FireMon to accelerate the addition of firewall rules within the new primary data center
0-5 years of experience
- Provided technical input to Continuous Monitoring Proposal
- Provided security oversight to various projects at TSA, including network architecture changes, application implementations, and mobile solutions
- Researched and provided security perspective on emerging technologies
- Managed PKI certificate disbursement as a registration authority
- Performed Nessus scans
0-5 years of experience
Design suitable solution architecture to address business needs and requirements
- Consult with clients to provide security best practices and recommendations
- Prepare and present Proof of concept (POC) based on design
- Rapidly implement Identity Management products across multiple platforms
- Plan and conduct performance testing