- Featured in:
Find out what is the best resume for you in our Ultimate Resume Format Guide.
Additional Data Systems Administration Resume Samples
Information Security Engineer Resume Samples
No results found
0-5 years of experience
Performed intensive analysis of application/platform access control data structures, defined and articulated to developers the data attributes/elements required to meet the requirements of the Access Management Remediation Project
- Assisted and educated business partners with data conversion and data delivery method requirements (NDM)
- Executed Z/OS job stream process for Test, Quality Assurance (QA), Data Acceptance Testing (DAT), User Acceptance Testing (UAT) and Production environments
- Using SAS and JCL on Z/OS developed iterative loop SAS MACROS which generated large text files from delimited control files, speeding up production of the text files by 700%
0-5 years of experience
Driving force behind innovative thinking through challenging the limits of preexisting norms.
- Developed the Computer Incident Response Methodology (Policy, Plan, Playbook), which lead to increased interdepartmental collaboration. This plan includes 60 trained people, across 15 global teams.
- Managed incident response from outside threat-actors to protect the brand and infrastructure. This required interfacing with law enforcement (FBI) and partner companies, including social media outlets.
- Assisted in authorship of the company’s three and five year roadmaps. These roadmaps focus on securing data centers, local offices, and various web-based technologies.
- Analyzed cutting-edged technologies that would affect corporate security posture, as well as protecting against unknown risk.
- Interfaced with global teams to implement technologies that align with the current security strategy. One strategy included the need for comprehensive vulnerability and risk management with Internet facing sites across all business units. Provided metrics on vulnerability assessments and recommended remediation activities.
- Reviewed information security controls to ensure maintenance of SOX compliance.
- Brought in multiple vendors to perform computer security awareness training for larger IT staff.
0-5 years of experience
- Lead E-Discovery Department: including documenting all processes and procedures, training, and case management best practices. Evaluated all requirements and implementation of new SaaS offerings: Office 365, Box, and more.
- Trained offshore SOC (Romania) on eDiscovery / Forensics. Increased workflow productivity by 200%.
- Created novel approaches to collect ESI containers, such as SharePoint, Wiki, and Confluence sites.
- Drove creation of company-wide security awareness and training program.
0-5 years of experience
Performed duties as an Information Security Engineer by assisting client with Computer Network Defense(CND), Security Engineering, and Incident Response & Analysis. Monitored all network traffic through administration of Websense, Wireshark, NIKSUN (Intrusion Detection System) and HBSS which kept client free of malicious software and exfiltration of sensitive data. Security incident handler for at least three security incidents per week on NIPRNet and SIPRNet to contain data spillages and malware-contaminated files; drafted reports after each one to brief the DAA.
- Co-developed and taught quarterly CND training course for CYBERCOM employees utilizing various exploitation tools to enhance CYBERCOM’s understanding of hacking and increase their ability to protect the network.
- Analyzed and investigated network misuse on behalf of the Chief of Staff with the Websense Network Monitor. Generated weekly usage summaries and provided site blocking recommendations for the Chief of Staff.
- Conducted weekly eEye Retina scans on both NIPRNet and SIPRNet within the JTFGNO’s 1,000+ computer network, and generated Vulnerability Management System (VMS) reports to maintain security compliance.
- Drafted usage policy memorandums and classified data spillage handling procedures for CYBERCOM to structure users’ actions and repercussions on all computers and networks.
- Empowered leadership with highly regulated domains and secured machines via proper HBSS management.
0-5 years of experience
Responsible for troubleshooting and maintaining Cisco PIX, FWSM, and ASA ACLs in order to provide successful transfer of data without compromising company information.
- Responsible for performing regular network and application security/ vulnerability assessments against corporate network and production applications using various open source and proprietary tools (Nmap, Nessus, FoundStone).
- Administered VPN access rights for employees and third party customers using Cisco 3000 concentrator with existing RSA server.
- Maintained and updated RSA servers and token/user accounts in order to help provide secure network access.
- Configured and maintained Avaya SG208 servers in order to provide VOIP access to remote users.
- Evaluated SIEM (Symantec, Intellitactics, and ArcSight) products in order to assist with the selection and implementation of the best tool to help identify network attacks, malicious behavior, policy violations and provide comprehensive auditing and reporting capabilities to support regulatory compliance.
0-5 years of experience
Vulnerability assessment and penetration testing methodology; knowledge of and experience with applying Common Weakness Enumeration (CWE) and Common Vulnerability Scoring System (CVSS)
- Oversaw development and management of resources and vendors for the project. Designed and presented the presentations regarding projects and their requirements.
- Managed a team of 6 engineers. Reviewed status of projects and budgets, manages project schedules and prepares project status reports.
- Assessed project issues and develops resolutions to meet project objectives. Managed internal as well as external project resources with a team size less than 20 people and experienced in resolving issues across multiple teams and managing dependencies between projects.
- Conceived and established asset management practices and processes to track all assets from purchase to disposal.
- Managed inventory tracking establishing tight asset control standards region-wide.
- Merged database into incident tracking system providing ability to monitor support trends. Identified root causes of suspicious issues and implemented resolutions that increased efficiency and customer satisfaction and lowered overall support costs.
6-10 years of experience
Reviewed, tested and deployed tools for the monitoring and protection of the network and server environments for a bank with over 120 branches and 6000 employees throughout California and Arizona.
- Generated reports and developed procedures for the IT department to harden the Network and Server infrastructure.
- Played a significant role in the development of the Information Security Department tools deployment, Team development and Policy remediation.
- Reviewed and authorized policy and procedure for the AD tree structure.
- Assisted in information security assessments; performed threat analysis, vulnerability assessments, and penetration testing. Performed investigations of security incidents, anomalies and events and the development of incident reports procedure.
0-5 years of experience
Built and executed social media strategy through competitive research, platform determination, benchmarking, messaging and audience identification.
- Generated, edited, published and shared original content (text, images, video or HTML).
- Set up and optimized company pages within each platform to increase the visibility of company’s social content.
- Worked with detection software and systems to protect our business and our clients.
- Proactively assessed potential items of risk and opportunities of vulnerability in the network.
0-5 years of experience
Performed Risk and Vulnerability Assessments for Department of Veteran Affairs (VA) TMP Wide Area Backbone
- Implemented Remediation Plan for the VA’s TMP Wide Area Backbone
- Performed security RAs, developed Security Plans, and performed C&As of information systems
- Defined and conducted software tests and evaluations for technical verification and validation of automation security
- Utilized relevant federal (e.g., FISMA, Privacy Act, HIPAA, NIST, OMB and FIPS) IT security regulations, policies and procedures for the Department of Justice JCON Civil Network Division
- Evaluated and ensured system compliance with established information assurance policies and regulations according to OMB FISMA and NIACAP
- Daily responsibilities included C&A, data gathering, security training and awareness, FISMA compliance and documentation development of SSPs, RAs, ST&E, CPs and IA policies and procedures, NIACAP appendences and SSAA document creation
0-5 years of experience
Protected data records for 8 million students, 180K active students, and nearly 25K staff
- Executed security operations on one of the largest computer networks in the state of Indiana, with over 30k PCs, 1300 college owned mobile devices, and over 100k walk-in BYOD wireless devices
- Deployed a Splunk cluster to digest over 50GB of security log data generated daily
- Developed Splunk dashboards, alerts, and reports to analyze critical security intelligence data
- Deployed firewalls and IPS systems in a data center that houses over 1300 virtual servers
- Managed all forensic incident response activities and worked with LEOs when needed
- Successfully completed numerous enterprise projects on schedule
- Developed and championed numerous security initiatives
0-5 years of experience
Managed security incident responses for NIPR and SIPR networks through a methodical process of identification, investigation, and resolution. Performed computer Incident Management for Navy systems and programs with 5,000 users. Worked directly with Navy personnel at multiple levels and with FBI and NCIS on high level incidents. Collaborated with law enforcement agencies and NCIS to obtain evidence and maintain chain of custody. Held Secret clearance.
- Developed Standard Operating Procedures (SOPs) for incident response handling.
- Reviewed and analyzed security response policies and programs for potential risks.
- Ensured continuity in user account creation for military personnel.
- Disseminated Information Assurance Vulnerability Alerts via Online Compliance Reporting System.
0-5 years of experience
Consultant
- Developed and implemented strategy to modify local network infrastructure in accordance with NIST 800-30; enhanced the security posture of the network by minimizing exposure to threats
- Well rounded automation and/or process knowledge including but not limited to: DCS/Distributed SCADA network architecture for control systems
- Conducted site survey for customer to assess the effectiveness of existing physical security layers
- Created backup plan that was integrated into daily LAN operational procedures
- Analyzed threats and provided impact assessment for exposure to malware
- Knowledgeable of FERC and NERC CIP standards; performed research on solutions to protect US power grids from cyber attacks
- Working knowledge and understanding of regulations/standards for critical infrastructure (NERC CIP, NIST 1108R2, ISA-99, IEC 92443, WIB, etc.) and processes
6-10 years of experience
Senior member of InfoSec Tools team, responsible for DLP engineering (Symantec DLP v11.1) and infrastructure monitoring (Nagios and Cacti (RRDtool)).
- Was actively involved with Tenable/Nessus and Splunk.
- Developed tools in perl and shell.
- Performed research into data-loss prevention technologies and other privacy-enabling technologies (PETs), as member of Information Privacy Team.
- Led MITRE InfoSec Operations’ intrusion detection team (IDS) operations for one year (staff of 16), integrating anomaly detection technology (StealthWatch) and security information management system (SIM) into the operational toolset.
- Worked with ‘cfengine’ configuration management tool.
- Created software tools as required to automate system administration processes.
0-5 years of experience
Development and implementation of corporate-wide security policies, standards, guidelines, and systems and applications specific security procedures
- Development and formulate of specifications for computer programmers to use in coding, testing, and debugging of computer programs
- Established and maintained password management program, monitored network devices for compliance to security policies, generated reports for internet and remote access activity (vpn and modem pool), and permit/deny access to websites
- Documentation of Information Security Controls in a System Security Plan (SSP)
- Conducted network and server vulnerability assessment scans plus track and report risk mitigation
- Through teamwork, conducted security incident investigations; sniffing network traffic for unauthorized network services; reviewed and authorized request for network services such as. modem lines, ISDN, remote access, VPN, Internet access (ISS Web filtering), and Verisign PKI.
0-5 years of experience
Maintained currency of new vulnerabilities to assess their impact to FBI information technology systems
- Conducted post-test analysis, developed test plans and test results document, as well as participated in the risk assessment process for the FBI and Bureau of Engraving and Printing
- Provided IT security and privacy counsel to the client as a member of the C&A team
- Provided technical support to the Information Technology Security Unit and the Information Assurance Section Senior Engineer
- Established IT application security testing plans, test scripts, and executed the applications’ security functionality as part of the C&A process for the FBI and the Bureau of Engraving and Printing
- Conducted Bureau of Engraving and FBI Information Technology enterprise systems security and IT application security testing using FISMA criteria and DISA STIGs
- Manually verified FISMA compliance using a CA-Top Secret audit level Userid and CA-Auditor software.
6-10 years of experience
Maintained, monitored, and upgraded the StealthWatch IDS system and created custom daily reports to alert on anomalous traffic patterns and behaviors. This proved invaluable in curtailing the spread of malware and mitigating Worm outbreaks.
- Worked with both vendors and customers to develop a solution to persistent VoIP issues related to MGCP and SIP incompatibilities.
- Used commercial as well as open source tools to troubleshoot network problems including tcpdump, “diag sniffer”, packet-tracer, and fw-monitor.
- Provided guidance and consultation to several business units concerning PCI compliance and assisted in the determination of what level of merchant each business unit would function as according to PCI DSS.
- Provided information security consulting and leadership as a member of the Architecture Review Board which has the responsibility of evaluating and approving new technologies and standards for the enterprise.
- Implemented 6 Sigma methodologies and the DMAIC process to measure, manage, and improve our Intrusion Detection process resulting in reduced false positives and greater system reliability.
- Created a comprehensive incident response plan which allowed for more timely identification of real threats and reduced the number of false alarms.
0-5 years of experience
- Established a new Information Security Professional Services.
- Completed an enterprise infrastructure and security assessment that resulted in improving public facing security and overall infrastructure creditability.
- Created & configured multiple zones to allow efficient communication between Data Domain DD660, Symantec NetBackup, and Sun STK L500 through a Cisco 9124 Multi Layered Switch.
0-5 years of experience
Provide security engineering for implementation in the Symantec Critical Systems enterprise network. Daily responsibilities include design, implementation, support and administration of Symantec Critical Systems security products. Provide best practice security consulting for multiple compliance initiatives, with a focus on highly resilient solutions. Create technical implementation plans, project plans, and work closely with internal and external customers to supply solutions that fulfill their needs.
- Re-architected CSP infrastructure to provide high-availability using Cluster services and Global File System (GFS) along with Application Clustering providing for 99.99% up time
- Provide technical leadership to the enterprise customer (UTC) for the information security program. Trained and mentored employees in many job descriptions regarding security and system basics, best practices, etc.
- Achieve consistent high marks on customer satisfaction surveys
- Developed scripts to maintain and backup key security systems
- Third level escalation point for troubleshooting any security, network, and system issues within the company or for our customers
- Direct Customer Interface from Engineering / Architecture to Management of engagement
0-5 years of experience
- Managed the service delivery for SIEM, DLP, and network gateways to large organizations
- Gained vast knowledge of regulatory compliance such as PCI-DSS, HIPPA, SOX, and GLBA
- Developed procedures for handling events and escalating investigation level incidents
- Created reports based on correlating log data from SIEM, DLP, and gateway technologies
- Assessed and analyzed the alerts using log and incident correlation reporting
0-5 years of experience
Administered Logrhythm Log Management Platform
- Administered, Developed, and Maintained Identity and Access platform
- Developed and implemented Risk Management Application to support Logrhythm log source enrollment lifecycle
- Conducted static and dynamic Malware Analysis
- Developed powershell scripts to identify, contain, and remediate enterprise infections
- Architected Log Management lifecycle for enterprise servers to prioritize logging for Security and Compliance
0-5 years of experience
Principal member of the Enterprise Information Security Group, responsible for monitoring various information security tools designed to protect all bank assets and reduce the overall risk of intrusion exposure related to internal and external threats. (Daily Frontier Bank responsibilities remained)
- Managed the end-to-end change control process for all enterprise network and firewalls.
- Worked with Windows and UNIX network administration teams to complete vulnerability and patch management assessments and implementation releases.
- Recommended and provided approvals for network security policies, standards and protocols to prevent unauthorized use, modification and destruction of customer data.
0-5 years of experience
Assisted the CISO with developing and maintaining ICF’s information security program including the development and implementation of security policies, standards, and procedures.
- Performed security assessments and vulnerability assessments on information systems.
- Developed security awareness materials.
- Consulted with project managers and developers on information security issues for individual projects and hosted information systems.
- Helped prepare for Certification and Accreditation of hosted information systems following NIST guidelines.
- Developed requirements for, research, and implement security tools and solutions such as; a secure file transfer solutions, Intrusion Detection Systems/Intrusion Prevention Systems (IDS/IPS), enterprise email encryption, log management, vulnerability scanning/penetration testing utilities, and web security and content filtering.
0-5 years of experience
Managed Vulnerability Management across Genesys Cloud. Scanned, validated vulnerability findings and coordinated remediation. Supported customer sales cycle and pre/post sales audit. Created security and compliance sales training. Coordinated pentests. Identified and managed security vendors, POV’d new solutions. Created and delivered security awareness and application security training. Supported secure Agile SDL processes, including architectural review, mobile (iOS), and web app testing support. Managed security incidents and performed forensics from identification through remediation and lessons learned. Performed external customer audits.
- Performed a review of all external facing Genesys applications for security issues. Presented results at internal ‘Engineering Days’ conference.
- Created a ‘Security Excellence’ rewards program to encourage best practices.
- Trained developers to use WebScarab to perform dynamic testing during the development cycle and prior to deploying code.
- Managed year-two PCI Audit from start to completion 30 days ahead of schedule.
- Named ‘Employee of the Quarter’ for work on initial PCI Level One validation effort.
0-5 years of experience
Provided daily Management of DoD Online Compliance Reporting System (OCRS) used by the U.S. Navy to track compliance with information assurance vulnerability alerts, bulletins and technicals (IAVA, IAVB, IAVT) as assigned by the Joint Task Force Global Network Operations (JTF-GNO), a subordinate command of the U.S. Strategic Command. Administered/managed Vulnerability Management System (VMS) and the DoD’s Security Technical Implementation Guides (STIGs). Provided daily coordination with information assurance managers to ensure IAVA and STIG compliance.
- Provide technical expertise and subject matter support to Global Network Operations Command’s (GNOC) Information Assurance Compliance team.
- Coordinated with Enhanced Compliance Validation (ECV) teams; assisted in ECV visits with Defense Information Systems Agency (DISA) Field Security Office compliance and inspections.
- Acted as primary point of contact for vulnerability scans throughout the NMCI network.
- Analyzed vulnerability scan data to assess network risk and make mitigation recommendations.
0-5 years of experience
Reviewed security violation investigation reports recommended corrective and disciplinary action for employee that committed the violation.
- Developed IT security policies, standard operating procedures, and training for DEA employees.
- Conducted extensive research with NIST 800 series and FIPS Publications for developing DEA IT policy for the Field Units.
- Performed audits of IT servers and workstations to ensure sensitive and classified systems was protected according to Department of Justice (DOJ) and DEA policy.
- The audits consisted of reviewing administrators and users accounts to ensure the policies on the network servers was setup correctly to deter unauthorized access.
- Ensured firewalls was setup according to DEA IT policies to protect network from external intrusion.
- Approved site diagrams and installation plans for IT systems, servers, and network equipment located inside OSA.
- Conducted inspection after construction of OSA ensured DOJ and Department of Defense security requirements was met prior to processing classified information.
6-10 years of experience
Performed Application Access and Usage audits, including Federally mandated Sarbanes-Oxley audits.
- Responsibilities included provisioning associate system access and performing system access audits.
- Working with projects to insure access needs are met for systems impacting users company wide.
- Acted as On Call Point of contact for system issues.
- Led project to convert team to new Access Management database system, moving 500+ applications and all Consumer banking employees to new system.
0-5 years of experience
Ensured comprehensive risk management and regulatory compliance for the protection of US cyber interests. Managed a team of information security and technology personnel to create a virtual lab for testing the propagation of malware. Managed information security budgets and expenditures while enforcing compliance with information technology standards. Researched security solutions and products for information security management performance.
- Provided information security management
- Created cloud computing infrastructure solutions
- Spearheaded virtualization infrastructure solutions
- Performed vulnerability assessments, remediation and security hardening
- Certification and Accreditation (DIACAP and ICD 503)
0-5 years of experience
IT Security Governance (ITSG) responsible for providing technical information security engineering services to support and validate information security controls in place protecting [company name] Corporation (CFC) data from exposure. Matured “3rd party” risk assessment process to attain COBIT level 4.
- Consulted with CFC users on security requirements for data, applications and processes.
- Developed the third party assessment process providing compliance with FISAP (BITS) and OTS.
- Information security SME for several projects/systems making sure the security controls comply with CFC policy
- Conducted information security reviews / risk assessments on both internal and external applications / projects.
10+ years of experience
Provided constant effective management, training, motivation, communication, quality-checks with 20 off-shore team members in India along with 6 current [company name] Associates.
- Provided computer forensic services including EnCase data collections, digital evidence analysis, data recovery, and electronic mail extraction to Inside/Outside Council and the Department of Justice.
- Managed critical deadlines that saved the bank $54MM in 2010 and $40MM in 2009.
- Gathered, organized, processed and provided accurate data analysis.
- Used Attenex Patterns Workbench. Catalogued, removed duplicates, indexed, searched, and produced responsive data on CD and/or industry document review tools.
- Managed cases involving many custodians, and terabytes of data containing confidential, critical, and highly sensitive information used in audit investigations.
- Used encryption/decryption software such as PGP, and Password Recovery Toolkit.
- Provided reports to Case Analysts, Service Delivery Managers and Upper Management.
- Performed quality control checks to ensure search criteria are accurately represented in data sent to litigation team and outside council.
0-5 years of experience
Evaluate, design, maintain, and integrate security systems, appliances, tools and services.
- Conduct vulnerability assessments, design and implement security measures, provide oversight of security projects to include the development of timetables, budgets, and status reports.
- Monitor and manage security systems, appliances, tools and services to ensure operation within contractual service level agreements and in support of network architecture and operations.
- Security appliances include McAfee Web Gateway, McAfee Vulnerability Manager, McAfee Web Reporter, Palo Alto and Fort iGATE Firewalls.
- Project lead for architecting implementing, and managing over 60 McAfee Web Gateway appliances across 4 countries resulting in a self-performance savings of over $1 million annually. This also included creating critical SharePoint tools vital for the deployment and maintenance of the appliances.
- Won the DynCorp’s Int’l STAR award within 5 months of hire date.
0-5 years of experience
Principal engineering and network security team member for $6 Billion Weyerhaeuser divestiture effort.
- Architected and deployed departmental network security R&D lab facilities in Ashburn, VA facility.
- Created technical articles, requirements documents, statements of work, and vulnerability assessments.
- Identified and documented security vulnerabilities in Cisco, Juniper, and Motorola security appliances.
- Identified and mitigated exploitation of multiple vulnerabilities affecting all Cisco ASA/PIX/FWSM firewalls.
0-5 years of experience
Completed security evaluations for over 20 web based applications, thick client applications, and web services.
- Application security evaluations for PCI and PII compliance
- Automated and manual penetration testing.
- Analyzed applications for security risks, which were detailed by the OWASP Top-10; including SQL injection, Cross Site Scripting and privilege escalation vulnerabilities.
0-5 years of experience
Provided technical support to the MITRE project manager and the Security Operations Center (SOC) on behalf of the Centers for Medicare & Medicaid Services (CMS).
- Developed documentation for standard operating procedures (SOPs) in the areas of vulnerability management tools, sensor deployment, and risk analysis reporting.
- Reviewed and edited the concept of operations (CONOPS) document for the CMS SOC.
- Developed compliance related and customer-facing resources based on contractual requirements, current demand, and projected customer needs.
0-5 years of experience
- Supported US Army Aviation and Missile Research Development and Engineering Center (AMRDEC) by successfully leading a small team on a 3 month proof of principle range modernization task including cost and schedule reports, negotiations, and data integration for modeling and simulating scenarios.
- Supported [company name]’s Engineering Solutions and Technologies Division in strategic planning and process of improvement discussions.
- Served on proposal efforts for Cyber and Information Security tasks.
- Supported [company name]’s Huntsville Conference and Innovation Center by identifying and securing Cyber Security Solutions to be installed and showcased; and developed partner relationships to extend [company name]’s services to customers.
- Represented [company name] in Marketing and Capabilities IPTs for the Cyber Huntsville Initiative.
- Participated in successful internal security audits.
6-10 years of experience
Provide security analysis support for PEO-C4I PMW 130 (Cyber Security Program Office) Ports, Protocols, Services, Management (PPSM)
- Advise the Navy Office of the Designated Accrediting Authority (ODAA) U.S. Fleet Cyber Command/U.S Tenth Fleet (FCC/C10F) on Ports, Protocols, and Services (PPS) issues.
- Guide System Owners on PPS registration/documentation, implementation, and compliance.
- Review system’s PPS vulnerability assessments and provide recommendations on implementation guidance and their risk to the Global Information Grid (GIG).
- Provide input and support to updates of Security Technical Information Guides (STIG) and Security Requirements Guides (SRG) that apply to PPS.
- Analyze Information Assurance Strategies and recommend modifications based on the analysis.
- Saved System Owners over $80 million in estimated architecture re-development costs by working with Department of Defense (DoD) PPSM to get System Owner’s PPS compliant with DoD policy.
0-5 years of experience
- Developed ISPF/REXX panel-programs which call SAS to obtain the data. These programs aid the teams who are responsible for putting new application/systems to be certificated for access control.
- Created complex reports sent automatically to business partners via SMTP sever.
- Enhanced SAS programs (processing 2 millions+ OBS) for shortening the execution time.
- Developed SAS programs to input and output XML data files.
0-5 years of experience
Was Department of Energy (DOE) Office of the CIO (OCIO) ISSO Team Lead before temporary disablement due to an accident, and returned as a senior member of the team. As a Senior ISSO, main responsibilities included acting team lead tasks in the absence of new team lead, maintaining Authorization to Operate (ATO) certifications and supporting Risk Acceptance and Annual Review efforts, by verifying FISMA/NIST, DOE, and OCIO compliance on new client systems as well as reauthorization of current systems; maintained/updated artifacts for those systems, in particular SSPs, and represented the ISSO team in meetings, including weekly configuration management board and continuous monitoring and other projects.
- Represented system owners in IATO, initial ATO, and reauthorization efforts.
- Addressed vulnerabilities found by Tenable/Nessus scanning.
- POA&M remediation and risk acceptance guidance and documentation.
- PIA, SSP, BIA, and Exemption/Waiver/Tailoring documents.
- Acceptance or rejection of change requests due to security posture.
- Reviewed, and provided guidance for, work by other DOE OCIO ISSOs.
0-5 years of experience
- Provided technical and strategic leadership to the enterprise on the sustainment and operation an effective Information Security Program through the integration of industry accepted information security best practices.
- Responsible for the operation of information security assurance devices such as IPS, IDS, firewalls, QRadar log management, AntiVirus, McAfee EPO.
- Assessed the potential impact of emerging threats, risks, and vulnerabilities.
- Utilized Nexpose vulnerability scanning software to ensure compliance objectives are met while providing mitigation strategies and guidance for discovered vulnerabilities.
- Authored enterprise security standards, policies, and guidelines that align with executive leadership goals and objectives.
0-5 years of experience
Information security engineer lead for DEA Security Programs, Information Security section.
- Evaluated and updated NIST special publications database.
- Managed DEA-wide Computer Security Assessment Training program for web security.
- Information security engineer lead on security programs team responsible for drafting DEA standard regarding use of portable electronic devices within DEA secure facilities.
- Drafted DEA policy regarding the standard operating procedure for employing external vendors for the destruction of classified documents.
- Drafted Memorandum of Agreement regarding Foreign Nationals employment within DEA.
- Drafted standard operating procedure for encrypting storage devices within DEA.
- Administered training for appropriate use of portable electronics devices.
- Facilitated and implemented plan for internal social engineering evaluation exercise within DEA.
0-5 years of experience
Performed project oversight for independent review and analysis of [company name] wide IT systems integration project.
- Applied project management knowledge and expertise to gauge system performance and assess risk.
- Provided stakeholders with project status and outlook for success, and recommend project improvements.
- Project lead for an information security Certification and Accreditation program for [company name] General Support System (GSS) and Major Application (MA).
- Participated in project and planning, budgeting, and requirement analysis.
- Documented functional and technical specifications.
- Performed enterprise wide vulnerability assessment on [company name] systems and developed Plan of Action and Milestone (POA&M).
- Developed and modified [company name] security policies.
- Performed compliance Map and Gap Analysis on [company name] systems.
- Developed secure baseline for Solaris 10, Windows 2003, Oracle10g and 11g in accordance with National Institute of Standard (NIST).
- Installed and configured the following information security tools Retina Security Scanner – Windows/Unix Security scanner, Retina Web Security Scanner, Application/Web Scanner, REM Enterprise Vulnerability Management, Tenable Nessus – Window/Unix Security Scanner
0-5 years of experience
- Designed Security Event Management infrastructure and Intrusion Detection systems for monitoring and alert correlation in a 3000+ node network with 40 branch offices
- Performed daily network vulnerability analysis with scanners and network traffic analysis tools
- Evaluated and implement new security technologies.
- Reviewed daily security logs from security devices across the enterprise
- Perform forensic analysis of systems and investigation of suspicious network activity
- Developed and reviewed Information Security policies, standards, guidelines and procedures
- Performed Security assessment and certification for XP/AD/Server Deployment
0-5 years of experience
Provide analysis and support for firewalls, routers, networks, and operating systems, such as McAfee Web Gateway, ISA servers, and Sidewinders.
- Monitor, and administer, user access processes to ensure operational integrity of security systems via Active Directory for Windows Server 2003.
- Monitor security events and alerts across TSA networks using ArcSight Logger.
- Provide technical support to assess and enforce TSA-mandated security policies.
- Review and recommend the installation, modification or replacement of security components.
- Develop, test, and maintain firewalls, IDS, enterprise Anti-Virus systems, such as SEP 11 and SAV 10, and software deployment.
- Author and review standard operating procedures for security tools, software, and hardware.
0-5 years of experience
Provide analysis and support for firewalls, routers, networks, and operating systems, such as McAfee Web Gateway, ISA servers, and Sidewinders.
- Monitor, and administer, user access processes to ensure operational integrity of security systems via Active Directory for Windows Server 2003.
- Monitor security events and alerts across TSA networks using ArcSight Logger.
- Provide technical support to assess and enforce TSA-mandated security policies.
- Review and recommend the installation, modification or replacement of security components.
- Develop, test, and maintain firewalls, IDS, enterprise Anti-Virus systems, such as SEP 11 and SAV 10, and software deployment.
- Author and review standard operating procedures for security tools, software, and hardware.
0-5 years of experience
Provide documentation for 28 IA, customer required DIACAP document artifacts supporting PKI and the Global Directory Services (GDS)/ Enterprise Directory Services (EDS) systems
- Team lead for the Tangible Compliance Team. Responsiblities include training new hires in the group and overseeing team work; created a vunlerabiltiy management guide for team members to use
- Interface with customer and engineers at other locations to coordinate FISMA exercises
- Interface with network and Linux engineers and track CRs in Remedy in support of vulnerability assessments
- Provide DoD VMS support for over 100 DISA PKI and EDS assets; review and draft POA&Ms and other vulnerability management support on an as needed basis; generate weekly reports and provide to upper management; coordinate status of findings with other DoD contractors’ VMS assets
- Authored a Tangible corporate wide IA policy using ISO/IEC 27002 Standards
- Reviewing current DIACAP artifacts and systems ATO status to determine best migration path to RMF
0-5 years of experience
Support overall network defense activities, provide in-depth analysis of suspected incidents, perform necessary inspection activities to understand the root cause, and develop recommendations on how to counter threats
- Installed and actively manage four Sourcefire 3DS200 Sensors and two 750 Defense Centers
- Investigate virus alerts/incidents to determine root cause, entry point, potential lateral movements, possible damage, and develop fix actions
- Review and correlate system/network logs daily while looking for anomalous activity via Microsoft logparser, Log Parser Lizard, and SPLUNK
- Operate and manage McAfee ePO/HBSS on two networks with over 200+ users on each network
- Develop timelines of activity to prove or disprove malicious system activity
- Develop SOPs and ready DFIR tools to save critical time during an attack/compromise
0-5 years of experience
- Independently conducted Vulnerability Assessments/Penetration Tests against Web, Database, and Application Systems using WebInspect, NeXpose, Nmap, Nessus, and several other tools. Validate findings from scans, author reports, and communicate security findings with clients as well as follow through with remediation.
- Served as Subject Matter Expert for rating risk of Microsoft and other third application security vulnerabilities as well as perform patch compliance audits against Windows Systems Infrastructure.
- Researched vulnerabilities, exploit code, and security tools in order to implement stronger controls and processes.
- Designed, implemented, and supported early warning Snort IDS/Aanval architecture running Red Hat Enterprise Linux 4 and VMWare Workstation/ESX Server.
- Assisted on computer forensics cases, performing duties such as establishing chain of custody, event logging, and imaging hard drives, using EnCase.
- Designed, implemented, and supported an enterprise scalable Windows Open Shares solution that audits against compliance in regards to the principle of least privilege.
0-5 years of experience
Training includes SANS Hacker Techniques, Exploits and Incident Response, Symantec SIEM, Checkmarx Security Code Scanner, Symantec SIEM Collector writing.
- Wrote Symantec SIEM queries and reports used for system/vulnerability metrics for executive management.
- Wrote the entire Incident Response Process, Procedures, and Checklists that have been approved and adopted within [company name] Media.
- Wrote Access Management Procedures and assists in Security Awareness and policy building.
- In charge of setting up the Application Security program and working the process into the current SDLC.
- In charge of the RSA soft token pilot for identity management onto the PCI environment.
0-5 years of experience
- Senior technical member of the Advanced Technical Services division. Services include vulnerability assessments, incident response handling, risk analysis, FISAM, C&A, and computer forensics.
- Maintained the information security testing and evaluation lab consisting of various types of servers/workstations and security software packages (Nessus, Core Impact, ISS, GFI LANguard, AppDetective Pro).
- Performed FISMA compliancy scans/reviews for various DHS components.
- Conducted NIST 800-53 and DHS 4300a audits.
- Conducted PII audits on various AIS.
0-5 years of experience
Real time monitoring of traffic and devices for entities within the financial industry.
- Monitoring traffic flows and security events using third party SIEM software.
- Investigating, logging, and updating internet security incidents related to customer networks.
- Monitoring of Syslog, HIDS, NIDS, and NIPS events through in-house software.
- Generate audits which document the compliance with specifications and associated
Information Security Engineer Duties and Responsibilities
To accomplish their primary goal of protecting computer systems and networks, Information Security Engineers perform many tasks. We analyzed several job listings to identify these core Information Security Engineers duties and responsibilities.
Develop Information Security Plans and Policies Information Security Engineers help plan and carry out an organization’s information security strategy. They develop a set of security standards and best practices for the organization, and recommend security enhancements to management as needed. They develop strategies to respond to and recover from a security breach. Information Security Engineers are also responsible for educating the workforce on information security through training and building awareness.
Implement Protections Information Security Engineers install and use software, such as firewalls and data encryption programs, to protect organizations’ sensitive information. They also assist computer users with installation or processing of new security products and procedures.
Test for Vulnerabilities An Information Security Engineer conducts periodic scans of networks to find any vulnerability. They also conduct penetration testing, in which they simulate an attack on the system to highlight or find any weaknesses that might be exploited by a malicious party.
Monitor for Security Breaches Information Security Engineers must constantly monitor their organization’s networks and systems for security breaches or intrusions. They install software that helps to notify them of intrusions, and watch out for irregular system behavior.
Investigate Security Breaches If a breach has occurred, the Information Security Engineer leads incident response activities to minimize the impact. Afterwards, they lead a technical and forensic investigation into how the breach happened and the extent of the damage. They prepare reports of their findings to be reported to management.
Information Security Engineer Skills
A strong multi-tasker with a keen eye for detail, a successful Information Security Engineer can think one step ahead of criminals. They are well organized and thrive in fast-paced, high-stress scenarios. In addition to these general skills and personality traits, employers are seeking Information Security Engineer candidates with the following skills. Core skills: Based on job listings we looked at, employers want Information Security Engineer with these core skills. If you want to work as an Information Security Engineer focus on the following.
- Direct experience with anti-virus software, intrusion detection, firewalls and content filtering
- Knowledge of risk assessment tools, technologies and methods
- Experience designing secure networks, systems and application architectures
- Knowledge of disaster recovery, computer forensic tools, technologies and methods
- Experience planning, researching and developing security policies, standards and procedures
- Professional experience in a system administration role supporting multiple platforms and applications
- Ability to communicate network security issues to peers and management
- Ability to read and use the results of mobile code, malicious code, and anti-virus software
Advanced skills: While most employers did not require the following skills, multiple job listings included them as preferred. Add these to your Information Security Engineer toolbox and broaden your career options.
- Strong understanding of endpoint security solutions to include File Integrity Monitoring and Data Loss Prevention
- CCRI Certification
- Ability to obtain a Security Clearance
Information Security Engineer Resources
We searched the Web to find the best industry resources to help you continue exploring a career as an Information Security Engineer. From thought leaders to industry groups, this list is packed with opportunities to learn, connect and engage. On the Web
Wired’s Threat Level – This blog from a well-known publication covers privacy, crime, and online security online.
Info Security – Read the latest security news impacting consumers and professionals in the field of cyber security.
INFOSEC Institute – Online skills-based training and resources to keep you at the cutting edge of information security. On LinkedIn
Information Security Community – Connect and network with a huge community of almost 300,000 members who work in Information Security.
Information Security Careers Network (ISCN) – Find jobs as an Information Security Engineer or other related jobs. Industry Groups
Information Systems Security Association – This international organization of information security professionals and practitioners provides educational forums, publications, and opportunities to interact with peers.
SANS Institute – A research and education organization with lots of helpful links and insights. Information Security Engineer Books
Elementary Information security – Read this primer for a foundational understanding of the basics of information security.
Management of Information Security – An overview covering all aspects of information security from a management perspective.
CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide – Prepare for the Certified Information Security Systems Professional Exam with this thorough study guide