- Featured in:
Find out what is the best resume for you in our Ultimate Resume Format Guide.
Additional Data Systems Administration Resume Samples
Information Security Specialist Resume Samples
No results found
6-10 years of experience
Led 7 technicians in securing an $8.5M network hosting multiple classified domains providing connectivity for 1000 international personnel.
- Directed bi-weekly internal network security scans and assessments to minimize and/or eliminate known vulnerabilities on 1,100 personal computers.
- Configured and distributed corporate level-directed software security upgrades using automated network utilities.
- Maintained and created custom signatures for multiple host and network protection tools
- Performed password complexity checks to ensure compliance with security standards, and implemented an in house built host data collection tool to identify anomalous activity.
6-10 years of experience
Bolstered security efforts by providing awareness training to new employees/managers.
- Ensured secure, robust infrastructure systems, including DNS, email, VPN, wireless networks, firewalls, & enterprise authentication, by performing efficient troubleshooting.
- Reduced downtime by remaining on-call 24/7 and quickly responding to emergencies.
- Strengthened vendor relationships by effectively managing problems, assisting with escalations, and developing resolutions that promoted loyalty and collaboration.
6-10 years of experience
Established Information Technology (IT) budget estimates for strategic planning by upper management.
- Performed impact analysis for software project feasibility
- Supervised security staff (including contractors)
- Project Manager for IT security support contracts (budgets exceeded $1.5 million)
- Liaison for all audits – Office of the Inspector General (OIG), Government Accountability Office (GAO), and those conducted by the risk management staff
- Developed the first set of standards for design of security elements in software applications
- Prepared and delivered high-level security briefings for various user groups and upper management
0-5 years of experience
Responsible for the day-to-day operations for Information Security at the customer site. Interacted daily with customer to consult on a wide variety of technical issues involving Windows NT, UNIX, Firewall evaluation, Virus Detection, Security Investigations, removal of sensitive equipment from the site, etc.
- Responsible for Information Security Engineering in a networked environment using IBM SUN and PC systems.
- Supported all facets of operations to include physical security, product production, communications security, personnel security, software upgrades, etc.
- Provided technical support and analysis of current and proposed system architectures, and security capabilities.
- Evaluated new security products and security audits. Responsible for security audits, configuration controls of security systems and as required, design security for current information systems.
- Led a team of three junior Information Security Specialists via delegation of duties and daily guidance. Monitored local system usage and audit trails. Responsible for reviewing proposals for any additions, modifications or deletions of security access information.
- Assisted with IC&T preparation activities and tests for all involved sites.
0-5 years of experience
Expertly coordinated, designed and implemented monthly vulnerability scanning for [company name] (ABA-20) and remediation utilizing various scanning tools such as McAfee Vulnerability Manager, Nessus, AppDetective, and Acunetix Web Scanner
- Managed processes for scanning production Linux, HP-UX, Windows 2003 & 2008 servers, Windows XP workstations, and Oracle and SQL 2005 databases
- Coordinated and responded to Cyber Security Management Center (CSMC) Security Incidents for FAA (ABA-20)
- Achieved Memo of Appreciation award from FAA ABA-20 Chief Information Officer for superior support in FY11 contributing to meeting FY11 Security and Privacy Business Plan Goals
- Credited with the FAA ABA Security Dashboard consistently outplacing other lines of business due to excellent incident response and reporting capabilities
6-10 years of experience
Responsible for the security of over 3,500 hosts
- Maintained the confidentiality, integrity, and availability of information stored on 15 servers
- Trained over 1,000 users on the importance of information security
- Supervised the certification and accreditation process for over 2,500 circuits
- Directly responsible for the instruction, supervision, and evaluation of 4 personnel
- Established a newsletter program informing employees of information security related matters and prevention
0-5 years of experience
Cease and investigate unauthorized access, use, disclosure, disruption, modification, or destruction by identifying, researching, and addressing vulnerabilities in areas of information systems and network security. Perform role-based access control (RBAC) of user creation, maintenance, and deactivation to directories or applications. Provide troubleshooting for incidents supporting user access.
- Created standardized operating (SOPs) practices and procedures that ensured audit compliance and standard levels of agreement (SLA).
- Obtained required approvals before granting user access to an application or data.
- Beta tested software and reported results to architects ensuring smoother roll out.
- Selected to train team mates or individual users on new or modified processes and procedures by demonstrating ability to learn and apply new knowledge quickly and to explain complex technical issues in a non-technical, easy to understand manner.
- Selected as administrator to create roles, grant access, and troubleshoot incidents by demonstrating extensive knowledge of application.
- Participated in maintenance and review of Disaster Recovery Plan as it related to Information Security that solidified role in Disaster Recovery Plan.
- Kept compliant with healthcare regulations that protected company from litigation and ensured client discretion.
0-5 years of experience
- Managed the classified and unclassified LLNL Public Key Infrastructure (PKI), including its Registration Authority (RA)
- Prepared and executed Security Test and Evaluation (ST&E) plans for the 2009/2010 Certification and Accreditation (C&A) of unclassified LLNL information systems.
- Evaluated security-significant changes to accredited information systems on an ongoing basis, and recommended safeguards or enhancements that maintained or improved the laboratory’s security posture.
- Periodically audited the effectiveness of NIST 800-53 security controls implemented within the laboratory, ensuring FISMA baseline requirements were met or exceeded.
- Developed and reviewed LLNL unclassified cyber security policy and guidelines, and provided recommendations and feedback to management.
0-5 years of experience
- Analyzed and worked on a research project sponsored by the DoD that related to Information-Warfare and Computer Crime
- Trained at USMA, West Point in regard to a recently developed network attack / defense mechanism
- Developed a simulated environment model to measure the effect of different network attacks
- Created a virtual framework for attack and defense platform using VMware
- Participated in a two state university curricula development for attack and defense.
0-5 years of experience
Recommended, developed and implemented the appointment of site specific IA liasons
- Coordinated Bluecoat and Firewall Exemption Requests
- Identified and responded to Category 1 network incidents as trusted agent for unit
- Conducted site assistance visits for all Iraqi units to ensure compliance/standardization of IA programs
0-5 years of experience
- Performed IT Security Administration functions, including the administration, maintenance, and deletion of end user accounts, permissions, and access rights for network access, following established procedures.
- Investigated and resolved access-related issues reported by customers in an expedient and effective manner, following established information security procedures and documenting approved revisions to access.
- Reported anomalies or abuse of the system access to management.
- Installed, configured, tested, maintained, monitored, networked, and troubleshot end user workstation hardware and software.
- Received and responded to incoming calls, pages, and/or e-mails regarding PC and/or hardware problems, and prioritized issues based on the level of impact and severity.
- Extensive technical application support with Metavante and Fiserv banking applications.
0-5 years of experience
Created policies for secure data destruction/disposal/business continuity and disaster recovery
- Conducted risk assessments and processed information security waivers as necessary
- Researched various emerging attacks, threats, and risks related to computer security for production of internal proactive security awareness report
- Published security communications regarding the protection of [company name]lectual property to our internal employees
- Provided data loss analysis for missing assets and engaged the proper stakeholders, legal, and privacy team for response
0-5 years of experience
- Personal Identification Verification (PIV) Member of the Information Security team who routinely performed the registration authority role in the deployment of the Booz Allen Smart Card.
- Coordinated with key government agencies, support staff, and representatives to ensure project execution and development met HSPD-12 and FIPS 201-1 policies, capabilities, and requirements.
- Primary point of contact (POC) for over 20,000 users requiring Public Key Infrastructure (PKI) certificates or support relating to the certificates.
- Created and revised standard operating procedures and ensured that all training documents were up to date for the PKI project using Microsoft SharePoint.
- Assembled, compiled, and summarized information from files and documents or other available sources for use by the project team.
- Verified accuracy of security information using IBM’s Cognos 8 software prior to issuing clearances to ensure accurate deployment of BAH smart cards.
- Coordinated with POC’s at BAH locations ensuring that shipments arrived prior to scheduled issuance dates by tracking information.
- Assisted with the coordination and booking of all travel arrangements during road show deployment.
0-5 years of experience
Selected to be on a five person team to build a new database for the management and standardization of Security Classification Guides (SCG) for the U.S. Navy Naval Air Systems Command (NAVAIR).
- Compiled and maintained digital library of all unclassified security classification guides and identifying missing classification guides and resolved conflicts in document revisions.
- Created a detailed analysis of the data contained in each SCG and identified any deviations and discrepancies in how the data was labeled or categorized and made recommendations for a more appropriate category assignment.
- Worked closely with project team members and Navy specialists to prioritize specific datasets and assemble deliverables in order to meet strict contract deadlines.
- Participated in the testing and troubleshooting of the database system, prior to delivery the client. Gave feedback for improvements as well as documented any bugs encountered during testing.
- Created training and instructional documentation on the usage of the database management system for use by the end user.
0-5 years of experience
Support initiatives for policy development and evaluation strategy that ensured HIPPA compliance to modernized policy deliverables. Support activities of the technical group to develop policy deliverables for SOX using control objectives for information and related standards (ISO 17799).
- Collaborated with other department heads and staff to satisfy audit inquiries by requesting and categorizing comprehensive documentation.
- Maintained compliance to HIPPA guidelines by conducting rigorous training sessions and making corporate security policies available to all employees on the intranet site.
- Coordinate risk acceptance requests for non-compliant processes or technologies
- Develop workflow & process narrative for annual reviews of policy deliverables
- Publish policies, standards, and procedures to intranet site.
- Conducted self-directed research and instruction regarding HIPPA principles to become the department’s subject matter expert.
- Track documentation in repository tool Compliance 360.
0-5 years of experience
- Contributed substantial work toward the efforts of establishing the Computer Security Incident Response Center (CSIRC).
- Developed CSIRC policies, processes, and procedures.
- Provided timely and effective response to network security incidents.
- Optimized CSIRC sensors to enhance monitoring capabilities.
- Performed vulnerabilities assessments for the entire Enterprise and reported findings to management.
6-10 years of experience
Maintained end-user profiles in IDMS, OmniPay, OmniPlan, TOSS, Sybase, and SecurId
- Supported and processed end-user requests for mainframe and distributed applications
- Investigated and resolved security access problems
- Maintained designated departmental security coordinators list
- Generated and reviewed security reports. Follow up on security violations
0-5 years of experience
Planned, coordinated, and directed response actions tied to potential security incidents
- Performed forensic investigations on potentially compromised hosts
- Analyzed network traffic and security event from various security devices located within the enclave
- Created and maintained incident tracking information
0-5 years of experience
Maintained documentation, policies and procedures in support of Essent’s Corporate Security Program in accordance with ISO 27000 standards
- Performed daily reviews of security relevant logs and activities
- Help to implement and maintain security related in-processing and out-processing of employees to include biometric controls
- Conducted security analysis and investigations. Ex: Content Analysis, Data Loss Prevention
- Assisted with management of enterprise wide security projects
- Acted as the backup administrator for all security related IT functions
6-10 years of experience
- Collaborated with Technical Support team to design and implement the Banks’ Access Review Reporting and compliance tool, resulting in 90% compliance with Sarbanes Oxley.
- Trained end users weekly regarding the tool, improving customer satisfaction by 50%+.
- Provided security administrative support on various systems.
- Resolved access issues, working closely with business partners and technical support.
- Worked closely with development teams and provided support for testing various applications.
0-5 years of experience
Responsible for monitoring and escalating on suspicious events generated from Network IPS, Wireless IPS, Symantec DLP, FireEye Email/Web Protection System, McAFee ePO and File Integrity Solution.
- Conducted identification and remediation of malware infections, phishing attacks, and policy violations for the Security Threat Management and Operations Team 24×7 Incident Response Center.
- Coordinated with the Security Incident Response Manager for all confirmed [company name] computer incidents and provide detail all notification and escalation reports.
- Assist the Security Incident Response Manager with supporting security incident artifacts requested by external agencies like FBI, NCUA and peers within FS-ISAC.
- Conduct website reputation check utilizing BlueCoat and Urlquery.net.
0-5 years of experience
As a member of ManTech, performed the following duties of a Senior Communications Security Specialist for the Air Force Office of Special Operations:
- Directly accounted for over 2000 COMSEC items, to include secure equipment, telephones, and electronic modern key.
- Provided on-the-spot COMSEC support for over 65 accounts in the Pentagon, and throughout the National Capital Region.
- Maintained and performed software updates, for the Sectera vIPer Universal Phone.
- Maintained, rekeyed, and performed software updates on the KG-175B, KG-175D, and KG-250
0-5 years of experience
- Worked to improve FISMA system compliance.
- Monitored and improved security aspects between 3rd party systems and the OCC. Implemented and lead Lean Six Sigma projects.
- Assisted with the OIG Audits of OCC’s information security posture.
0-5 years of experience
Assisted client in identifying current security and compliance requirements and recommend security solutions or actions.
- Created Standard Operating Procedures (SOP), step-by-step Work Instructions, and other technical documents for the Information Technology Security Department.
- Created, designs, and formats forms and templates using Microsoft InfoPath.
- Reviewed and edits documents in preparation for publishing.
- Updated policies in coordination with new acquisitions, and engineering changes.
- Interviewed customers to capture process workflow.
0-5 years of experience
Build, modify and delete RBAC Roles across multiple lines of business in an enterprise environment utilizing Tivoli Identity Manager 4.6 and Hewlett Packard Service Center.
- Create, modify and delete Access Global Groups in an enterprise environment utilizing Active Directory, Tivoli Identity Manager and Cigna proprietary applications.
- Managed request and approvals for maintenance of RBAC roles and Access Global Groups by communicating with data owners, application owners and role owners.
- Analyzed existing RBAC Roles, Global Groups and their policies to determine if revisions or restructuring is necessary for business requirements and functions.
- Developed processes and implement procedures for tracking and managing RBAC Roles, Global Groups and their entitlements.
- Coordinate efforts between lines of business and IT Security Team to define new system accesses (RBAC Roles) that provision the minimal and necessary amount of user access required to perform job functions.
- Managed request and approvals for maintenance of RBAC roles and Access Global Groups by communicating with data owners, application owners and role owners.
0-5 years of experience
Supported the creation and implementation of a risk assessment process for the technology group
- Evaluated vulnerability alerts from third-party sources, analyzed potential impact to the company, identify appropriate stakeholders, and communicate threat level of exposure
- Assessed security measures for enterprise Lotus Notes/Domino system
- Created and updated internal information security compliance policies, procedures, and standards
0-5 years of experience
Responsible for pre-project security evaluation and recommendation of security controls for simple to complex security vulnerabilities. Worked with project team to determine most secure/cost effective measures for small to large project initiatives. Responsible for providing guidance and final sign off of [company name] concerns and recommendations.
- Established inventory control system for department computer equipment.
- Established security requirements for assigned projects.
- Verified [company name] requirements were met or exceeded.
- Determined need to Security Consultation for assigned projects.