- Featured in:
Find out what is the best resume for you in our Ultimate Resume Format Guide.
Additional Information Technology Resume Samples
IT Security Consultant Resume Samples
No results found
6-10 years of experience
Developed and managed Security Alert Response Team, directing multiple IT Engineering teams in researching security alerts, testing and deployment of software patches and service packs, resulting in 85% reduction in virus infections, receiving multiple company awards.
- Acted as principal SME for infrastructure server configuration hardening procedures for all operating systems platform security.
- Designed, implemented and managed both IT Risk Acknowledgement and Privileged Access Review processes reducing numerous IT Audit issues.
- Completed daily and periodic vulnerability assessments/penetration tests of internet and intranet servers.
0-5 years of experience
- Analyzed the network infrastructure of approximately 2000 users for weaknesses and vulnerabilities.
- Performed a risk assessment for the organization and presented a risk
- Provided a business impact analysis to assist with risk management and identified the critical business functions.
- Created a Business Continuity Plan and a Disaster Recovery Plan for the organization to continue business in the case of an event or disaster.
- Designed an overall security plan which includes the recommendation of creating a Computer Incident Response Team and their primary
0-5 years of experience
Independent consultant working with multiple clients, designing and implementing security-based solutions to their information systems.
- Civilian project manager for the local US Embassy (Belize) site for the configuration and installation of a global telecommunications upgrade. Conducted network assessment/analysis for optimal architectural configuration/integration.
- Provided Security Awareness training, policy development, encryption, business continuity and disaster recovery services for legal, financial and investment companies.
- Successfully implemented VPN and VOIP solutions
- Tested vulnerabilities with diverse security systems utilizing NMAP, ISS, Retina, and Ethereal.
- Designed and implemented a community-wide secure WISP using the Motorola Canopy solution.
- Installed satellite-based broadband Internet connections for remote locations.
- Provided public presentations on information technology/security for private/government agencies.
- Technical columnist for six years for the national Reporter newspaper, writing articles on IT/Security.
0-5 years of experience
- Executed Payment Card Industry Compliance and Risk Assessments for merchants and service providers, such as Tory Burch, Gucci, and Wawa
- Performed HITRUST and HIPAA Gap and Risk Assessments for healthcare organizations and business associates, such as NorthWell Health, Barnabas Health, and Bronx-Lebanon
- Conducted testing on cutting edge forensic endpoint solution, Invincea, in which results were used for a whitepaper
- Spearheaded data center and retail store inspections to verify physical and logical access control and security to ensure optimization and compliance with security best practices
- Collaborated with the sales team and account managers to ensure quality deployment and delivery of security assessments to develop customer relationships and promote other services
- Delivered high quality written reports to clients upon completion of the assessments to ensure secure and optimal use of systems
- Developed policies and procedures for clients to help manage risk and optimize use and security of systems
- Reviewed firewall, switch, router, workstation, and server configurations to ensure compliance with security policies and IT standards
- Organized and led meetings during the assessments with personnel of various technical expertise
6-10 years of experience
- Advised on the implementation of an IT Security Program, Hardware and Software Configuration for compliance.
- Represented clients in civil litigation of several business matters.
- Drafted and negotiated various legal documents, including employee-employer contracts and company-vendor contracts.
- Advised clients on the implementation of online businesses, security information systems, information systems auditing, and legal compliance.
- Performed legal research and writing on IT Security procedures, policies, guidelines and baselines.
0-5 years of experience
Consult on IT Security, governance, risk, and compliance with several clients in the healthcare, financial, entertainment and cruise industries ranging from large national firms to small practices. Advise on the establishment of Information Security Management Systems. Conduct security risk assessments (HIPAA-HITECH, ISO 27001/2, NIST CSF, GLBA, SOX, PCI-DSS), create gap analysis and roadmaps, develop security policies and advise on procedures. For some, provide CISO as a service, assist with improving incident response and providing security/privacy training.
- Develop ISMS for clients
- Develop Policies sets for clients
- Review and revamp Incident Response plan, including conduct table top exercises.
0-5 years of experience
- Work closely with other members of the security organization to design and implement security technologies that align with Chevron’s security program.
- Monitor Enterprise information security systems; correlate, review, rank, and follow up on high-priority security events.
- Monitor external information sources (including information security/technical media, “hacker” groups, etc.) to identify events that might alter the risk of security incidents to Chevron.
- Develop and monitor trends in information security threats and incidents, evaluate performance of our security/threat management systems on a continuous basis.
- Lead or participate as a SME on security projects.
- Document all network topology changes and equipment configurations.
0-5 years of experience
- Managed project to comply with Office of Insurance and Regulation
- Implemented Smart Card – Two Factor Authentication Solution
- Implemented RSA SIEM and FireEye Threat Analytics Platform
- Created and evolved Security Awareness Program
- BitLocker for Full Disk Encryption
- Implemented RSA Token solution
- Implemented MDM Good Mobile Solution
0-5 years of experience
- Analyze Tripwire IP360 Vulnerability Scans
- Perform Security Risk Assessments
- Make remediation orders, tactics, and suggestions to resolve and prevent further incidents