- Featured in:
Find out what is the best resume for you in our Ultimate Resume Format Guide.
Additional Safety Security Resume Samples
Security Administrator Resume Samples
No results found
0-5 years of experience
SAP R/3 Basis Security administration over all the systems in the landscape. Worked with 4.6C Systems FI, CO, CD, SD.
- Defined and created Roles and generated Authorization profiles and Authorizations based on Role Matrix.
- Worked on Central User Administration (CUA)
- Transported Roles, Authorization Profiles across QAS and Production Systems.
- Performed level 0 testing and facilitated unit and integration testing.
- Processed SAP user access requests, and supported everyday troubleshooting of access problems
- Maintained Standard Naming conventions for Security Profiles and Objects
0-5 years of experience
Provided security administrative support by handling customers, managing databases, creating and uploading incident reports involving over 25K personnel and property
- Performed access control, incident management, training for property security
- Maintained and updated daily reports to be routed to higher authority to maintain accurate records and accountability of daily activities
- Drafted incident case reports, collected background info and evidence from statements during investigation and uploaded data into proper management information system for proper processing
- Analyzed data collected to aid in property management for over 30K personnel
0-5 years of experience
Managed Active Directory on multiple domains by adding, changing and removing users/groups.
- Maintained users and groups on Sun/Solaris and HP-UX servers.
- Implemented and modified Group Policy for multiple domains to align them to HP corporate standards.
- Setup, configured, and ran Nessus vulnerability scans on a quarterly basis to validate that the network and servers were not susceptible to any vulnerabilities.
- Actively reviewed logs of all Windows and Unix servers to ensure that there were no breaches of security.
- Assisted in several HIPPA and security audits to confirm that the account was aligned with state and federal standards.
0-5 years of experience
Provided administration and support for a wide area network consisting of 12 domains and over 200+ users. Implemented group policies to improve information security, administered active directory and maintained network firewall.
- Scheduled, configured and maintained network security upgrades and daily backups.
- Developed and implemented network and system security related policies.
- Supported incident response during non-regular hours and emergency situations.
- Research, interact and coordinate with vendors to identify and implement the best software solutions per our technology requirements.
- Trained, supported and communicated with end users on security related issues.
0-5 years of experience
Oversaw daily operation and administration of two IBM AS/400s, including installations, upgrades and maintenance.
- Promoted within two years to user security administrator.
- Oversaw security administration of more than 1,000 users, four systems and five applications including Active Directory, MS Exchange, IBM AS/400, and Intranet environments.
- Performed security audits and disaster recovery tests and helped write and develop HIPAA compliant policies, procedures and audits.
- Provided user support of security and software related issues.
0-5 years of experience
Responsible for the administration of Lawson ERP security class development.
- Decreased test time for HR, Finance, AP/AR, and SC decreasing 15% workflow complexity.
- Scripted monthly reports eliminating errors by 100% for functional teams.
- Designed and automated a UNIX report eliminating 3hrs of daily troubleshooting.
- Improved Tier II helpdesk duties by implementing a notification system to meet 100% SLA.
- Worked closely with developers, functional SMEs, solving complex business problems.
- Maintained web records, portal roles, LDAP accounts, active directory, and bookmark groups.
- Configured security class upgrade that resulted in 100% error free production implementation.
- Designed and implemented a team Wiki page increasing training and team retention 100%.
- Developed a series of SLA trend reports for team that decreased resolution time by 50%.
0-5 years of experience
Extended the existing security design to 2 of the client acquired companies in SAP R3 4.7, BW, & APO system, Re-designed the entire security architecture after the application was upgraded to ECC 6.0, BI & APO
- Designed & developed new security roles for different business processes and sub-processes via PFCG and ERM.
- Worked with the business users to gather requirements, later worked with the functional leads to design the roles
- Worked with the offshore team to co-ordinate unit testing, worked with the end users to perform day-in life testing & getting formal signoffs
- Involved in discussions with Audit & SOX to follow their recommendation at difference stages of the project implementation
- Assisted security team in redesigning of SAP Security roles, identifying SOD’s, building SOD Matrix and in creating new SAP Security Roles
- Closely worked with the security team members, architect & the program managers to ensure a smooth Go-live per the schedule.
- Provided 30-day hyper care to address post Go-live issues & fix the user reported incidents.
0-5 years of experience
- Managed acquisition, implementation, deployment and ongoing administration of data loss prevention systems.
- Created data risk management platform resulting in improved metrics and increased investigative capabilities into information leakage risks.
- Launched mobile device management initiative enhancing the firm’s capability to monitor and control threats posed by employee “bring your own device†trends.
- Developed information security training modules for annual employee completion and lead weekly training sessions for newly hired employees.
- Performed daily maintenance and monitoring of anti-malware, vulnerability scanning, web proxies, host and network based intrusion detection systems.
- Responded to client security audit questionnaires to detail firm’s compliance with contractual requirements and due care of industry best practices and regulations.
0-5 years of experience
Generated Reports from Tables in order to address particular reporting requirements using SE16N.
- Created and modified new user accounts using SU01.
- Defined and managed user profiles for employees and consultants. Assisted in the creation and maintenance of authorization objects and roles for all employees
- Created Single Roles, Composite Roles, and Derived Roles as per organizational Structure
- Identified missing authorization with the use of SU53 after seeking manager approval and maintained them using SAP tool PFCG
- Maintained Document, user Role Matrix and transaction Role Matrix with authorization limitations
- Participated in designing, writing and implementing security related Standard Operating Procedures for User Administration, Roles and Profile Generation.
- Worked with SAP GRC solutions pertaining to segregation of duties management, Super User access, access controls, and process controls
- Assisted in upgrade project for ECC 6
0-5 years of experience
Responsible for the administration of Lawson ERP security class development.
- Decreased test time for HR, Finance, AP/AR, and SC decreasing 15% workflow complexity.
- Scripted monthly reports eliminating errors by 100% for functional teams.
- Designed and automated a UNIX report eliminating 3hrs of daily troubleshooting.
- Improved Tier II helpdesk duties by implementing a notification system to meet 100% SLA.
- Worked closely with developers, functional SMEs, solving complex business problems.
- Maintained web records, portal roles, LDAP accounts, active directory, and bookmark groups.
- Configured security class upgrade that resulted in 100% error free production implementation.
- Designed and implemented a team Wiki page increasing training and team retention 100%.
- Developed a series of SLA trend reports for team that decreased resolution time by 50%.
6-10 years of experience
Identified Information Security Risks, implemented processes, procedures and technology to reduce risk to acceptable levels
- Developed and implemented threat based Information Security strategy and program
- Developed Information Security Risk Dashboard. A single page illustrating current, near and long term state of Key Performance Indicators and controls relating to Information
- Facilitated engagements and penetration tests with internal and external audit and consulting firms
- Managed a team of Information Security Administrators
- Presented quarterly reports to Enterprise Risk Management subcommittee of Board
- Served as Information Security subject matter expert and Security Architect for the organization
- Performed periodic risk assessments, vulnerability scanning and penetration tests
- Created CSIRT team responsible for responding to security breaches.
0-5 years of experience
Provided Security Account Administration support to 45,000+ users account within Active Directory, Novell, Windows NT, and Lotus Notes platforms.
- Provide Level 1 Support to users on access control
- Performed daily tasks in Active Directory and Novell-account and group creations/modifications, permission, nesting, shared data access control.
- Prioritized workload to ensure that escalated requests are completed in a timely fashion.
- Lotus Notes Administration- new setups, replicate mailboxes and convert mailbox templates.
0-5 years of experience
Implemented and enforced security policies for Active Directory security and distribution groups.
- Assisted in the migration of users and mailboxes from the seven different domains into one domain.
- Created new security groups as requested and implemented security access.
- Created new mailboxes and distribution groups with appropriate security access.
- Reconfigured network printers to print to email according to security policies.
- Worked with users resolving operating system and email profiles.
6-10 years of experience
Conducted incident prevention, detection/analysis, penetration testing, security assessments, and recommendations for projects.
- Identified vulnerabilities, recommend corrective measures and ensure the adequacy of existing information security controls.
- Educated business unit managers, IT development team, and the user community about risks and security controls.
- Prepared detail practices and procedures on technical processes.
- Analyzed security incidents and kept appropriate documentation.
- Utilized Security tools such as IDS and IPS, sniffers and malware analysis tools.
- Assess and test new systems that come into our environment for proper security and compliance in correlation with SOX / HIPPA / PCI.
6-10 years of experience
Security Administrator on Global Treasury payment system and bank systems, granting access and approval limits to Business Users. Developed and reviewed security policy of GCMS payment systems to ensure compliant with regulators and exchanges.
- Headed up the global rollout of Multi-Factor Authentication (MFA) tokens, to enhance security. Coordinated the migration to MFA platform for over 1,000 users.
- Prepared and trained hundreds of GCMS users across the globe on the enhanced MFA access to ensure seamless transition.
- Ensured system controls are adequate to comply with relevant laws and regulations. Identified potential risks or vulnerabilities and recommended changes and upgrades to senior management where appropriate.
- Participated in Global Cash Management System (GCMS) testing with IT and contributed to product updates and enhancements. Performed regression testing on IT modifications to de-bug GCMS, as needed.
- Introduced Manual Payment Process (MPP) reporting to senior management on a semi-annual basis. Reviewed user approval limits and confirmed limits were accurate and appropriate with senior managers as a proactive measure. This additional control is audit widely endorsed by internal and external audit.
- Coordinated Treasury billing on bank services, Letter of Credit fees and Day Loan interest. Reduced 4th quarter expenses by over $25k identifying inaccurate
- Created a monthly, consolidated compensation report for management to track fees.
- Migrated domestic payment system users and approvers to the GCMS platform during the phased-in global rollout. Coordinated Business area data elements with IT release schedule.
0-5 years of experience
Conducted criminal and educational background checks, arranged drug screenings, and maintained all administrative and human resource paperwork for Security Officers
- Managed activation and revocation of access clearances for all locations
- Assisted with internal investigations, incident reporting and alarm activity reviews
- Conducted service and maintenance on security and surveillance equipment
0-5 years of experience
Create, manage, and maintain user security in all business systems. Monitored and supported internal network security, including adding/deleting users and shared permissions. Complete change request and security request related to supported applications.
- Prepare daily and monthly system reports for audit control. Responsible for support of existing security policies and procedures, as well as creation and implementation of new security procedures.
- Assisted with testing of installed systems to ensure protection strategies are properly implemented and working as intended.
- Participated in internal monitoring and auditing, cooperating with external auditors for successful audit completion. Verified user accounts and host files, tested password files using multiple security tools.
- Analyzed and resolved network and server connectivity issues. Performed user testing and training for migration of Lotus to Exchange environment.
0-5 years of experience
Successfully conducted investigations of thefts, threats, and suspicious activity.
- Responsible for the ongoing oversight of both the threat procedures and the threat intelligence review process. This has led to the identification and resolution of incidents.
- Oversee the suspicious package procedures and training for employees.
- Effectively manage security hardware operations to ensure a secure work environment for all [company name] employees.
- Manage the relationship for [company name] with security hardware vendors.
- Develop and implement security plans for construction projects, which have limited exposure risk.
- Review all security incident reports for both content and accuracy. Since taking over this process, overall accuracy has increased to 99%.
0-5 years of experience
Provided customer assistance to over 3,000 subcontractors working in the public sector of [company name] entering time in a timekeeping system.
- Responsible for setting up profiles as new users came on board.
- Reset passwords and resolved any technical issues involving all end users including management and finance.
- Daily working relationships with Program Management and finance in assisting with budget requirements based on hours worked.
- Created and implemented training materials and taught new users how to effectively use the Lotus Notes tool.
- Responsible for ensuring that Management and end user’s followed federal and company guidelines.
- Created reports upon request for end users, management and finance team.
- Pulled accounting hours and loaded into the accounting system on a monthly basis.
6-10 years of experience
Managed all Security operations and audits. Worked with all departments to maintain all levels of security.
- Designed and maintained Active Directory.
- Handled all user access to network, exchange, and all in house software.
- Maintained and secured all mobile devices.
- Setup and maintained Palo Alto firewalls and the Mailgate encryption firewalls.
- Trained new employees on HIPPA and HITECH Compliance.
- Built and executed an audit schedule using LogRhythm, Dorain event logger, and SQL.
- Used Qualys to complete PCI Compliance Monthly.
- Developed a security awareness program.
0-5 years of experience
Responsible for supporting and securing network accounts, resources and applications.
- Managed all aspects of network accounts for State office employees, ensuring necessary for all users.
- Managed permissions to resources and security groups using Active Directory, Exchange console, PowerShell, and other server tools, limiting access to appropriate personal.
- Resolved Remedy trouble tickets for users utilizing phone, email, and remote tools, expediting resolution through troubleshooting and knowledge base searching.
- Set up and configured additional accounts including RightFax, Remedy, and GoToMyPC.
0-5 years of experience
Installation, configuration and maintenance of servers and workstations running Microsoft Windows Server 2003/2008, XP and Windows 7 OS.
- Configure and integrate network services such as Active Directory, DNS, DHCP, TCP/IP and administer Local and Group security policies
- Implementation and deployment of Intrusion Detection Prevention Systems (IDPS) solutions to monitor and detect malicious network and system activity.
- Installation and support for a variety of COTS and proprietary software packages. Test application software packages for completeness, system compatibility and to ensure that security updates/patch levels remain current.
- Perform periodic vulnerability and point scans using eEye Retina on servers, workstations and network devices.
- Established and administered effective backup and recovery procedures to ensure system reliability and protect data integrity.
- Provide tier-3 technical support to resolve both routine and complex hardware/software and customer related issues.
0-5 years of experience
Responsible for the security of member data and critical IS infrastructure
- Managed network vulnerability analysis and remediation
- Established policies to safeguard information security
- Participated in Manager’s Roundtable
- Performed network and routing troubleshooting and maintenance
- Responsible for configuration and patch management for all network systems
- Responsible for managing user permissions and access levels across multiple systems
0-5 years of experience
Responsible for setting up the infrastructure environment with majority of Checkpoint & Palo Alto appliances apart from various other equipment
- Replaced aging Checkpoint firewall architecture with next generation Palo Alto appliances serving as firewalls and URL and application inspection
- Configured and maintained IPSEC and SSL VPN’s on Palo Alto Firewalls
- Implemented Positive Enforcement Model with the help of Palo Alto Networks
- Troubleshoot, Monitor and configure checkpoint firewall issues and other smart console applications using CLI
- Perform regular updates, HFAs and patches for checkpoint firewall when needed for maximum performance
- Monitor checkpoint VPN tunnel activities with smart view monitor and troubleshoot VPN issues with CLI
- Implement identity awareness using checkpoint software blade to track user activity as company policy demands
0-5 years of experience
Responsible for setting up the infrastructure environment with majority of Checkpoint & Palo Alto appliances apart from various other equipment
- Replaced aging Checkpoint firewall architecture with next generation Palo Alto appliances serving as firewalls and URL and application inspection
- Configured and maintained IPSEC and SSL VPN’s on Palo Alto Firewalls
- Implemented Positive Enforcement Model with the help of Palo Alto Networks
- Troubleshoot, Monitor and configure checkpoint firewall issues and other smart console applications using CLI
- Perform regular updates, HFAs and patches for checkpoint firewall when needed for maximum performance
- Monitor checkpoint VPN tunnel activities with smart view monitor and troubleshoot VPN issues with CLI
- Implement identity awareness using checkpoint software blade to track user activity as company policy demands
0-5 years of experience
Conducted incident prevention, detection/analysis, penetration testing, security assessments, and recommendations for projects.
- Identified vulnerabilities, recommend corrective measures and ensure the adequacy of existing information security controls.
- Educated business unit managers, IT development team, and the user community about risks and security controls.
- Prepared detail practices and procedures on technical processes.
- Analyzed security incidents and kept appropriate documentation.
- Utilized Security tools such as IDS and IPS, sniffers and malware analysis tools.
- Assess and test new systems that come into our environment for proper security and compliance in correlation with SOX / HIPPA / PCI.
- Penetration testing for affiliates and internal / external applications.
0-5 years of experience
- Administered users via Oracle Identity Management systems as well as other applications and platforms such as Bill Matrix, MS Active Directory, Xycor, and RACF.
- Performed daily reviews of all Transferred employees to verify that all associated access was performed via IDM based on job descriptions.
- Access all administered applications primarily via a Citrix environment.
- Resolved submitted tickets via Service Now and Service Desk as well as request received via groups Outlook inbox as well as tasks submitted via IDM.
- Created and administered directories as requested.
0-5 years of experience
Tested conference rooms equipment for connectivity
- Trouble shot VTC’s (JWICS, DVSG, SIPRNET)
- Scheduled secure and unsecure VTC’s on DISN network
- Performed crypto keying functions on equipment for secure VTC’s
- Consulted with operational personnel and security specialists to devise organizational protection systems
- Evaluated effectiveness of existing security practices within GSAF secured areas
- Advised Director of Resource Management regarding security control requirements, procedures, and facilities needed to maintain SCIF security
- Assured organizational personnel adhered to established policies and practices for security purposes
- Maintained personnel records regarding clearance levels as required for entry to the SCIF
- Proficient use of the Joint Personnel Adjudication System
0-5 years of experience
in lead role for day-to-day SAP security support, problem determination and resolution, redesign mini-projects, Stack Updates and Role Lifecycle Management process design, defect management, SOX and PUC audit responses and resolution.
- Led Security admins during PTP role design, testing and implementation
- Authored SAP role creation/modification process documentation (SAP “back end” roles)
- Co-authored end-to-end Access Management Business Role Creation/Modification Process documentation
- Lead SAP Security admins in day-to-day operations
- Led audit responses and remediation
6-10 years of experience
Analyzed user access needs, developed access roles, and add/change/delete user access to the HRMS application. Provided support, to the HR users and direct reports.
- Developed and maintain custom row level security.
- Migrated security objects between various instances in PeopleSoft 8.3 using standard utilities.
- Developed and manage PeopleSoft Tree Security.
- Coordinate with the Business, Systems Analysts, DBA, and others in testing all security within PeopleSoft using test plan scripts before implementation.
- Developed audit and HR controls to assist in monitoring security.
0-5 years of experience
- Support RSA Manager administration and managed the token conversion project over which reached over 6000 users.
- Administered Active Directory and Softtera LDAP VPN accounts.
- Managed daily requests via Remedy ticketing system.
- Communicate firewall operations and firewall architecture on daily basis for level 3 troubleshooting efforts.
- Oversee group policy security to all users and provide technical support with network and firewall teams to greatly improve/increase end-user productivity and corporate efficiency.
6-10 years of experience
Accountable for a wide-range of information technology and security responsibilities for this premium incentive provider serving clients in diverse industries, including automotive, telemarketing, non-profit, and more.
- Configure hardware/software, perform routine backup, update records, implement passwords, maintain active/deactivated customer accounts, train employees and provide customer service.
- Work extensively with help desk technicians to diagnosis and troubleshoot customer issues involving the e-commerce website, including customer orders, replacements, and refund policies.
- Assist in the enhancement of existing products and the development of new products to generate revenue and profit growth for the company.
- Responsible for adding and maintaining phone extensions for new employees; configuring and adding new Ethernet cabling throughout the building; and overseeing forwarding of the phone system to employee cell phones.
- Administer necessary changes to employee desktop, email and PBX accounts.
- Consistently monitor Certificate Authority updates for company websites to prevent against SSL expiration.
- Reduced costs by configuring the VoIP system to upgrade out-of-date software and transition away from the old phone line system.
- Configured and monitored print servers that upgraded the firmware and enhanced handling of print jobs.
- Implemented new security techniques that improved protection of customer forms.
0-5 years of experience
Responsible for administering access to over 50 applications.
- Document and maintain internal control process for adding, deleting, and changing user access for supported applications.
- Create and post monthly application logs.
- Work closely with other departments to identify, analyze, and resolve client access issues.
- Successfully trained new employee to perform as an IT Security Administrator.
- Assist with research to complete Semi-Annual and Annual access reviews.
0-5 years of experience
Providing UAM services to TG Windows Active Directory, network, mainframe and database systems, gathers/analyzes access request information, fulfill internal/external user access requests, a privileged user to TG info resources
- Periodically reviews user and system activities to identify and report non-compliant user and system access
- Manages enterprise user authentication and authorization methods in Active Directory and standard protocols
- Manages Windows Active Directory commercial network, distributed systems, mainframe, application, data access and identify management technologies and processes
- Developed Metrics for reporting IAM proficiency and trend analysis. Managed the documentation procedure development review process for all IAM procedures
- Manage mainframe: IBM z/OS server, and application audit and control technologies and processes
- Mainframe security through Computer Associates Top Secret Security (TSS) product environment
- Enterprise security architecture (IAM, database, or other security infrastructure)
- RSA token administration, involved in FISMA/NIST 800-53 control family compliance standards and goals
0-5 years of experience
Provide Security Administration for entire Western Region of IBM site locations.
- Develop and manage risk analysis for Western Region sites including crime, natural disasters, terrorism and travel security risks. Analyze and evaluate security operations at sites to identify risks and opportunities for improvement.
- Maintain and monitor emergency planning for Western Region sites including emergency support information, crisis management and security communications.
- Schedule and manage security system maintenance and repairs. Reconcile time and materials billing.
- Manage purchasing and acquisitions for security related equipment and supplies.
- Respond to medical emergencies, fire alarms, intrusion alarms or other threats within the IBM Boulder site ensuring proper emergency response procedures are executed.
- Plan, direct and coordinate site activities with IBM Boulder Real Estate Operations ensuring employees, guests and visitors maintain site security.
0-5 years of experience
Member of a nine person team who creates, deactivates, reinitializes, and monitors user ID’s, and system accounts
- Created and maintained Active Directory accounts
- Processed third party account access requests such as FannieMae, FraudGuard, and Equifax
- Provided troubleshooting of account logon’s over the phone, via email and Remedy tickets.
- Improving and documenting processes and procedures to streamline access requests
- Responsible for the enforcement of Access Control security policies and procedures
- Participated in application certification and recertification’s for 150+ applications
- Assisted in on boarding applications for centralized access provisioning
- Responsible for providing monthly metrics reports to the manager
- Responsible for being back up to the team lead in managing the daily workflow as well as providing the manager with a daily workflow report
10+ years of experience
- Implemented corporate mainframe data security policies and procedures
- Created, modified, and deleted user and group profile accounts
- Installed and maintained mainframe security in CA-Dispatch subsystem
- Installed and maintained mainframe security in CA-Scheduler subsystem
- Maintained mainframe security in MQQueue, CICS, JES, Unix Systems Services, DB2, VM, and MVS subsystems
- Reviewed and modified user access to resources based on audit findings
- Supported mainframe security in bi-annual disaster recovery tests
- Created multiple interactive programs to facilitate security administration by security administrators
0-5 years of experience
Fanatical administration of network equipment across several globally-located data centers
- Deploy, maintain, and troubleshoot Cisco ASA and ASA-X Firewalls
- Deploy, maintain, and troubleshoot Loadbalancers (F5 and Brocade)
- Responsible for configuring, maintaining, and troubleshooting remote access & site-to-site IPSec/SSL VPN tunnels
- Work with Rackspace Enterprise customers to design, configure, and maintain their environment
6-10 years of experience
Administration and troubleshooting of phone system by way of Cisco Call Manager, Unity, UCCX systems.
- Conduct audit and security reviews against AD, NTFS, and third party vendors.
- Add, remove, and archive mailboxes using Exchange 2010 and PowerShell.
- Troubleshoot Citrix VPN client access.
- Administrator for the Ellie Mae loan originations software Encompass.
- Technical writer creating documentation of procedures and how to guides.
- Mentor and coached helpdesk technicians.
- Build images for desktop and laptops using Ghost.
6-10 years of experience
Provide day to day support for account creation/deletion and serve as the focal point for all systems and building access.
- Manage and oversee employee badge creation and administer the control systems for building access. As well as all account administration functions to ensure all user access meets established security policies and procedures.
- Maintain records for all users’ access. Ensure access is shut down upon employee termination.
- Work closely with Tech Services to administer Active Directory as well as FACS authorizations.
10+ years of experience
Manage computer forensics and investigative processes
- Use computer forensics tools to capture data and preserve chain of custody to support data integrity
- Administration and implementation of McAfee Web Filtering and Data Loss Prevention tools
- Support cellular management tool Air Watch
- Established process for collection and review of PC data
- Created process and training documentation for handling PCs of terminated PC to preserve chain of custody
0-5 years of experience
Monitor system security measures and logs and provide tracking updates to upper management
- Update system documentation according to National Institute of Standards and Technology government requirements
- Certify, terminate, and reinstate user accounts
- Conduct user access reviews to ensure appropriate user access levels
- Cyber Security Assessment and Management
- Provide audit deliverables to internal and external auditors
0-5 years of experience
Schedule external and internal host discovery scans to determine what’s on your global IP network
- Schedule external and internal vulnerability scans to evaluate the security posture of your IP devices and your network
- Configure and customize the scans for optimum performance taking into consideration the design of your specific network
- Prioritize and track all of the risk reduction activities based on an comprehensive set of evaluation criteria
- Generate a variety of reports, including executive summary, technical detail, and trend reports.
- Export the results to third-party applications for more extensive analysis.
0-5 years of experience
- Transported change requests between systems.
- Maintained user authorizations and role administration.
- Generated and modifying roles and profiles.
- Performed tape backups and resolved related issues.
- Performed kernel migrations, and applied support patches.
- Performed Disaster Recovery Server management – monthly backups from production server and restoring to DR server.
- Performed Database refresh using backup/restore procedure.
- Configured Transport Management System (TMS) across three-system landscape for DEV, QA and PRD systems.
- Performed Daily administrative tasks which include monitoring system logs, work processes, locks and updates (SM12, SM13, SM21, ST22 and SM51).
- Created and monitored background jobs using SM36, SM37 and checking SM35.
0-5 years of experience
Act proactively by acquiring and operating computer hardware and software to monitor the organization’s network in order to detect security incidents in progress.
- Develop and manages security-related education and training programs for system administrators, department managers, and general computer users.
- Provide advanced troubleshooting support to user community when interruptions occur to restore full system functionality.
- Documents logs thoroughly into the databases to ensure seamless communications with other information services team members.
- Assist in the creation, development, review, and maintenance of effective information security standards and procedures for auditing compliance.
- Patch Management, Antivirus, End Point Security
0-5 years of experience
- Administration of electronic security for Commission properties, power plants, electrical substations, water plants, and chilled water facilities.
- Management and reporting of physical access for government regulated Compliance areas that are subject to NERC CIP-006 standards
- Design and review of access control, intrusion detection, and CCTV systems for new and retrofit facilities.
- Interface with contract security technical staff and product vendors and manufacturers
- Manage contract security officer staff at Commission facilities
- Personal security detail for Commission meetings and CEO appearances
0-5 years of experience
Implement Information Security policies and procedures for the department governed by Sarbanes Oxley
- Acting member of the Compliance Team to regularly review risks and assess business processes and procedures
- Manage ongoing activities that serve to provide appropriate access to and protect the confidentiality and integrity of customer, employee, and business information in compliance with organization policies and standards
- Coordinate the activities for the Information Security Department such as server data migrations, RSA upgrades, SSL-VPN, and other security related applications
- Provide user support for access related issues
0-5 years of experience
- Trainer for Security Administration Team for implementation process in SAP
- Work with SME’s and other implementation team members for testing and implementation projects
- Provision, change, and remove user access in SAP using Excel scripts and GRC 10
- Create, modify, remove, and troubleshoot user access in SAP R/3, SAP R/2, NetWeaver, SDN, OSS, MDM Console 7.1, BPC, Vendavo, Primavera, and Sabrix
- Grant users access within Service Level Agreements in ISM 7.2
- Run reports for re-authorization process of users with role changes and who are no longer with Dow
6-10 years of experience
Manage administrative functions within the department to assist HR Manager with screening and completion of new-hire administration processes
- Oversee the intake process for new hires background checks, security certifications, and citizenship verification requirements
- Ensure compliance and proper documentation of new-hires, safety incidents/accidents
- Prepare, maintain, and control classified documents in accordance with applicable government requirements
- Coordinate government security investigations to obtain security clearance/access
- Consults with organization management on information protection to identify responsibilities for controlling government documents and records
- Assist with employment activities such as application/résumé screening, interview scheduling, and reference checking
- Maintain records and database management systems in compliance with company and regulatory requirements
- Provide administrative and clerical support to Human Resources
- Coordinate work orders/project quotes with service vendors/technicians
0-5 years of experience
- Design, Implement and Maintain PeopleSoft Security for HCM/CRM/EP/FMS
- Audit and Secure sensitive data to meet Sarbanes Oxley Compliance
- Design Implement and Administer Change Control Process
- Configure and Maintain Database Security
- Secure All Financial and Human Resource applications