Security Strategy Resume Samples
4.6
(83 votes) for
Security Strategy Resume Samples
The Guide To Resume Tailoring
Guide the recruiter to the conclusion that you are the best candidate for the security strategy job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.
Craft your perfect resume by picking job responsibilities written by professional recruiters
Pick from the thousands of curated job responsibilities used by the leading companies
Tailor your resume & cover letter with wording that best fits for each job you apply
Resume Builder
Create a Resume in Minutes with Professional Resume Templates
CHOOSE THE BEST TEMPLATE
- Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS
- Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES
- Instantly download in PDF format or share a custom link.
AK
A Kutch
Anita
Kutch
631 Margarita Dale
Los Angeles
CA
+1 (555) 437 1059
631 Margarita Dale
Los Angeles
CA
Phone
p
+1 (555) 437 1059
Experience
Experience
Dallas, TX
Information Security Strategy Analyst
Dallas, TX
Quigley Inc
Dallas, TX
Information Security Strategy Analyst
- Develop and build key metrics and a consistent reporting facility across various tools and systems, and meta-levels
- Develop and maintain process, procedures, forms and templates related to strategic execution planning
- Effectively manage relationships with vendors and service providers, and provide constant communication regarding service level agreements
- Perform additional duties as assigned by management
- Prepare vendor rotation analysis and impact, and seeks automation solutions
- Develop technical roadmaps about product solutions and version upgrades
- Recognizes interconnected systems and how they influence each other with dependencies around versions, patch-level and vendor support
Philadelphia, PA
Technical Security Strategy & Plans
Philadelphia, PA
Wuckert LLC
Philadelphia, PA
Technical Security Strategy & Plans
- Provide Continuous Improvement (CI) oversight
- Provide Physical Security Support to the global Joint Operations Centres
- Security incident management and response
- Manage resources to ensure technical security projects are delivered on time, in full and in accordance with the Security Strategy
- Develop the Technical Security Strategy and programme
- Excellent knowledge of current technical security systems and architecture (including access controls, camera systems and intruder detection systems)
- Security design of office space
present
Phoenix, AZ
Information Security Strategy Leader
Phoenix, AZ
Funk Group
present
Phoenix, AZ
Information Security Strategy Leader
present
- Oversight and development of technical security strategies
- Network and Perimeter Security – e.g., firewalls, IDS/IPS, secure remote access and secure file transfer
- Management of research and short-term innovation projects exploring new security technology
- Endpoint Security – e.g., anti-virus, firewall, endpoint encryptions technologies, port/device controls and network access control
- Development of written documents (English) and presentations at various levels of the organization – from technical to executive
- Cloud, mobile and other emerging technology security areas
- Review and assessment of technical security roadmaps aligned against strategic direction
Education
Education
Bachelor’s Degree in Computer Science
Bachelor’s Degree in Computer Science
Webster University
Bachelor’s Degree in Computer Science
Skills
Skills
- Candidate should possess good presentation skills with an ability to articulate his/her points across to customers in an effective manner
- Good understanding of standards such as ISO 27K especially in terms of carrying out gap assessments
- The candidate should have the ability to lead engagements as well as work as an SME on large engagements
- Should be technically sound with a good understanding of the different security related technologies such as FW's, IPS, WAF, Anti DDoS etc
- Understanding of risk frameworks such as ISO 31000 and compliance standards such as PCI-DSS
- The candidate should have about 6-7 years of experience of having delivered projects in the Security Strategy, Risk and Compliance area for clients
- Work with the front end sales teams to provide support in terms of defining engagement solutions
15 Security Strategy resume templates
Read our complete resume writing guides
1
Senior Manager, Cyber Security Strategy Resume Examples & Samples
- Develop a process and model for the Information Security Dashboard and Key Risk Metrics
- Work with Senior IT stakeholders to elicit operational data for use in Risk
- Develop and Deliver Executive presentations
- Understand and assess the Cyber Threat landscape and the associated trends
- Develop strategies to manage cyber and information security risks
- Manage a team of senior Information Security professionals
- Lead BCE wide discussions on architecture
- Develop technical requirements for securing technology, applications, and networks
- Minimum of 10 years Information technology with large enterprises
- Professional certification in Information Security (e.g. CISSP, CISM, GIAC)
- Excellent analytical skills, able to manage multiple projects under strict timelines, work well in a demanding dynamic environment
- Critical thinker with strong problem-solving skills
- Knowledge of ITIL, ISO, CoBiT, NIST, TOGAF
- Experience designing solutions for large scale enterprise rollouts
- Proven track record and experience developing process and procedures and successfully executing programs that meet objectives of excellence
- Degree in business administration and a technology-related field, or equivalent work- or education-related experience
- High level of personal integrity, and the ability to professionally handle confidential matters and demonstrate a high level of judgment and maturity
- High degree of initiative, dependability and ability to work with little supervision
- Bilingual preferred, but not mandatory
2
Security Strategy & Risk Management Graduate Resume Examples & Samples
- Bachelor or master degree in computer science, software engineering or equivalent - 2:1 or above
- Within 1 year of graduation which may also include relevant work experience
- Demonstrates a methodical approach from previous employment/university work using tools such as MS Project /Office
- Strong verbal and written communication using a variety of tools
- Understanding of basic negotiation skills - able to balance risk and opportunity
- Keeps up-to-date on professional/ technical developments
- Demonstrates a "can-do" spirit, ownership, and commitment
- Able to build relationships, demonstrates a passion for customers
- Is able to work both as a team player and independently on multiple tasks
- Is able to adapt to a technical environment, is highly motivated and able to manage constant change and ambiguity
- Has an understanding of information security and its impact on the organisations
- Exercises independent judgment within defined practices and procedures to determine appropriate action. Follows established guidelines and interprets policies. Evaluates unique circumstances and makes recommendation
3
Security Strategy & Transformation Principal Resume Examples & Samples
- Experiences a Security Consultant in Security Strategy and Transformation
- Detailed understanding of, and experience in, IT Security, Information Security
- Experience in working with executives and senior management within clients to capture requirements and formulate solutions
- Good understanding of Assurance Practices and Risk Management, with hands on experience
- Ability to investigate aspects of IT systems and compare them to relevant standards (e.g.ISO 27001, HMG Security Policy Framework, Financial Services, etc.)
- Ability to identify solutions to resolve security gaps in systems and designs
- Experience in producing security documentation such as a Security Improvement Plans, Security Management Plans, Security Policy and other ISMS components
- Significant experience of security processes and standards, in particular ISO27001
- High level knowledge of security audit and accreditation processes
- Appreciation of future trends in IT and Information security
- Ability to adapt to new security regimes
- Experience of working with ISO27001 auditors and of the audit process
- Experience of working as a senior security consultant
- Experience of presenting at client meetings
- Experience of translating contractual security requirements to deliverables
- University Degree Qualified or equivalent work experience
- Typically 5Years’ Experience as a Senior Security Consultant
- Typically10 Years’ industry related experience in Information and/or IT Security
4
Principal Consultant Security Strategy Risk & Compliance Resume Examples & Samples
- Experience in professional services (providing consulting for end clients)
- Experience in Information Security Consulting
- Experience in Technology Risk, IT and/or Information Security and Risk and IT Security Architecture
- Experience in Performing PCI Assessments (DSS and PA-DSS) for end clients. -- At least Certification as a Qualified Security Assessor (QSA) by the Payment Card Industry Security Standards Council (PCI SSC)
- Demonstrated knowledge in security industry regulations/standards (PCI DSS, Privacy Act) and compliance frameworks (ISO 27002, CobiT)
- Knowledge of security process frameworks, compliance and risk requirements and regulations, with particular regard to data privacy and protection
- Experience working on projects and providing security assurance testing services
5
Security Strategy Resume Examples & Samples
- The candidate should have about 6-7 years of experience of having delivered projects in the Security Strategy, Risk and Compliance area for clients
- The candidate should have the ability to lead engagements as well as work as an SME on large engagements
- Good understanding of standards such as ISO 27K especially in terms of carrying out gap assessments
- Understanding of risk frameworks such as ISO 31000 and compliance standards such as PCI-DSS
- Should be technically sound with a good understanding of the different security related technologies such as FW's, IPS, WAF, Anti DDoS etc
- Candidate should possess good presentation skills with an ability to articulate his/her points across to customers in an effective manner
- Work with the front end sales teams to provide support in terms of defining engagement solutions
- At least 7 years experience in ISO 27001 Lead Implementation Certification or CISA/CISSP
6
Security Strategy Resume Examples & Samples
- The consultant should demonstrate leadership skills through ownership of specific tasks or projects within an engagement
- The Consultants should be able to establish relationships within client organizations and deliver timely, high quality service to the client
- The candidate is expected to be a Subject Matter Expert in the area of Security Strategy, Risk and Compliance
- Candidate should be a self starter with an ability to take up tasks on hand and multitask if required
- ISO 27001 Lead Implementation Certification or CISA/CISSP
7
Security Strategy Resume Examples & Samples
- At least 7 years experience in management consulting and systems integration in a top tier professional services firm
- At least 7 years experience working in projects related to the core domain
- Experience working across diverse teams to facilitate solutions
- Experience working with Security practitioners
- Bachelor’s Degree in Engineering and/or Business Management
8
Leader, Climate, Controls & Security Strategy Resume Examples & Samples
- Corporate strategic planning– Develop organization wide global priorities and strategic plans. Identify cross – segment opportunities
- New market entry analysis– Conduct segment/country analysis including competitive analysis. Develop new market entry options while evaluating organic growth opportunities and potential acquisition targets
- Market understanding – Develop a strong understanding of the markets CCS participates in including competition status, product development trends, customer requirements, industry sales models, and external environment
- Market development – Identify customer needs and develop competitive analysis to develop and drive UTC Climate, Controls & Security’s business plan
- Acquisition & Divesture– Analyze, evaluate and make recommendations with regard to appropriate merger, acquisitions, joint venture, and/or divesture opportunities in existing markets. Provide results to senior management with timely and accurate analyses, intelligence and evaluation reviews
9
Information Security Strategy Leader Resume Examples & Samples
- Primary responsibilities associated with this role are
- Subject-matter expertise across all relevant technical security domains
- Experience with new and emerging technologies such as cloud services and infrastructure, mobility models, and big data concepts and usage and how those relate to enterprise security technology/controls; the areas of focus include vulnerability management, cyber security, and data protection disciplines
- Managing security as a business is important to the firm and setting the tone and strategic direction of this focus area is a part of the role
- Spear-heading and ownership of innovative concepts and architectural areas across our technical security domains
- Oversight and development of technical security strategies
- Review and assessment of technical security roadmaps aligned against strategic direction
- Management of research and short-term innovation projects exploring new security technology
- Creating and maintaining working partnerships with architecture, engineering, and operations to understand needs, feasibility of strategic recommendations, and impact to organizations and people; relationship management is a key role function
- Development of written documents (English) and presentations at various levels of the organization – from technical to executive
- Ability to liaise and a strong comfort level with Executives and Senior Leadership
- Supports the development, implementation and maintenance of the global information security strategy program
- Plays a key role in recommending strategic direction for the firm
- Leading technology specialist in all aspects of information security
- Excellent people skills particularly as it related to relationship management and consensus building
- A high proficiency in technical and general writing skills in English is required; very high proficiency in verbal communications in English is required also
- Vulnerability Management and Cyber Security – e.g., vulnerability scanning, vulnerability program management, network forensics, SIEM, cyber security technologies, incident response program implementation and technology enablement, and security reporting
- Endpoint Security – e.g., anti-virus, firewall, endpoint encryptions technologies, port/device controls and network access control
- Network and Perimeter Security – e.g., firewalls, IDS/IPS, secure remote access and secure file transfer
- 8+ years in the information security field; 12+ years in information technology
10
Senior Director, Payment Security Strategy Resume Examples & Samples
- Advance Visa's security roadmap (products, policies and programs) and "Champion Security" initiative
- Report progress, issues on executing critical security initiates to executive management. Develop Champion Security KPIs and reporting dashboard
- Contribute to the refinement of Visa's security story for the industry and clients
- Collaborate effectively with peers across Visa who are involved in developing new security and innovation products, policies and initiatives, while maintaining a balanced focus on Visa's risk roadmap
- Be an internal advocate for Visa's security strategy by promoting use of network fraud solutions that eliminate or devalue sensitive payment card data as well as strong data protection
- Identify and track new fraud threats
- Work with policy owners in Risk and the interchange team to review current incentive structure for payment participants to ensure behavior in alignment with Visa's security strategy
- Serve as subject matter expert and provide strategy consulting on payment security to internal colleagues and business partners
- 10-15 years of experience including 7-10 years of payments experience
- Proven track record of executing on strategic projects, managing cross-functional project teams, and engaging with senior level clients
- Strong business acumen; comfortable working in a matrix environment; exercises sound judgment
- Excellent presentation and written communication skills; experience presenting to and dialoging with senior management
- Strong knowledge of the payment system or financial services industry
- Able to compose, format, and deliver concise, on-message presentations which articulate complex information in a straightforward manner to executive management
- This person must be team-oriented, hard-working, and able to manage a large number of diverse and often complex issues and/or projects
- Ability to ramp up quickly on projects and security topics
- Strong relationship management and collaboration skills
- Bachelor's degree required, graduate education preferred
11
Director, Security Strategy & Innovation Resume Examples & Samples
- Highly collaborative with ability to articulate ideas and influence peersand senior leaders
- In-depth knowledge of emerging technology trends; ideally within the media and telecommunications industries
- Expertise with a wide variety of cyber security vendors and tools, and experience designing and managing vendor evaluation processes
- Strong analytical and critical thinking skills, and excellent written and oral communication & presentation skills
- Strong executive presence and demonstrated ability to develop strong executive relationships
- Generally requires 10+ years of experience
12
Head of Security Strategy Resume Examples & Samples
- Establish and lead the Group’s (Cyber) Security program in accordance with regulatory guidance, industry best practices, and other defined requirements
- Work with stakeholders to define policy, standards and controls, provide advisory and execute oversight for (Cyber) Security program
- Develop and maintain the Group’s (Cyber) Security relationships with regulators and industry
- Track and support resolution of (Cyber) Security issues and breaches
- Establish and manage metrics to demonstrate effectiveness of (Cyber) Security program
13
Executive Director, Cyber Security Strategy Resume Examples & Samples
- Designs and implements the security and network infrastructure that services a global Cybersecurity team for every property and geography where LVSC operates
- Lead a global team of resources across our organization that support both global and local requirements
- Contributes to the development and maintenance of the cyber security strategy
- Serves a senior leadership role in providing network and system security engineering and architecture advice and risk analysis
- Develops and leads the Security and Engineering team to ensure a well-defined program operates and identifies coverage areas and assess risk
- Develops a scientific approach for hardware and code review procedures to an application security program that functions centrally and provides global services to new projects and current Internet facing applications
- Develops infrastructure to sourcing and integrating external sources of cyber threat intelligence
- Design overall system and solution architecture, system integration, and implementation strategy
- Develops and leads the Security and Engineering program on a global basis
- 21+ years of age
- Proof of authorization/eligibility to work in the United States
- Bachelor's degree in computer science, information systems or other related field; or a minimum of 10 years or more years of equivalent work experience
- Professional security management certification, such as a Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM) is highly desired
- Expert knowledge of UNIX/Linux/Solaris/Windows secure network design, implementation and operation
- Expert knowledge of modern network security technologies such as Intrusion Detection/Prevention technologies, routers, switches, and load-balancers, virtual networking hardware and cloud based solutions
- Highly knowledgeable of network and system security principles such as defense in depth, role based access systems, etc. and how they are applied in the real world
- Expert knowledge of modern network security technologies such as network and host-based intrusion detection/prevention, vulnerability assessment (including app/web-layer interrogation), DDOS protection, sandbox technology, Security Information Event Management, host-based integrity checking, endpoint protection, AV/AM, application security solutions, virtualization, Data Loss Prevention, etc
- Strong conceptual thinking and communication skills - the ability to conceptualize complex business and technical requirements into comprehensible models and templates
- Knowledge of programming tools using a variety of languages (C, C++, Perl, Unix Shell Scripts, Python, etc.) and network protocols and architecture (TCP/IP, ATM, WAN, Bridges, etc.)
- Knowledge of PCI, SOX and other regulatory and statutory compliance
- Experience with leading, developing, and establishing best practices in architecting and engineering information systems and networks that service a highly secure environment
- Understanding of how to design and implement a security domain that services a globally diverse environment
- Experience in the design, documentation, and test of enterprise cyber security solutions
- Experience in the evaluating and recommending improvements for compliance-related requirements
- Experience with working in a highly outsourced environment (both infrastructure outsourcing and security operations outsourcing)
- Ability to work well under minimal supervision
- Demonstrated leader with team-oriented interpersonal skills, with the ability to interface effectively with a broad range of people and roles, including upper management, IT leaders, and technology vendors
- High levels of integrity in the conduct of personal and professional affairs
- Calmness and clarity of thought under pressure and ability to maintain confidentiality
- Ability to maintain the goals and culture of the organization
- Understanding of strategic business objectives and the ability to drive results toward those objectives
- Will be subject to a security background investigation and must meet eligibility requirements for access to U.S. Government Classified and Controlled Unclassified Information
- Ability to communicate effectively in a positive/upbeat fashion utilizing English, both in oral and written form
- Have interpersonal skills with focused attention to guest needs to deal effectively with all business contacts
- Maintain a professional, neat and well-groomed appearance adhering to Company appearance standards
- Maintain consistent adherence to the Las Vegas Sands Corp Unmatched Guest Service Standards
14
Cyberspace Operations Systems Security & Strategy Analyst Resume Examples & Samples
- 5+ years of experience with acquisition
- 5+ years of experience with OSD, Service Staff, or Joint Staff
- 5+ years of experience in DoD weapons systems
- 2+ years of experience with Cyberspace or tactical and weapons system operations
- 2+ years of experience with the DoD budget process
- Ability to work independently and with high energy
- Ability to lead tasks in formal and informal group settings
- Experience with security system engineering and software development
- Experience with industrial control systems
- Experience in working with senior DoD staff from several organizations, including AT&L, DoD CIO, Joint Staff, CAPE, Services, STRATCOM, and COCOMs involved with the DoD acquisition and budget process a plus
- Possession of excellent analytical and problem solving skills
15
Cyber Security Strategy Principal Resume Examples & Samples
- Develop strategy and roadmaps
- Mature capabilities
- Ensure that teams execute against the defined strategy and roadmap
- Identify new and innovative ways to ways to prevent data loss and protect the organization more effectively and efficiently
- Provide leadership and direction to develop application and device security capabilities and processes
- Maintain rolling plan of security projects and programs
- Maintain alignment of KP Cyber Security vision with business objectives and requirements
- Provide gap analysis for information security functions and provide plans for gap remediation
- Predict and recognize technology trends and ensure that information security functions adequately plan for them
- Position KP Cyber Security as an industry leader in application and device security
- Develop relationships with health care industry peers, research communities, and cyber security groups
- Provide insight and actionable intelligence to KP leadership
- Minimum fifteen (15) years of related experience
16
Leader, Climate, Controls & Security Strategy Resume Examples & Samples
- Ability to lead multi-functional teams to resolve unusually complex problems
- Excellent communication skills, both written and verbal across a wide audience. This includes the ability to effectively communicate with technical and non-technical teams
- Comfortable presenting and interaction with senior management
17
Security Strategy & Risk Consultants Resume Examples & Samples
- You have 1-5 years’ experience within IT consulting in project management and/or delivery
- The candidate has the possibility to develop into a subject-matter-expert in an area of interest
- Degree majoring in Computer Science, IT or Electrical Engineering – M.Sc./civ.ing. preferred, with excellent academic record
- 2+ years of expertise in either of these areas: Security strategy, transformation and risk; Enterprise security; Extended enterprise security; Cyber security or Managed security
- Experience from project management and/or work in team-oriented environments
- Relevant consulting, communication and interpersonal skills
18
Accenture Security Strategy & Risk Management Transformation Resume Examples & Samples
- Minimum of 3 years of security strategy experience
- Minimum of 2 years of experience implementing one of the IT GRC solutions such as Archer SmartSuite and Agilance
- Minimum of 2 years of experience with security governance (e.g., ISO31000, COBIT)
- Minimum of 1 year experience in at least 2 of the following areas: Compliance (HIPAA or PCI or SOX or GLBA.), Infrastructure, Security operations, Security consulting, Applications, or Architecture experience
- CISSP, CISM, CISA preferred
- Have a deep intellectual capacity and relevant experience to develop creative and breakthrough solutions
- Successful track record in sales origination with an entrepreneurial mind-set; demonstrated ability to lead multi-disciplinary teams to shape, sell, communicate, and implement security strategy engagements
- Be a natural leader with the ability to easily establish trust-based relationships; skilled in gaining valuable insights through collaboration and communication
19
Accenture Security Strategy & Risk Management Transformation Resume Examples & Samples
- Minimum of 5 years of security strategy experience
- Minimum of 3 years management consulting experience and/or internal consulting
- Minimum of 3 years of experience implementing one of the IT GRC solutions such as Archer SmartSuite and Agilance
- Minimum of 3 years of experience with security governance (e.g., ISO31000, COBIT)
20
Technical Security Strategy & Plans Resume Examples & Samples
- Intelligence
- Security incident management and response
- Security risk assessments and mitigation
- Executive and high-risk personnel protection
- Travel and Event security
- Security design of office space
- Develop the Technical Security Strategy and programme
- Oversee delivery of the Technical Security Strategy and programme
- Managing the delivery of multiple, complex, large-scale, concurrent projects
- Oversight and remediation of ongoing issues with current systems
- Ensure data integration with other functional areas
- Ensure regional consistency of systems
- Write Statements of Requirements (SoRs)
- Provide Continuous Improvement (CI) oversight
- Manage resources to ensure technical security projects are delivered on time, in full and in accordance with the Security Strategy
- Provide Physical Security Support to the global Joint Operations Centres
- Excellent knowledge of current technical security systems and architecture (including access controls, camera systems and intruder detection systems)
- Proven experience developing and implementing technical security strategies within large, global organisations, preferably within the Financial Services sector
- A thorough understanding of the total project life cycle, from project conception stage, through all of the operational stages to completion and post-project review
- Track record of managing multiple , simultaneous and complex, technical security projects across a large global organisation
- Strategic and commercial mind-set
- Managing the flow of project information between the team and the client, through regular meetings and written communications
- Excellent facilitation and stakeholder management skills; ability to work well with all levels of personnel, including senior managers and global stakeholders, to meet project objectives
- Ability to manage tasks simultaneously, with frequently changing priorities
- Proven Change Management skills
- Gathering and analysing client requirements
- Proven experience of developing and delivering a technical security strategy within a large, global, organisation, preferably within Financial Services
- Track record of establishing and driving the delivery of large-scale, complex technical security projects (including network IT, data integration and Physical Security systems IT) on time and within budget
- Technical security subject matter expert with an excellent knowledge of current and emerging market leading security systems, their application, integration and deployment
- Experience of managing Request for Proposal RFP’s
- Experience working with teams in multiple time-zones
- Strong interpersonal skills including negotiating and influencing
- Experience managing senior stakeholders, vendors and internal resources
- Experience managing project risks and issues
21
Information Security Strategy Analyst Resume Examples & Samples
- Develop and build key metrics and a consistent reporting facility across various tools and systems, and meta-levels
- Perform specific market observations and vendor management to manage information security product lifecycles across various tools and determine appropriateness of next generation solutions
- Develop various building blocks, slide material, diagrams and spreadsheets as needed, in cooperation with management and other teams
- Supports the establishment of a clear governance model and tracks key security decisions and reports outcomes to management
- Provide well-researched, well-condensed, and meaningful metrics, such as Key Goal Indicators (KGI), Key Risk Indicators (KRI), and Key Performance Indicators (KPI) to ensure accurate data is provided in the making of business cases for adjustments in budget, resources, and decisions (risk approval) etc
- Effectively manage relationships with vendors and service providers, and provide constant communication regarding service level agreements
- Provide robust and reliable data and analysis to drive better security outcomes for the enterprise
- Prepare vendor rotation analysis and impact, and seeks automation solutions
- Develop technical roadmaps about product solutions and version upgrades
- Recognizes interconnected systems and how they influence each other with dependencies around versions, patch-level and vendor support
- Assesses and analyzes key security processes and documents this into a common process portfolio / security catalog
- Establishes IT-wide RACI matrices and supports the service concept of security services for the enterprise
- Provide regular and detailed, reliable, and consistent reporting to management regarding metrics, quality, coverage, historic trends, and potential indicators / root causes
- Assists management with documentation needs, risk registers, risk / heat maps, compliance reports, dashboard development, data classification schemes, and dataflow diagrams
- Perform additional duties as assigned by management
- High School Diploma required; Bachelor’s degree in Computer Science, Science, Engineering or related discipline preferred
- 5+ years relevant information security experience, including security consulting and security analyst roles with exposure to various subjects like strategy, operations, governance, monitoring, and architecture is required
- Professional security management certifications, such as a CISA, CGEIT, CISM, CISSP, or other similar credentials are preferred
- Expert knowledge of security issues, techniques, best practices and frameworks (ISO27k, COBIT, NIST, ITIL), and implications across all existing computer platforms required
- Proven ability in security process and organizational design, and RACI chart impact analysis
- In-depth knowledge of high complex security, compliance, best practices, and risk management
- Strong conceptual thinking skills — the ability to conceptualize complex security program components into a functioning array of integrated building blocks and support processes
- Team-oriented interpersonal skills, with the ability to interface effectively with a broad range of individuals and roles
- Strong written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate security and risk-related concepts to both technical and non-technical audiences
- Proven track record and experience in developing information security programs and standards. Strong time management skills as well as strong organizational, problem-solving, and analytical skills required. Able to work in a very fast paced environment and remain positive
- High level of personal integrity, as well as the ability to professionally handle confidential matters, and show an appropriate level of judgment
- High degree of initiative, dependable and able to work well with limited supervision
- Proficient use of tools like MS office suite (PowerPoint and Visio expert), web solutions, and third party knowledge providers
- Able to condense vendor security reports into single page summaries that capture the provided / added value of the new security report in comparison to current state knowledge
- The ideal candidate should have worked at least in two different types of industries
- Authorized to work for any employer in the United States
- Ability to pass a thorough background check
22
Cyber Security Strategy Integration Senior Analyst Resume Examples & Samples
- 35% - Strategy & Planning
- Provide strategic, operational, and tactical insights, utilizing acquired knowledge of applicable domains and thorough business/technical acumen, particularly in cross functional and cross enterprise areas
- Coordinate periodic reviews assuring progress to meet timelines and fulfil our operational commitments
- Identify, recommend and implement best practices, based on sound evidence and deep domain understanding
- Define clear objectives and scope aligned to TGRC’s objectives
- Accountable for development of integrated remediation plans for each identified initiative
- 40% - Execution & Administration
- Manage the execution and implementation of countermeasures and supporting activities required to address identified gaps
- Utilize a project management framework approach to achieve objectives of being delivered on time, on budget and business results are realized for high cost and risk areas
- Integrate people and other resources from the different functional departments and business to achieve milestones and fulfillment of obligations and requirements
- Make decisions and takes actions to achieve results while managing relevant risks and issues
- Develop contingency plans for necessary technical and physical architecture design/modifications, and upgrades while employing trouble shooting initiatives
- Coordinate efforts and manages prioritization within high cost and risk control requirements. Monitors and controls interdependencies within controls and address escalated issues to satisfaction
- Contain and resolve issues appropriately
- Escalate risks and issues as and when necessary to appropriate responsible persons
- Provide sponsors and stakeholders with a routine status and actively communicating issues and threats, and ensuring that leadership alignment is a priority
- Work with the business to ensure the controls and solutions are successfully implemented and that the promised benefits and value are being captured
- Ensure successful closure of remaining remediation activities
- Recognize and celebrate success
- 4 years of cross-functional remediation work with medium to heavy IT involvement
- Ability to learn on the fly, manage through systems and complex processes, and have sufficient overall intellectual horsepower to address the demands of the team and environment
- Demonstrated active inquiry instincts and agile learning capabilities with strong strategic thinking, prioritization, and problem solving skills
- Strong continuous improvement experiences, including identifying, initiating, planning, executing, and sustaining
- Exceptional teaming skills encompassing cross-functional teams and peer relationships
- Competently understand and effectively communicate remediation concepts with business and functional people
- Excellent verbal and written communication skills supporting an ability to effectively describe technical concepts to non-technical audiences
- Developed understanding of how business initiatives create value and risk, ability to negotiate alternate approaches to address complex business issues, and appreciation of the interplay between internal and external environments
- Negotiation, facilitation and stakeholder management
- Business fluency in English
- Ability to travel up to 20% globally
23
Information Security Strategy & Execution Officer Resume Examples & Samples
- Manages one or more Planning areas (operating, functional, control), and is accountable for facilitating plan development sessions, and then documenting and maintaining plans and roadmaps to ensure delivery of outcomes in order to achieve strategic objectives
- Understands how execution paths align to overall business plan, cyber security landscape, security policy, and consumer needs; can anticipate new opportunities and/or adjust Planning approach to accommodate variable needs
- Responsible for defining, implementing, and monitoring measurements for performance and value outcomes against execution of a plan
- Looks holistically across all strategic objectives to understand (inter)dependencies and key integration points
- Communicates, influences, negotiates, and drives consensus both vertically and horizontally to achieve strategic objectives
- Must be able to translate vision/targets into strategic plans, and strategic plans into specific goals, tactics, action plans, and measures
- Strategic planning experience in Information Security or related field
- Ability to assess an operational or security challenge/opportunity and determine best future state
24
Information Security Strategy Analyst Resume Examples & Samples
- Develops presentations, graphs, charts, datasets and simple tools to facilitate management and presentation of information
- Supports one or more Strategy Leads in completing Strategy deliverables (roadmaps, documentation, metrics & measures, etc.), and ensures adherence to established standards, guidelines and templates
- Continually monitors alignment of execution paths to overall business strategy, cyber security landscape, security policy, and consumer needs
- Develop and maintain process, procedures, forms and templates related to strategic execution planning
- Leverages understanding of organizational processes to proactively remove barriers and enable the successful delivery of a Strategy
- Acts as an internal quality check function; reviews and ensures adherence to strategic objectives across strategic execution plans
- Strong analytical skills/problem solving/conceptual thinking
- Comfortable working with limited information, ambiguity, and rapidly changing priorities
- Advanced skills with MS Office suite including Access and SharePoint
- Ability to balance multiple needs, requests and goals
- Solid understanding of key database concepts and methods
- Strong functional and technical knowledge of information security capabilities
- Good technology and business acumen, with ability to navigate a highly matrixed organization effectively
- Minimum 5 years of relevant experience across IT - information security or related function
- Bachelor's degree, or higher, in Information Technology or related field
25
Director of Cyber Security Strategy & Execution Resume Examples & Samples
- Define MITRE’s overarching cyber security strategy and priorities for engagement with sponsors, stakeholders and industry partners; and develop MITRE’s current and future-state cybersecurity roadmap
- Affect national cybersecurity policy, decision making and system engineering processes for emerging cyber challenges facing the nation
- Support the development, integration and continuous improvement of the government’s cybersecurity efforts; develop key relationships across government and industry enabling engagement on items of mutual interest and appropriate partnerships across industry and academia
- Advise the government on technical issues related to cyber security, IT operations, cyber effects, computer science, and systems engineering
- Increase the public sector’s security and resilience against cyber threats
- Engage with critical infrastructure and industry to raise awareness, reduce risks, and prepare and respond to cyber events
- Ensure that MITRE’s cybersecurity work effectively reduces cyber risks to critical national infrastructures
- Demonstrated Cyber Thought Leadership across cyber community to create and implement cyber solutions for
26
Security Strategy & Risk Management Consultant Resume Examples & Samples
- Analyze complex enterprise environments from an information security perspective
- Delivering Security Architectures/Strategies as part of a broader Enterprise or IS/IT Architecture which encompass People, Process and Technology components
- Undertake Threat, Vulnerability and Risk analysis methodologies/techniques and the interpretation/application of their output in the definition of Security Architectures
- Rationalize different security solutions against requirements, risk, and constraints. Build business justification to support continued investment in security
- Develop security roadmaps for customers which will enable them to execute upon strategies developed
- 7+ years of experience with designing and implementing Security Solutions through to operation, experience in multi-supplier/multi-platform environments would be advantageous
- Information Security and regulatory compliance consultancy experience
- Interpreting and applying appropriate Standards, Policies and Legislation, e.g. ISO27001, NIST CSF, PCI DSS, GDPR etc. in the development of security strategies
- Demonstrable experience in leading large consultancy delivery teams and projects
- Demonstrable experience in “soft” consultancy skills (i.e., deliverable generation, communications, executive level presentation development/delivery)
- Able to help build information security documentation and convey complex information security topics in a simple effective manner
- Working knowledge of common IT Governance frameworks such as COBIT, ISO 20000, ITIL
- Cloud Security experience desirable
- Appreciation of trends in IT security, IT risk management, and security architecture
27
Security Strategy & Risk Management Principal Consultant Resume Examples & Samples
- Develop, implement and/or oversee the implementation of Enterprise Security Strategy
- Architect solutions and lead security projects at an enterprise level, ensuring that the customer's security requirements are met
- Work with key customer executives, directors and management teams (i.e., CISO, CSO, Security Director, etc.) to ensure a business-level understanding of their requirements are understood and that any solutions provided manage risk and address the needs of the business
- 10+ years of experience with designing and implementing Security Solutions through to operation, experience in multi-supplier/multi-platform environments would be advantageous
- Security Architecture and/or Enterprise Architectural Frameworks (e.g. SABSA, TOGAF, O-ESA)
- A high level knowledge of all key areas of Information Security Technology and an ability to apply them appropriately
- An understanding of the people, process & technology involved in Security Strategy, Risk Management, and Security Operations
- Understanding of basic financial analysis in support of providing cost estimations in delivery of large-scale security programs and associated activities
- Ability to develop new portfolio solutions from concept to market (methodology development, marketing, sales/internal training, etc.)
- Experience and knowledge of security management frameworks in multiple industries like finance, pharma, manufacturing, travel/transportation, retail or insurance
- Able to build information security documentation and convey complex information security topics in a simple effective manner
- Working knowledge of common risk assessment frameworks/methodologies such as FAIR, OCTAVE, CRAMM, COBIT, NIST SP 800-30, ISRM, ISO 31000
- Working knowledge of common IT security impacted regulations and/or standards such as HIPAA/HITECH, PCI, Sarbanes-Oxley, GLBA and GDPR
- Self-motivated individual who is keen to take ownership of allocated tasks and drive them to completion
- Key industry certifications such as CISSP, ISSAP, CISM, CRISC, CISA, CCSK, TOGAF certified Architect, CCSP, are desirable