Senior Cyber Resume Samples
4.7
(115 votes) for
Senior Cyber Resume Samples
The Guide To Resume Tailoring
Guide the recruiter to the conclusion that you are the best candidate for the senior cyber job. It’s actually very simple. Tailor your resume by picking relevant responsibilities from the examples below and then add your accomplishments. This way, you can position yourself in the best way to get hired.
Craft your perfect resume by picking job responsibilities written by professional recruiters
Pick from the thousands of curated job responsibilities used by the leading companies
Tailor your resume & cover letter with wording that best fits for each job you apply
Resume Builder
Create a Resume in Minutes with Professional Resume Templates
CHOOSE THE BEST TEMPLATE
- Choose from 15 Leading Templates. No need to think about design details.
USE PRE-WRITTEN BULLET POINTS
- Select from thousands of pre-written bullet points.
SAVE YOUR DOCUMENTS IN PDF FILES
- Instantly download in PDF format or share a custom link.
CS
C Schaden
Cleve
Schaden
5014 Peggie Extensions
Philadelphia
PA
+1 (555) 120 7208
5014 Peggie Extensions
Philadelphia
PA
Phone
p
+1 (555) 120 7208
Experience
Experience
Los Angeles, CA
Senior Cyber Hunt Engineer
Los Angeles, CA
Nikolaus, Labadie and Armstrong
Los Angeles, CA
Senior Cyber Hunt Engineer
- Integrating Microsoft and Linux/Unix infrastructure
- Linux and or Unix system/network administration
- Proactive, analytic, top-down thinker with a successful track record solving complex problems
- Use high-level scripting/programming language to support the development of endpoint sensor component and analytic bridge component
- Analyze threat intelligence (e.g. actors, hack tools, exploits, malware, etc.), determine techniques, tactics, and procedures (TTPs) of Threat Actors, and engineer effective countermeasures within an autonomous context
- Flexibility in meeting schedule commitments
- Passion for low-level network engineering and cyber security
Chicago, IL
Senior Cyber Range Engineer
Chicago, IL
Gibson and Sons
Chicago, IL
Senior Cyber Range Engineer
- Troubleshoots network systems when necessary and makes improvements to the network
- Provides configuration management planning
- Provides technical guidance for directing and monitoring information systems operations. Designs, builds, and implements network systems
- Directs compilation of records and reports concerning network operations and maintenance. Troubleshoots network performance issues; Analyzes network traffic and provides capacity planning solutions
- Provides the routine testing and analysis of all elements of the network facilities (including power, software, communications machinery, lines, modems, and terminals)
- Manages the purchase, testing, installation, and support of network communications, including LAN/MAN/WAN systems
- Performs a variety of systems engineering tasks and activities that are broad in nature and are concerned with major systems design, integration, and implementation, including personnel, hardware, software, budgetary, and support facilities and/or equipment
present
Boston, MA
Senior Cyber Insider Threat Analyst
Boston, MA
Jacobson-Graham
present
Boston, MA
Senior Cyber Insider Threat Analyst
present
- Continually evaluate changes to actor tactics, techniques and procedures to ensure technology strategy maintains pace with a changing cyber insider threat landscape
- Work closely with Information Security architecture and engineering to develop new tools and techniques for predicting, detecting and preventing insider threats
- Manage inventory of forensic evidence and case management (virtual and physical)
- Decrypt and perform forensic acquisitions of digital media while assisting with the shipment and receipt of digital evidence and other items
- Work with outside agencies and internal stakeholders to discretely conduct investigations and report findings to management
- Develop and Document Forensic Standard Operating Procedures
- Recommend changes to detection platform data sources, policies, filters and rules to improve event analysis
Education
Education
Bachelor’s Degree in Computer Engineering
Bachelor’s Degree in Computer Engineering
Adelphi University
Bachelor’s Degree in Computer Engineering
Skills
Skills
- Excellent analytical ability, sharp attention to detail, creative problem solving, consultative skills, and innovation
- Analytical ability, attention to detail, problem solving , and consultative skills
- Ability to navigate a complex global network to identify intelligence and detection sources
- Experience handling investigations, leveraging legally sound practices (including chain of custody), the results of which are prosecutable case files
- Professional, clear, and concise communication to both technical and non-technical audiences
- Good understanding of possible methods of internal and external data movement
- Proven ability to innovate, develop, implement, and effectively document complex technical systems and approaches
- Experience using analytical skills and an ability to interpret established standards and guidelines to solve problems
- Experience developing and communicating findings to non-technical business areas
- Demonstrated expertise in both working in and handling extremely sensitive areas/materials, respectively
15 Senior Cyber resume templates
Read our complete resume writing guides
1
Senior Cyber Incident & Threat Analyst Resume Examples & Samples
- Log analysis and experience reviewing Security Events
- Experience with network packet analysis
- Intrusion analysis
2
Senior Cyber Insider Threat Analyst Resume Examples & Samples
- Develop and Document Forensic Standard Operating Procedures
- Conduct hands-on analysis of computing devices (endpoint, mobile) as part of active investigations
- Investigate user behavior using multiple data sources and systems of record (logs, computer evidence)
- Use data visualization tools and database methods (SQL) to identify elevated insider threat concerns
- Implement and test new forensic applications and solutions
- Review user activity within User Activity Monitoring tools
- Respond to requests for investigative support from business stakeholders
- Gather evidence related to outside subpoena from law enforcement or regulatory agencies
- Manage inventory of forensic evidence and case management (virtual and physical)
- Compose official reports documenting investigative findings
- Ability to collect, analyze, interpret, and document computer forensics findings
- Ability to forensically process mobile devices
- Ability to review technical logs and archives (such as e-mail) to research activities that present risk to the firm
- Bachelor’s degree in Computer Science or related field, or equivalent work experience REQUIRED
- Minimum 5-7 years of overall experience in IT security REQUIRED
- Minimum 3 Years of Computer Forensic or Cyber Investigative experience REQUIRED
- Experience with Windows, MacOS, Linux, iOS
- Industry recognized forensic certification such as EnCE, ACE, CFCE
- Experience with Data Loss Prevention (e.g. Vontu, McAfee, Websense) or SecurityLogging (ArcSight, Splunk)
- Forensic Related Certification – EnCase EnCE, Access Data ACE, CCE – Certified Computer Examiner, CFCE – Certified Forensic Computer Examiner
3
Senior Cyber Resume Examples & Samples
- Work with global product teams to identify potential security vulnerabilities, where the weak points in the systems are, create a risk profile of the system, then assess & implement proposed solutions that eliminate identified vulnerabilities
- Work with the global engineering teams to establish cyber security design policies and ensure that these policies are incorporated into product design, with requirements traceability and system validation and verification
- Communicate regularly with management about the legal and regulatory requirements for cyber-security, risk assessments on new product introductions and new technological adoption
- Attend relevant training sessions, conferences, and summits that focus on cyber-security methodologies including
4
Senior Cyber SME Resume Examples & Samples
- Interface with cyber security subject matter experts to gather inputs and develop policy analysis and reports
- Provide planning, documentation, logistics, and execution support for public-private cyber security and risk management meetings and events
- Engage in public-private collaboration efforts to enhance cyber security capabilities within the energy sector
- Track, report, and address requests pertaining to public-private collaboration efforts and cyber security programs
- A Bachelor’s degree with 10 years’ experience in cybersecurity and risk management best practices and Program process management experience
- Understanding of energy sector cyber security and critical infrastructure protection best practices with either NEI 08 09 or NERC CIP
- Cyber security compliance, regulatory assurance or Industrial controls experience
- Experience in assisting public-private collaboration efforts
- Experience developing or analyzing public policy
- Experience in designing and implementation of standards and best practices
- Aptitude for working autonomously and prioritizing
- Team player with the ability to work in a fast-paced environment workload to achieve goals
5
Senior Cyber Threat Defense Analyst Resume Examples & Samples
- Real-Time “eyes on glass” monitoring
- Review alerts from SIEM
- Escalate suspicious activities and anomalies
- Provide feedback to SIEM administration on tuning and configuration
- Certificate of good conduct (Erkölcsi bizonyítvány)
- Experience in analysis of security events/incidents
- Ability to make information security risk determinations
- General knowledge of TCP/IP, Routing/Switching, UNIX/LINUX & Windows
- Understanding of common network services
- Good English knowledge (verbal and written)
- Network security related certificate (CCNA, CCSA)
- Holder of relevant security-focused certifications (CISSP,GCIA/GCIH, etc.)
6
Senior Cyber SME Resume Examples & Samples
- Providing advice and recommendations on the direction, implementation, and management of electric and smart grid cybersecurity activities under the relevant Federal and Departmental regulations and policies
- Advising on the cyber risks and infrastructure impact of issues that may affect the reliability of the grid, or national security
- Providing Smart Grid cybersecurity and other advisory, analysis, and research and other support to the Senior Advisor for Cyber Security
- Engaging and collaborating with industry, government agencies, state agencies, utilities, NIST, DHS, NERC, FERC and other key parties to understand the cyber security vulnerabilities, risk, opportunity and structure of the electric and smart grid
- Creating and maintaining documentation for the electric and smart grid cybersecurity activities and program including strategic and action plans, risk assessment, architecture, and threat statement
- Developing and recommending options for program improvements, performance measures, planning strategies, and reporting requirements
- Planning and conducting special studies, research, and quick response to requests from the Senior Advisor for Cyber Security relative to electric and smart grid cyber security issues
- Identifying and researching electric and smart grid cyber security issues and assists in developing and implementing related Departmental initiatives
- Supporting liaison activities between the Office of Intelligence on electric and smart grid cyber security issues
- Active Top Secret DOD Clearance, or DOE-Q Clerance
7
Senior Cyber Incident Analyst / Lead Resume Examples & Samples
- Demonstrates knowledge of the following security related technologies: IPS, IDS, SIEM, firewalls, DNS, encryption, HIDS, NIDS, proxies, network packet analyzers, malware analysis, forensic tools, and enterprise level appliances
- 10 or more years CND Incident Response experience
- 5 or more years CND Incident Response experience in DOD or IC
- Demonstrate a strong knowledge of the Windows operating system, knowledge in various Linux distributions and the Unix framework
- Demonstrate a deep understanding of various open source and commercial analysis tools used for incident analysis, both network and host based
- Demonstrate expert-level knowledge and supervision of employees of various labor categories and skills in efforts similar in size and scope as this acquisition
- Demonstrate experience in a DOD or IC IT environment
- Demonstrate expert-level knowledge in planning, directing, and managing Computer Incident Response Team (CIRT) operations in an organization similar in size to this acquisition
- Demonstrate experience with computer forensic analysis
- Demonstrate experience in an IT development environment
- DoD 8570 IAT Level III CND Analyst certification or ability to become compliant within six months
8
Senior Cyber Range Engineer Resume Examples & Samples
- Provides technical guidance for directing and monitoring information systems operations. Designs, builds, and implements network systems
- Directs compilation of records and reports concerning network operations and maintenance. Troubleshoots network performance issues; Analyzes network traffic and provides capacity planning solutions
- Monitors and responds to complex technical control facility hardware and software problems. Into-faces with vendor support service groups to ensure proper escalation during outages or periods of degraded system performance
- Manages the purchase, testing, installation, and support of network communications, including LAN/MAN/WAN systems
- Performs system-level design and configuration of products including determination of hardware, OS, and other platform specifications
- Plans large-scale systems projects through vendor comparison and cost studies
- Performs a variety of systems engineering tasks and activities that are broad in nature and are concerned with major systems design, integration, and implementation, including personnel, hardware, software, budgetary, and support facilities and/or equipment
- Provides quality assurance review and the evaluation of new and existing software products
- Provides assistance and oversight for all information systems operations activities, including computer and telecommunications/communications operations, data entry, data control, LAN/MAN/W AN administration and operations support, operating systems programming, system security policy procedures, and/or web strategy and operations
- Provides input to policy level discussions regarding standards and budget constraints
- Supervises all personnel engaged in the operation and support of network facilities, including all communications equipment on various platforms in large scale or multi-shift operations
- Supervises complex operations that involve two or more additional functions such as but not limited to network operations, systems security, systems software support, and production support activities
- Monitors and responds to hardware, software, and network problems
- Provides the routine testing and analysis of all elements of the network facilities (including power, software, communications machinery, lines, modems, and terminals)
- Utilizes software and hardware tools and identifies and diagnoses complex problems and factors affecting network performance
- Troubleshoots network systems when necessary and makes improvements to the network
- Provides configuration management planning
- Describes provisions for con figuration identification, change control, configuration status accounting, and configuration audits
- Regulates the change process so that only approved and validated changes are incorporated into product documents and related software
- 7-10 years of test experience
- 10+ years specialized technical experience
- Effective Team Leader with above average interpersonal skills
- Demonstrated ability to interact on a daily basis with all levels of personnel from junior level test engineers to capability developers to the Contracting Officer's Technical Representative (COTR)
- Preparing documentation for technical and process projects, and briefs
- Reviewing requirements, writing and operational test plans, reports and conducting data analysis and develop and write final reports
- Familiarity with and ability to apply AFI 99-103, AFSPCI 99-103, AFSPCI 10-170, AFSPI 10 260, CJCSI 6212, instructions and guidance
- Ability to work in a high energy and dynamic technical environment
- Highly proficient with all Microsoft Office Products
9
Senior Cyber Vulnerability Analyst Resume Examples & Samples
- Bachelor's degree and 12+ years of experience in Information Technology, including Cyber Security. Additional experience or certification may be considered in lieu of degree
- Experience in planning mitigations for systems vulnerabilities
- Experience acting as a Subject Matter Expert or team lead providing guidance to others
- Strong communication skills; person in this role must be able to successfully communicate with management personnel, technical personnel and third parties
- Active Secret clearance is required
10
Senior Cyber Consultant Resume Examples & Samples
- You will hold technical expertise in; secure systems design, assurance, governance & risk, compliance and cyber security strategy
- As a trusted advisor you will support Thales’ clients to survive and thrive in a difficult Cyber Threat environment by providing business focussed technical guidance to organisations to combat these threats
- This position reports to the Cyber Security Capability Lead undertaking Cyber Security architecture and consultancy projects for customers in the Nuclear, Automotive, Government, Rail and Aviation industries
11
Senior Cyber Vulnerability Engineer Resume Examples & Samples
- Lead a team performing computer network exploitation: embedded and software reverse engineering (RE), vulnerability research (VR), and application development for software and embedded systems
- Solid understanding of PC and embedded systems architecture from bios/Boot ROM through OS and application layers
- Develop software tools to support Reverse Engineering and Vulnerability Research
- Develop specialized software/firmware modules to run on embedded hardware that communicate across native communications channels
- Conceive of and lead innovative R&D programs that address our clients' future needs
- Participate in business development, capture, and proposal efforts through technical discussions and writing
- M.S. in a computer science, computer engineering, or systems engineering
12
Senior Cyber Hunt Engineer Resume Examples & Samples
- Architect innovative autonomous cyber defense solution to meet operational requirements
- Collaborate with operational stakeholders to collect, refine, and resolve requirements
- Integrate solution into cyber weapons systems consisting of multiple frameworks to included, but not limited to: Elastic Stack, Splunk, Cyber Situational Awareness and Analytic Cloud (CSAAC), Metasponse, and/or other cloud-based architectures
- Engineer infrastructure to replicate cyber weapon system components and subsystems, and maintain research, development, test, and evaluation (RDT&E) environment
- Design and execute end-to-end DevOps process for continuous integration coupled with test automation
- Use high-level scripting/programming language to support the development of endpoint sensor component and analytic bridge component
- Analyze threat intelligence (e.g. actors, hack tools, exploits, malware, etc.), determine techniques, tactics, and procedures (TTPs) of Threat Actors, and engineer effective countermeasures within an autonomous context
- Support the development of innovative cyber data analytic techniques for automatic correlation of advanced threats and indicators of compromise
- Translate analytical findings into security “use cases” that can be implemented within the autonomous solution
- Collaborate with other developers, testers, and system engineers to ensure quality product deliverables
13
Senior Cyber Strategist Resume Examples & Samples
- Apply strategic insights to a growing industrial cyber security business
- Provide oversight and leadership to assist internal stakeholders and external customers with critical cyber security management decisions as related to business processes, security controls, policies and standards, regulations and investment prioritization
- Accumulate and analyze risk/exposure data and lead the development and delivery of industrial cyber security offers
- Recommend go-to-market, customer acquisition and channel partner strategies
- Lead and support customer engagements, focused on cyber risk strategy, program stand-up and technology selection
- Apply advanced data analysis techniques statistics and data mining to solve core business challenges, capture cyber security requirements and translate them into customer offers
- Produce and organize persuasive outputs leveraging multiple formats, including Excel-based models and PowerPoint
- 7+ years of experience in a strategy role or consulting organization
- Support experience creating and defining specific consulting and service offerings
- Develop campaigns to create awareness and increase offer adoption
- Experience with financial modeling, statistical analysis, data mining or value chain analysis
- Knowledge of risk control frameworks like NERC-CIP, NIST 853, FISMA, SANS
- Ability to work on fast-paced customer engagements, including outside of business hours
- Minimum BA or BS degree from an accredited university
- Preferred MBA or MA/MS degree in related field, including data analytics, risk assessment, cyber technology, statistics
14
Senior Cyber Application Specialist Resume Examples & Samples
- Involvement in the entire System Development Lifecycle
- Responsible for the design, architecture, development, integration, unit test, installation, configuration, integration, deployment and maintenance to include: HBSS components, agent modules, approved policies and ArcSight components, connector distribution & maintenance and ESM 6.x filter & channel configuration
- Perform troubleshooting of components and applications
- Maintain the latest configurations to address known exploits using the Host Intrusion Prevention System (HIPS) and collect required security events
- Develop automated reporting dashboards within the existing system to provide near real-time reporting of computer system compliance information and maintain overall visibility for all connected assets
- Modify the operational parameters (filters, signatures, rules, etc.) when requested
- Perform regular required reporting, monitor applicable security resources for updated requirements and compliance directions
- This position requires an active (or the ability to obtain) U.S. Security Clearance, for which the U.S. Government requires U.S. Citizenship
- This position requires a CURRENT SECRET CLEARANCE
- Requires a minimum of a technical Bachelor's Degree
- DoD 8570 certification atIAT Level III or higher (such as CISSP, CASP, CE, CISA, GCED, or GCIH
- Group Policy experience and software development is a plus
- Technical document preparation skills and verbal communications are required for presentation of technical information assurance issues and reports to senior government and military officials
- User/real-world experience with ePO, HBSS and its various Windows/Linux Point Products
- Experience resolving upgrading major versions of HBSS to include: compatibility issues, applying patches, installing hot fixes and hardening Windows/Linux servers/workstations
- User/real-world experience with ArcSight, ESM, Loggers and Connectors
- Experience resolving upgrading major versions of ArcSight to include: compatibility issues, applying patches, installing hot fixes, connector distribution & maintenance and ESM 6.x filter & channel configuration
15
Senior Cyber Mobile Device Analyst Resume Examples & Samples
- Mobile Threat Analysis
- Real-world experience with top MDM solutions
- Strong background in Security Event Analysis
- Experience testing security of MDM configurations
- Experience performing Mobile malware analysis
- Experience working with Blackberry, Android, and IOS
- Network Forensics Analysis
- Experience with log correlation utilities like SPLUNK or Elastic Search
- Experience reviewing network traffic logs to identify malicious activity
- Experience reviewing and hardening network configurations
- Experience with Snort or other network-based signature development
- Monitoring using commercial tools
- BRO scripting experience is a big plus
- Static Binary Analysis
- Use of industry standard tools
- Experience with one or more programming languages, preferably at least one high level and one low level language. Examples include Python, Java, C, and x86 ASM
- Dynamic Binary Analysis
- Experience with Disassemblers and Debuggers
- Host Forensic Analysis
- Experience with tools like EnCase, FTK, Volatility
- Experience with Yara, OpenIOC, or other host-based signature development
- Experience across multiple platforms (Windows, Linux, Mac, iOS, Android)
16
Senior Cyber IA Analyst Resume Examples & Samples
- Requires a Master’s Degree and a minimum of 10 years of related experience
- Must be able to obtain and maintain IAT level II or higher
- Knowledge and experience with Defense Information Systems Agency (DISA) Security Implementation Guides (STIG) and Security Readiness Review (SRR) for multiple operating systems (Windows 2000/XP/2003, UNIX, Linux Red Hat), software applications (Oracle, SQL), web technologies (Apache, MS IIS), and cloud computing services and application
- Knowledge of FedRAMP program and accreditation process
- Knowledge of NIST or DoD certification and accreditation process
- Knowledge of continuous monitoring process
- Knowledge of Windows 2000/XP/2003, TCP/IP, LAN networking, and cloud computing services. In-depth knowledge of DoD IA Directives: DoDD 8500.1; DoDI 8500.2; DoDD/I 8530.1/.2, DODD 8510.01, DIARMF, NIST 800-53, NIST 800-37
- Knowledge of ISO/IEC standards, such as 17025, 17043 and 15089
- Conceptual understanding of multi-level security environments and devices used to achieve dissemination of releasable information from US to bi-lateral networks and techniques and security devices used achieve the establishment of Communities or Interest (COIs), i.e. separation of data
- Experience as a system administrator working in multiple environments is highly desirable
- Possess strong writing and communication skills
- U.S. Citizenship and Top Secret Clearance
17
Senior Cyber Threat Engineer Resume Examples & Samples
- Gathering cyber-security intelligence from a variety of internal monitors and external sources (e.g. government agencies, financial community, computer security community)
- Assessing the bank’s networks and systems to detect vulnerabilities & security configuration deficiencies
- Analyzing potential threats against the bank’s computing environment
- Recommending security improvements to other teams and departments within the bank
- Detecting anomalies, malware infections and intrusion attempts, and responding appropriately
- Escalating significant security events to executive leadership appropriately
- Sharing cyber-security intelligence data with internal and external partners (e.g. government agencies, financial communities) when appropriate
- Ensuring team members are trained on the latest cyber-security trends, threats and applicable technologies
- Implementing and managing the tools necessary to support the team’s mission
- Banking/financial services experience
- Systems Administration and Information security experience in medium/large enterprise environments
- Experience with scripting languages (e.g. Python, PERL, etc.)
- Cisco Routing/Switching, Checkpoint Firewalls, McAfee Security Technologies, RACF, UNIX/LINUX
- Industry certifications in cyber security and forensics, such as Certified Ethical Hacker (CEH), GIAC Security Essentials (GSEC), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), Security + and other related credentials
18
Senior Cyber Incident Analyst Responder Resume Examples & Samples
- Perform real-time proactive security monitoring and reporting on various security enforcement systems, such as SIEM, Anti-virus, Internet content filtering/reporting, malcode prevention, Firewalls, IDS & IPS, Web security, Anti-spam, etc
- Perform the role of primary Incident Coordinator for all IT Security events requiring focused response, containment, investigation, and remediation
- Manage and execute first-level responses and address reported or detected incidents
- Report to and coordinate with external organizations and authorities
- Coordinate and distribute directives and vulnerability and threat advisories to identified consumers
- Provide daily summary reports of network events and activities and delivers metric reports
- Must possess a Bachelor’s degree with a minimum of 9 years related technical experience
- Must possess experience working cyber incident management
- Must possess threat/network defense and troubleshooting experience
- Must possess security certification
19
Senior Cyber Response Analyst Resume Examples & Samples
- The Cyber Response Senior Analyst is a member of the Cyber Security Operations Centre with primary responsibility for responding to events. Responsible for the identification, management and mitigation of security events as detected by monitoring, internal and external intelligence, vulnerability assessment and internal problem management tools and procedures
- Act as part of the team in relation to identified events for the relevant technical support groups, businesses at risk and Service Recovery teams – both, internally and externally
- 4+ years experience with security processes and technologies, including threat analysis, vulnerability assessment, security monitoring, compliance auditing and IDS
- 4+ years experience in following incident response procedures and standards, strong communication skills and ability to articulate events to senior management
- 2+ years experience working with security mechanisms associated with Windows or UNIX operating systems, switched networks, application and databases
- Demonstrated ability to solve complex problems
- Extensive experience in responding to information security and privacy incidents
- Can discuss their role, security related trends and outline functional implications
- Has an understanding of emerging security technologies
- Experience with securing information for cross-functional, cross-platform applications
- Monitors marketplace trends and experiences on security, audit and control issues
- Follows processes for what should be communicated, when and to whom
- Actively seeks ways to understand, mitigate, and/or reduce risks
- Ability to communicate clearly and concisely
- Ability to shift from task to task
- Ability to work concisely when under pressure or with extremely tight timescales
- Good understanding of the Barclays’ business unit responsibilities and structure
- Appreciation of risk mitigation by both technical and non-technical measures
- Understands the importance of effective technical documentation in identifying and managing IT security risks
- Knowledge of the full spectrum of application control techniques
20
Senior Cyber Sec Analyst Resume Examples & Samples
- 2 to 3 years of experience in Android / IoS app testing with web app pen testing
- Having Bachelors degree in any discipline
- Good understanding of security development lifecycle processes
- Automated Whitebox Fuzz testing using SPIKE, PEACH and/or Other COTS Tools
- Knowledge of open source Ethical hacking tools (Kali)
- Expertise on Mobile Application & Platform penetration testing experience (Android, IPhone & Windows versions)
- Ability to work within an International team
- Knowledge on domain understanding about the HVAC / Fire control systems, controllers, field instruments, cameras, industrial networks, sensors etc
21
Lead / Senior Cyber Developer Resume Examples & Samples
- Self-leader, self-thinker, needs little direction, ability to work in a dynamic team environment, proven communication skills and client customer support
- Strong written and oral skills
- Willingness to explore new or unfamiliar technologies
- Experience with Microsoft SharePoint and leveraging web services preferred
- Experience with agile development methodologies preferred
- Experience with DIACAP, Risk Management Framework, or NIST preferred (especially regarding policy compliance)
- Experience with XML and XML based standards preferred (especially security standards such as SCAP, XCCDF, OVAL, and OCIL). Knowledge of XML schema validation and namespaces, etc
- Travel: Up to 10% is possible
- An understanding of the complete software life cycle
- Ability to analyze customer requirements and translate them into a design
- Demonstrated understanding of technical documents describing systems and processes, and demonstrate an aptitude and willingness to keep technical skills current by learning new languages, operating systems, hardware, tools, and technology
- Relevant training in software design and development
- Assist in software product evaluation
- Provide time estimates for assigned tasks
- BA/BS in Information Systems Management, Computer Science or related discipline plus 8 to 12 years of experience. In lieu of formal education, at least 18 years of related experience. Specific contract requirements regarding education and experience will prevail
- Secret clearance. Candidates that do not have a clearance will undergo a government background investigation and must meet the requirements for access to sensitive government information if selected for position
- OS Certification/Approved Training completed within 180 days of hire
- Web Services
22
Senior Cyber Threat Engineer Resume Examples & Samples
- 5+ years of relevant consulting or industry experience
- Must have experience with technical instruction for ethical hacking principles and techniques
- Active SECRET Security clearance required
23
Senior Cyber Watch Analyst Resume Examples & Samples
- Lead for network operations center
- Sponsor experience
- Relevant certification
24
Senior Cyber Insider Threat Analyst Resume Examples & Samples
- Must be able to support team case management by working with customers to quickly understand and document their requirements to ensure rapid completion of tasks
- Decrypt and perform forensic acquisitions of digital media while assisting with the shipment and receipt of digital evidence and other items
- Able to collect, correlate, and display complex metrics depicting notable Insider Threat activities and suggest actionable items to reduce risk for the business
- Utilize data mining tools to collect, search, sort, and organize large amounts of electronic information
- Produce high quality reports presenting complex technical matters clearly and concisely
- Examine the timeline of notable incidents and identify precursors for data leakage
- Review all available data to further develop and improve the threat scenario’s and use cases
- Work closely with Information Security architecture and engineering to develop new tools and techniques for predicting, detecting and preventing insider threats
- Continually evaluate changes to actor tactics, techniques and procedures to ensure technology strategy maintains pace with a changing cyber insider threat landscape
- At least 3-5 years of relevant insider threat, intelligence, or investigative experience
- Demonstrated success in close working collaboration with cyber security, intelligence, HR, and Legal
- Experience using analytical skills and an ability to interpret established standards and guidelines to solve problems
- Good understanding of possible methods of internal and external data movement
- Ability to navigate a complex global network to identify intelligence and detection sources
25
Senior Cyber Threat Modeling Engineer Resume Examples & Samples
- Continue to develop and expand the proposed IC ITE threat modeling concept and conduct socialization activities within the community
- Select the best of breed and gain sponsor support to implement a prototype demonstrating the value of the threat model
- Demonstrated knowledge of cyber threats at all levels of sophistication, including a detailed understanding of adversary tactics, techniques, and procedures (TTPs)
- Knowledge of software development, either to code or to lead developers
- Ability to socialize new concepts with senior Government sponsors as well as the larger Intelligence Community
26
Senior Cyber Hunt Team Analyst Resume Examples & Samples
- Providing situational security awareness by combining information from a variety of systems and normalizing / correlating the information
- Assisting Customers and key stakeholders with security related issues and advice including escalating and explaining severe security incidents verbally and in writing. Defining toolset requirements, supporting the selection of appropriate tools and in some cases developing in-house capability to support the needs of the Advanced Analytic team's long term strategy and technology roadmaps
- Experience of using ITIL compliant processes
- Experience of network anomaly detection using traffic analysis or network intruder detection systems
- CISSP, GIAC (GSEC), GCIH, CEH, CHFI or related security certifications would be of advantage as would previous experience of working as part of a hunt team
- Knowledge or experience of following would be an advantage SANS, GIAC, GCIA, SANS, GIAC, GCIH, CISSP, CCNA, MCSE
- ITIL Intermediate Course in Service Operations or OSA
- Experience as a Security Analyst
- A proven track record of delivery in a multi-disciplined environment
- Demonstrable experience of security related incidents and work requests
- Familiarity with industry leading security products
- Knowledge of Full Packet Capture or SIEM toolsets and Intrusion Detection Systems
27
Senior Cyber Resume Examples & Samples
- Will function as a senior SME and has the ability to identify conflicts between the need for DoD USTC and Military Service systems functionality and CYBER requirements. The candidate will be able to guide all parties to a conflict resolution
- Must have familiarity with and hand-on experience with planning and scheduling of DoD Blue Teams (vulnerability assessments) Green Teams (specialized training events) and Red Team (Cyber OPFOR) during the DoD JELC Cycle
- Selected candidate will be responsible for providing CYBER technical support of DoD, USTC and Military Service during DOT&E Exercise events. The includes staffing of Standing ground Rules/Rules of Engagement for all Blue/Green/Red Teams for CRC events
- Must be able to manage Cybersecurity readiness campaign (CRC) events and ensure the all campaign events are a part of the flow up to the designated Capstone Tier-1 exercise event. Must be able to plan, schedule and monitor the CRC events to include scheduling of Blue Teams/Green team and Red Teams ensuring the JITC and USTC needs are met
- Must be able to plan, schedule and monitor the Cybersecurity exercise readiness reviews in accordance with the DOT&E CAP Handbook ensuring the customer needs are met
- Must have exceptional verbal and written communications skills.As the JITC DOT&E USTRANSCOM LNO must be able to clearly communicate and defend the reported CYBER results in writing and verbally to Senior JITC, DOT&E, Military Service and DoD Agency Staff
28
Senior Cyber Vulnerability Analyst Resume Examples & Samples
- Excellent communication, meeting facilitation, interpersonal, and leadership skills
- 5+ years of Information Security experience
- Ability to mobilize and motivate teams; set direction and approach; resolve conflict; execute with limited information and ambiguity
- Must be able to translate vision/targets into strategic plans, and strategic plans into specific goals, tactics, action plans, and measures
- Ability to interact with and influence senior-level technical and non-technical subject matter experts
- Ability to assess an operational or security challenge/opportunity and determine best future state
- Strong functional and technical knowledge of information security capabilities
- Minimum 5 years of experience in technology-based Strategic Planning, or an equivalent practice
- Bachelor's degree, or higher, in Information Technology or related field
- Program/project management
29
Senior Cyber Secury Engineer Resume Examples & Samples
- Assume support and/or lead role in assigned projects insuring project delivered on time and within budget and to the satisfaction of the customer
- Keep technically current with the HPS networking and wireless product/systems portfolio, while maintaining expert knowledge on specific designated network disciplines
- Maintain cyber security certifications
- Maintain knowledge of current industry security standards such as IEC-62443, NERC CIP, ISO 27000, etc
- Maintain industrial safety awareness through the completion of pertinent safety certifications
- Bachelor’s degree in Information Technology/Computer Science or Engineering (Electronics, Instrumentation & Control) with minimum of 7 years experience. Familiarity in industrial automation network systems engineering is an advantage
- Cisco Certified Network/Design/Security Professional is an advantage
- CISSP Certified Information Systems Security Professional or similar security certification like CEH Certified Ethical Hacker is an advantage
- Proficient in Chinese-Mandarin & English (spoken & written)
- Experience in performing audits/assessments and design/implementation in Process Control System
- Experience with security scanners: nmap, Nessus and other open source tools
- Possess sound knowledge of Cisco Networking Switches & Firewall Devices
- Excellent troubleshooting skills to resolve complex network and or application or system integration issues
- Experience with virtualization preferably VMWare
- Knowledge of industry standards such as ISA-99/ISA-62443 and ISO/IEC 27001
- Added advantage Possess sound knowledge of Honeywell Experion DCS/SCADA, C300/C200 controllers, or any equivalent DCS/SCADA systems, RTUs, Fault Tolerant Ethernet, Graphics Designing, PLC configuration and scheduled maintenance activities in DCS/SCADA operations
- Experience in LAN/WAN architectures & related diagnostic tools
- Experience designing and optimizing complex LAN environments
- LAN/WAN and wireless networking principles and protocols including Ethernet, TCP/IP, VLAN, WLAN, Frame Relay, Firewall, DMZ, VPN, IDS, switches, routers, firewalls
- TCP/IP protocols – SMTP, SNMP, FTP, HTTP, SSH, SSL
- Experience Network Security – Firewall, ACL, IDS, IPS
- Specific experience in Cisco Routers, Switches, or Firewalls
- Microsoft – Active Directory, DNS, WSUS, Terminal Server
- Experience with anti-virus systems, backup & restore solutions, system management
30
Senior Cyber Advisory Specialist Resume Examples & Samples
- Client retention and growth
- Demonstration of deep technical understanding of Cyber/Network Security & Privacy, an Commercial and Technology Errors & Omissions, and Media. Utilizing risk expertise and knowledge of industry and insurance market place, reviews clients’ exposures and loss experience and develops solutions for complex clients’ needs
- Determines the impact of solutions and articulates the value to clients
- Reviews and assists with completion of client risk profiles
- Understands nuances of clients industry and the related risks associated with industry and provides advice accordingly
- Assists in the creation of the Renewal Strategy and Submission documents. Responsible for the final placement delivered to the client
- Identifies the need for new products and develops innovative solutions for clients
- Contributes to the firm’s body of knowledge within product line through active internal communication. Keeps abreast of changing risk and insurance market conditions
- Prepares client differentiation/marketing message
- Works with placement specialist on quote analysis and proposal preparation
- Reviews proposed submission and offers suggestions for improvement
- Coaches the client on underwriting meeting preparation
- Policy management activities and makes certain that follow up for policies, binders, review of policy against bound terms & conditions, request for corrections, if any, and delivery of reviewed policy to client has been done. Can be available to review policy with client
- Understands and complies with the Marsh Compliance and Transparency Standards
- Review and support creation of client stewardship document
- Provides technical expertise an assists in the delivery and presentation of RFP’s
- Addresses client inquiries as necessary
- Represents Marsh by speaking at client roundtables, industry roundtables and conferences
- Has superior technical, financial, written and verbal skills required to be an acknowledged expert sought out by Brokers, clients and other Marsh colleagues
- Superior knowledge of Marsh resources and the ability to lead them in a collaborative fashion
- Minimum of 7 years broking or related cyber or sales experience
31
Senior Cyber Syestems Engineer Resume Examples & Samples
- Advise, plan, support, and provide expertise regarding the implementation, scoping, capacity planning and administration of a complex Windows environment that includes Active Directory and Exchange
- Lead an Infrastructure Team in the configuration, installation, documentation, monitoring and maintenance of a Mixed Windows and Linux Environment
- Consult with the customer stakeholders and offer innovative solutions relative to the infrastructure
- Serve in an advisory role, providing subject matter expertise in the area of Windows Engineering, Directory Design and Implementation
- Advanced problem solving skills and ability to provide premier customer support and knowledge of internet services such as IP, DNS, WINS, DHCP, SSH and AD Sites & Services
- Present at customer review boards and should be comfortable with direct customer interaction
- Bachelor’s Degree in Computer Science or STEM degree field and a minimum of 9 years related experience. An additional 4 years of experience may be considered in lieu of a degree
- A minimum of an active Secret Clearance
- Advanced problem solving skills and ability to provide premier customer support
- Experience with windows SCCM
- Familiarity with scripting and automation experience (Power Shell, Perl, VB Script) is a plus for this role
- Experience with setup, configuration and upgrade of HP and IBM Blade enclosures
- Experience using Microsoft System Center (any or all of the modules)