Cyber Security Consultant Resume Example

Love this resume?

By clicking Build Your Own Now, you agree to our Terms of Use and Privacy Policy

Jessica Claire
Montgomery Street, San Francisco, CA 94105
Home: (555) 432-1000 - Cell: - - -
Professional Summary
A trained professional with great familiarity and hands-on experience in planning, coordination, and maintenance of an organization’s information security; his tasks involved training and education of internal users on topics linking to computer security to increase awareness on prevention of security breaches and be able to respond to cyber attacks, and, in some cases, gather data and evidence to be used in prosecuting cyber crime; his exposure involved installation of security software and network monitoring essential in today’ corporate scenario as cyber attacks have increased and became more sophisticated.
  • Core Competencies include:
  • System Architecture
  • Design Configuration Management
  • Linux Administration
  • Information Assurance
  • Hardware Installation
  • Project Management
  • Vulnerability Evaluation
  • System Troubleshooting
  • Managing multiple projects simultaneously
  • Team player
  • Documentation
  • Large computer networks
  • Investigations expert
  • Project planning and development
  • Extremely organized
  • Risk management processes and analysis
  • Team leadershipStrong verbal communication
Work History
05/2016 to Current
Cyber Security Consultant Ahead Dallas, TX,

Conducted security inspections and surveillance operations with other MIS team personnel.

Provided security protection to the Client’s data, documents, financial records and other relevant information.

Coordinated with law enforcement agencies on some reported cases of cyber crime.Conducted initial reviews of audit logs pertaining to critical information systems encompassing review of weekly-generated reports and identification suspicious activities.

Coordinated and delegated security assurance activities to subordinates; main tasks involved identification and gathering of evidences to verify compliance to approved security baselines for various operating systems and internal server databases.

Coordinated review of logs and user access data availability and programs for both regular and privileged users.

Assisted in the development and implementation of information security policies, laws, standards, and processes for corporate governance.

Drafted and edited prevailing internal regulatory compliance laws on email and network security.

Recommended hardware and software upgrades and purchase approvals to help secure the company’s valuable information and prevent Distributed Denial of Service (DDoS) attacks.Educated the employees on the procedures to be followed should they be faced with such individual attacks.

02/1999 to 05/2017
Physical Security Professional Securitas Security Services USA City, STATE,

Inspected security design features, installations and programs to verify compliance with applicable standards and regulations.

Conducted 4 security audits per month to identify potential problems related to physical security, staff safety and asset protection.

Supervised a team of 25 security personnel during a given shift.

Monitored and evaluated unit performance on key security issues, recommending corrective action programs where appropriate.

Advised security team and conducted investigations of significant threats and the loss or misappropriation of assets.

Analyzed and investigated all incidents alongside functional management and security supervisors.

Responded quickly to medical emergencies, bomb threats and fire alarms.     

Collected data and evaluated information, assisted with database queries.

Expected in 1998
Bachelor of Science: Computer Information Systems
Strayer University - Alexandria, VA
G.P.A. 3.4 / 4.0
Available upon request

By clicking Build Your Own Now, you agree to our Terms of Use and Privacy Policy

Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.

How this resume score could be improved?

Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume:


Resume Strength

  • Personalization
  • Target Job

Resume Overview

School Attended
  • Strayer University
Job Titles Held:
  • Cyber Security Consultant
  • Physical Security Professional
  • Bachelor of Science