Jessica Claire
  • , , 609 Johnson Ave., 49204, Tulsa, OK 100 Montgomery St. 10th Floor
  • Home: (555) 432-1000
  • Cell:
Professional Summary

Information Security Manager Experienced, dedicated security professional with exceptional business-to-technical communication skills. Analytical information security professional with over 20 years of success leveraging best practices and sophisticated technological tools to protect organizations’ information on-prem and in the cloud. Proven expertise in business continuity planning, process re-engineering and systems improvement. Exceptional proficiency in planning and executing all phases of system development life cycle with remarkable knowledge of system architectural styles and exemplary integration. Superb technical skills. Collaborative, communicative and proactive; effectively build and steward relationships with internal and external stakeholders to meet company objectives.

  • Information Threat Mitigation
  • Enterprise Risk Management
  • Information Assurance (IA)
  • Assessment and Authorization (AA)
  • Business/Technology Integration
  • Policy and Procedure Design
  • Vulnerability Analysis
  • PenTesting
  • Gap Analysis
  • Business Continuity
  • Information Systems
  • System Security Plans
  • Risk Assessment
  • Security Implementation
  • Certification And Accreditation
  • Maintain Documentation
  • Risk Management Framework
  • Developing Security Plans
  • Maintenance
Work History
Information Security Manager, 07/2019 to Current
Apple Inc.Odessa, TX,
  • Prepared and maintained regular system assessment and evaluation documents, and architected remediation controls to neutralize vulnerabilities increasing security postures by over 20%
  • Continuously monitored corporate networks and systems for various threats, including viruses, ransomware, cyber espionage and insider sabotage.
  • Created plan of action to follow in case of data breach or cyber attack, reviewing and updating procedures on weekly basis.
  • Reviewed existing technical specifications to identify and eliminate potential security flaws and weaknesses.
  • Led security team during migration of data center to AWS cloud leading to over $3m savings.
  • Monitored daily operations for accuracy of regulations, terms and conditions as well as policies and procedures.
  • Assessed security measures against government policies and regulations.
  • Verified continuous update of systems and immediately patched vulnerabilities to prevent security issues.
  • Oversaw user provisioning efforts, verifying credentialing policies, security and maintenance to encourage safe sign-ins.
  • Applied cybersecurity best practices to information system standards, directives and guidance for all personnel, monitoring compliance across organization.
  • Worked closely with management teams to plan, develop, coordinate and execute technical strategies aligned to client's vision, mission and purpose.
  • Coordinated with management teams to plan, develop, align and execute strategies that would meet client's vision, mission and purpose.
  • Identified computer hardware and network system issues, performing troubleshooting techniques for remediation.
  • Led and assisted technical upgrade projects for clients by working and coordinating with consultants and developers for integrations.
  • Interviewed, hired, trained and mentored three staff by coaching daily, leading performance reviews and offering constructive feedback.
  • Guided implementation of company-wide enterprise security strategy for network and hardware, disaster recovery, data protection and endpoint protection.
  • Analyzed network security and current infrastructure to assess areas in need of improvement and develop solutions.
  • Played key role in on-going network design, reevaluation and optimization to keep pace with company growth.
  • Analyzed architecture design, scoping, implementation, testing and deployment needs to define project requirements.
  • Delivered effective integrations of warehouse management system software applications to centrally manage tasks.
  • Created cybersecurity best practice communications to educate staff against known threats and potential vectors of attack.
  • Developed and maintained incident response protocols to mitigate damage and liability during security breaches.
  • Participated in creation of device hardening techniques and protocols.
Cybersecurity Analyst, (Contractor), 04/2016 to 06/2019
RivianSalt Lake City, UT,
  • Assess diverse clients’ information technology security status, evaluated IT security control risks leveraging NIST SP 800-53a rev 4.
  • Document risk assessment Security Requirements Traceability Matrix (SRTM) to determine each system that complies with Federal Security Standards and review security logs.
  • Prepare security assessment reports that clearly document findings and recommendations resulting from security controls assessments.
  • Prepare Plan of Actions and Milestones (POA&M) as management tool for tracking mitigation of cyber security program and system-level weaknesses based on SAR findings and recommendations.
  • Continuously monitor asset vulnerabilities based on prioritized vulnerability list and address any and all critical weaknesses in system(s).
  • Track security authorization documentation for assigned systems and keep them accurate and updated, including lists of assets (hardware/software), accurate boundary diagrams, ports and protocols.
  • Implemented security policies for client that reduced cyber security incidents by over 50%.
  • Using Veriato360, evaluated user activities to determine potentially abuse of privilege or unauthorized access.
  • Recommended mitigating strategies to clients’ IT infrastructure in relation to low/high-level security events, reducing exposures by over 30%.
  • Customized compliance requirements for scans with PCI/HIPAA policy manager for server and firewall devices to meet client’s specific compliance controls and supported over 500 customers.
  • Established automated patching process Nessus identified vulnerable devices.
Technical Security Specialist, 05/2012 to 08/2018
  • Evaluated security processes, tools and practices and reported them to CISO.
  • Assessed effectiveness of available solutions and identified gaps in security protection.
  • Collaborated with internal and external partners to address ‘non-patch based’ vulnerability remediation.
  • Leveraged tools including social engineering to assess physical and technical vulnerabilities.
  • Utilizing RSA Archer, developed incident response processes and procedures based on NIST.SP.800-61r2, improving incident response times by over 30%.
  • Prepared, configured and managed Palo Alto PA-500 firewall device leading to reduction of network threats.
  • Reduced attack surface by over 50% after implementing Tripwire IP360 integrated with Tripwire Enterprise for risk assessment.
  • Utilized SPLUNK, conducted and triage anomalous events fed from Websense Triton endpoint Data Loss Prevention package.
  • Proactively preventing unintentional data loss.
  • Implemented security measures on new banking system, supporting over 750k online customer account inquiries per day, reducing costs by 15%, and increasing inquiries capacity by over 500%.
  • Enforced IT security policies to ensure full compliance with Sarbanes-Oxley (SOX) and Payment Card Industry Data Security Standards (PCI DSS) regulations.
  • Managed relationships with third-party intrusion detection system providers.
  • Monitored confidential company data and mitigated hacking through network systems updates.
Master of Science: Cybersecurity, Expected in 08/2018
Liberty University - Lynchburg, VA
Master of Science: Accounting, Expected in 08/2015
Liberty University - Lynchburg, VA
MBA: Banking & Finance, Expected in 08/1999
Enugu State University - Enugu, Nigeria,
Bachelor of Science: Computer Science, Expected in 1988
University of Lagos - Lagos, Nigeria,
  • Certified Information Systems Security Professional (CISSP)
  • AWS Certified Security Specialty
  • Scrum Master
  • MCP - Microsoft Certified Professional

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy


Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.

How this resume scorecould be improved?

Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume:

resume Strength

  • Clear Contact Info
  • Completeness
  • Formatting
  • Measurable Results
  • Personalization
  • Strong Summary
  • Target Job
  • Word Choice

Resume Overview

School Attended

  • Liberty University
  • Liberty University
  • Enugu State University
  • University of Lagos

Job Titles Held:

  • Information Security Manager
  • Cybersecurity Analyst, (Contractor)
  • Technical Security Specialist


  • Master of Science
  • Master of Science
  • MBA
  • Bachelor of Science

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: