LiveCareer-Resume

manager information security resume example with 8+ years of experience

Jessica Claire
  • , , 609 Johnson Ave., 49204, Tulsa, OK 100 Montgomery St. 10th Floor
  • H: (555) 432-1000
  • C:
  • resumesample@example.com
  • Date of Birth:
  • India:
  • :
  • single:
  • :
Summary

Results-oriented Cybersecurity and Information Assurance major currently attending Western Governors
University, with 9+ years of work experience. Aiming to leverage a proven knowledge of vulnerability
management, monitoring and responding to security alerts, Threat hunting and information security design skills to successfully fill the Chief Information Security Officer role at your company. Frequently praised as analytical by my peers, I can be relied upon to help your company achieve its goals.

Skills
  • Vulnerability and Risk Assessment
  • Strong interpersonal and Collaboration skills
  • Excellent written and verbal communication
    skills
  • Strong leadership skills
  • Health Insurance Portability and
    Accountability Act (HIPAA)
  • Fast learner and strong team player
  • Threat hunting and EDR protection
  • Excellent customer service skills
Experience
Manager, Information Security, 04/2021 - Current
Avanade Salt Lake City, UT,
  • Leads the design, review and maintenance of the organization's information security systems.
  • Review and recommend best practices of security configurations in Azure environment.
  • Manages vendors involved in IT to ensure appropriate vendor security compliance.
  • Leads the present SOC 1 type 1 audit presently on-going in the organization.
  • Review and recommend remediation to security vulnerabilities discovered in web applications by ZAP scanning.
  • Conducts security awareness training for old and new employees using knowbe4.
  • Conducts phishing campaign and simulation test, and recommend training to any staff that fails.
  • Communicates a company-wide cultural mentality regarding the importance of information security.
Cyber Security Engineer, 06/2020 - 04/2021
Iron Mountain Birmingham, AL,
  • Customized a comprehensive vulnerability management program, achieving weekly automated scans using Tenable Nessus.
  • Performs routine security risk assessment inline with the CIS framework and recommends appropriate mitigation or remediation.
  • Daily monitoring and review of logs from enterprise anti-virus tool and SIEM.
  • Capitalizes on threat intelligence from enterprise anti-virus platform, investigate alerts to determine false positive, normal behaviors and real incident.
  • Enhances continuous monitoring of endpoints, systems and network for possible security incidence and promptly mitigate such.
  • Enhances threat detection and regularly search for presence of any known IOCs within the enterprise environment.
  • Lessened business impact of emerging security threats, vulnerabilities, and risks by deploying appropriate security solutions.
  • Handles phishing campaigns and general security awareness within the enterprise.
Sr Cyber Security Engineer, 02/2015 - 10/2019
Exelon Delta, PA,
  • Led teams of up to 4 people in developing and implementing security systems, resulting in 98% fewer threats over resulting from false negatives.
  • Capitalized on monitoring the use of data files and regulated access to protect secure information to determine any internal attempted breach.
  • Configured and monitored network-based security solutions such as firewalls, intrusion prevention and detection systems.
  • Worked closely with business and technical stakeholders to select and help implement security controls as outlined within information security policy and regulatory framework.
  • Achieved security test scenarios for systems, functions, integration and acceptance testing.
  • Recommended best practices for security controls with effective change management.
  • Enhanced provisioning, modifying and de-provisioning of user's accounts in line with enterprise IAM policy.
  • Conducted security audit review (Payment Card Industry Data Security Standard).
Cyber Security Analyst, 03/2012 - 01/2015
General Dynamics Linthicum, MD,
  • Monitored computer virus reports to determine when to update virus protection systems.
  • Achieved documenting risk findings and suggested mitigations in a concise manner that can be clearly communicated to relevant parties.
  • Conducted security audits to identify vulnerabilities in operational processes.
  • Integrated with the team that periodically assessed the enterprise's ability to respond to incidents from cyber attacks.
  • Worked with compliance and audit teams to determine audit scope, testing requirements and objectives.
  • Amplified solutions that met security standards while ensuring functionality for business continuity.
  • Collaborated with third-party payment card industry (PCI) compliance partners.
Education and Training
Master of Science: Cybersecurity And Information Assurance, Expected in 12/2021
-
Western Governors University - Salt Lake City, UT
GPA:
Status -
Bachelor of Science: Agriculture, Expected in
-
University Of Benin - Benin City, Edo State, Nigeria,
GPA:
Status -
Certifications
  • Certified Information Systems Security Professional (CISSP), (ISC)2
  • Certified Information Systems Auditor (CISA), ISACA
  • Information Technology Infrastructure Library (ITIL), AXELOS
  • Certified Data Privacy Practitioner (CDPP), NETWORK INTERLLIGENCE
  • AWS Certified Security-Specialty (AWS CSS), AWS
,

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

Your data is safe with us

Any information uploaded, such as a resume, or input by the user is owned solely by the user, not LiveCareer. For further information, please visit our Terms of Use.

Resume Overview

School Attended

  • Western Governors University
  • University Of Benin

Job Titles Held:

  • Manager, Information Security
  • Cyber Security Engineer
  • Sr Cyber Security Engineer
  • Cyber Security Analyst

Degrees

  • Master of Science
  • Bachelor of Science

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in:As seen in: