Jessica Claire
  • , , 100 Montgomery St. 10th Floor
  • H: (555) 432-1000
  • C:
  • Date of Birth:
  • India:
  • :
  • single:

I'm a well rounded security professional with over 20 years of experience in information security. I have experience in incident response, forensics, penetration testing, security architecture, and security leadership as a CISO for a financial institution.

I teach security leadership classes for the SANS institute (

MGT514: Security Strategic Planning, Policy, and Leadership

MGT512: Security Leadership Essentials for Managers

I'm also a faculty grader for a masters level course for the SANS Technical Institute.

My activities in the information security community include presenting at conferences, InfraGard Board Member, and a chapter leader for the Oklahoma City OWASP Chapter.

I enjoy all aspects of building information security programs and teams. I adapt easily to the context of security requirements within organizations and understand how to align security with the business objectives.

The reason I'm applying at Zions Bancorporation is that we are planning on moving to Utah in the next four years and I'm not opposed to traveling to Salt Lake City.


Security Leadership

Building effective and cohesive security teams

Information Security Metrics

Connecting information security to business objectives

Technical and administrative controls

Proposing and maintaining security program budgets

Incident Response and forensics

Managing breaches

Penetration testing

Senior Consultant, 01/2019 - Current
Vizient Fort Myers, FL,

I lead a team of 12 penetration testers on a long term engagement for a multi-national client.

The technical side of this engagement has me performing web application penetration testing for some of the top financial institutions in the nation as well as the Fortune 500.

The leadership side of my role at Rural Sourcing has me building cohesive teams, strategies growth of team skills and competencies, managing work life balance for the team, and strategies to grow the security practice for the organization.

Chief Information Security Officer, 05/2018 - 07/2019
Riverbed Technology, Inc. Durham, NC,
  • I was responsible for building the information security program and the strategic plan for security. I was in a unique position of being a technical contributor as well as a security leader for the bank.
  • Managed organization's security posture by monitoring networks for potential threats, including cyber espionage, malware and internal sabotage.
  • Analyzed system risk to identify and implement appropriate security countermeasures.
  • Audited networks and security systems to identify vulnerabilities.
  • Analyzed security procedure violations and developed plans to prevent recurrence.
  • Designed, implemented and maintained security systems and controls.
  • Designed and implemented plans to secure computer files against breach, destruction or accidental modification.
  • Built firewalls and encrypted data to secure confidential information.
  • Researched and designed advanced computer forensic tools.
  • Performed annual risk assessment and FFIEC CAT assessment and reported results to the board.
  • Work with Fed auditors during the annual audits.
  • Worked with 3rd party auditors and penetration testing firms.
Network Security Administrator, 05/2014 - 05/2018
City Of Springfield, Il Springfield, IL,
  • Managing the network security from the endpoint, perimeter, DMZ, and shadow IT services. I also perform forensic investigations, reverse engineering malware, security planning, and end user training.
  • Incident response and investigation - This includes threat isolation and performing forensics to determine the source and cause of the infection/intrusion, and determining what data was compromised or leaked if any.
  • Network troubleshooting - switches, routing, DDOS mitigation, and encryption.
  • Administration of Check Point firewalls and Check Point Endpoint Protection.
  • Administration of Rapid 7 Insight IDR and Nexpose.
Network Security Manager, 07/2004 - 05/2014
Deloitte Salt Lake City, UT,

Network and infrastructure security
• Vulnerability scanning with Nessus, Nexpose and Metasploit
• Penetration testing to ensure patches and fixes secure the vulnerability
• Patch and update management
• Log analysis with HIDS and NIDS using Snort and OSSEC
• Making sure web servers and web site are PCI compliant
• Firewall and VPN configuration and support
• PKI and authentication
• RADIUS and wireless authentication support
• End user education and security awareness training
• Data encryption and decryption
• Network switching and routing

Managing the hardware and infrastructure team who provide end user support, workstation break fix and server configuration tasks.
• Workflow
• Support ticket priority
• End user satisfaction and SLA’s
• Root cause determination
• QC verification
• Ensuring issues are tracked and fixes are documented
• Recurring issue trending and elimination

System and Server Administration –Including everyday tasks, troubleshooting and configuration.
• IBM AIX 5.3
• Windows Server 200x
• Linux (includes Red Hat, CentOS, Fedora, and Ubuntu)
• Windows XP through Windows 8 / Mac OS X
• Email server configuration and support
• Google Apps support
• Network services support

Change Management
• Ensure change impact is properly assessed
• Ensure changes are scheduled to minimize impact
• Ensure changes can be rolled back if needed
• Ensure changes are relayed to the company and expectations are managed
• Document and track all changes in the event future related issues occur

Business Continuity and Disaster Planning
• Ensure back ups are available and functional
• Ensure servers have fail-overs and test quarterly
• Assess and maintain redundant power in NOC
• Offsite backup storage and management
• Maintain on call rotation
• Assess and maintain recovery time objectives and recovery point objectives

Education and Training
: Information Assurance And Forensics, Expected in
Oklahoma State University Institute of Technology - Okmulgee - Okmulgee, OK
: Network Security, Expected in
Rose State College - Oklahoma City, OK
  • Certified Information Systems Security Professional (CISSP)
  • GIAC Strategic Planning, Policy, and Leadership (GSTRT)
  • GIAC Security Leadership (GSLC)
  • GIAC Certified Forensic Examiner (GCFE)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Penetration Tester (GPEN)
  • CNSSI 4012 Senior Systems Manager
  • CNSSI 4013 System Administration in Information Systems Security
  • CNSSI 4014 Information System Security Officer
  • NSTISSI 4011 Information Systems Security Professional
  • NSTISSI 4015 Systems Certifier

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy


Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.

How this resume score
could be improved?

Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume:


resume Strength

  • Length
  • Personalization
  • Target Job

Resume Overview

School Attended

  • Oklahoma State University Institute of Technology - Okmulgee
  • Rose State College

Job Titles Held:

  • Senior Consultant
  • Chief Information Security Officer
  • Network Security Administrator
  • Network Security Manager


  • Some College (No Degree)
  • Some College (No Degree)

By clicking Customize This Resume, you agree to our Terms of Use and Privacy Policy

*As seen in: