If youre looking to break into this field or switch jobs in the next year, its time to write a resume that will get you noticed by hiring managers at information security companies. Take a look at our writing tips, resume example, and template to understand what belongs in your submission and how to phrase your accomplishments and skills.
Worked with operational audit teams and defined approach for integrated audits for better coverage and assurance. For one, your experiences have to do with your creative output and skills, not necessarily traditional factors WorkSimpli Software, LLC This is what will improve overall horsepower. Assisted in reporting of security alerts. Moved back to Colorado. IT & Cyber Security Consultant Duration: Oct - July, MRI Technologies - Clear Lake City, TX (Contract work for Space Center Houston (NASA)), Sr. System IT Security Engineer Duration: July - Oct, In Transition Duration: April - July, Brandon Technology Consulting - Alexandria, VA (Contract work for Defense Health HQ-DHHQ), Sr. Network Security Engineer Duration: Jan - April, NCI Information Systems - Col Springs, CO (Contract work for U.S. Air Force Space Command), Sr. Information Assurance Engineer Duration: Sept - Jan, Yoh, Inc. - Colorado Springs, CO (Contract work for The Boeing Company), Sr. Computer Security & Information Protection Specialist Duration: Sept - Sept, In Transition Duration: June - Sept, Yoh, Inc. - North Charleston, SC (Contract work for Space & Naval Warfare Systems Command), Sr. Systems Analyst Duration: April June, Booz Allen Hamilton - North Charleston, SC (Contract work for the VA, NSF and IRS), Sr. Systems Security Engineer Duration: Dec - April, G&B Solutions - Lakewood, CO (Contract work for Department of Interior (DOI)), Sr. C&A Security Analyst Duration: Dec - Dec, Boecore - Schriever AFB, CO (Contract work for to the Missile Defense Agency), Sr. Systems Security Engineer Duration: Dec - Dec, The Metropolitan Water District of Southern California - Winchester, Cal Poly Pomona - College of Agriculture - Pomona, List of Jobs | Experience responding to, analyzing, and communicating information, Expert knowledge of DBA administration and, 5-7 years of professional experience in information technology, specifically software development , risk and. Related: How Much Does an Information Security Auditor Make? Maintained system configuration service line structure. They identify risks and recommend solutions to protect against unauthorized access, theft of data, and other threats. Established Best Practices to implement new technologies. Recent Searches. Ensure the rigorous application of information security policies, principles, and practices on the network. Moved to Denver, CO. Provided technical support to other auditors regarding specific technologies used within the organization when performing their own audits (e.g., payment card processing systems). As you draft your resume, youll want to keep a few basic guidelines in mind. When trimming down a resume, focus on removing irrelevant information and details, and on highlighting the most relevant experience and skills. Create and contribute secure code library. Ensured create procedures in support with IT procedures. After logging in, come back to this page and refresh your browser. Gathered and documented assessment results; a liaison Point Of Contact with business unit directors, managers and clients; conducted one-on-one meetings with the asset owners. Information security is one of the fastest growing fields in the world of work. Having someone else proofread your resume is also helpful, as they can catch mistakes that you may have missed. Studying for the CISM and CRISC. Let us show you how to tweak and strengthen your resume. Development of interconnected systems to create strategic solutions to structural deficiencies such as Separations of Duties and Password Management. Projects completed for contract agencies for multiple projects. Last Updated (Wednesday, 21 April 2021 22:11), We believe that our battery is the future of the automotive battery market with its. Sub-Contracted to SAIC to provide Information Assurance Certification and Accreditation (C&A) and Cross Domain Solution (CDS) support to the Navy at SPAWAR. Reviewed the current implementation and provided a recommendation on how to leverage the tool for other departments. www.linkedin.com/in/marilyn-sousa-cisa-cism, Sr Administrative Analyst - District Temp (Facility Contracts Administrator), Local Foodservice - Route Delivery Driver.
Developed consistent policies and processes of disaster recovery plans and business continuity plans of the individual GPS (Global Positioning System) sites. Designed the Risk Based Security Architecture for a complete retrofit of Security Services within the Engineering and Operational environment. Develop and interpret security policies and procedures, determine applicability to the Division IT infrastructure, communicate findings to Information Security Officer, Information Systems Security Officer, and Engineers. 1225 Ave Ponce de Leon, Suite 1001 Conducted IT audit fieldwork; walkthrough and detailed testing of controls. So its crucial that you use them to your advantage. Provided technical security engineering support for complex software, hardware, network systems; design, develop, and execute security tests and evaluations (ST&E) of annual audit plan, vulnerability assessments and audits; risk mitigation and analysis of security threats. templates.
Additionally, I have a proven record of successfully utilizing Confidential principles or Information security risk management knowledge to assist businesses with the assessment and improvement of their risk management processes and program for the Confidential, Antitrust Division, Confidential and Records Administration, South Carolina Confidential, & HiPAA/HiTECH. When writing your own, be sure to focus on your key skills and experiences, and make it clear what youre hoping to do next. Writing Security Plans, Contingency Plans (CPs), analyzing scan results; experience creating and reviewing reports in ArcSight and Splunk. Use professional field-tested resume Performed and documented audit activities in accordance with professional standards based on frameworks such as COBIT, ITGC, PCI, HIPAA and SOX. Conducted security assessments of systems and applications to identify vulnerabilities and risks. Completed contracted project. Verify actions have been completed and obtain artifacts/evidence to close POAMs. Architected policies, procedures, & documentation for the Authorized Security Risk Assessment Framework Conduct risk assessments, penetration tests and diagnose security vulnerabilities in the operational environment as well as systems under design. How to Become One. Conducted in-depth technical reviews of new and existing IT systems (Windows, UNIX, RACF) for compliance with policy and industry guidelines for the DOI and the Department of Transportation (DOT) for ongoing monitoring of IT security controls.
Responsible for HIPAA Security Risk Assessment, ITGC Audit, and auditing Cerner- P2 Sentinel. Committed to these projects with integrity reliability; seeing them through as complete. Created and defined companywide IT Security policies and best practices to preemptively align security standards with HIPAA/HITECH requirements in pursuit of obtaining the future Safe Harbor status. How to Write an Impressive Resume Objective, 6 Easy Steps to Blow the Dust Off Your Resume, How to Create an Artist Resume That Complements Your Portfolio. Author of IBM Security Standard Operating Process/Procedures (SOP) for Confidential Project. And if youre someone who loves solving puzzles and protecting valuable assets, this might be the perfect role for you. Responsible subject matter expert on financial services of vendor cyber security risk to include risk identification, quantification, and management efforts.Assessed (QA) remediation plans and non-compliance acceptances. Security Processes: Architecting Risk Based Security Solutions, Business Case and Proposal Writing, Risk Assessment, Vulnerability Assessment, Vulnerability Mitigation Process Design/Improvement, Security & Compliance Auditing, SIEM Integration, Regulatory Compliance: Confidential 800 - x (specializing in 800-53, 800-30, 800-37, & 800-39), FIPS, HIPAA/HITECH, PCI,, GLBA, SOX, EPA, EHR, EMR, Privacy & Disclosure Policies, SIG, Document Management, Applications / Application: Tenable Security Center (SC), Splunk, Snort, CSAM, XACTA, KeyLight, Wintel Systems, Confidential Sidewinder v8, LogLogic, pfSense Firewalls, Windows (2008 R2), Exchange (2007, & 2010), XenServer (5.5, & 5.6 SP2), Linux CentOS (5.x, 6.x) and Red Hat (5.x, 6.x), vCenter w/ Configuration Manager, Senior Information System Security Officer, IT Solutions Consultant - Cloud Services Provider, Senior Systems & Security Manager / Operations Manager, © 2022 Hire IT People, Inc. Looking to leverage my years of Sr. Security Analyst and IT Cyber Security Regulatory Compliance Auditor. Interfaced with the appropriate government agencies, customers, and company personnel to facilitate implementation of protective mechanisms and to ensure the understanding of. Provided status updates to the PMO 3 times a week showing the project was on schedule. 2022, WorkSimpli Software, LLC. Cloud Solutions Small business IT solutions and Cloud based services brokerage enabling turnkey virtual offices for micro to medium sized businesses. Keeping up to date on the latest NIST -. Provided security compliance verification and implementation for the Neutral Buoyancy Laboratory and the Space Vehicle Mock-up Facility of the International Space Station (ISS) industrial control systems (ICS) that utilizes Rockwell Automation software following, Implemented and maintained IT security procedures, policies and risk reports. Validated evidence from third parties to assist in closing identified findings. This system looks for certain keywords related to the job in order to determine whether you are a good fit. Security Assessments & Gap Analysis for Small Businesses.
Part of the response team for network security issues, using mostly Confidential products. Advise Engineers on Security Best Practices and how to integrate those best practices into existing and new solutions. Keeping up to date on the latest in IT Security. Regularly provided updates to the PMO thru the project coordinator. Coordinated and deployed new computers to every department within the organization. There are few tasks that you cannot tackle as an IT auditor. Successfully delivered multiple technology audits including Cloud Security, Mobility (BYOD), Third Party, Identity and Access Management, Vulnerability Management, SAP Post-implementation review, etc.