Sample Template Example of Beautiful Excellent Professional Curriculum Vitae / Resume / CV Format with Career Objective, Job Description, Skills & Work Experience for Freshers & Experienced in Word / Doc / Pdf Free Download
Information
Security Consultant
Information
Security Consultant
Network/Internet/E-Commerce
Security Manager Consultant
Independent
Network/Internet Security Consultant (Self Employed)
Network/Internet
Security Manager
Senior
Security Engineer
PCI, GLBA, SOX, HIPPA,
State and Federal Bank Regulatory Examination/Audit Requirements
Download Resume Format
Celia
Hunter
309 W Running
Brook Rd
Nashville, TN
37001
615-545-9876
celia.Hunter@live.com
Objective:
Highly effective
Information Security Architecture, Analysis and Engineering skills responsible for design and implementation of Digital, Data and Regulatory
Compliance programs at strategic, tactical and operational levels (network,
infrastructure, applications and databases) to ensure that security controls
are functioning efficiently and effectively.
Major objectives
include identification and management of security risks ensuring compliance
with PCI, SOX, GLBA and HIPAA regulatory mandates, standards and best practices within the realm of security logging, monitoring, alert
management, incident handling, vulnerability and configuration management.
Security research and development, product evaluations, consulting,
project support, and operational tasks needed to support the overall
requirements of business programs, strategies and functionality.
Provide technical expertise
to establish and implement security related standards, procedures, and
guidelines appropriate to securing new
and existing environments in partnership with various Business Units and
Stakeholders.
Optimal goals are to design
and implement controls and processes, risk mitigation techniques, and
standardized information security solutions that will allow sensible management
processes with a balance between risks and technical business operational
functionality.
Strengths
and Expertise:
Risk, Compliance & Policy Management
·
Providing technical and
operational input and expertise to management for all applicable security
policies, standards, risk/threat models, procedures, and guidelines that will
assist IT teams and Business Operations
in integrating and maintaining security requirements within their networks,
systems, applications and databases.
·
Ensuring published security
standards, procedures, and guidelines are adhered to by conducting security
assessments over the network and all resources attached to the infrastructure.
Research & Development
·
Providing technical and
operational expertise to management and other IT engineers, analysts, project
managers, etc., contributing to the technical understanding and promotion of
new and existing information security standards, solutions and tools; serving
as a technical communication channel to business management.
·
Providing Research and
Development, Subject Matter Expertise and
Consulting support to the IT team and business units as needed.
Documentation, Reporting & Analytics
·
Implementing security
metrics and statistics about business and IT environment, analyzing trends in
security events and activities to better understand and mitigate risks and
vulnerabilities, reporting security metrics and statistics to senior and
executive management as well as other key business stakeholders.
·
Documenting and following-up
on all security exceptions relating to IT and operational activities that could
adversely impact security risks and/or not adhere to established policies,
practices, standards, or procedures.
Operational Planning & Management
·
Performing technical
security risk assessments and security exposure analysis of systems, networks,
business applications and databases. Identify, document, and report security
issues, incidents and concerns and follow-up on action items to resolve
security exposures. Report on vulnerability findings and other security related
gaps.
·
Managing the technical
aspect of various audits, compliance assessments, etc., to ensure that all
outstanding findings and gaps are resolved by the various technology and
business units with approval and signing-off of final remediation, executed in
close collaboration with Audit, Risk & Compliance. In addition, manage the
day-to-day and end-to-end Security Incident Management and Responses includes
notification processes, escalation of critical events and activities,
following-up on security-related events and activities, ensuring correlation,
analysis, reporting, remediation and closure.
·
Engineering and optimizing
technical solutions and processes for monitoring the security health of the
infrastructure (IDS/IPS, firewalls, servers, clients, applications, databases,
spam tools, spy-ware tools, computer forensics tools, integrity checking tools,
encryption key management tools, etc.), through regular logging, monitoring,
scanning, response, investigation, closure review.
·
Managing the relationships
of Security Operations, Information Technology Teams and other business units
to analyze all security-related events and activities to provide daily, weekly,
and monthly reporting of statistics and metrics.
·
Providing input to audit and
other assessment requirements from clients, customers, and other third-parties
as well as provide Subject Matter Expertise for IT and business projects.
·
Providing understanding of
network and system security and influence the IT Teams (as well as the business
segments) in integrating security in the design of networks and implementation
of systems
·
Point of contact for all
technology projects providing security expertise and consulting on policies,
standards and other solutions, working with technology team members as needed
to obtain end-to-end input to projects not only from a technical aspect but
also from a compliance, risk and application perspective.
Technical Expertise and
Proficiencies:
ñ Sun Solaris 2.6-2.8 Security, Engineering and
Administration, Experience with Sun Solaris 2.10
ñ Linux Security, Engineering and Administration
– RedHat Enterprise, Debian, SuSE, Slackware
ñ BSD Unix Security, Engineering and
Administration – OpenBSD, FreeBSD, BSDi
ñ Internet Services including SendMail, Apache
Web Server, SSL, SSH/SFTP, Qmail
ñ ArcSight ESM Implementation, Engineering and
Administration
ñ Oracle Identity Management Engineering,
Implementation and Administration
ñ Symantec SEIM Control and Compliance Suite
Implementation, Engineering and Administration
ñ BindviewRMS/CCS implementation, Engineering
and Administration
ñ Tools including NMAP, Nessus, Snort, Syslog,
Syslog-NG, Wireshark, MetaSploit, Snoop and TCPDump, Eeye Retina, Qualys and
Debug Level Logging.
ñ Access Management, Firewalls and Packet
Filtering devices such as Bluecoat, Imperva, Solaris Sunscreen, NAI Gauntlet,
Axent Raptor, Cisco PIX/ASA, IPFilter, IPChains and IPFW
Experience:
Emdeon Healthcare Services, (Mar 10 – Aug 11)
Senior Data Security Analyst IV (Acquired, Department Outsourced – RIF)
American Airlines, (Sep 09 - Dec 09)
Senior Security Analyst (Contract Completed)
AIG, American Insurance Group, (Oct 08- Mar
09)
Senior Security Analyst (Contract Completed)
Aviall Services (June 07- Sept 08)
Senior Security Analyst (Acquired, Department Duplication Eliminated –
RIF)
Mannatech (Sep 06- June 07)
Senior Security Consultant (Contract Completed)
Information
Security Consultant
Sungard Availability Services (Mar 06 – Sep
06)
Senior Security Consultant (Contract Completed)
Information
Security Consultant
ONE Network Enterprises Dallas TX (June 05 –
Jan 06)
Technical Operations Manager Consultant (Contract Completed)
Network/Internet/E-Commerce
Security Manager Consultant
NivekTechnology, Ft. Worth TX (Sep 04 to June
05)
Independent
Network/Internet Security Consultant (Self Employed)
TIB – The Independent BankersBank – Las
Colinas, TX (July 01 to Sep 04)
Network Security Officer
Network/Internet
Security Manager
Senior
Security Engineer
Associates First Financial -- Las Colinas, TX
(Oct 99 to July 01)
Senior Security Systems Analyst (Acquired, Department Duplication
Eliminated – RIF)
COMPUSA -- Corporate Headquarters Dallas, TX (October 97 - July 99)
Internet Security Administration (Acquired, Company Liquidated)
Cross Timbers Oil Company - Fort Worth, TX
(June 97 to October 97)
Information Systems, LAN/WAN/WEB/Security Administrator
University of Texas Medical Branch at
Galveston / SW Medical Ctr at Dallas -- (Apr 1992 to June 1997)
Information
Resources, Human Resources Information Systems LAN/WAN Administrator/Network
Analyst III
Compliance Experience and
Professional Certifications
PCI, GLBA, SOX, HIPPA,
State and Federal Bank Regulatory Examination/Audit Requirements
ISO17799,
ITIL Foundation v3
Sun Solaris, Solaris Sunscreen, NAI Gauntlet, Axent Raptor, Novell
(thru 4.12), Lotus Notes 4.5, NetIQ,
Bindview RMS/CCS, Symantec ESM, ArcSight ESM
Download Resume Format
0 comments:
Post a Comment