Keeping up to date on the latest NIST -. Military service veteran - U.S. Air Force. Discovery and Documenting of Current Architecture. Confidential liaison to DOJ ATR Information Systems Security Officer.
The transition took half the time allotted in the maintenance window. Reviewed the current implementation and provided a recommendation on how to leverage the tool for other departments.
read Reviewed risk assessment reports for senior executive team quantifying and verifying action plans to remediate identified risks; evaluated compliance closures for upper management of audits performed for the National Science Foundation (NSF) Antarctica. Take a look at our writing tips, resume example, and template to understand what belongs in your submission and how to phrase your accomplishments and skills. Privacy policy What Is an Information Security Auditor? For example, rather than saying you conducted risk assessments, you could say you conducted risk assessments of global financial services companys global network of data centers, identifying over 200 high-risk vulnerabilities.. MacBat is a unique combination of latest Supercapacitors power pack technology with traditional Lead-Acid Battery.

We believe that our battery is the future of the automotive battery market with its outstanding performances and its low environmental impact. Examine whether IT strategy is aligned with Business objectives, identify gaps and make recommendations to breach the gap. After logging in, come back to this page and refresh your browser. Experience and knowledge in security compliance and internal audit of networks and rd party associates for Health Care, Financial Institutions, Oil & Gas, Federal and Fortune companies to industry standards. Sub-Contracted to SAIC to provide Information Assurance Certification and Accreditation (C&A) and Cross Domain Solution (CDS) support to the Navy at SPAWAR. Responsible for HIPAA Security Risk Assessment, ITGC Audit, and auditing Cerner- P2 Sentinel. If youre on the lookout for a new position, or just have the idea in the back of your mind, its a good plan to update your resume. Maintained system configuration service line structure. Additionally, you can use bolding and italics to emphasize important information, but should avoid using all-caps or too much formatting variation. Utilized the Defense Information Systems Agency (DISA) approved checklists. Provided security compliance verification and implementation for the Neutral Buoyancy Laboratory and the Space Vehicle Mock-up Facility of the International Space Station (ISS) industrial control systems (ICS) that utilizes Rockwell Automation software following, Implemented and maintained IT security procedures, policies and risk reports. Assist in responses to external audits, penetration tests and vulnerability assessments. Created and managed audit process utilizing third party auditors. If youre looking to break into this field or switch jobs in the next year, its time to write a resume that will get you noticed by hiring managers at information security companies. Examine, identify and make recommendations on security products. Implemented IT Security Test Plans, Security Compliance Testing (Nessus scans), Risk Assessment Reports and Accreditation Reports of the DHHQ TRICARE systems. Review Audit Logs for assigned Applications. templates that follow the exact resume rules employers look for. Committed to these projects with integrity reliability; seeing them through as complete. Architect and Project Manager for the initiative to upgrade the Confidential Perimeter Firewalls from v7 to v8 without degradation of services. Let us show you how to tweak and strengthen your resume. Keeping up to date on the latest in IT Security. All rights reserved. Whether you're seeking an entry-level position or have been in your career for a few years, exposing your relevant achievements in your resume can allow you to stand out and get that job interview. Proposals Draft the business case and once approved the solutions proposal for all Information Technology Initiatives. They identify risks and recommend solutions to protect against unauthorized access, theft of data, and other threats. This resume example is a great representation of what a hiring manager is looking for in a Security Auditor Resume. Communicate with management regarding audit findings, recommendations, and possible process improvements, Project milestones and completion dates met on all audits, TeamMate administrator responsible for configuring, managing, monitoring, and troubleshooting audit management software and creating customized reports, Execute SQL queries to extract data fromEDW. Identify errors and false positives. Proofreading your resume is important to making sure it looks its best. Completed contracted project. Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC). Contracted to Northrop Grumman Mission Systems to provide technical IT Security expertise in Information Assurance (IA) for systems compliance support safeguarding associated classified and unclassified systems. Conducted in-depth technical reviews of new and existing IT systems (Windows, UNIX, RACF) for compliance with policy and industry guidelines for the DOI and the Department of Transportation (DOT) for ongoing monitoring of IT security controls. When trimming down a resume, focus on removing irrelevant information and details, and on highlighting the most relevant experience and skills. Installed, configured, and provided support for Dell and HP Workstations and Laptops for all Confidential . Manage, Architect, & Designer for a modern continuous monitoring and remediation solution. How to Become One. Scheduled and performed quarterly. As you draft your resume, youll want to keep a few basic guidelines in mind. Lead Configuration Analyst for the Tripwire v8.2 Deployment to fulfill: Change Control, Confidential, CIS, FISMA, & FIPS compliance. First, use left alignment instead of centered text, and use a standard font type and size throughout the document. Spelling mistakes, punctuation mistakes, and grammatical mistakes can all be easily corrected with a careful eye. Gathered and documented assessment results; a liaison Point Of Contact with business unit directors, managers and clients; conducted one-on-one meetings with the asset owners.
If youre looking to make a strong first impression with a potential employer, using a resume summary statement is a great way to do it.
As part of an onsite team responsible for managing multiple hull construction at a Tier 2 shipyard with an, Participate in the supplier selection process and perform supplier, Provide direction of business process and. Risk profiling of clinical devices and applications for IT governance for. San Juan, PR, USA 00907 Information security auditor with 10 years of experience in the field. Supported IT Systems Security needs including monitoring, risk analysis, system updates, documentation and regulatory compliance to ensure HIPAA security requirements and standards were met. Define the boundaries of applications / infrastructure, network diagram reviews (Visio) and gathers evidence to support the identified NIST Controls are in compliance with IBM. Support enterprise-wide security awareness program. Acted as a representative of the firm during outside party audits. Looking to leverage my years of Sr. Security Analyst and IT Cyber Security Regulatory Compliance Auditor. (phone hidden) | (email hidden) | Colorado, LinkedIn: www.linkedin.com/in/marilyn-sousa-cisa-cism. Provided technical security engineering support for complex software, hardware, network systems; design, develop, and execute security tests and evaluations (ST&E) of annual audit plan, vulnerability assessments and audits; risk mitigation and analysis of security threats. And theyre the best way to showcase your experience and qualifications. In fact, As an artist, you have a unique challenge when it comes to resumes. Progressively expanded my skill-set and proficiency by taking on various Contract projects. To impress hiring managers, you must transfer your strong IT skills into equally strong resume-writing skills. Associate, Cyber Security - SecOps salaries in Milwaukee, WI, Responsibilities include identifying and defining system, Demonstrated success assessing, testing, and implementing, Continually building knowledge of business finance and investment terminology and accounting and. Provided daily status reports, in writing and verbally, to VITAs Project Management Office, Coordinated the Enterprise Desktop Deployment of Common Access Card ( Confidential ) with Network Operations, Security Services/Operations, & Desktop services. Collaborates with management to improve internal controls and processes - preparing risk assessments. Recommend and coordinate the application of fixes, patches, and disaster recovery procedures in event of security breach. Migration consisted of over 300 PC, Laptops, and Tablets, spaced over a large campus which presented another issue in relation to the normal process. Security Processes: Architecting Risk Based Security Solutions, Business Case and Proposal Writing, Risk Assessment, Vulnerability Assessment, Vulnerability Mitigation Process Design/Improvement, Security & Compliance Auditing, SIEM Integration, Regulatory Compliance: Confidential 800 - x (specializing in 800-53, 800-30, 800-37, & 800-39), FIPS, HIPAA/HITECH, PCI,, GLBA, SOX, EPA, EHR, EMR, Privacy & Disclosure Policies, SIG, Document Management, Applications / Application: Tenable Security Center (SC), Splunk, Snort, CSAM, XACTA, KeyLight, Wintel Systems, Confidential Sidewinder v8, LogLogic, pfSense Firewalls, Windows (2008 R2), Exchange (2007, & 2010), XenServer (5.5, & 5.6 SP2), Linux CentOS (5.x, 6.x) and Red Hat (5.x, 6.x), vCenter w/ Configuration Manager, Senior Information System Security Officer, IT Solutions Consultant - Cloud Services Provider, Senior Systems & Security Manager / Operations Manager, © 2022 Hire IT People, Inc.

Interfaced with the appropriate government agencies, customers, and company personnel to facilitate implementation of protective mechanisms and to ensure the understanding of. Developed consistent policies and processes of disaster recovery plans and business continuity plans of the individual GPS (Global Positioning System) sites. Assisted management in identifying gaps between controls and processes, made recommendations to breach gap as well as to mitigate identified control weaknesses. Heres how to write an resume of your own. Having someone else proofread your resume is also helpful, as they can catch mistakes that you may have missed. Reviewed and examined policies, procedures and records, as well as interviewed workforce members to ensure compliance with standards and regulations. Architect, Deploy, and Manage Tenable Nessus Scanner & Passive Vulnerability Scanner, Confidential, CIS, FISMA, & FIPS compliance. Cloud Solutions Small business IT solutions and Cloud based services brokerage enabling turnkey virtual offices for micro to medium sized businesses. And if youre someone who loves solving puzzles and protecting valuable assets, this might be the perfect role for you. templates. When recruiters look at your IT auditor resume, they must immediately see what makes you a great auditor.
Sitemap 12