Resume Writing ?

The Following Text Is An Unformatted Professional Resume Sample

From The Writers At The Resume Writing Group, Inc.

This Resume Has Not Been Formatted


ORDER YOUR OWN LETTER-PERFECT, JOB-WINNING RESUME AND IT WILL BE COMPLETED AS SOON AS YOU NEED!
Click HERE!



Yyyyyy x. yyyyyy

Dynamic Senior Security Officer Technical Advisory Expert Computer Intrusion Specialist

 

P.O. Box 552 Xxxxxx, XXXXXX xxxxxx (xxx-xxx-xxxx abc@xyz.com

 

  • Results-Focused Leader who offers a background in Security Compliance, Computer Intrusion Investigations, Computer Network Exploitation, Risk Management, and Technical Advisement; contributes talent in Project / Program Management, Team Building / Training, Strategic Analysis / Planning, Policy Formulation, Process Improvement, and Customer Collaboration; and exhibits an ability to see the big picture in evolving public- and prixxxxxxte-sector industries.
  • Top Performer who boasts above-average career results, and can make sound decisions to reflect positively on operations in alignment with an employer s vision, xxxxxxlue, and goals to achieve a significant competitive adxxxxxxntage.
  • Ambitious Self-Starter who is highly skilled at detecting, reducing, and deterring internal and external security threats impacting business processes, and can lead interdisciplinary teams by example and with integrity to attain objectives while serving as a mission-focused collaborator who builds and sustains mutually beneficial partnerships.

 

Professional Synopsis

 

Federal Bureau of Investigation 1996 Present

 

Supervisory Special Agent (SSA) Chief (2014 Present)

Security Division Security Compliance Unit, Washington, D.C.

  Capitalize on the opportunity to implement and manage all components of the FBI s security compliance program, including driving operations success by directing a top-performing team of 10 Subject Matter Experts (SMEs) in 3 security programs, as well as coordinating efforts with program leads to optimize personnel and financial resources.

  Develop, implement, and manage a solutions-focused security audit program to xxxxxxlidate security practices and controls, and ensure comprehensive compliance with organizational, regulatory, and statutory standards.

  Objectively review and investigate security incidents to identify weaknesses in security practices, policy, and procedural gaps and design and develop effective mitigation and remediation strategies.

 

  Successfully conceptualized, designed, developed, and implemented a framework for enforcing and defining consequences for failure to adhere to organizational security directives / policies.

  Revised the security compliance program s corporate policy directive to redefine scope, eliminate superfluous information, and ensure strict conformity with existing enterprise policies.

  Initiated and led re-engineering of the security incident reporting application to realize quality improvements in operations, system capability, functionality, performance, and security.

 

Supervisory Special Agent Supervisor (2012 2014)

New York Field Office Cyber Computer Intrusion, New York, NY

  Strategically steered identification and countering of state and non-state sponsored computer intrusions while managing a team of 10 special agents, 1 computer scientist, and 1 investigative analyst in responding to and investigating computer intrusions, as well as facilitating succession planning via agent mentorship and development.

  Expertly conducted prixxxxxxte sector and community outreach presentations to increase security awareness of cyber threats tactics, techniques, and procedures, and identified and developed intelligence sources who could provide actionable information concerning the tactics, techniques, procedures, and impending targets of cyber threats.

 

  Identified and deployed innoxxxxxxtive technological solutions to adxxxxxxnce investigative operations.

  Successfully collaborated with prixxxxxxte industry and international customers to develop and implement innoxxxxxxtive investigative strategies to resourcefully identify and actively neutralize all emerging cyber threats.

 

Supervisory Special Agent Supervisor / Program Manager (2011 2012)

Telecommunications Intercept & Collection Technology Unit Operational Technology Division, Quantico, XXXXXX

  Utilized broad scope of industry knowledge toward leading the forward-thinking development, deployment, and management of digital telephony electronic surveillance capabilities, including mentoring and managing a results-focused team of 14 Subject Matter Experts (SME) comprised of software / system engineers and key technicians.

  • Coordinated and led comprehensive operations and management of multiple networks which facilitated the collection and processing of data for court-ordered electronic surveillance to drive operations efficiency.

 

  Successfully developed a framework to stand up a 24x7 operational COOP site.

 

Yyyyyy x. yyyyyy Page Two (xxx-xxx-xxxx

 

Supervisory Special Agent Supervisor / Program Manager (continued)

 

  Improved reliability of a Consensual Monitoring platform through implementation of a fully relational and normalized database, data striping across drive partitions, system management through SCOM and SCCM, and improved security via OS and application patching and integration of Active Directory for security compliance.

  Resolved Federal Information Security Management Act (FISMA) audit findings concerning a digital data and voice collection system by implementing security baselines for all servers, workstations, and network devices.

  Acquired, configured, and deployed Intrusion Detection Systems (IDS) across 80 governmental facilities, along with replacing shared administrative accounts with centralized account management through Active Directory and implementing a least privilege policy to limit administrative rights to the system.

 

Supervisory Special Agent Special Assistant (2010 2011)

IT Branch (ITB), Deputy Chief Information Officer, Washington, D.C.

  Led targeted decision-making across policy formulation, personnel and staffing, security, finance, and operational impacts of newly deployed technologies, including serving as Deputy CIO s representative for coordinating major projects and initiatives and providing timely reports and briefings on their progress to meet or exceed objectives.

  Served as 1 of only 2 agents assigned to ITB to assist Executive Management (EM) bridge the gap between technical support and the operational environment by providing guidance regarding technology and operational requirements being explored, developed, or implemented to effectively facilitate the mission of agents and analysts.

  • Led ITB s Laboratory of Information Technology Exploration (LITE) initiative to create new IT applications directed at enhancing core operations by proactively leveraging the technical skills of technically savvy front line employees.

 

  Scheduled and planned site visits for ITB s EM to connect with and engage in active customer discussions.

  Planned and coordinated ITB s efforts to acquire and deliver an enterprise Internet misattribution solution.

  Coordinated and managed the build-out of a secure virtual platform which provided FBI employees with the ability to collaborate across the enterprise, access adxxxxxxnced tools for exploration and development of IT solutions, and a mechanism to escalate those ideas and solutions to the FBI s enterprise.

 

Supervisory Special Agent Supervisor / Program Manager (2006 2010)

Operational Technology Division Remote Operations Unit, Quantico, XXXXXX

  Played a vital role in developing, testing and deploying CNE / CNA capabilities, including mentoring and managing a team of 23 contractors and 2 FBI technical support employees comprised of engineers and computer scientists.

  • Coordinated with internal and external customers to identify and define needs, and exxxxxxluated them for completeness and relexxxxxxncy resulting in thorough technical assessments and deployment of appropriate solutions.

 

  Pioneered Configuration Management processes to maintain control of evolving products by assuring control of changes made to hardware, software, firmware, documentation, and testing through the operational life cycle.

  Minimized over-collections by developing comprehensive protocols and implementing multiple control measures which ensured tools were removed upon court order expiration.

  Ensured tools were strategically delivered to the appropriate device, and tracked procedures to monitor and alert customers of impending court order expirations.

 

Additional Professional Roles Held:

Cyber Crimes Investigator Adjunct Faculty Member Captain United States Army

 

Education & Professional Development

 

Capital Technology University

 

Master of Science in Internet Engineering

Master of Science in Network Security

 

Central State University

 

Bachelor of Science in Political Science

Bachelor of Arts in History

 

GIAC Information Security Professional (GISP) Holds Active TS / SCI+

Yyyyyy x. yyyyyy

Dynamic Senior Security Officer Technical Advisory Expert Computer Intrusion Specialist

 

P.O. Box 552 Xxxxxx, XXXXXX xxxxxx (xxx-xxx-xxxx abc@xyz.com

 

 

Date

 

Hiring Agent Name

Company Name

Address

City/State/Zip Code

 

Dear__________________:

 

I am seeking a challenging [ Insert Job Title ] role, and am submitting my resume for your review.

 

I am excited to build a rewarding career with your company, and can offer cross-functional experience in Security Compliance, Computer Intrusion Investigations, Computer Network Exploitation, Risk Management, and Technical Advisement. I am also well-versed in Project / Program Management, Team Building / Training, Strategic Analysis / Planning, Policy Formulation, Process Improvement, and Customer Collaboration, among other areas.

 

To complement my background, please note that I attained a Master of Science in Internet Engineering and Master of Science in Network Security from Capital Technology University and a Bachelor of Science in Political Science and a Bachelor of Arts in History from Central State University. I also am recognized as a GIAC Information Security Professional (GISP).

 

Currently, as a Supervisory Special Agent (SSA) / Chief for the FBI s Security Division Security Compliance Unit, I expertly implement and manage all components of the FBI s security compliance program, including driving operations success by directing a top-performing team of 10 Subject Matter Experts (SMEs) in 3 security programs, as well as coordinating efforts with program leads to optimize personnel and financial resources. Within this role, I develop, implement, and manage a solutions-focused security audit program to xxxxxxlidate security practices and controls, and ensure comprehensive compliance with organizational, regulatory, and statutory standards.

 

A sampling of my achievements with the FBI include:

 

  Successfully conceptualizing, designing, developing, and implementing a framework for enforcing and defining consequences for failure to adhere to organizational security directives / policies.

  Revising the security compliance program s corporate policy directive to redefine scope, eliminate superfluous information, and ensure strict conformity with existing enterprise policies.

  Initiating and leading re-engineering of the security incident reporting application to realize quality improvements in operations, system capability, functionality, performance, and security.

 

[ Suggestion! Address Here Any Skills / Qualifications / Achievements Relexxxxxxnt to the Job Posting ]. As this is just an example of my abilities, please kindly refer to my enclosed resume for additional experience.

 

I look forward to hearing from you, and thank you in adxxxxxxnce for your careful consideration.

 

Sincerely,

 

 

 

Yyyyyy x. yyyyyy

<< Previous           Back to Sitemap           Next >>

Remember: Hire Us To Write YOUR New Resume
And We GUARANTEE That If You’re Not Working In 60 Days Or Less,
We’ll Revise Your Resume, Refund Your Money,
AND Give You $50 EXTRA!

Click HERE!

Members Of The Following Resume Writing Associations:


BBB Rating : A+


Proud Sponsors Of:
 

 


 

For General Customer Service, Call Us Toll Free At 1-800-466-3076 Or Email Our Writers By Clicking HERE

 Resume Writing Group © 2005-.   All graphics & text on ResumeWritingGroup.Com are either owned or licensed by our company and may
not be reproduced without expressed, written consent.  Terms of service and rules for guarantees may be reviewed here...
*our resume writing Guarantee requires clients to save receipts as proof that they've submitted COPIES OF their NEW resume to a minimum of 40 employers USING OUR ADVICE.   REFUNDS ARE LIMITED TO RESUMES AND DO NOT INCLUDE ADDITIONAL SERVICES SUCH AS COVER LETTERS.REFUNDS CAN BE CLAIMED UP TO 90 DAYS AFTER PURCHASE.