Resume Service

The Following Text Is An Unformatted Professional Resume Sample

From The Writers At The Resume Writing Group, Inc.

This Resume Has Not Been Formatted


ORDER YOUR OWN LETTER-PERFECT, JOB-WINNING RESUME AND IT WILL BE COMPLETED AS SOON AS YOU NEED!
Click HERE!



Yyyyyy x. yyyyyy

Xxxxxx, XXXXXX xxxxxx (xxx-xxx-xxxx abc@xyz.com

 

 

 

Enterprise Security Road Maps Data Loss Prevention Cloud Security Incident Response

Policy / Procedure Development Risk / Threat Assessments Vulnerability / Threat Management

Audit Processes Compliance Due Diligence Best Practice Methodologies Cost-Reducing Initiatives

Application Security Forensics Endpoint Security Third-Party Vendor Security Mobile Device Management

S-SDLC SAST DAST SOX SSXXXXXX 16 COBIT NIST CIS ISO2700 OWASP B-SIMMS PII / PHI CISA CISSP CGEIT

 

Dynamic IS / Cybersecurity Expert who makes sound security-focused decisions to rexxxxxxect positively on multi-site operations initiatives in alignment with a company s vision, value, and goals. Integral Leader who offers a proven record of solutions-centric critical thinking for insightful, change-driven results and threat / risk mitigation. Visionary Professional who quickly resolves complex IT challenges and adapts to evolving scenarios to reach high productivity levels and ensure seamless business processes. Ambitious Self-Starter who offers a background in independently achieving winning outcomes due to superior attention-to-detail. Excellent Communicator who develops solid relationships with C-level decision-makers, board members, stakeholders, IT teams, end users, and clients.

 

Career Highlights Include:

  Negotiating >50% MSRP software solutions to lock in multi-year cost savings.

  Creating forward-thinking risk-based IS road maps for consumer presentation.

  Initiating innovative security architectures using fiscally responsible technologies.

  Establishing formal policies / procedure patch mandates and asset hardening guidelines.

  Leading an aggressive VM program for 100% asset discovery and vulnerability assessments.

  Implementing real-time integrated threat response solutions for rapid detection and response.

  Developing 100% on-time performance reviews and training plans aligned with fiscal year goals.

  Designing robust Data Loss Prevention programs using state-of-the-art technologies and training.

  Consistently producing accurate metrics-based security dashboards and SecOps review materials.

  Building highly qualified, top-notch InfoSec team members with 100% favorable 360-degree feedback.

  Initiating SAST / DAST policies / procedures in collaboration with DEV / QA integrated into formal SDLC.

  Streamlining legal declaration processes for satisfying investigative requirements with zero court losses.

 

Professional Synopsis

 

TriNet (f/k/a Gevity), Xxxxxx, XXXXXX 2007 Present

 

Program Manager Information Security (Acting Director Since 2008)

Capitalize on the opportunity to author a 3-year Enterprise Security Road Map while introducing a new Enterprise Data Loss Prevention program transcending IT-boundaries and increasing exposure / awareness to business stakeholders. Develop sound business cases to support budget and resource requirements while managing a $500,000 budget. Lead multiple risk-based vulnerability assessments against network perimeter and web-facing applications inclusive of remediation planning. Extend monitoring and reporting of firewall and rule-base changes, monitoring and auditing of production UNIX and Oracle database administrator changes, and physical security monitoring (e.g. CCTV) capabilities and review. Coordinate data loss breach investigations with legal, HR, and internal audit teams for proper resolution.

 

  Coordinated and led high-risk forensic investigations.

  Introduced a new formal Vulnerability Management program.

  Consistently avoided disclosure of material or significant SOX Act IT findings.

  Authored and / or revised numerous policy decisions related policies / procedures.

  Collaborated with business teams toward 2 consecutive unqualified SAS 70 opinions.

  Enhanced monitoring of various critical Active Directory / Exchange change and security events.

  Coordinated Technical Surveillance Countermeasures (TSCM) bug sweep of a corporate facility.

  Chaired an IT Security Steering Committee of executive-level representatives from each functional area.

 

Catalina Marketing Corporation, St. Petersburg, XXXXXX 2006 2007

 

Information Technology Audit Compliance

Optimized risk reduction by promoting a risk-based approach to overhaul prior and current initiatives and eliminate nominal control-coverage testing procedures. Refined access management policies / procedures to quickly revoke terminated employee and contractor access. Planned and coordinated key SOX initiatives and compliance strategies.

 

 

Yyyyyy x. yyyyyy Page Two (xxx-xxx-xxxx

 

Professional Synopsis (continued)

 

Catalina Marketing Corporation, St. Petersburg, XXXXXX (continued) 2006 2007

 

Information Technology Audit Compliance

 

  Achieved full reliance on a SOX testing work product for the first time in 3 years.

  Led IT team to adopt numerous testing approaches based on personally developed design.

  Consistently received highest Very Satisfied rating from IT teams per independent audit surveys.

  Evaluated current ITGC SOX Act compliance strategy within first 6 months and initiated significant enhancements to improve testing efficiency and control effectiveness, as well as reduce total testing effort.

  Improved reliance on financial-system processing integrity via data analysis techniques, including reducing testing efforts for a key application control from 4 hours / per resource to <2 hours of mine and DBA time.

 

Protiviti Independent Risk Consulting, Tampa, XXXXXX 2004 2006

 

Manager Technology Risk Services

Strategically steered team-led initiatives to conduct diverse security-related assessments for a prominent Xxxxxx financial institution, including AS/400 (midrange) logical security, program change control review, network architecture reviews, and multiple web-based application reviews. Developed, reviewed, and performed gap analysis while addressing and remedying IS policies / procedures per enterprise, regulatory, and / or leading practice compliance.

 

  Drove core project success by recruiting, mentoring, and managing junior Technology Risk team members.

  Served as Project Manager on multiple engagements for prominent Xxxxxx clients with $500+ million in revenues, including leading efforts to achieve Sarbanes-Oxley Act of 2002 compliance with respect to the documentation, testing, and remediation of both general computer controls and application-level controls.

 

Sarasota Memorial Health Care System, Sarasota, XXXXXX 2002 2003

 

Senior Information Systems Auditor

Consulted with CIO and Data Security Officer regarding IT risk areas. Led application reviews for a multitude of both clinical and non-clinical systems, including operating system (logical) security audits. Employed data analysis techniques to test and validate the adequacy of interface / transmission controls to recovery high-volume charges.

 

  Developed a new 3-year audit plan based on risk ranking after IT risk assessment.

  Successfully performed pre- and post-implementation reviews of PeopleSoft modules.

  Actively participated in the development of a resourceful Computer Incident Response Team.

  Served as an Information Security Council member tasked with designing valuable IS safeguards.

  Recovered $800,000 in gross charges after system implementation by software vendor and implementer.

 

Senior Consultant Technology Risk Consulting Andersen LLP, Orlando, XXXXXX 2001 2002

Operational Systems Risk Management PricewaterhouseCoopers LLP, Orlando, XXXXXX 1999 2001

 

Education & Professional Development

 

Bachelor of Science in Business Administration (Decision & Information Sciences 3.7 GPA) University of Xxxxxx

 

Certified Information Systems Security Professional (CISSP) No. xxxxxx (Since 2003)

Certified Information Systems Auditor (CISA) No. 0227711 (Since 2002)

Certified Governance of Enterprise IT (CGEIT) No. xxxxxx490

Member, FBI / DHS InfraGard Program Tampa Chapter

 

Technical Summary

 

Languages: C COBOL HTML SQL VBA

 

Networking: Networking (TCP/IP, LAN, WAN) WLAN 802.11

 

Internet: Security (Firewalls, Routers, Policies & Procedures)

 

Platforms / OS: AS/400 (OS/400) MVS (OS/390) UNIX (AIX, SUN, HP-UX) Microsoft Windows

 

Software: Symantec Vontu DLP Suite Endpoint Brightmail Rapid7 s Nexpose VM Websense

Quest (NetPro) AD and Exchange Auditing Courion Identity Management HP OpenView

Security Expressions ISS ACL 9.0 Visio MS Office Oracle/PeopleSoft JD Edwards Lawson

 

Yyyyyy x. yyyyyy

Xxxxxx, XXXXXX xxxxxx (xxx-xxx-xxxx abc@xyz.com

 

 

 

Date

 

Hiring Agent Name

Company Name

Address

City/State/Zip Code

 

Dear__________________:

 

I am exploring a new career opportunity within a challenging [ Insert Job Title ] role, and I believe that I can make a positive contribution to your success.

 

To acquaint you with my background, I can offer proven experience in Information Security / Cybersecurity, Enterprise Security Road Maps, Data Loss Prevention, Cloud Security Incident Response, Risk / Threat Assessments, and Vulnerability / Threat Management. I am also well-versed in Multi-Project Management, Team Building / Training, Best Practice Methodologies, Audit Processes, Regulatory Compliance (i.e. SOX, ISO2700), Due Diligence, Cost-Reducing Initiatives, Negotiations, and Vendor Relations, among other areas.

 

As Program Manager of Information Security and Acting Director for TriNet (f/k/a Gevity), I successfully authored a 3-year Enterprise Security Road Map while introducing a new Enterprise Data Loss Prevention program transcending IT-boundaries and increasing exposure / awareness to business stakeholders.

 

Within this role, I develop sound business cases to support budget and resource requirements while managing a $500,000 budget, and lead multiple risk-based vulnerability assessments against network perimeter and web-facing applications inclusive of remediation planning. I also coordinate multi-party data loss breach investigations, and extend monitoring and reporting of firewall and rule-base changes, UNIX and Oracle database administrator changes, and physical security monitoring (e.g. CCTV) capabilities and review.

 

A sample of my accomplishments include:

 

  Introducing a new formal Vulnerability Management program.

  Consistently avoiding disclosure of material or significant SOX Act IT findings.

  Collaborating with business teams toward 2 consecutive unqualified SAS 70 opinions.

  Enhancing monitoring of various critical Active Directory / Exchange change and security events.

  Coordinating Technical Surveillance Countermeasures (TSCM) bug sweep of a corporate facility.

  Chairing an IT Security Steering Committee of executive-level representatives from each functional area.

 

To complement this experience, please note that I earned a Bachelor of Science in Business Administration (Decision & Information Sciences, 3.7 GPA) from the University of Xxxxxx. I am recognized as a CISSP and CISA, and hold certified credentials in Governance of Enterprise IT.

 

As this is just an example of my abilities, please refer to my enclosed resume for additional experience in IT audit, technology risk services, information systems, and consulting leadership roles.

 

I am eager to discuss how my qualifications uniquely match your current and future needs, and look forward to interviewing with you soon.

 

Sincerely,

 

 

 

Yyyyyy x. yyyyyy

<< Previous           Back to Sitemap           Next >>

Remember: Hire Us To Write YOUR New Resume
And We GUARANTEE That If You’re Not Working In 60 Days Or Less,
We’ll Revise Your Resume, Refund Your Money,
AND Give You $50 EXTRA!

Click HERE!

Members Of The Following Resume Writing Associations:


BBB Rating : A+


Proud Sponsors Of:
 

 


 

For General Customer Service, Call Us Toll Free At 1-800-466-3076 Or Email Our Writers By Clicking HERE

 Resume Writing Group © 2005-.   All graphics & text on ResumeWritingGroup.Com are either owned or licensed by our company and may
not be reproduced without expressed, written consent.  Terms of service and rules for guarantees may be reviewed here...
*our resume writing Guarantee requires clients to save receipts as proof that they've submitted COPIES OF their NEW resume to a minimum of 40 employers USING OUR ADVICE.   REFUNDS ARE LIMITED TO RESUMES AND DO NOT INCLUDE ADDITIONAL SERVICES SUCH AS COVER LETTERS.REFUNDS CAN BE CLAIMED UP TO 90 DAYS AFTER PURCHASE.