As part of an onsite team responsible for managing multiple hull construction at a Tier 2 shipyard with an, Participate in the supplier selection process and perform supplier, Provide direction of business process and.

Security Processes: Architecting Risk Based Security Solutions, Business Case and Proposal Writing, Risk Assessment, Vulnerability Assessment, Vulnerability Mitigation Process Design/Improvement, Security & Compliance Auditing, SIEM Integration, Regulatory Compliance: Confidential 800 - x (specializing in 800-53, 800-30, 800-37, & 800-39), FIPS, HIPAA/HITECH, PCI,, GLBA, SOX, EPA, EHR, EMR, Privacy & Disclosure Policies, SIG, Document Management, Applications / Application: Tenable Security Center (SC), Splunk, Snort, CSAM, XACTA, KeyLight, Wintel Systems, Confidential Sidewinder v8, LogLogic, pfSense Firewalls, Windows (2008 R2), Exchange (2007, & 2010), XenServer (5.5, & 5.6 SP2), Linux CentOS (5.x, 6.x) and Red Hat (5.x, 6.x), vCenter w/ Configuration Manager, Senior Information System Security Officer, IT Solutions Consultant - Cloud Services Provider, Senior Systems & Security Manager / Operations Manager, © 2022 Hire IT People, Inc. Implementing a proactive approach to information security risk management, focusing on the guidelines with the Confidential . You should also use bullets rather than paragraphs to describe your experiences, and keep bullets to no more than 2 lines each. Looking for a full-time role in south Denver or Colorado Springs, CO or a Remote position where my contracting experience and interpersonal skills can bring value. Write Business cases and proposals for all security architecture recommendations, Confidential 800-53 Security and Privacy Controls for Federal Information Systems and Organizations, Confidential 800-37 Risk Management Framework ( Confidential ). You wouldnt buy a product online without first reading the product description. Ensured to document analysis of security concerns in incident response format. For one, your experiences have to do with your creative output and skills, not necessarily traditional factors WorkSimpli Software, LLC Assisted in reporting of security alerts. MAC BAT HIGH PERFORMANCE STARTING BATTERY. Without the right help, cultivating a document that gets results is not easy, a sentiment shared by IT auditors just starting in the industry and those with your level of experience. Conduct annual (CP) Test and write/update CP following guidelines found in Confidential 800-37. Research emerging technologies in support of security enhancement and development efforts. All rights reserved. Successfully delivered multiple technology audits including Cloud Security, Mobility (BYOD), Third Party, Identity and Access Management, Vulnerability Management, SAP Post-implementation review, etc. There is no hard and fast rule about the length of a resume, but in general it is best to keep it succinct and to the point one or two pages long is usually ideal. As you draft your resume, youll want to keep a few basic guidelines in mind. Review of Visio network designs. Created and defined companywide IT Security policies and best practices to preemptively align security standards with HIPAA/HITECH requirements in pursuit of obtaining the future Safe Harbor status. When you apply for a job as an information security auditor, your resume goes through an applicant tracking system (ATS). Information security auditors are tasked with investigating an organizations security systems and procedures to uncover potential vulnerabilities. Performed Network compliance & vulnerability scans followed by delivering proposed remediation. And it provides more detail about what you did and the results of your work. Information Security is a "Skilled Trade" which requires years apprenticing. Documented findings and created reports with recommendations for remediation. Determined audit scopes, tested IT controls and accurately reported audit findings.

Designed the Risk Based Security Architecture for a complete retrofit of Security Services within the Engineering and Operational environment. Moved to Denver, CO. Collaborated with ISACA on their certification program for Cybersecurity Nexus (CSX) III. | Browse By Location | Browse By Category | Jobs Just Posted. So its crucial that you use them to your advantage. Reviewing and establishing consistent information security policies and standards across the enterprise to enforce ownership and accountability, Assessing and recommend Risk Management or Compliance strategies, policies and governance, Project Management of project risks and controls, Facilitated the design phase of a MetricStream Confidential solution for Confidential, Reviewed and analyzed Gulfstreams Tenable s security center upgrade. RSS | Responsible for HIPAA Security Risk Assessment, ITGC Audit, and auditing Cerner- P2 Sentinel. Monitored, revised and documented information security alerting. Scheduled and performed quarterly. Architect, Deploy, and Manage Tenable Nessus Professional Feed Scanner. Implement Security Framework for Electronic Records Archive ( Confidential ) Project. Finally, try to leave some white space on the page to make the document less overwhelming. Business Continuity - Disaster Recovery, CONTRACT - PROJECT CONSULTING EXPERIENCE June - Present. Created, managed and implemented internal security audit process. Here are some common keywords for information security auditors: As an information security auditor, you need to be proficient in a variety of software programs and systems in order to do your job effectively. Performed risk assessments and gap analysis of the companys information security program against industry best practices, including PCI DSS, SOX, FISMA, NIST SP800-53/ATO2.3, ISO27001/27002, CSA Z1002 and others as applicable.

Coordinated and deployed new computers to every department within the organization. TechOne Staffing, Inc. Greenwood Village, CO (Contract work for Kaiser Permanente), Sr. Security & Compliance Consultant Duration: Feb Present, Randstad Technologies, LP Lone Tree, CO (Contract work for Charles Schwab), Sr. Analyst Vendor Information Security Oversight Duration: Aug - Feb, Rose International - Greenwood Village, CO (Contract work for Kaiser Permanente), Sr. Security & Compliance Business Consultant Duration: April - Aug, In Transition Duration: Feb - April, InSight Global - Houston, TX (Contract work for Hewlett-Packard), Third Party Global Cyber Security (GCS) Assessment Duration: July - Feb, W-Industries (CSE ICON) - Houston, TX (Contract work for Energy Transfer and INGAA), Sr. Keeping up to date on the latest in IT Security. You identify vulnerabilities in networks and systems, study internal IT controls, head audit testing, and communicate with relevant staff about technical problems. Proven ability to assess and mitigate information security risks across a variety of industries, including banking, healthcare, and retail. (phone hidden) | (email hidden) | Colorado, LinkedIn: www.linkedin.com/in/marilyn-sousa-cisa-cism. Proofreading your resume is important to making sure it looks its best. templates that follow the exact resume rules employers look for. We believe that our battery is the future of the automotive battery market with its outstanding performances and its low environmental impact. Successfully delivered the annual IT SOX program (ITGC, Application controls, and Key reports) which includes planning, scheduling, review of work papers, follow-up, and closure. Design security services which include the development, design/implementation and evaluation, to fulfill the security service catalogue. Conducted security assessments of systems and applications to identify vulnerabilities and risks. Performed IT security assessments of networks (IBM RACF, Cloud), Security Operations assets, Facility Operations assets and medical equipment with clients and vendors. The knowledge that I have gained during my 15+ year career allows me to always look a problem with an outside the box viewpoint and to tailor proven solutions to a new problem while dramatically increasing the efficiency of the process or procedure. Reviewed scans of servers, workstations and network equipment configurations. They identify risks and recommend solutions to protect against unauthorized access, theft of data, and other threats. After logging in, come back to this page and refresh your browser. | Cookie policy, Hire IT Global, Inc - LCA Posting Notices. MacBat is a unique combination of latest Supercapacitors power pack technology with traditional Lead-Acid Battery. Architect, Deploy, and Manage Tenable Nessus Scanner & Passive Vulnerability Scanner, Confidential, CIS, FISMA, & FIPS compliance. Provide advance compliance draft audit consulting to focus on. Ensured create procedures in support with IT procedures. San Juan, PR, USA 00907 Related: What Is an Information Security Auditor? Privacy policy Provided technical security engineering support for complex software, hardware, network systems; design, develop, and execute security tests and evaluations (ST&E) of annual audit plan, vulnerability assessments and audits; risk mitigation and analysis of security threats. Oversaw the creation - draft, enhancement, and adoption of information security policies and standards with the needs of business segments.

Experience and knowledge in security compliance and internal audit of networks and rd party associates for Health Care, Financial Institutions, Oil & Gas, Federal and Fortune companies to industry standards. Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC). Read our, IS Cybersecurity Engineer, Remote - Cloud, Lead Security Engineer Application Security, GRC SECURITY ENGINEER, FCH - IT - SECURITY, Sr. Technical Program Manager, Finance Security, By creating a job alert, you agree to our, Platform Security Engineer (Remote) salaries in Milwaukee, WI, questions & answers about Johnson Controls, State of Wisconsin Investment Board jobs in Madison, WI, IS Cybersecurity Engineer, Remote - Cloud salaries in Madison, WI, Milwaukee Electric Tool Corporation jobs in Brookfield, WI, Lead Security Engineer Application Security salaries in Brookfield, WI, questions & answers about Milwaukee Electric Tool Corporation, Senior Quality Engineer salaries in Neillsville, WI, GRC SECURITY ENGINEER, FCH - IT - SECURITY salaries in Menomonee Falls, WI, Cloud DevOps Engineer - DAS Audit salaries in Milwaukee, WI, Three Square Market, Inc. jobs in River Falls, WI, Chief Information Security Officer salaries, Amazon.com Services LLC jobs in Wisconsin, Sr. Technical Program Manager, Finance Security salaries in Wisconsin, questions & answers about Amazon.com Services LLC, Northwestern Mutual jobs in Milwaukee, WI, Senior Security Engineer salaries in Milwaukee, WI, questions & answers about Northwestern Mutual, AE Business Solutions jobs in Madison, WI, Senior Security Engineer salaries in Madison, WI, questions & answers about AE Business Solutions, LOCKHEED MARTIN CORPORATION jobs in Marinette, WI, Quality Engineer salaries in Marinette, WI, questions & answers about LOCKHEED MARTIN CORPORATION, Supplier Quality Engineer salaries in Eau Claire, WI, Sr. Operationalizing Risk Management thru the, Identifying risks through a comprehensive evaluation process. Lead Configuration Analyst for the Tripwire v8.2 Deployment to fulfill: Change Control, Confidential, CIS, FISMA, & FIPS compliance. Studying for the CISM and CRISC. Recent Searches. Writing Security Plans, Contingency Plans (CPs), analyzing scan results; experience creating and reviewing reports in ArcSight and Splunk. I am also well versed with the Confidential 800 Series, Cyber Risk Management Framework, IRS Pub 1075, and Privacy/Disclosure Policies, Designing Security Program Posture in accordance to the Confidential Cyber Security Risk Management Framework, Reviewed Control Assessment Questions for IRS Pub 1075, GLBA, SOX, Basel 2.0, Performed Audits and Assessments for clients, Provided Analysis and assistance to the software development team, Provided a Confidential solution to the South Carolina Confidential, Worked Directly with the PMO to discovery and make recommendations for improvements, Provide strategy for tactical decision on regulatory compliance. Also, the light weight of this battery would be 8-9Kgs lesser than conventional lead acid battery, which will slightly improve the overall power to weight ratio. Review Audit Logs for assigned Applications. For more information, see the, For the best experience, please upgrade to a modern, fully supported web browser. Assist in responses to external audits, penetration tests and vulnerability assessments. Managed audit results to maintain compliance with GAO and other auditor findings. Integrate antivirus, desktop firewall, intrusion prevention, and network access control to defend against malware on the Confidential network. Utilized Confidential 800-37 to accomplish goals, Management of all open Plan of Actions and Milestones (POAMs). List of Resumes | Risk profiling of clinical devices and applications for IT governance for. Identified high risk areas and made recommendations for risk mitigation and process improvement. Holds CISSP and CISA certifications. Sub-contracted to Raytheon at NASA. Architected policies, procedures, & documentation for the Authorized Security Risk Assessment Framework Conduct risk assessments, penetration tests and diagnose security vulnerabilities in the operational environment as well as systems under design. This solution is being modified to be used for the whole of the Agency, The Confidential & Records Administration. Provide and implement recommendations to improve security and remediate Plan of Action & Milestones (POAMs ). Job Objective Looking for an opportunity to put my skills and training to work for your company by acquiring the position of Security Auditor. Additionally, many organizations are now using social media platforms to share information about security threats and vulnerabilities, and security auditors who are familiar with these platforms will be better equipped to take advantage of this growing trend. Use your resume to let employers know which professional accomplishments, skills, and responsibilities make you a great fit for their company culture. Last Updated (Wednesday, 21 April 2021 22:11), We believe that our battery is the future of the automotive battery market with its. Senior Subject Matter Expert (SME) managing and architecting many industries through implementation of the Risk Management Framework; including IT Business Systems for Financial, Government Services, Department of Defense and the Information Technology Industry, with experience building security frameworks for enterprise systems to meet current and future needs specializing, but not exclusively, with Tenable Security Center, and Secret Server by Thycotic Software. Reviewed risk assessment reports for senior executive team quantifying and verifying action plans to remediate identified risks; evaluated compliance closures for upper management of audits performed for the National Science Foundation (NSF) Antarctica. Analyze ArcSight and Splunk data to interpret reports. Advise Engineers on Security Best Practices and how to integrate those best practices into existing and new solutions.

Ensured to work in Compliance with Risk Teams. Collaborates with management to improve internal controls and processes - preparing risk assessments. Spelling mistakes, punctuation mistakes, and grammatical mistakes can all be easily corrected with a careful eye. Develop and interpret security policies and procedures, determine applicability to the Division IT infrastructure, communicate findings to Information Security Officer, Information Systems Security Officer, and Engineers. Whether you're seeking an entry-level position or have been in your career for a few years, exposing your relevant achievements in your resume can allow you to stand out and get that job interview. Indeed ranks Job Ads based on a combination of compensation paid by employers to Indeed and relevance, such as your search terms and other activity on Indeed. Gathered and documented assessment results; a liaison Point Of Contact with business unit directors, managers and clients; conducted one-on-one meetings with the asset owners. Validated evidence from third parties to assist in closing identified findings. Indeed may be compensated by these employers, helping keep Indeed free for jobseekers. Managed Co-source staff and relationship with external auditors for effective execution of the annual audit plan. When trimming down a resume, focus on removing irrelevant information and details, and on highlighting the most relevant experience and skills. Development of interconnected systems to create strategic solutions to structural deficiencies such as Separations of Duties and Password Management. Contracted to Northrop Grumman Mission Systems to provide technical IT Security expertise in Information Assurance (IA) for systems compliance support safeguarding associated classified and unclassified systems. Conducted IT audit fieldwork; walkthrough and detailed testing of controls. Utilized the Defense Information Systems Agency (DISA) approved checklists. Soft Skills: Communication, Leadership, Teamwork, Time Management, Risk Management, Attention to Detail, Problem Solving. Industry Knowledge: IT Audit, Cyber Security, IT Governance, ISO 27001, NIST, PCI DSS, ITIL, COBIT, GDPR, FISMA, ISO 27017, ISO 27018 Projects completed for contract agencies for multiple projects. Provided status updates to the PMO 3 times a week showing the project was on schedule. Develop Department of Homeland Security ( Confidential ) mandated security documentation and enter into XACTA tool. When recruiters look at your IT auditor resume, they must immediately see what makes you a great auditor. Here are some tips and an example plus resume template to help you do just that.

Discovery and Documenting of Current Architecture. You want to know what youre getting, and if its any good. Review and interpret vulnerability scans. Copyright Climbtheladder.com All Rights Reserved. Point of contact for external auditors as regards IT Audit projects. Information security auditor with 10 years of experience in the field. Looking to leverage my years of Sr. Security Analyst and IT Cyber Security Regulatory Compliance Auditor. Sub-Contracted to SAIC to provide Information Assurance Certification and Accreditation (C&A) and Cross Domain Solution (CDS) support to the Navy at SPAWAR. Examine whether IT strategy is aligned with Business objectives, identify gaps and make recommendations to breach the gap. Tracked assessments in the RSA Archer for HP Global.

Collect and analyze data to detect deficient controls, duplicated effort, and non-compliance with laws, regulations, and management policies. Experience responding to, analyzing, and communicating information, Expert knowledge of DBA administration and, 5-7 years of professional experience in information technology, specifically software development , risk and. Rebuilt All LogLogic Devices to effectively collect and aggregate data. IT & Cyber Security Consultant Duration: Oct - July, MRI Technologies - Clear Lake City, TX (Contract work for Space Center Houston (NASA)), Sr. System IT Security Engineer Duration: July - Oct, In Transition Duration: April - July, Brandon Technology Consulting - Alexandria, VA (Contract work for Defense Health HQ-DHHQ), Sr. Network Security Engineer Duration: Jan - April, NCI Information Systems - Col Springs, CO (Contract work for U.S. Air Force Space Command), Sr. Information Assurance Engineer Duration: Sept - Jan, Yoh, Inc. - Colorado Springs, CO (Contract work for The Boeing Company), Sr. Computer Security & Information Protection Specialist Duration: Sept - Sept, In Transition Duration: June - Sept, Yoh, Inc. - North Charleston, SC (Contract work for Space & Naval Warfare Systems Command), Sr. Systems Analyst Duration: April June, Booz Allen Hamilton - North Charleston, SC (Contract work for the VA, NSF and IRS), Sr. Systems Security Engineer Duration: Dec - April, G&B Solutions - Lakewood, CO (Contract work for Department of Interior (DOI)), Sr. C&A Security Analyst Duration: Dec - Dec, Boecore - Schriever AFB, CO (Contract work for to the Missile Defense Agency), Sr. Systems Security Engineer Duration: Dec - Dec, The Metropolitan Water District of Southern California - Winchester, Cal Poly Pomona - College of Agriculture - Pomona, List of Jobs | Passed Cybersecurity certification. Tracked in RSA Archer. Responsible for timely execution of financial reporting control test work and risk-based IT internal audits. Developed, implemented and updated corporate IT Security policies and procedures.

Develop dashboards/reports in ArcSight for external customers for audit monitoring. If youre on the lookout for a new position, or just have the idea in the back of your mind, its a good plan to update your resume. Browse our full library Coordinated with stakeholders and performed audit on departments. Architect for all Security and Operational systems. Maintained system configuration service line structure. If you are not able to grow at least 25% a year than you are at best standing still, but more likely than not you are falling behind your peers. Manage, Architect, & Designer for a modern continuous monitoring and remediation solution. university louisville web vector security systems development computer Recommend and coordinate the application of fixes, patches, and disaster recovery procedures in event of security breach. How to Write an Impressive Resume Objective, 6 Easy Steps to Blow the Dust Off Your Resume, How to Create an Artist Resume That Complements Your Portfolio. How to Become One. Support enterprise-wide security awareness program. Implemented IT Security Test Plans, Security Compliance Testing (Nessus scans), Risk Assessment Reports and Accreditation Reports of the DHHQ TRICARE systems. Verify actions have been completed and obtain artifacts/evidence to close POAMs. Use professional field-tested resume Security advisor - IT network support staff; director level - provided Information Assurance (IA) guidance and clarification direction to AF Wings and units. Project Management duties included designed, developed, and managed projects to track and major security undertakings. Provided support to clients on hardware and software issues.

(Cloud computing, reviewing the newest revision NIST -). Related: How Much Does an Information Security Auditor Make? The transition took half the time allotted in the maintenance window. If your resume doesnt have enough of the right keywords, the ATS might automatically reject your application. Email: [emailprotected]. There are a few things you can do to make your resume more readable and skimmable. Define the boundaries of applications / infrastructure, network diagram reviews (Visio) and gathers evidence to support the identified NIST Controls are in compliance with IBM. university louisville web vector security systems development computer Provide d expert security consultation/advice on highly complex systems. Proposals Draft the business case and once approved the solutions proposal for all Information Technology Initiatives.