Information Security Specialist Resume Examples

information security specialist

  • Implement access control best practices. Access request processing time improved by about 50%. 
  • Scan infrastructure for vulnerabilities.
  • Implement and automate anti-fraud controls. 
  • Participate in BCP and DRP planning and testing.

information security specialist

  • Lead security role on S4 HANA production redesign which reduced the number of overall roles by nearly 50% and eliminated intra-role SoD conflicts using task based roles.
  • Lead in developing security for BusinessObjects (BOBJ) application and provided administrative support.
  • Worked with all business areas to create Risk Analysis and Remediation (RAR) customized global rule set.
  • Participated in the implementation and deployment of the Central User Administration (CUA) application for the entire SAP landscape
  •  Developed and implemented security monitoring and reporting tools 
  •  Provided Production support in SAP Security related daily activities related to user authorization issues and user account administration 
  •  Assisted users in troubleshooting and identifying authorization issues using SU53 and trace analysis 

information security specialist

  • Utilized HP ArcSight SIEM Tool, Splunk, ArcSight Logger, RSA E-Cat, SEPM, Websense security tools for real time security incident investigation and analysis.
  • Monitored security logs from Firewalls (Checkpoint, Juniper, Cisco ASA, and Cisco Pix) and IDS (ISS, and Snort),  Antivirus (SEP), Proxy (Websense), Web Servers(Apache, IIS) and Exchange Servers(Symantec) 
  • Worked on Imperva and F5 web application firewalls to detect and investigate web application attacks (XSS, CSRF, Directory Traversal etc.).
  • Research and Investigation of Botnets, CnC, Ransomware and Phishing attacks in the network.
  • Creation of rules and Dashboards to detect malicious activities in the network.
  • Increased the number of security reviews performed utilizing the same resources.
  • Investigation of logs to detect exploitation in the vulnerabilities present in the network.

information security specialist

  • Implements information security policies and procedures for new projects to meet information security objectives and ensure effective implementation.
  • Manages strategies to control risks from inadequate protection of confidentiality, integrity, and availability of the information assets, processing facilities and connected services. 
  • Acts as technical SME that provide guidance to the team in-terms of best practices implementation and design on every new project that teams encountered. 
  •  Mentored my teammates in SAP Security concepts, and procedures. 

information security specialist

  •  Resolved wide range of SAP incident tickets as per established procedures. 
  • Malware analysis and Investigation using SEP, RSA Ecat, and raw logs.
  • Served as the team’s primary curator of documentation for security engineering and incident response procedures.
  • Developed security documentation to include policies and procedures for Incident Investigation, response and closure.
  • Presentation of security incident handling and improvement to CISO on monthly basis.