

Not in love with this template? Browse our full library of resume templates
Related Resumes & Cover Letters
1
information security specialist
- Implement access control best practices. Access request processing time improved by about 50%.
- Scan infrastructure for vulnerabilities.
- Implement and automate anti-fraud controls.
- Participate in BCP and DRP planning and testing.
2
information security specialist
- Lead security role on S4 HANA production redesign which reduced the number of overall roles by nearly 50% and eliminated intra-role SoD conflicts using task based roles.
- Lead in developing security for BusinessObjects (BOBJ) application and provided administrative support.
- Worked with all business areas to create Risk Analysis and Remediation (RAR) customized global rule set.
- Participated in the implementation and deployment of the Central User Administration (CUA) application for the entire SAP landscape
- Developed and implemented security monitoring and reporting tools
- Provided Production support in SAP Security related daily activities related to user authorization issues and user account administration
- Assisted users in troubleshooting and identifying authorization issues using SU53 and trace analysis
3
information security specialist
- Utilized HP ArcSight SIEM Tool, Splunk, ArcSight Logger, RSA E-Cat, SEPM, Websense security tools for real time security incident investigation and analysis.
- Monitored security logs from Firewalls (Checkpoint, Juniper, Cisco ASA, and Cisco Pix) and IDS (ISS, and Snort), Antivirus (SEP), Proxy (Websense), Web Servers(Apache, IIS) and Exchange Servers(Symantec)
- Worked on Imperva and F5 web application firewalls to detect and investigate web application attacks (XSS, CSRF, Directory Traversal etc.).
- Research and Investigation of Botnets, CnC, Ransomware and Phishing attacks in the network.
- Creation of rules and Dashboards to detect malicious activities in the network.
- Increased the number of security reviews performed utilizing the same resources.
- Investigation of logs to detect exploitation in the vulnerabilities present in the network.
4
information security specialist
- Implements information security policies and procedures for new projects to meet information security objectives and ensure effective implementation.
- Manages strategies to control risks from inadequate protection of confidentiality, integrity, and availability of the information assets, processing facilities and connected services.
- Acts as technical SME that provide guidance to the team in-terms of best practices implementation and design on every new project that teams encountered.
- Mentored my teammates in SAP Security concepts, and procedures.
5
information security specialist
- Resolved wide range of SAP incident tickets as per established procedures.
- Malware analysis and Investigation using SEP, RSA Ecat, and raw logs.
- Served as the team’s primary curator of documentation for security engineering and incident response procedures.
- Developed security documentation to include policies and procedures for Incident Investigation, response and closure.
- Presentation of security incident handling and improvement to CISO on monthly basis.