resume

Not in love with this template? Browse our full library of resume templates

boy

Build your resume in 15 minutes

Use professional field-tested resume templates that follow the exact resume rules employers look for.
6

security consultant

  • Monitoring and respond to security events escalated by Level 1, 2, and 3
  • Collaborating along aside the engineering team
  • Collaborating along aside the Threat Intel
  • Collaborating along aside the Incident Response
  • Analyzing log, flow, vulnerability, user and asset data
  • Observing full visibility into network, application and user activity globally
  • Observing real-time correlation in QRadar (SIEM) 
7

security consultant

  • Deployment and migration to the following technologies: 
  • Documenting and creating VAPT reports as a part of the PCI DSS audits.
  • Supported periodic audits/reviews on application and department access rights to eliminate any possible risks.
  • Identified, triage d, and documented the instances of vulnerability areas and devices and recommended with possible remediation’s  as per bank standard procedures.
8

security consultant

  • Provision of training and translation
  • Compile and generate security reports on system and network access on a weekly quarterly and yearly basis.
  •  Lead Monthly Data Security and Privacy Meeting with client owners of various projects, to discuss the status of implemented data security and privacy controls and understand their expectations, to ensure all client requirements are met in an appropriate and timely manner. 
  •  Part of the contract negotiation team for account, to review client data security requirements. 
9

security consultant

  • Reviewing all Statement of Works related to any new work coming to account, to ensure appropriate verbiage is included with respect to data security and  privacy related requirements and if any regulation is applicable then that should also be included, making its scope loud and clear, to avoid any future non-compliance scenarios. 
  • Successfully implemented an IBM specific On/Off Boarding Tool- Blueroom, to automate the account wide on/off boarding process, thus making it easier to track the process. 
  • Helping and guiding account delivery team to correctly assess the scope of GDPR, for their projects and create all applicable contractual documents like Data Processing Addendums (DPA), DPA-Exhibits, Sub-processors contracts, EU-Model Clauses etc. 
  • Implementing GDPR related Technical and Organizational Measures across the account, to ensure all applicable controls in place and avoid any kind of non-compliance issues. 
10

security consultant

  • Having 3.5years of experience in cyber security&components using cyber security tools like Nmap, Wireshark, Nikto, Backtrack etc.
  • Having 1 year of experience in Network maintenance.
  • Good knowledge of All Cyber Criminals & their concepts.
  • Having a year of experience as a security researcher.
  • Having knowledge of Cyber Bullying, Trojans, Ransomware, Hackers Attacks, Phishing, Money Laundering.