resume

Not in love with this template? Browse our full library of resume templates

boy

Build your resume in 15 minutes

Use professional field-tested resume templates that follow the exact resume rules employers look for.
11

senior security consultant

  • Recruited to build IT operational infrastructure and define and execute IT strategy with a focus on delivering a low infrastructure footprint by leveraging virtualization, cloud and managed services, and incorporating technology to increase productivity. Develop IT operations road-map and direct IT governance to ensure outstanding performance of critical IT activities including, service management, IT engineering and operations, security infrastructure, vendor management, disaster recovery and business continuity planning. 
  • Conducted grey-box penetration security assessments of networked environments, identified security infrastructure weaknesses, evaluated counter-measures, and engineered security solutions, which reduces the cyber kill chain for companies 
  • Investigated IT security breaches and recommended risk mitigation strategies. 
  •  Served as part of a team hired to perform black box penetration tests of Windows 2008 and 2012 Servers, wireless networks, and social engineer employees, using Phishing emails.
  •   Performed an assessment of the overall website security, and made recommendations for implementing a defense mechanism for identified vulnerabilities, which were made based off NIST 800-53.
  •  Assisted clients with implementing a broad set of information security leading practices and technologies (e.g. application security, risk management, data protection, encryption) within AWS environments.
  •   Responsible for the creation and implementation of information security policies, based on Payment Card Industry (PCI) and NIST-800-53 standards.
12

security consultant

  • Training the account resources including the leadership, on GDPR Regulation, Principles of Privacy by Design and Default, and Data Security & Privacy Requirements for the account. 
  • Perform a Qualitative Risk Analysis of any new project coming to the account with respect to Data Security & Privacy Requirements. 
  • Create a risk log to keep regular track of the risks and ensure all applicable mitigation controls are in place. 
  • Implemented Segregation of Duties Control, with a SOD matrix using ART tool, to ensure no role conflicts arises. 
13

senior security consultant

  • Performed security assessment for clients in numerous domains including web, native, network, blockchain, hardware, policy, and SDLC.
  • Developed and improved testing methodologies for customer assessments   
  • Created a training program for new technical leaders, that taught essential skills about communication, delivery, self management, and critical thinking 
  • Appropriate Secondary Controls are identified and implemented, wherever there is a Role Conflict. 
14

security consultant

  • Provide Close Personal Protection to the client
  • Collection of local geopolitical data
  • Conduct Risk assessments and management
  • Surveillance
15

security consultant

  • Leading all type of information security related audits for the account like KCO (Key Controls Over) Audit, Risk Assessments, ISO-27001 audits. 
  • Keeping the account always in an AUDIT-Ready position, to strictly avoid any non-compliance. 
  •  Evaluates the adequacy and timeliness of management’s response and the corrective action taken on significant audit recommendations. 
  • Conducting Monthly Management Review Meetings, in order to discuss the existing Data Security & Privacy posture and how to improve further.