Resume Templates: Network Security Professional

BUILD MY RESUME

STEFAN DOE
CAREER OVERVIEW


1300 Lane Street, City, CA 00000 Cell: 000-000-0000 Email: email@email.com


Solutions-oriented IT security professional with extensive senior-level experience in system / network security analysis, information assurance, IT security governance and security administration. Solid background in IT risk consulting, IT risk operations, IT control reviews, identity and access management, firewall and IDS management, data loss prevention and 24/7 security operations. Intuitive and highly analytical with in-depth knowledge of networking security technologies, architectures and platforms with the ability to apply them to the strategic benefit of the organization. Excellent capacity to work with IT managers to prioritize activities and achieve defined objectives; ability to translate business requirements into security solutions. Strong knowledge of creating and revising ISO 27001-compliant security policies, and ISO 27001compliant Information Security Management Systems (ISMS).


QUALIFICATIONS


IT Security Management Security Infrastructure Design Firewalls, VPN, HTTP Proxies and Web Caches Anti-virus and Anti-Spam, Network Email and Web Filtering, IPS / IDS Identity and Access Management Information Protection Analysis Risk Management and Vulnerability Assessment Problem Resolution


Information Assurance Requirements Gathering Intrusion Detection and Prevention Procedure Definition Routers, and Switches Web Technologies (JSP, ASP, PHP, Ruby On Rails) Operating Systems (Windows, Linux, AIX) Database Systems Active Directory and eDirectory Project Management


ACCOMPLISHMENTS


Network Security Planned, designed, implemented, managed and optimized broad range of network security systems including Firewall, VPN, network Web cache, network Web filter, network anti-spam, email compliance, and intrusion detection / prevention system. Endpoint Security Delivered all facets of Endpoint Security, including antivirus, device control, token authentication, encryption, control access, workstation police, remote access and host intrusion system. Identity and Access Management Oversaw all aspects of identity and access control with Active Directory, eDirectory, Oracle and other systems / applications. Application Security Designed, programmed and launched application security controls and awareness of top security considerations for application development in SDLC. Risk Management Created, prepared, implemented and launched risk management process, including vulnerability assessment, control assessment, likelihood determination and risk prioritization. Forensics Managed computer and network forensics and incident management, including computer forensics in workstation, laptop, smart phone, servers, application, SAP and network.



Loading...