Resume Writing ?
The Following Text Is An Unformatted Professional Resume Sample
From The Writers At Resumes Guaranteed
ORDER YOUR OWN LETTER-PERFECT, JOB-WINNING RESUME AND IT WILL BE COMPLETED AS SOON AS YOU NEED!
Click HERE!
yyyyyy x. yyyyyy
10 short drive abc@xyz.com
xxxxxx, xxxxxx xxxxxx (xxx-xxx-xxxx
objective
results-focused information technology security executive eager to contribute superior policy development, organization and change management, business administration, compliance enforcement, and operational management skills toward collaborating with a progressive organization in maximizing bottom-line performance.
profile
more than 14 years of progressive information security experience, with expertise in developing cost-effective, client-specific solutions to minimize risk and ensure compliance with regulatory requirements. diligently plan, conduct, and report on information security compliance audits and gap assessments; extensive practical knowledge of national institute of standards and technology (nist), international organization for standardization (iso), federal trade commission (ftc), health insurance portability and accountability act (hixxxxxxa), and xxxxxxyment card industry data security standards (pci-dss). lead operational, security architecture, vulnerability assessment, access control, physical security, and wireless / desktop / server reviews. serve as a subject matter expert and apply depth of knowledge towards developing and streamlining standard operating procedures, compliance programs, and formal risk assessment processes, as well as toward training employees in security awareness. solid record of increasing employee productivity by reducing exposure to risk and systems downtime. demonstrated ability to build, train, and direct top-performing support teams. consistently achieve critical deadlines while maintaining high quality standards. unique blend of technical, leadership, and relationship management skills.
~ technical proficiencies ~
technology: client/server os: windows 2000, windows xp, windows 2003 server, linux, mac os x client,
mac os x server, windows mobile, encryption solutions
network: firewalls cisco & checkpoint, vpn s - rsa
database: ms access, sql
programming: visual basic, real basic, and html
security tools: saint security scanner, nmap, ethereal, red hat linux, intermapper, nessus, snort, l0phtcrack, henwen, backtrack v2, v3, v4
software: ms project, front xxxxxxge 2000, ms visio, office, rapidweaver, apple professional apps,
windows professional apps
~ key achievements ~
ø selected to manage prestigious verisign client accounts, including wal-mart, fairways markets, ahold, career education corporation, jellyvision, teletech, varian, basell, wilmington trust, tjx stores, barclays, and wyeth
ø produced employee security awareness video, handbook, digital flipbook, 12 security newsletters, and an online training program to support career education corporation in achieving full compliance
ø played an integral role in leading the vision dexxxxxxrtment, pharmacy dexxxxxxrtment, and the internal group health program at wal-mart to achieve hixxxxxxa compliance
ø conducted policy and technical assessments of numerous third-xxxxxxrty data storage, use, and transmission practices and technologies for wyeth
ø successfully created new, enterprise-wide encryption strategy, policy, and data collection process for barclays, thereby facilitating the comxxxxxxny s ability to meet strict audit requirements
ø led major security and regulatory compliance initiatives for tjx stores, including developing a risk management tool that provides overall exposure, confidentiality, integrity, and availability ratings for 15 it domains; xxxxxxrtnered with external legal counsel to help manage ftc-related issues
ø designed change management system to minimize downtime for biovail s critical business systems and prohibit deployment of unauthorized changes; additionally managed global implementation of antivirus/anti-malware systems
continued
yyyyyy x. yyyyyy xxxxxxge 2
career xxxxxxth
verisign inc, mountain view, ca 2006 c present
consulting manager
- apply depth of knowledge towards providing expert it security consultation and developing high quality solutions for a diverse client base with national and worldwide interests
- conduct thorough security assessments in line with individual business practices to define unique client needs and deliver recommendations
- plan and implement total comxxxxxxny and issue-specific security programs, identify and mitigate potential risks, and develop employee trainings / security awareness presentations
- developed strong policies, procedures, and controls to ensure compliance with all relevant regulations and local laws
strategic software solutions, royersford, xxxxxx 2005 c 2006
director of it security
- expertly set up and administered local practice dedicated to serving the needs of small businesses by creating customized security solutions, policies, and procedures
- created comprehensive security awareness program and oversaw the delivery of top-tier service; additionally developed comxxxxxxny s web presence
biovail, bridgewater, nj 2004 c 2005
director of global it security & networking
- led a staff of five specialists and managed a $1.2m budget to ensure the security of all global it systems and networks for canada's largest publicly traded pharmaceutical comxxxxxxny
- pioneered new policies, procedures, and technical controls and trained interdexxxxxxrtmental personnel on risk mitigation through responsibly managing intellectual property, executing processes, and effectively utilizing technologies
aventis (formerly rhone-poulenc rorer) 1995 c 2004
director of global it security, bridgewater, nj (7/00 c 1/04)
- in recognition of outstanding performance, steadily progressed within aventis to attain position entrusted with managing a geographically dispersed 15-member team and administering a $5m operating budget to ensure continuous security and indemnity to viruses, intrusions, and other potential it issues
- built and managed a global information technology security organization covering all business systems, applications, and intellectual property; developed worldwide xxxxxxtch process program to efficiently resolve system vulnerabilities
- directed the creation of network access control center to monitor system additions and block rogue connections
global is security coordinator, collegeville, xxxxxx (4/96 c 6/00)
- established initial security practice to minimize risk to corporate finances and employees, authored computer security and network policy, and performed local audits to ensure policy compliance
- designed global shared services websites and wrote associated encryption strategy in support of utilizing a global encryption tool to transmit data securely
- substantially enhanced critical relationships by strategically developing and implementing a local privacy solution boosting security of research dexxxxxxrtment and external xxxxxxrtner communications
customer support analyst, dagenham, england (11/95 c 4/96)
- provided exceptional customer service and worked closely with clients to develop customized solutions; additionally oversaw systems security, implemented new antivirus program, and instituted an improved document management system
credentials
pci qualified security assessor (qsa)
certified information systems security professional (cissp)
certified information security manager (cism)
certified information systems auditor (cisa)
health insurance portability and accountability act (hixxxxxxa) compliance certification
<< Previous Back to Sitemap Next >>
Remember: Hire Us To Write YOUR New Resume
And We GUARANTEE That If You’re Not Working In 60 Days Or Less,
We’ll Revise Your Resume, Refund Your Money,
AND Give You $50 EXTRA!