We provide IT Staff Augmentation Services!

Cyber Security Specialist Resume

4.00/5 (Submit Your Rating)

SUMMARY:

A competent IT Security administrator with extensive knowledge of monitoring and controlling data security within guidelines to ensure compliance and report on possible improvements. Well mannered, articulate and able to act as point of contact for colleagues and other IT system users.

KEY SKILLS:

  • CISCO devices, Windows 7, Windows 8, Server 2008 R2, 2003 and other banking systems (Misys products), Windows server 2003/2008 active directory & exchange experience, endpoint security.
  • SQL Server, MySQL, MS Access
  • Effective computer and network security management as well as network trouble shooting and or problem solving

WORK EXPERIENCE:

CYBER SECURITY SPECIALIST

Confidential

Responsibilities:

  • Perform day - to-day security log review and analysis in adherence with corporate requirements and industry security best practices. The log reviews include, but are not limited to, operating systems, databases, applications, networks and security applications
  • Monitor and manage corporate security devices and applications including Firewalls, Intrusion Prevention Systems.
  • Implement network security policies, application security, access control and corporate data safeguards
  • Perform vulnerability testing, risk analyses and security assessments
  • Oversee and monitor routine security administration
  • Respond immediately to security incidents and provide post-incident analysis
  • Research and recommend security upgrades
  • Assist in drafting and maintain documented standards, processes and procedures for Information Security.
  • Guide the business with the selection of appropriate IT controls in order to combat cyber-security threats leading to fraud.
  • Perform administrative tasks to install, configure, deploy end protection software
  • Research, develop and recommend security policy guidelines and or procedures
  • Conduct security audits and security assessments to provide recommendations for risk mitigation.
  • Produce or modify disaster recovery and business continuity work practices.

IT AUDITOR

Confidential

Responsibilities:

  • Planed audits, analyzed and documented all information systems and related controls and developing an appropriate audit program to test the controls identified.
  • Performed audits of the Group's Information Technology (IT) systems, Networks and Infrastructure to proactively assess, evaluate and appraise IT risks and internal control adequacy, strengths and weaknesses.
  • Ensured quality assurance in implementation of IT solutions to meet business requirements and provides IT Security expertise on key projects initiated by business and data centre
  • Performed follow-up audits to ensure that management has taken the agreed corrective action(s).
  • Participated in the testing of different system modules and products before launch.
  • Conducted data integrity reviews for ZB Bank and Confidential
  • Assisted external auditors in performing audit procedures (Yearend Audit)
  • Applied analytical skills to detect frauds, errors, anomalies
  • Performed application controls review to ensure completeness, accuracy of data input, processing and output.
  • Reviewed change management for authorization and business requirements.
  • Performed audit of the database and applications reviewing policies, standards, procedures, configuration and management of the database systems.
  • Participated in developing and coaching subordinate auditors

IT SECURITY ANALYST

Confidential

Responsibilities:

  • Managing the selection, design, justification, implementation and operation of information security controls, management strategies and standards, enabling effective assessment of risks to information integrity, authentication, and confidentiality, combating virus attacks, network hacking and system misuse.
  • Managing the enrolment of new users & leavers, making password changes and resets and exercising control on remote and wireless access authorisation.
  • Ensuring the protection of systems and information in storage, processing, or transit from unauthorized access or modification through the denial of service to unauthorized users.
  • Managing monitoring systems and logs to identify potential anomalies or breaches of security or policy and similarly to discover and report potential issues that need control action.
  • Investigating security breaches, including offensive or indecent material, and reporting such incidents immediately to the Head of IS.
  • Assessing the effectiveness of firewalls, SMIs (Smart Managed Interfaces), Gateways, IDS (Intruder Detection Systems) and IPS (Intruder Prevention Systems) to improve network/system resilience.
  • Contributing to Disaster Recovery and Business Continuity planning, testing and maintaining documentation as required. and ensuring that users are aware of the Group IT Security policy and other related policies so as to foster a good and safe computing culture in the Group

SYSTEMS SUPPORT TECHNICIAN

Confidential

Responsibilities:

  • Established and upgraded systems by planning and implementing desktop roll-out projects; data migration and recovery; operating system testing, roll-outs and patching; package development; and installing hardware, applications, and software.
  • Provided technical assistance and support for incoming queries and issues related to computer systems, software, and hardware.
  • Responded to queries either in person or over the phone walking the customer through problem-solving process.
  • Installed Operating systems (Windows 7, Server 2008 R2) and Applications software (MS Office, SQL Server Misys Equation, Equation branch automation, antivirus) and other software required by users.
  • Created and Updated self-help documents so that users can fix minor problems themselves.
  • Monitored system performance and took corrective actions.
  • Liaised with 3rd party service & hosting providers.
  • Maintained system and related business documentation.
  • Recommend changes to improve systems and network configurations, and determine hardware or software requirements related to such changes.
  • After hour standby duties on a rotational basis with other support staff.

JUNIOUR SYSTEMS ADMINISTRATOR

Confidential

Responsibilities:

  • Assisted with installation and maintenance of new and existing PC software applications and utilities.
  • Provided first line technical support; answering support queries via phone and email.
  • Supported users in the use of computer equipment by providing necessary and advice.
  • Maintained and Monitored Antivirus and Security solutions (Symantec antivirus).
  • Maintained software inventory records of applications, utilities and operating systems to ensure compliance with licensing agreements and corporate policy.

INTERNSHIP

Confidential

Responsibilities:

  • Assisted users with onsite support where users could not be helped remotely.
  • Provided remote user support and technical support; answering support queries via phone and email.
  • Logged calls filling out work report sheets for each call-out.
  • Respond to enquiries from clients and help them resolve any hardware or software problems.
  • Maintain a log of any software or hardware problems detected.
  • Supported users in the use of computer equipment by providing necessary and advice.
  • Installation and monitoring of mobile and temporary branches and ensuring branch connectivity.

We'd love your feedback!