CV, Curriculum Vitae and Online Resumes Search
Recruiters - Try Postings!
Postings.com™ is a must-have for recruiters who want to:
- Find Qualified Candidates
- Find Job orders and Post Splits
- Be Found in Search Engines
- Implement a Social Sourcing Strategy
Job Seekers - Look Here!
Hitting a wall with your job search? Try Climber Premium.
- Top the Search Engines
- Unsurpassed Candidate Marketing
- Power Career Networking
- Fresh Jobs from the Net
Were you looking for Malware-Analysis job results?
Click Here to search for Malware-Analysis in our 2.4M jobs.
Online Resumes with "Malware Analysis"
. I am a capable network engineer with a solid technical background and a proven record in security policies and compliance, IDS/IPS, malware analysis, migration, configurations, active directory, installation, troubleshooting, vulnerability scans, and pen test. I believe I offer a set of skills that would benefit your company. With extensive knowledge and strong analytical skills complemented by excellent interpersonal ski...
Experienced analyst and consultant on geopolitical, economic, and national security issues / policy. Specializing in Cyber Security, HUMINT, and national security. Extensive background studies on U.S., Russia, and Middle Eastern intelligence. Adept at conducting in-person interviews, data assessments, and analyzing strategic planning for global operations. Highly familiar with industries relating to apparel, textiles, logis...
Tags for this Online Resume: Security, Incident Handling, Linux, Penetration Testing, Test, Banking Industry, bash, Certification for Information System Security Professional, Python, Malware Analysis, Incident Response, Digital Forensics, SANS GCIH, ISO 27001 LA, Insider Threat, Risk Management, Software Security, Reverse Engineering, Application Security, SOC operations, SIEM, DLP, Security Analytics, Secure Web Gateway, Advanced Persistent Threat
Summary: Over 35 years progressively responsible positions in Information Technology. * CISSP Certification * ITIL Foundation Certification * GREM Certification * Security Manager with proven track record in maintaining secure architecture * Responsible for the safety and security of 2,500 Financial institutions and over 9-million end-users * Maintained fraud rates of less than 0.1% overall * Created and maintained Security...
SUMMARY An Information Technology and Security professional with extensive background in the technology, engineering, and federal industries. Adept at learning and applying new skills and technologies. Supported users at all organizational levels. Additional experience with operations management, information systems administration, and infrastructure technology and design. Skilled in: * Microsoft Azure * Azure Site Recovery...
SR CYBER SECURITY ANALYST AND IT CONSULTANTNetwork Security Engineer - 10 Years of Experience - Near 30080
IT Security Analyst with notable success in directing a broad range of corporate IT security initiatives while participating in planning, analyzing, and implementing solutions in support of business objectives. Excel at providing comprehensive secure network design, systems analysis, and full lifecycle project management. Hands-on experience leading all stages of system development efforts, including requirements definition...
Areas of Expertise: * * Information Security Engineering and Compliance * Training and Instruction * Network Penetration Testing * Test and Evaluation * Software/Hardware Installation * Technology Integration * Data Analysis * Program Management * Intrusion Detection * Malware Analysis * Data Preservation * CIA Triad * Network Security * Security and Threat * Cyber Intelligence
CAREER HIGHLIGHTS: Cox Enterprises (March 2013 - Aug 2017) Sr. Security Analyst (Level III Analyst) Exploring, analyzing, and implementing the Cox Enterprises' security policies. Team Lead in the absence of SOC Manager for Detections, Investigations and Incidents Supervises and mentors a team of Level I/II Security Analyst in a 24/7 SOC environment. Provides PCI Compliance monitoring and systems overview on sensitive networ...
Tags for this Online Resume: Active Directory, Apple Mac OS X, Corrective Actions, Data Security, DHCP (Dynamic Host Configuration Protocol), Domain Name System, Financials, Firewall, Incident Response, IPSec
To work for an organization that provides an opportunity for personnel growth and development. The opportunity to demonstrate my drive and experience as well to increase my knowledge. Strong Microsoft Windows Server 2000/2003/2008/2008R2/2012R2 Strong Virtualization Experience: Hyper-V, VMWare ESXI and ESX, Xen Server, XEN Desktop, XEN App, VDI, NSX Strong SAN Implementation Experience Xiotech/EMC/ Strong Active Directory /...
Tags for this Online Resume: Compliance, DSS, PCI, PCI DSS, SAS, Active Directory, Microsoft Active Directory, Configure, Information Technology, it jobs, html, Hippa, GDPR, PII, Risk, FFIEC, DLP, linux, software, Malware Analysys, IT Security, Management, Splunk, FIM, Firewalls
A Masters Graduate and seeking position in Information Security/Cybersecurity where I could leverage my 3+ years of professional experience in Risk Management, Governance Risk and Compliance and team management with technical skill-set on IT infrastructure, Networks & Web Application security, Third part Risk Assessment, Identity Access Management, Data protection & Penetration testing.
Ideal Companies: Google, Facebook, Amazon, FireEye, Zscaler, Microsoft, Visa, Paypal, Adobe, Cisco, IBM, RallyHealth, Symantec, Synopsys, Deloitte, Fidelity, Salesforce, Twitter, Palo Alto, McAfee, Ernst Young, Mastercard
Tags for this Online Resume: Vulnerability Management, Penetration Testing, Network Security, Risk Assessment, Governance Risk and Compliance, Python, SQL, Intrusion Detection / Prevention, Malware Analysis, Incident Response
A Systems Security Professional with over 10 years of experience in Cybersecurity strategy, implementation, incident response, malware analysis, computer forensics, E-Discovery, data security, disaster recovery and SIEM implementation / configuration. Engagements have included maturing cyber programs, managing risk profiles, investigation of malware, intellectual property, patent infringements, human resource complaints, c...
Project Management, Client Relations, Health Informatics, Systems Analysis, Data Analysis, Project Management, Information Management, Database Management, Compliance, Help Desk. Troubleshooting, HIPAA, Threat Intelligence, Incident Response, Vulnerability Analysis, Malware Analysis, Intrusion Detection, Cyber Defense, Classified Operations, Intrusion Detection, Inside Threat, Security Audits, People Management, Risk Manag...