Published: Nov 11, 2025 - The Information Technology (IT) Security Specialist ensures the implementation and maintenance of information security policies, controls, and compliance frameworks to protect organizational assets. This role collaborates with technical teams and vendors to assess risks, address vulnerabilities, and strengthen the organization’s overall security posture. The specialist also promotes cybersecurity awareness and continuously improves processes to align with best practices and regulatory standards.

Tips for IT Security Specialist Skills and Responsibilities on a Resume
1. IT Security Specialist, Horizon Data Systems, Raleigh, NC
Job Summary:
- Creating and maintaining ICT Security policies and procedures
- Completing security assessments including threat risk assessments and system security plans
- Assisting in the management of several internal mailboxes
- Completing periodic system audits
- Review and monitor security alerts
- Providing tailored ICT security advice to the greater agency
- Assisting in investigations of breaches
- Managing a ticket queue with internal requests
- Being a point of contact for internal projects
- Promoting a positive security culture within the agency through process improvement
Skills on Resume:
- Security Policy (Hard Skills)
- Risk Assessment (Hard Skills)
- System Auditing (Hard Skills)
- Incident Investigation (Hard Skills)
- Security Monitoring (Hard Skills)
- Process Improvement (Soft Skills)
- Project Coordination (Soft Skills)
- Security Communication (Soft Skills)
2. IT Security Specialist, ClearPath Consulting, Des Moines, IA
Job Summary:
- Analysing and resolving security incidents
- Administering various IT security tools and applications
- Performing analysis of suspected malicious code and other software or programs and providing written and/or verbal analysis to management
- Assisting IT groups and business units in troubleshooting compatibility issues between security tools and business or productivity programs
- Analysing client and customer needs
- Working closely with management on assigned projects from inception through to implementation, ensuring adequate internal communication and user involvement is maintained
- Assisting management in investigating IT or cybersecurity events and developing resolutions
- Providing feedback and suggestions to improve IT Security processes and procedures
- Working closely with project managers to meet and complete project milestones accurately and on time
- Supporting the organisation's quality programme
Skills on Resume:
- Incident Analysis (Hard Skills)
- Security Administration (Hard Skills)
- Malware Analysis (Hard Skills)
- Troubleshooting Support (Hard Skills)
- Client Analysis (Soft Skills)
- Project Management (Soft Skills)
- Process Improvement (Soft Skills)
- Quality Assurance (Hard Skills)
3. IT Security Specialist, SilverPeak Financial Services, Tulsa, OK
Job Summary:
- Develop, update and maintain IT security policy, standard operating procedures and other technical documentation
- Responsible for assisting in the coordination effort of security activities such as security patch remediation, configuration review, and vulnerability management process
- Monitor for potential compromise, intrusion, significant event or threat to the security posture and security baseline
- Responsible for incident handling, coordinating with other teams to contain and mitigate security threats
- Perform application and infrastructure penetration testing
- Identify potential threats and develop recommendations for corrective actions
- Hands-on deployment of new technologies and security capabilities
- Maintain knowledge of current security trends and be able to clearly communicate with other teams
Skills on Resume:
- Security Policy (Hard Skills)
- Vulnerability Management (Hard Skills)
- Threat Monitoring (Hard Skills)
- Incident Response (Hard Skills)
- Penetration Testing (Hard Skills)
- Risk Mitigation (Hard Skills)
- Technology Deployment (Hard Skills)
- Cross-Team Communication (Soft Skills)
4. IT Security Specialist, IronBridge Manufacturing, Fort Wayne, IN
Job Summary:
- Oversee the daily operations of desktop support activities to ensure effective provision of second-line technical support and achieve service level agreements, objectives and deadlines set
- Develop training materials and procedures, or train users in the proper use of hardware or software and provide employees with guidance in handling difficult or complex problems
- Research and evaluate new desktop/laptop hardware and software technologies
- Maintain records of daily support activities, system problems, remedial actions taken and installation activities
- Communicate with end users through Help Desk tips, an intranet site, and other e-mail announcements
- Develop the security strategy, manage security projects and oversee the implementation of processes and methods for auditing and addressing non-compliance to information security standards
- Evaluate and select security applications and systems and deploy operating system, application security patches and anti-virus updates
- Assist in the implementation of security policies and procedures
- Review security violation reports and investigate possible security exceptions, update, and maintain and documents on security controls
Skills on Resume:
- Desktop Support (Hard Skills)
- User Training (Soft Skills)
- Hardware Evaluation (Hard Skills)
- Issue Documentation (Hard Skills)
- End-User Communication (Soft Skills)
- Security Strategy (Hard Skills)
- Policy Implementation (Hard Skills)
- Incident Investigation (Hard Skills)
5. IT Security Specialist, BlueWave Logistics, Mobile, AL
Job Summary:
- Support and drive global and local security initiatives throughout the project lifecycle
- Review system/application/procedure change request from a security perspective, and manage documentation
- Work with related teams to coordinate a response to security incidents in the region
- Develop training or awareness materials, and deliver training sessions to employees
- Track security-related news, analyze potential impact on ASML, and have stakeholders updated in time
- Analyze new/existing laws, regulations, and standards, etc., around Cyber Security Law and MLPS
- Identify applicable articles, and propose response plans
- Examine security data, discover trends and incident root causes, and deliver reports
Skills on Resume:
- Security Initiatives (Hard Skills)
- Change Management (Hard Skills)
- Incident Coordination (Soft Skills)
- Security Training (Soft Skills)
- Threat Analysis (Hard Skills)
- Regulatory Compliance (Hard Skills)
- Risk Assessment (Hard Skills)
- Reporting (Soft Skills)
6. IT Security Specialist, TechHaven Solutions, Boise, ID
Job Summary:
- Defend the internal network from outside Internet cyber threats
- Detect any unauthorized attempts to access the system
- Information Systems cyber security, including disaster recovery, database protection and software development
- Configure security hardware and software such as firewalls, antivirus programs, and operating system updates to make non-compliant environments compliant environments
- Develop, implement, and maintain security tools
- Develops security strategy, security awareness programs, security architecture, and security incident responses
- Evaluates new cybersecurity threats and IT trends and develops effective security controls
- Oversees the development of security awareness programs
- Recommend security enhancements to IT Management
- Assist with training Woodstream employees on security best practices
- Conduct periodic IT security audits and remediate findings
Skills on Resume:
- Network Defense (Hard Skills)
- Threat Detection (Hard Skills)
- Disaster Recovery (Hard Skills)
- Security Configuration (Hard Skills)
- Security Architecture (Hard Skills)
- Awareness Training (Soft Skills)
- Risk Evaluation (Hard Skills)
- Audit Management (Hard Skills)
7. IT Security Specialist, Redwood Energy Group, Eugene, OR
Job Summary:
- Work with architects and engineers to create security standards across all company networks
- Research IT security trends
- Serve as the point of contact for Woodstream SEIM
- Work with the SEIM vendor to remediate discovered issues
- Managing security audits and vulnerability and threat assessments and directing responses to network or system intrusions
- Authorize personnel and provide login credentials for the network
- Manage device security including endpoints, servers, e-mail and firewall security
- Manage and review software security packages such as antivirus, web and email filtering
- Develop and train employees on cybersecurity best practices
- Manage security compliance as it pertains to GDPR, California Consumer Privacy, and PCI
- Perform security audits on the network and maintain compliance
Skills on Resume:
- Security Standards (Hard Skills)
- Threat Assessment (Hard Skills)
- SEIM Management (Hard Skills)
- Access Control (Hard Skills)
- Endpoint Security (Hard Skills)
- Software Protection (Hard Skills)
- Compliance Management (Hard Skills)
- Cybersecurity Training (Soft Skills)
8. Senior IT Security Specialist, HarborPoint Health Systems, Tampa, FL
Job Summary:
- Provide input into IT security policies and ensure they are effectively implemented
- Ensure robust security monitoring and alerting are in place
- Deliver cybersecurity risk assessments, identify solutions to mitigate risks and work with the IT team and/or third-party suppliers to implement
- Articulate and present findings to Senior Management and formulate recommendations to improve PLI's cybersecurity posture
- Act as the lead for security tasks involving multiple team members and third-party suppliers
- Collaborate with Internal Audit, DPO, Business Assurance and across PLI
- Act as subject matter expert for relevant project teams in building security into systems and applications
- Carry out security assessments on projects from a governance perspective, and advise on security controls required
- Design and implement security standards across different technologies and applications in the business and ensure adherence
- Design and implement audits of computer systems to ensure operational security and protection from attack
- Investigate security breaches and other cybersecurity incidents and document findings, actions taken and any recommendations
- Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs
- Assist with 3rd party security audits, such as ISO 27001, World Lottery Association Security Control Standard and IT General Controls
- Assist with the security assurance of third-party suppliers (new and existing)
Skills on Resume:
- Security Policy (Hard Skills)
- Risk Assessment (Hard Skills)
- Incident Investigation (Hard Skills)
- Security Governance (Hard Skills)
- Audit Coordination (Hard Skills)
- Stakeholder Collaboration (Soft Skills)
- Standard Implementation (Hard Skills)
- Vendor Assurance (Soft Skills)
9. IT Security Specialist, Summit Ridge Analytics, Colorado Springs, CO
Job Summary:
- Performs activities including planning, providing technical leadership, and tracking projects and key task dates to other Security staff, programmers, and technical staff
- Participates in the development, maintenance, and testing of operating systems and application security
- Reviews existing data systems' security issues and procedures
- Uses Security monitoring tools to review, investigate, and recommend appropriate corrective actions for data security incidents
- Responds to problems for all levels of associates
- Participates in the 24/7 production system security issue and event handling
- Develops management reporting tools
- Communicates with customers and management to ensure customers’ security requirements are met and in compliance with company standards
- Develops processes to ensure Security complies with policies and standards
Skills on Resume:
- Project Planning (Soft Skills)
- Technical Leadership (Soft Skills)
- System Security (Hard Skills)
- Incident Response (Hard Skills)
- Security Monitoring (Hard Skills)
- Customer Communication (Soft Skills)
- Compliance Management (Hard Skills)
- Process Development (Hard Skills)
10. IT Security Specialist, Apex Infrastructure Group, Albuquerque, NM
Job Summary:
- Day-to-day security operations and management of the global Security Technologies and Controls, monitoring, events and alerts management, vulnerability assessment
- Standardisation of baseline builds, configurations, etc., to improve security
- Investigation and resolution of potential security incidents and other cybersecurity breaches, including documentation of the outcomes
- Manage third parties to implement, develop and review the appropriate security infrastructure
- Carry out security audits and ensure compliance and best practices is adhered to
- Lead, manage, coach and mentor certain team members to ensure high levels of performance
- Manage and operate the centralized security infrastructure of HKEX
- Perform security monitoring, event analysis and basic forensic investigation
- Handle and manage security-related incidents for containment and recovery
- Generate security-related management reports and statistics
- Receive and respond to emergency and non-emergency calls from internal users within HKEX
Skills on Resume:
- Security Operations (Hard Skills)
- Vulnerability Assessment (Hard Skills)
- Incident Investigation (Hard Skills)
- Vendor Management (Soft Skills)
- Security Auditing (Hard Skills)
- Team Leadership (Soft Skills)
- Forensic Analysis (Hard Skills)
- Incident Recovery (Hard Skills)
11. IT Security Specialist, OakStone Engineering, Lexington, KY
Job Summary:
- Manage the vendors responsible for the IT infrastructure and the telecommunication system of the organization
- Manage trouble ticket and service request escalation to ensure timely resolution of issues
- Engage with Management to understand new initiatives, providing information on the inherent information security risks of these activities, and outlining ways to mitigate the risk
- Provide management reports on overall security posture, risk register, vulnerabilities, threat intelligence, control, compliance and security awareness
- Manage Disaster Recovery and Business Continuity Plans, including periodic testing, implementation procedures and debrief
- Leads IT Steering Committee meetings and agendas and reports results to management
- Interact and liaise with external auditors and bank examiners regarding the Information Security Programs to assess compliance with internal policies and processes and make any required changes
- Manage the client's incident response team in the event of a technology emergency or cybersecurity incident and report to the management and other stakeholders
- Monitor emerging risks through regulatory and threat intelligence monitoring to implement mitigations
- Participate in industry collaborative efforts to monitor, share, and discuss emerging security threats
- Ensure that the cybersecurity risk profile is prepared annually and reported to the required parties
- Manage and track critical vendors responsible for threat identification, IT Implementation, Critical Software Systems and Data connectivity
- Train staff on network and IT security procedures
- Complies with all regulations that apply within the scope of the position, including BSA, AML, OFAC and CIP
Skills on Resume:
- Vendor Management (Soft Skills)
- Risk Mitigation (Hard Skills)
- Security Reporting (Hard Skills)
- Disaster Recovery (Hard Skills)
- Incident Response (Hard Skills)
- Audit Compliance (Hard Skills)
- Staff Training (Soft Skills)
- Regulatory Adherence (Hard Skills)
12. IT Security Specialist, BrightCore Technologies, Grand Rapids, MI
Job Summary:
- Ensure cyber security within the business by designing and deploying security policies, principles and practices
- Support SOX and ISO27001 audits to ensure compliance
- Support the business by keeping up to date with relevant legislation such as GDPR
- Investigate existing solutions to ensure they meet all recommended security standards and recommend remediation activities
- Work alongside the RE SecOps team to ensure a concise approach to Cyber Security and propose new solutions
- Provide a monthly update meeting with the IT manager to review and prioritise workload and objectives
- Work with teams within the wider global business to ensure a strategic security vision
- Investigate and implement new technologies to support the needs of the business
- Create and maintain technical documentation using defined documentation templates to support the management and deployment of IT solutions
- Support and maintain technical issues through Service Now
- Prioritising and managing the cybersecurity budget
- Work with IT suppliers to provide solutions, maintain existing infrastructure and investigate new technologies
- Obtain quotes from multiple suppliers and continuously work with existing suppliers to obtain the best cost
- Ensure that computer systems are fully operational and respond to any system failures that could have a significant impact
Skills on Resume:
- Cybersecurity Design (Hard Skills)
- Audit Compliance (Hard Skills)
- Regulatory Knowledge (Hard Skills)
- Security Assessment (Hard Skills)
- Technology Implementation (Hard Skills)
- Strategic Collaboration (Soft Skills)
- Vendor Coordination (Soft Skills)
- Budget Management (Soft Skills)
13. IT Security Specialist, NorthernLight BioTech, Burlington, VT
Job Summary:
- Identify equipment, hardware, software, documents and other artifacts that are included in the transition
- Ensure code meets security requirements
- Develop resolution of security vulnerabilities
- Collaborate with Information System Security Officers (ISSOs) and the TSA Information Assurance Division (IAD) regarding application security requirements and compliance with technical standards
- Work collaboratively and cross-functionally with engineering, operations, and security to implement continuous integration, CI/CD, production monitoring, and production support
- Correct application defects and perform Security and 508 POA&M remediation
- Coordinate information flow and data capture from the Level 2 application support team
- Perform application account maintenance, password resets as well as system account management, inclusive of issues related to logging in, management of software versions and access roles
- Perform all activities required for diagnosing, debugging, developing/coding, and assisting with promoting the software to production and perform quality assurance on software defects after the application release
Skills on Resume:
- Security Compliance (Hard Skills)
- Vulnerability Resolution (Hard Skills)
- Application Security (Hard Skills)
- Cross-Functional Collaboration (Soft Skills)
- CI/CD Implementation (Hard Skills)
- Account Management (Hard Skills)
- Software Debugging (Hard Skills)
- Quality Assurance (Hard Skills)
14. IT Security Specialist, RiverGate Construction, Omaha, NE
Job Summary:
- Support in reviewing existing and new IT services and solutions in MOAI to build security into the architecture, identify design gaps and recommend security enhancements in solutions and services
- Ensure alignment between IT security architecture frameworks and standards and the overall business strategy
- Actively and reactively ensure the availability of IT Services, perform IT security monitoring and testing
- Handle demands, order requests, and internal/external requirements, safeguarding IT security services, products, and architecture
- Contribute to IT security assessments or audits and support with incidents and investigations in accordance with the agreed and established process concerning the IT environment in MOAI
- Establish and demonstrate interfaces to relevant internal or external functions and managers
- Responsible for clarity in directives and instructions with IT Security and Group Security and ensuring the MOAI has the right IT technical level of ISMS implementation to be aligned with the ISO27001 standard
- Ensure IT security risks are followed up on in the MOAI Security Leadership Team and other governance meetings and record decisions taken in such forms
Skills on Resume:
- Security Architecture (Hard Skills)
- Risk Management (Hard Skills)
- System Monitoring (Hard Skills)
- Incident Investigation (Hard Skills)
- Audit Support (Hard Skills)
- Governance Alignment (Soft Skills)
- Process Coordination (Soft Skills)
- Compliance Management (Hard Skills)
15. IT Security Specialist, CloudMatrix IT Services, Salt Lake City, UT
Job Summary:
- Participation in cybersecurity audits and maturity assessment, applying reference frameworks
- Design and implement an information security management system
- Support other teams in implementing Risk, Governance, and Compliance controls
- Present technical material in a clear, organized briefing to both technical and non-technical personnel
- Support in business development both locally and regionally
- Maintain current knowledge of international (ISO, NIST), European (Directives, ENISA) and local standards and requirements (UKSC) from the field of cybersecurity
- Providing a dedicated information security lead advisory service to assigned ICT programs and projects
- Planning, analysis, development and maintenance of security plans, precertification, or interim authority to operate deliverables
- Conducting security assurance activities against the Australian Government security policy or related information security policy frameworks
- Communication within the ICT Program, other Information Security peers and ICT teams
- Record and maintain files/information in accordance with Defence requirements
Skills on Resume:
- Cybersecurity Auditing (Hard Skills)
- ISMS Design (Hard Skills)
- Risk Governance (Hard Skills)
- Technical Communication (Soft Skills)
- Business Development (Soft Skills)
- Standards Compliance (Hard Skills)
- Security Advisory (Hard Skills)
- Security Planning (Hard Skills)
16. IT Security Specialist, GraniteView Electronics, Manchester, NH
Job Summary:
- Establish the security architecture and requirements for Majid Al Futtaim Retail (MAFR) endpoints, network devices and other security apparatus on the infrastructure
- Implement security controls based on the adopted IT Security Strategy, regulatory standards, industrial frameworks, risk treatment plan or security initiatives from Holding and/or MAFR IT
- Participate in the process of risk assessments and controls assurance reviews
- Analyze business requirements to develop technical processes, configuration and operating processes for the IT and IT Security administrators
- Plan, engineer, review, and improve the security posture of the enterprise assets
- Coordinate the processes of defining, enforcing and reviewing adopted information security standards and overall security strategies posture
- Responsible for Enterprise Configurations Standardization and Security Hardening
- Responsible for overall Security and Vulnerability discovery and remediation of MAFR endpoints, network devices and other security apparatus on the infrastructure
- Responsible for the review of other security apparatus
Skills on Resume:
- Security Architecture (Hard Skills)
- Control Implementation (Hard Skills)
- Risk Assessment (Hard Skills)
- Process Development (Hard Skills)
- Security Engineering (Hard Skills)
- Standards Enforcement (Hard Skills)
- Vulnerability Management (Hard Skills)
- System Hardening (Hard Skills)
17. IT Security Specialist, SouthPoint Utilities, Columbia, SC
Job Summary:
- Develop and carry out information security plans and policies
- Develop strategies to respond to and recover from a security breach
- Develop or implement tools to assist in the detection, prevention and analysis of security threats
- Awareness training of the workforce on information security standards, policies and best practices
- Conduct and monitor network scans to find any vulnerability, breaches, intrusions and anomalous system behaviour
- Manage penetration testing, simulating an attack on the system to find exploitable weaknesses
- Identifying current and emerging technology issues including security trends, vulnerabilities and threats
- Proactive research to analyse security weaknesses and recommend appropriate strategies
- Liaising with vendors and team members to implement security solutions
- Lead incident response, including steps to minimize the impact and then conduct a technical and forensic
- Investigation into how the breach happened and the extent of the damage
Skills on Resume:
- Security Planning (Hard Skills)
- Incident Response (Hard Skills)
- Threat Detection (Hard Skills)
- Security Training (Soft Skills)
- Vulnerability Scanning (Hard Skills)
- Penetration Testing (Hard Skills)
- Risk Analysis (Hard Skills)
- Vendor Collaboration (Soft Skills)
18. IT Security Specialist, Beacon Data Consulting, Baton Rouge, LA
Job Summary:
- Works with IT leadership to develop a strategy for information security and recommends security enhancements
- Plans and ensures implementation of strategic security measures to protect computer systems, networks, and data
- Monitors systems and networks for security breaches and investigates violations when they occur
- Stays up-to-date on the latest intelligence, including hackers’ methodologies, to anticipate security breaches
- Research new technologies that will effectively protect the network to help prevent data loss and service interruptions
- Performs risk assessments on critical business systems
- Establishes system controls by developing a framework for controls and access levels and recommending improvements
- Establishes computer and physical security by developing standards, policies, and procedures
- Coordinates with facilities security and recommends improvements
- Ensures computer files are safeguarded by creating plans that require regular backups
- Develops procedures for source code management and disaster preparedness
- Develops security awareness across the organization by working with Talent Management to provide orientation, educational programs, and security-related communication
- Participates in review and planning of security architecture design, development of security incident response process, and IT security risk assessments
- Collaborate with IT team members during system upgrades and other maintenance needs
- Attend all mandatory trainings promptly
Skills on Resume:
- Security Strategy (Hard Skills)
- Risk Assessment (Hard Skills)
- Threat Monitoring (Hard Skills)
- Access Control (Hard Skills)
- Policy Development (Hard Skills)
- Disaster Preparedness (Hard Skills)
- Security Awareness (Soft Skills)
- Team Collaboration (Soft Skills)
19. IT Security Specialist, NextPhase Media Group, Richmond, VA
Job Summary:
- Adhere to the company's Health, Safety and Environment policy and procedures
- Provide outstanding Customer Service including excellent telephone and presentation manner
- Pragmatic approach to drive security solution delivery
- Maintain awareness of the organisation's needs and promote the benefits of a common approach to security
- Maintain awareness of current regulatory, technology and security standards
- Creating and implementing an IT Security strategy in the organization across all aspects of IT environments
- Supporting vulnerability and penetration tests on IT environments
- Creating and following up security knowledge in the whole organization, preparing the IT Security-oriented training
- Analysing vulnerabilities in the OT and IT environment and in security warnings
- Continuously monitoring and validating infrastructure for security risk overview and remediation
- Scanning stacks for security vulnerabilities and misconfigurations
- Reporting and communicating the vulnerabilities post-assessment
Skills on Resume:
- Security Strategy (Hard Skills)
- Vulnerability Analysis (Hard Skills)
- Penetration Testing (Hard Skills)
- Risk Monitoring (Hard Skills)
- Security Training (Soft Skills)
- Customer Service (Soft Skills)
- Regulatory Awareness (Hard Skills)
- Solution Delivery (Soft Skills)
20. IT Security Specialist, TrailBlazer Foods, Portland, OR
Job Summary:
- Participate creation of Identity Management security controls documentation
- Manage, configure, and support Identity Provider/IdP (e.g., Okta) for Single Sign-On (SSO)
- Support existing Multi-Factor Authentication for various systems and access points
- Review and advise partners regarding the security posture of Azure AD and Office 365 (O365)
- Support existing entitlement system for access auditing and reporting (e.g., RSA Identity and Lifecycle Governance)
- Help evaluate improvements or new vendors in this space
- Advise on user lifecycle management and access management processes to help evolve identity management maturity in IT and the business
- Accountable for supporting and maintaining existing ISR identity tools and processes and the infrastructure required to support them
- Focus on designing and implementing automation to aid the team in creating efficiencies
- Create and guide the implementation of OIDC and OAUTH for custom application development
- Responsible for determining the security controls and procedures from business requirements, translating these into workable business solutions, which include providing advice and consultancy on new and existing solutions
- Assist with the development of security strategy plans and roadmaps based on sound enterprise architecture and security practices
- Assist in the design, implementation, documentation and publishing of security control and related policies
Skills on Resume:
- Identity Management (Hard Skills)
- Access Control (Hard Skills)
- SSO Configuration (Hard Skills)
- MFA Support (Hard Skills)
- Security Consulting (Soft Skills)
- Automation Design (Hard Skills)
- Vendor Evaluation (Soft Skills)
- Policy Development (Hard Skills)
21. IT Security Specialist, IronOak Systems, Charleston, WV
Job Summary:
- Review information and technology security and Risk Management in Etisalat and advise on the mitigating strategies and controls (e.g., security policies, security functions/processes, security over infrastructure/applications, business continuity and crisis management, etc.)
- Produce a report with effective and accurate security audit findings and recommendations to remediate the control weaknesses and improve the overall maturity of the control processes
- Interact and build good working relationships with relevant stakeholders to coordinate effective performance of audits and grow understanding of current and future business objectives and challenges
- Perform research, develop and maintain comprehensive IT security testing and audit work programs, as well as value-added insights to share with stakeholders
- Support and advise the business in closing outstanding recommendations and reviewing and reporting on the completion of current and pending actions
- Promote team building and culture of knowledge/information sharing and effective relationships throughout the Internal Audit Department
- Adhere and promote the current Etisalat corporate values
- Keep up to date with the IT industry trends and advancements by investing in self-learning and being an active member and contributor at IT/ Cyber Security related organizations such as Cloud Alliance, SANS Security, OWASP, ISACA, ISC2, etc.
Skills on Resume:
- Risk Management (Hard Skills)
- Security Auditing (Hard Skills)
- Stakeholder Engagement (Soft Skills)
- Research Development (Hard Skills)
- Compliance Reporting (Hard Skills)
- Team Collaboration (Soft Skills)
- Knowledge Sharing (Soft Skills)
- Industry Awareness (Hard Skills)
22. IT Security Specialist, BlueSky Healthcare Partners, Madison, WI
Job Summary:
- Design and review the application security framework and system interface security to guard against security risk
- Review and evaluate the compliance with established policy, procedure and standard on system, network and database security
- Manage and handle vulnerability scanning/penetration testing to ensure security compliance
- Implement and oversee technological upgrades, improvements and major changes to the information security environment
- Assess current technology architecture and security measures such as anti-virus software, passwords and firewalls for vulnerabilities, weaknesses and possible upgrades or improvements
- Provide information security advice and requirements to IT teams for application, system and network implementation
- Address information security/cybersecurity issues, work with the IT team, vendors and business partners to identify security loopholes and apply fixes
- Plan and implement security policies based on customer business requirements throughout the whole IT security landscape (e.g., firewalls, proxies, email gateways, WAFs, anti-virus)
- Take care of security technology-related support requests for customers
- Make the customers work efficiently while maintaining a high level of security
- Support the SOC team in analyzing and responding to security events
- Consult and guide customers on all questions concerning IT security
Skills on Resume:
- Application Security (Hard Skills)
- Compliance Review (Hard Skills)
- Penetration Testing (Hard Skills)
- System Upgrades (Hard Skills)
- Vulnerability Assessment (Hard Skills)
- Security Consulting (Soft Skills)
- Policy Implementation (Hard Skills)
- Customer Support (Soft Skills)
23. IT Security Specialist, QuantumEdge IT Solutions, Reno, NV
Job Summary:
- Detect and respond to basic security incidents across the organization with the help of automated tools (Azure Sentinel, MS E5 Security stack, Palo Alto Security stack, Google Cloud Security, Terraform, etc.)
- Collaborate with the SOC vendor and raise T3 incidents to them
- Utilize the current security stack for analyzing and identifying tactics, techniques, and patterns of attackers
- Analyse network traffic and identify attacker activity
- Securing Kubernetes Clusters
- Taking care of API Authentication
- Establish DevSecOps and Shift Left mindset
- Scan for and identify vulnerable systems and applications
- Monitor and analyse emerging threats, vulnerabilities, and exploits as well as analyse possible risks and mitigations
Skills on Resume:
- Incident Response (Hard Skills)
- Threat Analysis (Hard Skills)
- Network Monitoring (Hard Skills)
- Kubernetes Security (Hard Skills)
- API Authentication (Hard Skills)
- DevSecOps Implementation (Hard Skills)
- Vulnerability Scanning (Hard Skills)
- Risk Mitigation (Hard Skills)
24. IT Security Specialist, LakeView Financial, Rochester, NY
Job Summary:
- Provide technical support in maintaining security governance programs
- Perform audits of potential security threats and violations
- Monitor security events daily and identify potential suspicious activities
- Prepare materials for regular governance meetings
- Facilitate the implementation of security measures
- Act as a consultant on a working level within a specific part of the IT organization for the creation, further development, and implementation of ZF's IT security guidelines and standards
- Extend the governance function of the IT Security department to achieve a consistent security level throughout the IT architecture and implementation of services in the IT organization
- Support the remediation of cases as a consultant for his respective department and the central IT Security organization, regarding IT security incident and problem management
- Part of the IT organization's IT Security expert team
- Contribute and support planning, budgeting, design and alignment of information security processes and IT environment
- Support security assessments of IT services
Skills on Resume:
- Security Governance (Hard Skills)
- Threat Auditing (Hard Skills)
- Event Monitoring (Hard Skills)
- Governance Reporting (Soft Skills)
- Security Consulting (Soft Skills)
- Incident Management (Hard Skills)
- Process Alignment (Soft Skills)
- Security Assessment (Hard Skills)
25. IT Security Specialist, BrightLine Automation, Peoria, IL
Job Summary:
- Enforce the effective global operation of the Cybersecurity function (e.g., Threat Management)
- Identity Management and Threat Intelligence technologies and processes)
- Consult and support stakeholders about IT Security best practices in all service lifecycle stages
- Analyse information related process to identify risk and propose a solution
- Monitor IT processes to ensure IT security standards are strictly followed
- Contributes to the design and implementation of pragmatic and efficient cybersecurity defences
- Support the activities of the Computer Security Incident Response Team (CSIRT) in RMIT Global
- Support in the monitoring of cybersecurity environmental threats, including periodic cyber technical compliance reporting of the operating environment
- Ensure the compliance of security standards, processes and procedures by continuously monitoring for vulnerabilities, periodic audits and identifying abnormality throughout the infrastructure
- Contribute to the continuous improvement of the IT Security function based on an in-depth knowledge of contemporary cybersecurity practices and trends
Skills on Resume:
- Threat Management (Hard Skills)
- Identity Management (Hard Skills)
- Risk Analysis (Hard Skills)
- Security Consulting (Soft Skills)
- Incident Response (Hard Skills)
- Compliance Monitoring (Hard Skills)
- Process Improvement (Soft Skills)
- Cyber Intelligence (Hard Skills)
26. IT Security Specialist, StoneBridge Manufacturing, Little Rock, AR
Job Summary:
- Formulating risk assessments and security strategies relating to the IT environment
- Assessing risks relating to the security of the IT environment
- Defining requirements for security measures necessary for the IT environment
- Ensuring consistency with security policies
- Designing security measures for the IT environment
- Selecting and comparing solutions to be implemented
- Planning operations for solutions to be implemented
- Identifying problems in operations and considering solutions
- Proposing solutions and building consensus with senior management
- Implementing and running security solutions
- Running security measures (setting configurations, answering questions, etc.)
- Liaising with security vendors
- Monitoring and evaluating security measures
Skills on Resume:
- Risk Assessment (Hard Skills)
- Security Strategy (Hard Skills)
- Policy Compliance (Hard Skills)
- Solution Design (Hard Skills)
- Problem Solving (Soft Skills)
- Vendor Liaison (Soft Skills)
- System Implementation (Hard Skills)
- Performance Monitoring (Hard Skills)
27. IT Security Specialist, SafeNet Logistics, Wichita, KS
Job Summary:
- Ensure that the IT environment has privacy, confidentiality, integrity, scalability, and availability
- Work well with team members, decision-makers, and stakeholders to define business requirements and systems goals, and to identify and resolve network and systems issues
- Implementing technical policies for user groups to adhere to
- Administering groups and organizational units in the system to correspond to business units and teams requiring similar access levels
- Auditing user access and activities from log files
- Handling account exceptions including lockouts, forgotten passwords, and setting up and deactivation accounts
- Design and perform server and security audits, system backup procedures, and other recovery processes in accordance with the company’s disaster recovery and business continuity strategies
- Establish and maintain regular written and in-person communications with the Director of IT security regarding pertinent network activities
- Direct and administrate a contingent of network analysts and technicians
- Guide junior members of the IT team
- Manage Day-to-Day Vigilance and User Support
- Monitoring application-specific access logs, looking for evidence of attempted penetration attacks, or working with developers to sanitize code designed to interface between data stores and public-facing services
Skills on Resume:
- System Administration (Hard Skills)
- Access Management (Hard Skills)
- Security Auditing (Hard Skills)
- Disaster Recovery (Hard Skills)
- Team Leadership (Soft Skills)
- Stakeholder Communication (Soft Skills)
- User Support (Soft Skills)
- Network Monitoring (Hard Skills)
28. IT Security Specialist, WestGate Petroleum, Midland, TX
Job Summary:
- Monitor organizations’ networks for security breaches and investigate regulatory violations
- Help to design, implement, and maintain the organization’s cybersecurity plans
- Develop and direct the implementation of security standards and best practices for the organization
- Directly in charge of installing, implementing and operating security tools, e.g., firewalls, data encryption, endpoint protection
- Recommend security enhancements to managers and leaders across functional teams
- Research the latest information technology security trends
- Help end-users when they need to install or learn about new IT systems and/or procedures
- Participate in documenting security, compliance and relevant technical issues, procedures, guidelines, etc.
- Ensure that IT security audits and compliance are conducted periodically
Skills on Resume:
- Network Monitoring (Hard Skills)
- Cybersecurity Planning (Hard Skills)
- Security Implementation (Hard Skills)
- Tool Administration (Hard Skills)
- Security Enhancement (Soft Skills)
- Trend Research (Hard Skills)
- User Training (Soft Skills)
- Compliance Auditing (Hard Skills)
29. IT Security Specialist, MetroPulse Communications, Orlando, FL
Job Summary:
- Educate and raise awareness on the development community in Madrid, regarding good security coding practices, and be the IT security advocate on-site
- Review the state of monthly patching, ensure that all servers/VMs have a patch schedule, and handle non-conformities like a VM cannot be patched (open JIRA, etc.)
- Steer the implementation of network compartment, help implement "Privileged Access Management" across infrastructure, and roll out server software deployment strategy
- Lead the yearly Disaster Recovery Tests together with providers and address findings to its Applications Owners
- Periodically review Pen testers' and also auditors' findings and address them to different stakeholders and mitigate the risk of remaining open points
- Monitor and analyse network traffic and security event data
- Investigate intrusion attempts and perform in-depth analysis of exploits
- Provide network intrusion detection expertise to support timely and effective decision-making
- Conduct proactive threat and compromise research and analysis
- Review security events that are populated in a Security Information and Event Management (SIEM) system
Skills on Resume:
- Security Awareness (Soft Skills)
- Patch Management (Hard Skills)
- Access Management (Hard Skills)
- Disaster Recovery (Hard Skills)
- Risk Mitigation (Hard Skills)
- Network Analysis (Hard Skills)
- Threat Investigation (Hard Skills)
- SIEM Monitoring (Hard Skills)
30. IT Security Specialist, Titan Engineering Group, Sioux Falls, SD
Job Summary:
- Reviewing upcoming solutions to ensure that they are designed to meet and exceed industry security best practices and internal compliance requirements
- Ensuring solution designs implement appropriate protective controls and processes to support and develop compliance levels
- Enhancing the processes used to assess solutions
- Providing technical guidance on topics including security protocols and system hardening in line with industry frameworks and standards including NIST, CIS and OWASP
- Contributing to the development and enhancement of internal configuration standards
- Leading investigations and analysis to provide comprehensive, evidence-based advice and recommendations
- Evaluation of security controls on existing solutions and recommending enhancements
- Participating in system audits to confirm users and systems are compliant with applicable security standards
- Contributing to the transformation of security, risk and compliance programs across GTP to help drive the maturity of the wider risk and compliance structures and frameworks
Skills on Resume:
- Security Design (Hard Skills)
- Compliance Assurance (Hard Skills)
- Technical Guidance (Soft Skills)
- Standard Development (Hard Skills)
- Control Evaluation (Hard Skills)
- Audit Participation (Hard Skills)
- Risk Analysis (Hard Skills)
- Program Transformation (Soft Skills)
31. IT Security Specialist, SilverStone Retail, Oklahoma City, OK
Job Summary:
- Works with IT to create and implement incident response plans
- Monitors the operation of network security solutions
- Performs log and malware analysis
- Ensures that the proper security controls are present and functioning
- Analyzes security requirements and recommends improvements to the configuration of systems
- Monitors network traffic for suspicious behavior
- Creates security policies and defends against unauthorized access, modifications, and destruction of data
- Consults with staff, managers, and executives about security best practices and provides technical advice
- Ensures IT is properly configuring and supporting security tools, such as firewalls and anti-virus software
- Trains staff to understand and practice good security hygiene
Skills on Resume:
- Incident Response (Hard Skills)
- Network Monitoring (Hard Skills)
- Malware Analysis (Hard Skills)
- Security Configuration (Hard Skills)
- Policy Development (Hard Skills)
- Access Control (Hard Skills)
- Security Consulting (Soft Skills)
- Staff Training (Soft Skills)
32. IT Security Specialist, CoreLogic Transportation, Jackson, MS
Job Summary:
- Analyze data from threat and vulnerability feeds and use the data for applicability to the organization
- Configure and monitor a variety of security devices and tools, including Anti-Virus endpoint, IDS/IPS, Firewalls, SIEM, DLP, NAC, Spam filter, Web filter, Patch Management, and Vulnerability Management tools etc.
- Execute policies and audit plans
- Identify security risks and operational needs
- Ensure compliance with all applicable configuration standards
- Generate reports on assessment findings and summarize them to facilitate remediation tasks
- Recommend improvements to the Information Security Program to the Information Security Manager
- Support the management of information security, the establishment and implementation of the Information Security Framework and Program in compliance with internal and external regulations
- Perform all tasks assigned by the Information Security Manager
- Follow established safety policies and procedures as outlined in the OEFCU Illness and Injury Prevention Program
- Submit to initial and ongoing Bank Secrecy Act (BSA) compliance training
- Incorporates current BSA regulations into applicable job functions
Skills on Resume:
- Threat Analysis (Hard Skills)
- Vulnerability Management (Hard Skills)
- Policy Execution (Hard Skills)
- Risk Identification (Hard Skills)
- Compliance Assurance (Hard Skills)
- Report Generation (Hard Skills)
- Program Improvement (Soft Skills)
- Regulatory Training (Soft Skills)
33. IT Security Specialist, GreenField Power Systems, Spokane, WA
Job Summary:
- Assist in establishing an internal Threat Hunting team
- Utilize QRadar to monitor malicious traffic, malicious payloads, detect insider threats, etc
- Utilize CrowdStrike to detect and remediate malware, endpoint protection, etc
- Utilize eDiscovery in 0365 to detect and remediate Phishing attacks, Spam, email recovery, etc.
- Develop and document intelligence artifacts and relevant detection and mitigation patterns
- Hands-on experience with writing and implementing complex analytics queries, threat visualization dashboards, and large data volume management
- Strong working knowledge of security-relevant data, including network protocols, ports and common services, such as TCP/IP network protocols and application layer protocols (e.g., HTTP/S, DNS, FTP, SMTP, Active Directory, etc.)
- Cyber Security subject matter expert in threat intelligence and vulnerability management
Skills on Resume:
- Threat Hunting (Hard Skills)
- Malware Detection (Hard Skills)
- Email Security (Hard Skills)
- Data Analysis (Hard Skills)
- Threat Intelligence (Hard Skills)
- Query Development (Hard Skills)
- Network Protocols (Hard Skills)
- Vulnerability Management (Hard Skills)
34. IT Security Specialist, DataSecure Partners, Knoxville, TN
Job Summary:
- Create, manage and maintain policies, processes and controls of information security
- Conducting Vendor Management and third-party security assessments
- Work with local development and infrastructure teams to identify and enhance IT security controls
- Participate in security/controls gap analysis to define and implement necessary solutions for compliance
- Promote IT security awareness and share best IT security practices as well as demonstrate adherence to internal controls
- Reviews vulnerability reports, researches vulnerabilities to assess risk and develops/documents mitigation strategies
- Performing risk assessments, compliance assessments and audits (internal and external) to compliance best practice frameworks and company policy
- Advise IT stakeholders on the effectiveness of corrective action plans in the event of non-compliance or detected vulnerabilities in the environment
Skills on Resume:
- Security Policy (Hard Skills)
- Vendor Management (Soft Skills)
- Control Enhancement (Hard Skills)
- Gap Analysis (Hard Skills)
- Security Awareness (Soft Skills)
- Vulnerability Assessment (Hard Skills)
- Risk Assessment (Hard Skills)
- Compliance Auditing (Hard Skills)