Documents
Resources
Learning Center
Upload
Plans & pricing Sign in
Sign Out

Information Security Director Resume Sample

VIEWS: 760 PAGES: 3

Enjoy this expertly developed sample information security director resume with complimentary cover letter strategies included. Unlike most resume samples you will find, this one is a completely editable Word document, which means you can revise this resume as needed to suit your needs while keeping the stylish format in tact.

More Info
									                                      JESSE KENDALL, MSIA, CISSP, SSCP, MCSE
                                123 Elm Street  Miami, FL 33183  (305) 555-5555  jkendall@notmail.com


                                              INFORMATION SECURITY DIRECTOR
Performance-driven Information Systems Architect/Manager with expertise in directing all aspects of highly technical multimillion dollar
projects. Effective in defining breakthrough technology options based on organizational standards, security policy, and the strategic
needs of the organization. Recognized as an organizational thought leader and subject matter expert. Top Secret/SCI Clearance.

                                                        Areas of Excellence:
     Process Management                           Access Management                               User Provisioning
     Web Services Security                        Privacy Management                              Project Management
     Development Management                       High-Impact Presentations                       Content Management
     Vendor Relations/Negotiations                Systems Development Life Cycle                  Team Motivation/Leadership

                                                     PROFESSIONAL EXPERIENCE
Information Security Director, Field Intelligence Systems
ABC CORPORATION – Miami, FL (20xx-Present)
Direct overall efforts to modernize and enhance United States Air Force and National Security Agency COMSEC Operations. Lead
teams in support of information systems security architecture and management for the USAF Cryptologic Systems Program Group.
DELIVERED RESULTS:
     Planned and executed strategies to ensure effective oversight of information security program aspects of USAF Cryptologic
      Systems operations for high-profile programs, including the F-22, Joint Strike Fighter, and Future Combat Systems.
     Managed development of key distribution services in support of federal sponsors.
     Devised program enhancements by applying complex information security architecture and systems engineering principles; met
      rigorous requirements in development of sustainable and deployable national security systems.
Information Security Director, Federal Systems Security-Application Security
CDE CORPORATION – Miami, FL (20xx-20xx)
Provided information security and network architecture, engineering, and management oversight for the U.S. Department of Homeland
Security Office of the CIO through a high-performance technical section consisting of five direct reports and dotted line associates in
support of technical and application security of federal systems with public mission outreach.

Offered executive technical advisement to the DHS CISO, ITO, and CIO on federal architectural, engineering, and operational
committees. Ensured compliance with FISMA for IA platforms, DHS technology reference standards, and Federal Enterprise
Architecture (FEA) regulations.
DELIVERED RESULTS:
     Researched, identified, and delivered breakthrough technology solutions and provided secure, integrated information services to
      the Homeland Security CIO, the Homeland Security Chief Information Security Officer (CISO), and the Infrastructure
      Transformation Office (ITO).
     Conceptualized and deployed solutions that secured access to sensitive but unclassified (SBU) and classified networks.
      Provided enterprise technical architecture and security architecture guidance for the largest government organization in
      existence. Authored application security portions in support of the DHS security architecture, including identity and access
      management and HSPD-12 positions.
     Served as expert advisor on platform deployment of the DHS One Network, DHS Active Directory and Exchange Infrastructure
      (ADEX), and DHS service oriented architecture (SOA).
     Spearheaded a comprehensive evaluation of PKI and identity and access management strategies for the DHS CIO. Evaluated
      and designed HSPD-12 PIV strategic security architecture plans.
     Devised DHS extranet operations models. Managed subordination of a Federal Bridge accredited PKI to the DHS root.
JESSE KENDALL, MSIA, CISSP, SSCP, MCSE                                                                                             PAGE 2

Enterprise Security Architect, Technology Architecture and Planning
CDE INTERNATIONAL – Miami, FL (20xx-20xx)
Directed technical problem solving/training, systems management operations, security architecture, and corporate risk analysis in
support of information security across this global entity with 150,000 employees and $43 billion in annual revenues. Mitigated
organizational risk in development of technical and procedural documentation for operational support and business continuity planning.
Set security standards and developed organizational policies. Defined intrusion detection and response procedures. Devised
acceptable secure application development guidelines to maximize system integrity. Increased organizational efficiency by creating
complex application development security models.
DELIVERED RESULTS:
     Played an instrumental role in a platform re- engineering study for Marriott.com that initiated a change to the architectural model
      for a $400 million revenue generating Web site.
     Architected and implemented Tivoli Access Management Server, Tivoli Identity Manager, and Tivoli Privacy Manager
      environments to control access to corporate Web resources; maximized integrity with a combined single Web sign-on,
      consistent policy management, and tight Web services integration across disparate partner companies.
     Integrated WebSphere, J2EE frameworks, and WebSphere Edge server content delivery systems with the Marriott
      infrastructure. Maximized secure operational design and deployment of several key corporate Web applications, including One
      Yield, Siebel ERP, ECRM, PeopleSoft, and the Marriott Reservations Data Warehouse.

                                                           TECHNICAL SKILLS

Security Management Devices: Check Point Firewall-1 and VPN-1, Nortel Contivity Extranet Switches, SonicWALL SOHO Devices,
Microsoft Internet Security and Acceleration Server, Microsoft Certificate Server, IBM Directory Server, Red Hat Directory Server, Tivoli
Access Manager, Tivoli Identity Manager, Symantec IDS, Cisco IDS, Secure Computing Sidewinder, Trusted Computing Systems
Multi-level Workstation

Operating Systems, High Availability, Database Platforms, and E-mail: Windows NT, Windows NT Enterprise, Windows 2003,
Windows 2003 Data-Center, Solaris 2.X, AIX 4.X, Linux, Microsoft Cluster Server, Microsoft SQL Server, IBM DB2, Oracle, Citrix
MetaFrame, Windows Terminal Server, Microsoft Exchange Server, Sendmail

Development Tools: Microsoft Visual Studio, Microsoft Visual J++, WebSphere Studio Developer

Programming Languages: Active Directory Service Interfaces (ADSI), Java Server Pages (JSP), Visual Basic, Active Server Pages
(ASP), ColdFusion, JavaScript, VBScript, Perl


                                                              EDUCATION
                             M.S. in Computer Systems Management / Information Assurance (20xx)
                                       UNIVERSITY OF XYZ, UNIVERSITY COLLEGE – Miami, FL
                                       B.S. in Information Technology Management (20xx)
                                       UNIVERSITY OF XYZ, UNIVERSITY COLLEGE – Miami, FL

                                                    PROFESSIONAL CERTIFICATIONS
                     ICS2 Certified Information Systems Security Professional (CISSP) – 2/9/20xx / Number 27xxx
                          ICS2 Systems Security Certified Practitioner (SSCP) – 11/15/20xx / Number 38xxx
                                 Information Systems Audit and Control Association (ISACA) - Member
                                      Microsoft Certified Systems Engineer (MCSE) (20xx-Present)
                                            IBM AIX Advanced Administrator (20xx-Present)

                                                         SECURITY CLEARANCE
                                                            Top Secret/SCI
Creating a Compelling Cover Letter
A powerfully written cover letter is necessary to land most interviews and ensure job search success. When an advertised
position creates a pile of 100+ resumes, it becomes the responsibility of the hiring personnel to shortlist the applications.
Resumes without cover letters are usually the first to go, followed by the ones with poorly written cover letters. Avoid this
fate by following these effective strategies:


Address your cover letter appropriately:
Be sure that you get the name of the hiring manager before sending your resume, and address the letter to that individual.
The proper greeting will be either “Dear Mr. (Smith),” or “Dear Ms. (Smith).” Avoid using Miss or Mrs., and do not address
your letter to “Dear Sirs,” as it is considered inappropriate. If you are unsure of your contact’s gender, address them by
their first and last name, as in “Dear Pat Smith,” to avoid an embarrassing mistake. If you don’t know the name of the
hiring manager, simply use the greeting “Dear Hiring Manager,”– it’s clear, to the point, and gender neutral.


Get to the point in your opening paragraph:
One of the most common interviewing questions employers ask is “Why should I hire you among other candidates?”
Provide an answer to that question right off the bat in your opening paragraph. This is a very important section because it
is the first thing the employer will read. It must be powerful and make an immediate impact. Be sure sell yourself and your
unique abilities. Do not use a generic opening paragraph that can apply to any Tom, Dick or Harry.
Every line should sell you, so use aggressive language here and throughout the rest of your cover letter. For example,
instead of writing “My background is in finance management, making me well-suited for your advertised Corporate
Finance Director position.” you can write “A background in finance management and a proven record of developing
effective strategies that drive revenue, growth and shareholder value make me a strong candidate for your advertised
Corporate Finance Director position.”


Show your interest and sell your accomplishments in the body of the letter:
In this section, you need to show your interest in the job and the company. Research is a key ingredient to a successful
job search. The more you are able to demonstrate your interest and knowledge about a company, the better your chances
are to secure an interview. Get to know the company’s mission and new corporate initiatives, and tell them how you can
help them meet their objectives or resolve their problems. Praise the company for public recognitions or recent
accomplishments. The employer will surely take notice of your active interest.
Use “I” and “my” sparingly. Try not to use these words more than six times in your cover letter. You need to focus on what
you will bring to the company and how you will help them improve their profitability. Too much use of the word “I” will also
make your letter look elementary and poorly written.
For executive-level candidates and professionals with substantial achievements, a bullet point format is often the most
effective and efficient way to highlight accomplishments. If you fall into this category, be sure to keep the bullet point
statements unique and fresh. Do not copy and paste the exact same phrases from the resume as it will make you look
lazy. All sentences and achievements transferred from the resume should be rephrased.


Close your letter with a strong paragraph:
In the closing paragraph, you need to address several issues. At the very least, you need to ask for the interview and
provide contact information. This is also the ideal place to mention your salary requirements (if the employer insists on it),
or your desire to relocate.
To demonstrate your drive and interest, mention that you will call within a week to follow up. This is a great way to ensure
the resume was successfully received, and it creates an opportunity to establish a dialog. However, do not mention this in
your cover letter if you do not intend to follow up.

In summation, an aggressive and dynamic cover letter will help you stand out among the competition. Remember that the
goal is to market yourself – not to compose a dull biography.

								
To top