IT Security Consultant Resume

This IT security consultant resume is written in an organized format. This resume contains complete information of the skills and job responsibilities. The information in the sample will help to convince your employer. The aim of this resume is to help you to grab the attention of the potential employer.

An IT security consultant designs, creates and implements information security system to protect information of client business. To Plan, direct, and oversee the implementation of comprehensive security systems is the main role of an IT security consultant.

Here is a good resume example that covers all the features of writing a complete and effective technical resume.

Sample IT Security Consultant Resume

Frank Augustin

Address: 67 Kim Park, Texas

Phone No: 646-987-5320

Email ID: a.frank@example.com

Career Objectives:

Seeking the position of an IT security consultant to utilize my progressive five years of professional experience in a renowned IT organization.

Summary of skills:

  • Comprehensive knowledge of security principles and practices
  • Possess advance knowledge of security protocols and standards
  • Proficient in analyzing complex technical landscapes and evaluating technical solutions
  • Strong communication skills, both written and verbal
  • Good time management, risk management and organizational skills
  • Ability to work under pressure and handle multiple projects

Technical Proficiency:

  • Extensive knowledge of Networking & Operations Systems like NT, 98, 2000, XP & Mainframes along with Hardware
  • Familiar with JSP440, RMADS, IAS1 and IAS 2
  • Advance knowledge of JSP480, MPS, SPF, ISO27000, DIAN, and penetration testing

Work History:

IT Globe Solutions, Texas

June 2005 till date

IT Security Consultant

  • Provide assistance in developing and implementing policies, standards, tools and procedures of Information Systems and Computer Security
  • Responsible for remote penetration testing to measure the exposure of the company network resources and services
  • Handle tasks of implementing and coordinating the information security policies and procedures of the organization
  • Conduct technical analysis on information and computer security policies and procedures like hardware, software, physical security and data
  • Coordinate with system architect on all architecture and design proposals to build in security
  • Monitor and review all system-related security plans throughout the organization’s network
  • Monitor the internal control systems to maintain appropriate access levels

Tec Business Associates, Texas

April 2003 to December 2004

IT Security Consultant

  • Responsible for developing and implementing security processes and procedures to minimize risks to the business
  • Assist project teams on information and IT security matters and support security sign off for projects and modifications
  • Maintain and administer IT security system of the organization
  • Create awareness of the importance of information security and provide information to help colleagues increase security and the protection of company data
  • Maintain and kept up to date technical documentation and procedures
  • Perform investigation and evaluation of new methods of ensuring data and applications remain protected from breaches

Educational Summary:

Bachelor’s degree in Information Security

University of Texas in the year 2000

Certifications:

Certified Information system Security professional, Texas in the year 2002

Personal Details:

Name: Frank Augustin

Date of Birth: 13/01/1978

Employment Status: Full time

Relationship status: Single

Reference:

Will be pleased to furnish upon request

Make a Comment