CV, Curriculum Vitae and Online Resumes Search

Recruiters - Try Postings!

Postings.com™ is a must-have for recruiters who want to:

  • Find Qualified Candidates
  • Find Job orders and Post Splits
  • Be Found in Search Engines
  • Implement a Social Sourcing Strategy
30-Day Free Trial!



Job Seekers - Look Here!

Hitting a wall with your job search? Try Climber Premium.

  • Top the Search Engines
  • Unsurpassed Candidate Marketing
  • Power Career Networking
  • Fresh Jobs from the Net

Were you looking for Incident-Response-planning job results?
Click Here to search for Incident-Response-planning in our 2.4M jobs.



Online Resumes with "Incident Response planning"



CISSP/CISM/CAP

Chief Information Security Officer

Ideal Companies: Any IT Security and Technology company

Tags for this Online Resume: It Security, Customer Satisfaction, Business Development, Regulatory Compliance

Featured Profile

Law Enforcement

Supervised a myriad of cultural and ethnical diversities in law enforcement, surveillance detection and force protection for over twenty years. Established, developed and managed liaison and operational contacts with local, state, federal, military and national level counterparts. Recognized expert in antiterrorism and physical security. Experienced Antiterrorism Officer who was one of three individual that previously bui...

Featured Profile

Chief Security Officer - 18 Years of Experience - Near 29461

Cyber Threat Analysis/Modeling * iCloud * Network Administration * Agile Management * DIACAP/COBIT/SOX/NIST/PCI * IT Governance * Emergency Response * IBM DOORS * Code Analysis * Project Management * Disaster Recovery Planning/Testing * Risk/Privacy Assessments * Certification/Accreditation * Strategic Planning * Application Security/Assessments * BORIS * Software Development Life Cycle * Relationship Building * Static/Dyn...

Tags for this Online Resume: Information Security, Cybersecurity, Distributed Development Environement, Scrum Master, CISSP, C|CISO, Risk Analysis, Strategic Planning, Project Management, IT Governance, RMF

System Administrator

Qualifications: * Designing, installing, administering, securing, monitoring and optimizing server operating systems, networking devices, storage systems and related components * Implementing, reviewing and updating security policies, controls and cyber incident response plans * Maintaining privacy and protecting Personally Identifiable Information (PII) and Personal Health Information (PHI) * Effective communicator - both ...

Tags for this Online Resume: Management, Microsoft Windows, Cybersecurity, Novell Netware, Research, Research and Development, Services, Consulting, Technical Support, Operating Systems, Boise, Idaho, Administration

Quality Assurance Specialist

Areas of Expertise * Information Assurance * Design and Implement Procedures * Incident Response * Team Builder * Risk Assessments * Microsoft Office Suite * Cyber Security * Project Management Description I have experience in developing system security plans, risk assessments, incident response plans, and contingency plans. I also conduct cyber security capability validations in accordance with established practices and st...

Tags for this Online Resume: Management, Assessments, Microsoft Outlook, Network Administration, Networking, Application Support, Blackberry, Citrix, Email, Information Security

Manager - 20 Years of Experience - Near 78414

ISSE Lead IT security representative within the CCAD Information Technology Directorate. Track and manage IT security programs and FISMA compliance to include performing risk analysis for all IT systems within CCAD in accordance with the Army DoD and NIST security programs. Supervise programs and personnel. Accountable for a team of Cyber Security (CS) professionals who provide security services directly to the United State...

Tags for this Online Resume: Cyber, Cyber Security, Security, Documentation, Management, Systems Security, CIO, Incident Response, Information Security, Information Technology, it jobs, Cybersecurity

Information Assurance/Security Manager

Leading a team of IA and Security Engineers developing a FISMA compliant Authority to Operate package coordinating with several OpDivs HR systems that interface with EHCM, and successfully delivering required documentations on time and on EPLC schedule. Produces and delivered the EHCM FIPS-199 Security Categorization, System Security Plan (SSP), Security Control Matrix (SCM), Risk Assessment, Plan of Action & Milestones (PO...

Tags for this Online Resume: Assessments, Facilitator, Management, Planning, Test, Test Scripts, Cms, Documentation, Oracle, Web, it jobs, Information Assurance

Network Security Engineer - 14 Years of Experience - Near 23228

SUMMARY An Information Security Professional with proven experience in Risk Management Framework (RMF), Systems Development Life Cycle (SDLC), and Risk Assessment using industry frameworks such as OMB, FISMA, Health Insurance Portability and Accountability Acts (HIPAA), and applicable NIST special publications. Other areas of proficiencies include Customer Relation Management, Emotional Intelligent competencies and Team Bui...

Tags for this Online Resume: Security, System Security, Connectivity, Nessus, Troubleshooting, Assessments, Information Security, Monitoring, Sar, Systems Security

Featured Profile

Relationships are the real test of a professional.

Make an impact in whatever capacity that I am working in and be recognized for the expertise that I bring to every situation. Be counted on to be an asset and willing to assist no matter what the situation is.

Ideal Companies: Apple, Microsoft, Tenable

Tags for this Online Resume: Security, System Security, Management, Switches, Systems Security, Utilities, Computer Security, Cyber Security, Documentation, Information Security, Gap Compliance, Linux, Networking, Configuration Management, Software Management, Vulnerability management, Access Control, Auditing, Identity Access Management, Remediation Planning, Incident Response planning, Business Continuity Planning, Infrastructure Integration, Application Integration, Vulnerability Remediation