Post job
zippia ai icon

Automatically apply for jobs with Zippia

Upload your resume to get started.

Manager, security infrastructure and enterprise services skills for your resume and career

Updated January 8, 2025
2 min read
Manager, security infrastructure and enterprise services example skills
Below we've compiled a list of the most critical manager, security infrastructure and enterprise services skills. We ranked the top skills for managers, security infrastructure and enterprise services based on the percentage of resumes they appeared on. For example, 25.6% of manager, security infrastructure and enterprise services resumes contained architecture as a skill. Continue reading to find out what skills a manager, security infrastructure and enterprise services needs to be successful in the workplace.

15 manager, security infrastructure and enterprise services skills for your resume and career

1. Architecture

Here's how managers, security infrastructure and enterprise services use architecture:
  • Assisted Program Managers with development of security policy and evaluation of system architecture and interconnectivity.
  • Created a risk advisory level architecture focused on identifiable triggers relevant to specific company assets, facilities, and personnel.

2. Security Services

Security services provide security to a customer who can pay for the service. They offer different services and packages that start with the basic security to more thorough security. This could include a security guard, with a weapon and a guard dog.

Here's how managers, security infrastructure and enterprise services use security services:
  • Developed new courier program; consolidating drivers from several departments under supervision of the Security Services Department.
  • Directed contracted Security Services at the Hyatt Regency Hotel in Jersey City and The Grand Hyatt Hotel in New York.

3. PCI

Here's how managers, security infrastructure and enterprise services use pci:
  • Ensured compliance with Sarbanes Oxley, PCI, HiTRUST, and HIPPA.
  • Prepared and delivered presentations to various business groups on meeting PCI requirements.

4. Security Operations

Here's how managers, security infrastructure and enterprise services use security operations:
  • Oversee the security operations of 34 sites, operating with approximately 12,000 HPW.
  • Identified operational improvements in all functional areas of security operations, including quality management, customer service, and budgeting guidelines.

5. Security Program

Here's how managers, security infrastructure and enterprise services use security program:
  • Supported development of a consolidated risk inventory to facilitate an operational test-once report many IS Security program management methodology.
  • Integrated effective loss prevention and security program with cooperation of clients.

6. Business Objectives

Business Objectives refer to the goals and objectives which a company has set for itself. They could be related to profit, increasing growth of a business, or something else.

Here's how managers, security infrastructure and enterprise services use business objectives:
  • Managed outside contractors and consultant to ensure their services meet the business objectives.

7. NIST

Here's how managers, security infrastructure and enterprise services use nist:
  • Implemented enterprise security policies and procedures based on recognized best practices, such as NIST and NSA standards.
  • Evaluated security controls in accordance with NIST SP 800-53a Guide for Assessing Security Controls and the HIPAA Security Rule Set.

8. SIEM

Here's how managers, security infrastructure and enterprise services use siem:
  • Provide enhancements to the SIEM through various data enrichment methodologies including proper contextual information.
  • Managed application vulnerability assessment and Security Incident Event Management (SIEM).

9. Windows

Windows is a chain of operating systems that controls a computer and is developed by Microsoft. Every version of Windows consists of GUI (graphical user interface), with a desktop that allows the user to open their files.

Here's how managers, security infrastructure and enterprise services use windows:
  • Implemented centralized Windows patch management using Microsoft Software Update Services for all corporate workstation and server systems.
  • Managed the conversion to a hybrid NAS/disk/tape CommVault based backup environment resulting in decreasing backup windows and improving recovery objectives.

10. Linux

Linux is a Unix-like operating system. Just like Windows, Mac OS, and IOS, Linux is an operating system used by millions across the globe. Android itself is powered by the Linux operating system. Linux manages all the hardware resources that are associated with your computer. The software is famous because of the protection it grants from viruses, malware, and crashes. The Linux operating system is entirely free and is an open-source software meaning it can be altered by those equipped with the knowledge to code.

Here's how managers, security infrastructure and enterprise services use linux:
  • Implemented and maintained OpenSSH public-key authentication for all corporate Linux systems and managed commercial systems.
  • Deployed numerous RedHat Linux servers in support of Oracle RAC database clusters over the years.

11. Encryption

Here's how managers, security infrastructure and enterprise services use encryption:
  • Provide technical expertise and assistance in specialized areas such as encryption, authentication, and telecommunications.
  • Manage the administration of various encryption, authentication and public/private key management technologies and certificate/digital authority.

12. Security Policies

Here's how managers, security infrastructure and enterprise services use security policies:
  • Avoided potential regulatory fines by assisting with documenting security policies that aligned with ISO27001.
  • Facilitated improvements to security policies and processes, further enhancing the safety of employees, visitors, and customers.

13. HIPAA

Here's how managers, security infrastructure and enterprise services use hipaa:
  • Evaluated both internal and customer systems and networks for compliance with HIPAA guidelines and recommendations.
  • Categorized information and information systems in accordance with FIPS 199 Standards for Security Categorization Performed HIPAA risk assessment.

14. Security Practices

Here's how managers, security infrastructure and enterprise services use security practices:
  • Provided guidance and suggested security practices to security staff and internal IT teams enabling the availability and reliability of critical information.

15. CCTV

Here's how managers, security infrastructure and enterprise services use cctv:
  • Manage global card access, CCTV, alarm protection and all security system related operations.
  • Implemented Hotel Emergency Procedures, Security Department Procedures, Key Control System Procedures, improved Casino Surveillance CCTV system.
top-skills

What skills help Managers, Security Infrastructure And Enterprise Services find jobs?

Tell us what job you are looking for, we’ll show you what skills employers want.

List of manager, security infrastructure and enterprise services skills to add to your resume

The most important skills for a manager, security infrastructure and enterprise services resume and required skills for a manager, security infrastructure and enterprise services to have include:

  • Architecture
  • Security Services
  • PCI
  • Security Operations
  • Security Program
  • Business Objectives
  • NIST
  • SIEM
  • Windows
  • Linux
  • Encryption
  • Security Policies
  • HIPAA
  • Security Practices
  • CCTV
  • Patrol
  • Security Infrastructure
  • Security Issues
  • Physical Security
  • DLP
  • Emergency Procedures
  • Vulnerability Assessments
  • Application Development
  • SOX
  • Emergency Management
  • Security Threats

Updated January 8, 2025

Zippia Research Team
Zippia Team

Editorial Staff

The Zippia Research Team has spent countless hours reviewing resumes, job postings, and government data to determine what goes into getting a job in each phase of life. Professional writers and data scientists comprise the Zippia Research Team.

Browse executive management jobs