Automatically Apply For Jobs With Zippi
Upload your resume to get started.
Network Security Consultant skills for your resume and career
15 network security consultant skills for your resume and career
1. Network Infrastructure
- Protected network infrastructures from unauthorized access by deploying endpoint security software to enterprise customers with work group based permissions and functionality.
- Involved in the continual improvement of the applications, network infrastructure and implementation of new security-based technologies.
2. Switches
- Acquainted self with Cisco devices such as switches, routers, PIX/ASA, and MARS through self-research and mentoring.
- Installed and configured Cisco Works 2000 and MRTG for monitoring Cisco routers and switches.
3. Routers
A router is a device that gives a computing device the capability to connect to the internet and transfer data between different devices whether at a home or office. It may include several network ports to connect many devices at one go.
- Installed and configured web hosting environment, which entailed establishing EBGP sessions with multiple providers and IBGP sessions with Prodigy routers.
- Designed and configured Prodigy's client services network, which consisted of 40 Cisco routers running both RIP and EIGRP.
4. Windows
Windows is a chain of operating systems that controls a computer and is developed by Microsoft. Every version of Windows consists of GUI (graphical user interface), with a desktop that allows the user to open their files.
- Provide technical guidance and consultation for enhancements and changes to Windows Server/Active Directory, Identity and Access management and security controls.
- Install and configure various additional software through Windows and Macintosh operating systems.
5. NMAP
- Tested client systems and network equipment to make sure they were secured with various port scanning software such as nmap.
- Scanned networks for vulnerabilities using Nessus and Nmap.
6. Linux
Linux is a Unix-like operating system. Just like Windows, Mac OS, and IOS, Linux is an operating system used by millions across the globe. Android itself is powered by the Linux operating system. Linux manages all the hardware resources that are associated with your computer. The software is famous because of the protection it grants from viruses, malware, and crashes. The Linux operating system is entirely free and is an open-source software meaning it can be altered by those equipped with the knowledge to code.
- Monitor Customer networks both locally and remotely using Linux and Terminal Emulation Software.
- Red Hat Linux System Administration (2 Years).
Choose from 10+ customizable network security consultant resume templates
Build a professional network security consultant resume in minutes. Our AI resume writing assistant will guide you through every step of the process, and you can choose from 10+ resume templates to create your network security consultant resume.7. Emerging Technologies
- Designed and engineered modifications and improvements to 400-user office automation network to maintain pace with emerging technologies.
- Research current and emerging technologies, evaluating alternatives, recommend solutions and proposing alternatives to mitigate risk.
8. Wireshark
- Created penetration test plans and performed vulnerability scanning (Wireshark)
- Utilize Wireshark and packet captures to analyze traffic flow.
9. Vulnerability Assessments
- Provided full service security and project management services ranging from PCI/HIPPA regulatory compliance to penetration testing and vulnerability assessments
- Performed comprehensive security vulnerability assessments for various clients in the energy, insurance and financial services industries.
10. PCI
- Stored all the reports and vulnerability data on a secure asset for the Internal and PCI audit purposes.
- Conducted a penetration test of company network perimeter to identify vulnerabilities and remediated critical IT assets based on PCI requirements.
11. TCP/IP
- Documented the installation, administration, configuration and user's Guide for a B1 and B2 security compliant TCP/IP UNIX network.
- Analyzed and resolved incident response alerts for various B2B customers and provided customer support via PCAP analysis of TCP/IP traffic.
12. Cisco Asa
- Manage Juniper, Cisco ASA & Checkpoint Firewalls as per users change management forms.
- Manage project task to migrate from Cisco ASA Firewalls to Check Point Firewalls.
13. Juniper
Juniper Networks, Inc. develops and markets networking products and software which include routers, network management software, and network security products. Many large enterprises use Juniper products and software as part of their larger networking operating management suite.
- Configured and maintained security policies for Juniper and ASA firewalls.
- Configured Juniper SRX and resolved issues in existing environment.
14. IDS
An IDS (intrusion detection system) stands for a software application or device that monitors a network to identify policy violations or malicious activities.
- Installed firewalls and intrusion detection systems (IDS), X.509 Certificate services, & PKI (Public Key Infrastructure).
- Lead team member responsible for replacing end of life IBM IDS platforms for the Network Security Intranet team.
15. F5
- Work with F5 URI Filters including custom URI filters, Load Balancing, OS platform and signature upgrades and more.
- Maintain and configure and troubleshoot f5 Big IP load balancing devices.
5 Network Security Consultant Resume Examples
Build a professional network security consultant resume in minutes. Browse through our resume examples to identify the best way to word your resume. Then choose from 5+ resume templates to create your network security consultant resume.
What skills help Network Security Consultants find jobs?
Tell us what job you are looking for, we’ll show you what skills employers want.
What soft skills should all Network Security Consultants possess?
List of network security consultant skills to add to your resume
The most important skills for a network security consultant resume and required skills for a network security consultant to have include:
- Network Infrastructure
- Switches
- Routers
- Windows
- NMAP
- Linux
- Emerging Technologies
- Wireshark
- Vulnerability Assessments
- PCI
- TCP/IP
- Cisco Asa
- Juniper
- IDS
- F5
- OSPF
- SIEM
- BGP
- Virtualization
- Post Sales
- ASA
- Security Policies
- Network Devices
- Security Devices
- Unix
- HIPAA
- RSA
- SSL
- ArcSight
- Data Loss Prevention
- Checkpoint Firewall
- Troubleshoot
- ITIL
- MPLS
- Lan
- IOS
- DNS
- Nexus
- NAT
- Security Infrastructure
- Ipsec VPN
- Symantec
- PIX
- DMZ
- Cacti
Updated January 8, 2025