FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.

Securities Consultant

This job has expired and is no longer available.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 Securities Consultant Skills

Below we've compiled a list of the most important skills for a Securities Consultant. We ranked the top skills based on the percentage of Securities Consultant resumes they appeared on. For example, 7.7% of Securities Consultant resumes contained Security Procedures as a skill. Let's find out what skills a Securities Consultant actually needs in order to be successful in the workplace.

These are the most important skills for a Securities Consultant:

1. Security Procedures

demand arrow
high Demand
Here's how Security Procedures is used in Securities Consultant jobs:
  • Conducted network Vulnerability Assessments using tools to evaluate attack vectors, Identify System Vulnerabilities and develop remediation plans and Security Procedures.
  • Performed risk assessments and implementation of appropriate information security procedures, standards and technologies.
  • Charted and documented security procedures and proposed mechanisms to meet business and regulatory requirements.
  • Propose value-engineering measures, provide security procedures, recommendations, and training materials.
  • Conducted facility security assessments and recommended improvements to existing safety and security procedures.
  • Develop and implement information security policies, standards and detailed security procedures.
  • Recommended security procedures and drafted standard operating procedures for client businesses.
  • Advised Premier Oil company managers on security procedures and emergency situations.
  • Rendered security procedures and arranged necessary security for top level executives
  • Perform ongoing threat assessments and develop proactive security procedures.
  • Performed firewall rule modifications and documented network security procedures.
  • Researched and recommended various updates to security procedures.
  • Conducted end user training on maintenance and security procedures
  • Documented security procedures and worked with Auditors.
  • Review and make recommendations to their security procedures and policies.
  • Analyze existing architecture and security procedures Provide cost-efficient recommendations for improvement of redundancy, minimizing intrusions and ensure audit compliance.
  • Provided consultation for organization in managing political risks, maintain integrity and security procedures in complex,hostile environments.
  • Developed and documented Cyber Security procedures for computer systems used at the nuclear facility.
  • Evaluate existing security procedures and pply appropriate security standards.
  • Key Accomplishments: Developed a detailed safety and security procedures and protocols manual and provided hands-on training to staff.

Show More

2. Security Systems

demand arrow
high Demand
Here's how Security Systems is used in Securities Consultant jobs:
  • Provide consulting services for the installation and audit of casino camera security systems.
  • Directed implementation of comprehensive security systems for protection of individual.
  • Designed and sold security systems for residential and commercial applications.
  • Designed security systems for large residential and commercial properties.
  • Conducted consultations and sold home security systems.
  • Prepared written recommendations for improving physical, procedural and design of security systems and operations at the CDC in Atlanta.
  • Full sales cycle telesales (outbound) consultant, selling residential and commercial security systems.
  • Sell new and enhance current security systems in homes and businesses within the CT area.
  • Commissioned sales of residential and commercial burglary, fire protection, and CCTV security systems.
  • Identified, designed & sold security systems to the specific needs of individual clients.
  • Created, developed and managed the sales, service and installation of security systems
  • Marketed and sold home and business security systems and home automation systems.
  • Maintained hardware for computers, security systems, and phone systems.
  • Job description- Marketed and sold Home & Business Security Systems.
  • Design, sell, and install residential security systems.
  • Create custom security systems based on client needs.
  • Educated clients on new home security systems.
  • Recommend and sale security systems and cameras * Demonstrate various security systems
  • Develop and implement programming procedures for the NetJets', Inc. Security Systems.
  • Tailor ADT security systems to clients needs administrative clerk Schedule activations and set up installations Outside Sales and Marketing Involved daily

Show More

3. Ensure Compliance

demand arrow
high Demand
Here's how Ensure Compliance is used in Securities Consultant jobs:
  • Monitored visitor control programs to ensure compliance with prohibited Special Access Programs.
  • Evaluated system use of network ports, protocols and services to ensure compliance with DoD network communications standards for data communication.
  • Reviewed and updated Voice over IP policy to ensure compliance to NIST 800-58; Security Considerations for Voice over IP system.
  • Work closely with Chief Executive Officer, Human Resource Manager and government customers to ensure compliance of all security programs.
  • Performed client screening to ensure compliance with Washington State Liquor Control Board regulations and state laws.
  • Research, analyze and interpret federal and state regulations to ensure compliance.
  • Validated DIACAP and RMF controls to ensure compliance with DoD, Army, DISA STIG, and NIST 800-53 guidance.
  • Created process to review IT controls to ensure compliance to Internal Policies Managed two global Disaster Recovery Assessments

Show More

4. Vulnerability Assessments

demand arrow
high Demand
Here's how Vulnerability Assessments is used in Securities Consultant jobs:
  • Provided security-focused solutions including vulnerability assessments, architecture/procedure reviews, penetration tests and incident response/digital forensics.
  • Perform security analyses and risk/vulnerability assessments; conduct security tests, audits, and evaluations.
  • Perform physical security risk and vulnerability assessments, master planning, technical research and bench-marking.
  • Conducted Vulnerability Assessments and Penetration testing for network devices and servers.
  • Performed network risk assessments, vulnerability assessments, and penetration testing.
  • Performed threat vulnerability assessments and provided security test and evaluation support.
  • Conduct technical vulnerability assessments and prioritize and track remediation efforts.
  • Conducted Risk Assessments and Vulnerability Assessments to companies.
  • Performed vulnerability assessments and basic penetration tests.
  • Conducted bi-monthly Threat Vulnerability Assessments (TVA) alerting the client to weaknesses within their critical infrastructures, physical and administrative.
  • Executed and managed vulnerability assessments and penetration tests for several of the largest banking and financial providers in the country.
  • Conducted security audit/vulnerability assessments in support of DITSCAP C&A efforts for DOD agencies.
  • Enhanced processes and procedures for vulnerability assessments and other C&A related activities.
  • Completed 25x Vulnerability Assessments of critical facilities based on NERC CIP 14-2 Requirement 4.
  • Conduct vulnerability assessments, configuration reviews, audits, and attestations for various clients.
  • Performed Risk and Vulnerability Assessments on AT&T's U-verse infrastructure.
  • Conduct yearly personal vulnerability assessments for all executives, include their personal residences and office locations.
  • Provide vulnerability assessments and pentesting services to clients and present concise reports to management.
  • Performed database security vulnerability assessments Determined the requirements to implement enterprise SOX compliance.
  • Network vulnerability assessments using Nessus and Nexpose.

Show More

3 Vulnerability Assessments Jobs

No jobs at selected location

5. Security Consultant

demand arrow
high Demand
Here's how Security Consultant is used in Securities Consultant jobs:
  • Lead security consultant for several tactical remediation and gap analyst initiatives in a large financial institution.
  • Provide guidance to on-site security consultants in accordance with security classification guides.
  • Perform information security assessment and assist senior security consultant with training requirements.
  • Named International Travel Security Consultant for all competitors and staff.
  • Founder and Principal Security Consultant.
  • Position Overview Challenges: Charged with Security Consultant to perform day-to-day security functions for the State of Georgia security directives.
  • Served as security consultant/analyst for ADT Security Services, Inc. surveying business sites and homes for security system installation.
  • Acted as security consultant to local commercial, industrial, and governmental entities as private firm.
  • Completed professional security consultant training through First Alert and Bruce Scott.
  • Acted as a Security Consultant for Pacers Sports and Entertainment.
  • Assisted in the training of new security consultants.
  • Serve as a security consultant to Western Security.
  • Contract Security Consultant offering expertise in the following: Development and Implementation of Information Security Programs.
  • State Board of Texas Licensed Security Consultant Prospected, qualified, and closed sales for both on site security and investigations.
  • Project MGH group Worked as Security consultant - Creation of users, locking/unlocking of users, deletion of users.
  • Position: Security Consultant/Sales Associate o Maintaining a yearly sales quota (monthly, quarterly etc.)
  • Position: Security Consultant Exceeded sales goals from outset and earned Salesman of the Month honors.
  • Hired as full time security consultant and designer within 3 months.
  • Top 5 Residential Security Consultant in Northern Region.
  • contract position) Security Consultant for Hosted Systems Provider.

Show More

113 Security Consultant Jobs

No jobs at selected location

Job type you want
Full Time
Part Time
Internship
Temporary

6. Security Policies

demand arrow
high Demand
Here's how Security Policies is used in Securities Consultant jobs:
  • Revised and restructured security policies and procedures for manufacturing, high value stores, asset management, logistics and corporate operations.
  • Maintain security records, requirements and policies to adhere to all government security policies and regulations.
  • Analyzed and redesigned the security policies to include SMS authentication for highly secure web applications.
  • Identified and implemented strategies for revamping of information security policies and vulnerability/risk assessment strategy.
  • Recommend alterations to client security policies for compliance to meet regulatory standards.
  • Provide recommendations for improvement of security policies, procedures and standards.
  • Presented results to management and recommended security policies and improvements.
  • Created and implemented security policies for company's infrastructure.
  • Drafted Security Policies with detailed control framework.
  • Developed SAP program security policies that ensured compliance with Top Secret Control procedures for controlling and accounting for TS SAP material.
  • Create IT Security Policies, Standards, Principles, and Policy Objectives that support Risk and Control Objectives.
  • Managed all rules on the Cisco Security Agent dealing with the Desktop Firewall and Host based Security Policies.
  • Developed and implemented security policies and procedures to ensure that the district remained in compliance with Project SAVE.
  • Planned, observed, investigated and provided recommendations of the client s security policies and operating procedures.
  • Analyzed completeness and compliance to Information Security policies, Standards, Procedures, Guidelines, and templates.
  • Led employee conferences and seminars to advise staff of company security policies and procedures.
  • Attend monthly security meetings to stay compliant with all security policies and procedures.
  • Evaluated, reviewed and recommend changes to DoD and AF Security Policies.
  • Advise and evaluate security policies, procedures and security related issues.
  • Maintained proper adherence to security policies, procures, and guidelines.

Show More

38 Security Policies Jobs

No jobs at selected location

7. Access Control

demand arrow
high Demand
Here's how Access Control is used in Securities Consultant jobs:
  • Recommend implementation of appropriate security and access controls.
  • Educate and train customers in the field of Intrusion Detection, Proactive Security, Access Control and High Resolution Video Surveillance.
  • Design and configure Role based access controls to grant access to the application based on the user role in the organization.
  • Used the knowledge of intrusion, access control, closed circuit television and fire monitoring services in obtaining new clients.
  • Freelance contract work for businesses and technology companies faced with the human aspects of access control in secured environments.
  • Provided access control, ensuring employees wore badges, assigned appropriate access to building and secures sub areas.
  • Scheduled site surveys and designed Integrated Intrusion, Access Control, and IP & Analog CCTV solutions.
  • Recommend, Sell, & Design IP Access Control & video solutions to Commercial Accounts in Oklahoma.
  • Designed and sold Security, Fire, CCTV, and Access Control Systems for commercial applications.
  • Design and sell Burglar/Fire alarm systems as well as Access Control and CCTV and monitoring services.
  • Managed the planning, purchasing, and installation of an upgraded electronic access control system.
  • Design, develop and test the GRC Access Controls security roles using Role Maintenance tool.
  • Provided first line of security, protection, and access control for exclusive concession.
  • Processed after-sale paperwork & procured Low-voltage and Access Control Permits when using MagLocks.
  • Reviewed and interpreted SAP regulations required for access control to SAP facilities.
  • Worked on RBAC (Role-Based Access Control) and GearUp Implementation.
  • Review and configure the Access Controls standard settings using SPRO tool.
  • Provide solutions for security, access control and surveillance systems.
  • Monitored CCTV, access control of exterior and interior of clients' location, computers and telephones.
  • access control, site assessments.

Show More

8. Infrastructure

demand arrow
high Demand
Here's how Infrastructure is used in Securities Consultant jobs:
  • Led internal audit team for governmental projects and supported Global IT Infrastructure Qualification Plan for manufacturing pharmaceutical companies.
  • Served as project manager of security incident and event management, ensuring a secure infrastructure.
  • Implemented threat, vulnerability, and critical assessments for area infrastructure.
  • Coordinated between multiple groups within corporate infrastructure to efficiently complete project.
  • Oversee daily operations and infrastructure needs of independent business centers.
  • Contracted to assist in a security infrastructure migration.
  • Provided auditing and feedback on network infrastructure.
  • Supported the day-to-day network infrastructure which included multiple 6500 layer 2 and 3 switches as well as 40 remote access facilities
  • Evaluated threats to the infrastructure based on the technology evolution curve, anticipated business models and competitive landscape changes.
  • Assisted Network Operation Center with troubleshooting of infrastructure system such as VPN, firewalls, and enterprise authentication.
  • Provide the expertise and support life-cycle security reviews of technology deployments and changes to existing IT infrastructure.
  • Contracted to assist in design and implementation of a new data center LAN network security infrastructure.
  • Implemented secure VPN connectivity to VZW business partners for access to business and infrastructure services.
  • Assisted with design of the computer infrastructure and review of existing Policies and Procedures.
  • Provided environmental, infrastructure and floor space planning.
  • Offer managed services expertise in budget, security, infrastructure designprocurementinstallationstandardization, governance, and systems administration.
  • Collaborated with vendors to remediate vulnerabilities detected in the infrastructure.
  • Developed work plans for 5-year roadmap to centralized IT management and update the City of Newport Beach IT architecture/infrastructure.
  • E-Mail Surveillance Project Manager, Implementation, configuration, and rollout of e-mail surveillance infrastructure.
  • Integrate Infrastructure devices and Securiy devices and also applications to QRadar SIEM.

Show More

10 Infrastructure Jobs

No jobs at selected location

9. Risk Assessments

demand arrow
high Demand
Here's how Risk Assessments is used in Securities Consultant jobs:
  • Play active role in business development, conduct security risk assessments, policy development, presentation development and delivery to clients.
  • Performed security risk assessments of external vendors on a temporary, contract basis for MasterCard International.
  • Developed and implemented security risk assessments, operational plans and procedures that substantially reduced property loss.
  • Executed risk assessments, facilitated stakeholder interviews, and reviewed architectural and product specifications.
  • Performed security risk assessments surveys, physical security surveys, provide protective strategies.
  • Provided daily threat/risk assessments and recommended desirable adjustments to the security plan.
  • Performed risk assessments to evaluate security concerns.
  • Performed physical & life safety risk assessments for select medium to large institutional, commercial, and industrial clients.
  • Initiated, drafted, and implemented the use of risk assessments, security plans, and operational procedures.
  • Provide advanced driver training, advance survey, risk assessments and close protection services for private clients.
  • Perform Risk Assessments (RA) and present findings and mitigation solutions to project executives.
  • Managed international ISO-17799/BS-7799-2 risk assessments for international Fortune 500 companies, reducing their risk profile.
  • Conducted physical security risk assessments for NERC CIP 14-2 for the electric power industry.
  • Conducted risk assessments, communicated recommendations to clients in verbal and written format.
  • Conducted risk assessments based on varied ISO, Internal and NIST Standards.
  • Developed project plans, work programs and risk assessments.
  • Conducted periodic risk assessments and response plans.
  • Performed security and risk assessments, developed Prioritized Remediation Plans (PRPs), and Management Action Plans (MAPs).
  • Performed Cyber Security risk assessments to increase Cyber Risk posture for several mid market (500M - 2B) companies.
  • Conduct third-party cyber security risk assessments Manage cyber security portfolio

Show More

13 Risk Assessments Jobs

No jobs at selected location

10. Video Surveillance

demand arrow
high Demand
Here's how Video Surveillance is used in Securities Consultant jobs:
  • Monitored video surveillance and performed parking lot vehicle patrols.
  • Conducted assessments of video surveillance systems.
  • Designed, installed and maintained a large video surveillance system.
  • Consulted on home automation and video surveillance systems.
  • Worked with various contactors and electricians regarding security equipment and video surveillance.
  • Design and sell security, fire alarm, access control and video surveillance systems usingprescribed methods and pricing guidelines.
  • Performed maintenance in building for lighting,shelving, and video surveillance.

Show More

11. Customer Service

demand arrow
high Demand
Here's how Customer Service is used in Securities Consultant jobs:
  • Promoted to positions of increasing authority and responsibility because of strong leadership skills, teamwork, customer service and overall performance.
  • Managed customer relationships, conflict resolution, negotiation, and customer service.
  • Received multiple reviews acknowledging my level of dedication to excellent customer service.
  • Provide exceptional customer service to potential and existing clients.
  • Managed incoming calls for sales and customer service, gave the best experience over phone and online chats for sales.
  • Develop new business through excellent customer service, follow up, and relationship and solution based selling.
  • Provide high quality customer service to sustain customer base and acquire new business.
  • Provide outstanding customer service to customer base.
  • Provide customer service to clientele when needed.
  • Executed customer service techniques for clients.
  • Provide customer service to all visitors.
  • Perform basic safety duties within emergency and non-emergency situations Actively patrol property to increase and ensure excellent customer service and safety
  • Provided excellent customer service Designed security systems for homeowners and small businesses tailored around their specific needs and wants.
  • Relationship-based approach to customer service; providing assistance and trouble-shooting while offering supplemental products; upselling when appropriate.
  • Key Responsibilities Awarded commendation for excellent customer service and client relationship management.
  • Earned numerous recognitions for exceptional customer service.
  • General customer service for iOS and Android devices, maintenance of customer service web portal and FAQ's.
  • Work closely with the install and service departments to insure the highest level of customer service possible.
  • Maintain safe environment Good customer service skills Able to handle stressful and potentially dangerous situations with due care
  • Provide internal and external customer service Accomplishments Exceeded the goal that was set by the company.

Show More

12. Security Audits

demand arrow
high Demand
Here's how Security Audits is used in Securities Consultant jobs:
  • Completed security audits to identify potential threats to physical security, safety and protected valued assets.
  • Performed detailed advanced penetration testing and security audits of UNIX and Win32 variant network environments.
  • Evaluated security needs, developed security/loss prevention programs/policies and conducted security audits.
  • Conduct security audits to identify potential vulnerabilities related to security.
  • Created Manager Access Review Reports for Information Security Audits.
  • Conducted statewide security audits of the prison system relating to all aspects of daily operations.
  • Conducted ISPS Security Audits and granted Ship Security Certificates to ships Classed by INSB.
  • Conducted safety and security audits for Procter & Gamble's Chicago Business Office.
  • Assisted the security investigation team with PHI data breaches and security audits.
  • Performed Security audits for UNIX, Linux and Windows NT Servers.
  • Performed security audits on firewalls in Client networks on quarterly basis.
  • Audit focal for two clients during IBM internal security audits.
  • Performed security audits of customers PBX and Voice Mail systems.
  • Assessed risk, and delivered multiple security audits.
  • Perform security audits, risk assessment and analysis.
  • Provided range of services, including security audits, background checks, emergency response, onsite security and investigations.

Show More

2 Security Audits Jobs

No jobs at selected location

13. Information Security

demand arrow
high Demand
Here's how Information Security is used in Securities Consultant jobs:
  • Perform site security surveys and recommend standard policies and procedures by evaluating existing/proposed physical, personnel and information security protocols.
  • Demonstrated proven success that emphasized a thorough knowledge of technical aspects of IT Risk Management and Information Security.
  • Interviewed with CSI and other periodicals to address current regulations and laws surrounding information security issues and privacy.
  • Assigned to project teams to represent information security requirements and perform operations and administration tasks.
  • Delivered comprehensive consulting services to drive business in Northeast Region for Information Security practice.
  • Developed and maintain policies regarding information security for four sites with approximately 2,000 users.
  • Developed and maintained Information Security consulting offerings in Vulnerability Assessment and Risk Gap Analysis.
  • Created and maintained Information Security lab used to monitor a variety of company systems.
  • Demonstrated knowledge of Information Security strategy, policies, organization and governance.
  • Manage information security and organizational professionals as part of a project team.
  • Conducted Information Security Assessments and mapped identified vulnerabilities to CobiT standards.
  • Perform effective personnel security inspections to assure information security compliance.
  • Developed and administer information security programs within the organization.
  • Performed information security issues with general to limited supervision.
  • Performed Physical Security, Operational security (OPSEC) and Information security (INFOSEC) surveys for customer facilities.
  • Work with the InfoSec team to identify, analyze, and correct/prevent information security vulnerabilities.
  • Provide Integration of a Wide Variety of Information Security Products for Multiple Companies.
  • Update and document information security processes and procedures Participate in Weekly and Ad-hoc status meetings
  • Perform Gap Analysis against clients current information security status and create remediation roadmaps to help them fill gaps and achieve compliancy.
  • Lead Information Security Analyst US Bank - Enterprise ISS Security Department - Bellevue WA.

Show More

66 Information Security Jobs

No jobs at selected location

14. Security Assessment

demand arrow
high Demand
Here's how Security Assessment is used in Securities Consultant jobs:
  • Provided domestic and international security assessments for airport, seaport and land border cargo and passenger operations.
  • Authorized or denied Change Management Requests dependent upon the completion and integrity of application security assessments.
  • Managed security assessments for financial organizations in alignment with FDC and State Department banking regulations.
  • Manage security assessment application (SecurCompass) to accurately evaluate customer's security posture.
  • Conducted a security assessment and consulted key stakeholders at two government court facilities.
  • Performed Security Assessment of client's existing security design and documented procedures.
  • Performed security assessment with costumers to ensure work performed met company standards.
  • Key leader in conducting facility security assessments and audits of government/public structures.
  • Carried out security assessment to ascertain agency's security posture.
  • Conducted security assessments and trained subordinate security staff.
  • Provided security assessments and remediation services.
  • Performed risk and security assessments on clients and third party vendors as part of a team of consultants.
  • Complete the Security Assessment, System Security Plans with the use of NIST SP 800-30 security controls.
  • Performed security assessment and penetration testing for networks, servers, Android devices and mobile apps.
  • Led security assessments at US Government facilities after the Oklahoma City bombing.
  • Delivered comprehensive security assessment of NEMIS (National Emergency Management Information System) first responder application for the Federal Emergency Management Agency
  • Skilled in conducting security assessments, travel safety planning and conflict de-escalation.
  • Conduct cyber security assessments to include impact and gap analysis.
  • Provided security assessment services for Reliance Infocom.
  • Managed the remediation of many vulnerabilities discovered by a previous security assessment project, world wide.

Show More

19 Security Assessment Jobs

No jobs at selected location

15. Security Personnel

demand arrow
average Demand
Here's how Security Personnel is used in Securities Consultant jobs:
  • Patrolled, inspected and protected facility s airfield and surrounding perimeters, via strategic placement of security personnel.
  • Oversee security operations of unarmed contract security personnel in conjunction with preparing logs and reports as required.
  • Entrusted with hiring and assigning security personnel during construction of WinStar's Manhattan headquarters.
  • Consult event coordinators and provide security personnel.
  • Arrested persons who committed theft, fraud, and forgery Hired, trained, and supervised security personnel.
  • Present, discuss and ease concerns regarding IRS's security design with client's security personnel.
  • Experienced and successful in development, retention, and recruitment and training of security personnel.
  • Provide residential security for high profile family; scheduling duties for 15 armed security personnel 24/7
  • Apprehend suspects and release them to law enforcement authorities or security personnel.
  • Directed the identification, selection and hiring of 30 US security personnel.
  • Train all the Security personnel and develop ongoing training programs.
  • Review backgrounds of all Security personnel.
  • Develop and impliment training and development courses and programs for corporate security personnel.
  • Mentor new security personnel as they navigate their way through the many processes involved with various agencies.

Show More

16. Cctv

demand arrow
average Demand
Here's how Cctv is used in Securities Consultant jobs:
  • Designed, Sold and had to troubleshoot Commercial Security/Fire/CCTV/Access Control systems.
  • Design Custom Security Systems * Utilize CCTV to help protect facilities * Work with modern technology to protect assets and people
  • Consult with local business owners on protecting their largest investments through CCTV and sophisticated intrusion system products and services.
  • Engaged in the installation and troubleshooting of Solar Powered Security, Fingerprint Locks, Alarm Monitoring Stations and CCTV.
  • Design, operate, install & maintain CCTV surveillance, intrusion, and physical plant security.
  • Company tried to start a new division in CCTV/Card Access with no success.
  • Operated CCTV systems as well as performed numerous perimeter checks on various sites.
  • Design, develop and implement CCTV and security/surveillance systems for Commercial accounts.
  • Detailed knowledge of security cameras (CCTV)and their operation.
  • Focus on alarm system/CCTV system/access control design and sales.
  • Focus on alarm system/CCTV system/home automation design and sales.
  • Designed burglar, fire alarm and CCTV systems.
  • Utilize CCTV system to monitor the entire facility.
  • Planned and designed access control and CCTV systems.
  • Alarm, CCTV and staff evaluation.
  • Monitor the property using CCTV equipment.
  • Assist in the implementation of the company's in-office biometric security system, employee identification badges and CCTV security monitoring systems.
  • Configured and installed Security, Fire Systems, Entry Access, Overt and Covert CCTV, Intercoms and Call Systems.
  • Recommened the design and installation of CCTV systems geared to special event monitoring.
  • Design burglar, CCTV, fire, or access systems that is best suited for the client's goal.

Show More

17. Architecture

demand arrow
average Demand
Here's how Architecture is used in Securities Consultant jobs:
  • Conducted OS Vulnerability Assessment, Database Vulnerability Assessment, provided recommendations with secure architecture design, development of policies and procedures.
  • Inspected security architecture, assessed system performance, and documented test validation while identifying areas for improvement to mitigate security defects.
  • Analyzed and recommended secure fixes for a variety of applications based on static analysis, penetration testing and architecture review.
  • Managed security design flow among architecture, micro-architecture/design, verification and testing teams of PG product line.
  • Managed a team of security analysts and programmers on web development architectures and e-commerce strategies.
  • Consulted clients regarding systems design, architecture, and implementation based on requirements.
  • Network configuration and design of network architecture.
  • Incorporate security best practices in the network architecture and design by providing security consulting services to business units and project teams.
  • Based on the results of the assessment, designed a new logical and physical architecture for the agency.
  • Collected and reviewed PLP documents, firewall rules, and documented the Security Architecture for each application.
  • Network Security Design: (Security Architecture and Models) and customer and employee security presentations.
  • Installed Responsible for Architecture, Planning, and Deployment of RSA's Adaptive Authentication 6.0.2.
  • Provided a new ArcSight systems data mining architecture design per the customer requirements.
  • Developed Architecture and Deployment for RSA Adaptive Authentication with DB2 Data Store;.
  • Provided architecture and profiles to Federal entities for use.
  • Implemented and managed Palo Alto Firewall architecture, establishing firewalls for stores with segregation of PCI network and traffic.
  • Assisted in the security design of a data warehouse architecture for EMC, Westborough, MA.
  • Performed audits and assessments are on the design architecture of new power plants and system upgrades.
  • Designed data centers and security architecture supporting Turkish Telecom eGovernment initiative.
  • Specialized in software security conducting a Architecture Risk Analysis of a high volume stock trading data clearing system.

Show More

39 Architecture Jobs

No jobs at selected location

18. Firewall

demand arrow
average Demand
Here's how Firewall is used in Securities Consultant jobs:
  • Automated firewall conversion from layer-2 to layer-3 technology; integrated results with intrusion detection systems.
  • Generated reports on current firewall policy to publish on customer portal.
  • Manage Check Point and Cisco ASA firewalls, along with other industry standard tools to monitor and prevent threats.
  • Worked hand-in-hand with the firewall management team to assign and remove ACL's for constantly changing project requirements.
  • Build cohesion and traction for an entirely new Firewall team to take over the systems.
  • Perform Intranet maintenance (via remote access) including firewall management and Log review.
  • Performed the in-depth hardware and software assessment on Cisco PIX and ASA 5520 firewalls.
  • Maintain network security devices which included firewalls, proxies, intrusion detection systems.
  • Network operations: Routing, switching, firewalls, wireless and remote connectivity.
  • Ported Gauntlet firewall code written in C to Nokia system running FreeBSD.
  • Installed and configured routers, switches, firewalls and wireless networks.
  • Implemented firewalls for nearly 80 stores over 8 months.
  • Administered Juniper 50, 200, 500, and SSG 520 firewalls.
  • Orchestrated firewall audit and risk evaluations to develop effective security controls where policy compliance was previously unachievable.
  • Analyzed and recommended modifications to customer firewall configurations on Solaris, HP, and Linux systems.
  • Achieved highest customer satisfaction scores for firewall implementation project.
  • Identify potential risk, consult on correcting or reducing risk Worked with Cisco routers, switches and Firewalls.
  • Conduct Firewall security assessments - Analyses of firewall design, configuration and rules.
  • Performed the migration of firewalls from Solaris based platform to Nokia.
  • Design and development of a perimeter firewall using Debian Stable Lenny + Netfilter / Iptables.

Show More

24 Firewall Jobs

No jobs at selected location

19. Security Services

demand arrow
average Demand
Here's how Security Services is used in Securities Consultant jobs:
  • Provide protective security services/tactical escort, weapons training, courier services and computer security services.
  • Reported to Vice President of Security Services for all matters pertaining to Security Agency Licensing.
  • Developed enterprise methodology to sell security services, pricing models for security consulting engagements.
  • Execute advanced risk management services and supervise staff in delivering high-level security services.
  • Served as bail bond manager and provided corporate executive security services.
  • Provide individuals and businesses with personalized security services and expertise.
  • Marketed security services to existing and new businesses.
  • Perform non-commission security services for clients.
  • Sell security services to small business and residential customers in the same fashion as stated below.
  • Provided Executive Security Services, and met all performance evaluation to the Washington convention.
  • Contributed to the creation of technical training material for mobile security services.
  • Started business that provided IT security services to commercial clients.
  • Perform security services at the City of Irvine Train Station.
  • Provided security services to U.S. State Department and other agencies.
  • Provided security services to current clients.
  • Authorized Dealer for ADT Security Services.
  • Provided security services to a government agency migrating to a cloud environment powered by Amazon Web Services (AWS).
  • Sell Home Security services and ancillary products door-to-door to residential customers to meet or exceed sales goals.
  • Bank of America Cyber Security Services - Created product portfolio for Intrusion detection.
  • Provide Managed Cyber security services to help protect small business from cyber threats.

Show More

16 Security Services Jobs

No jobs at selected location

20. Security Solutions

demand arrow
average Demand
Here's how Security Solutions is used in Securities Consultant jobs:
  • Focus upon assessment of gaps in technical deployment of security solutions, configuration, and overall security program governance state.
  • Review new security solutions designs and specifications and ensure that they align and integrate with existing security operations environment.
  • Provide security solutions using a consultative selling process while using technology for demonstrating the benefits of the systems.
  • Conceptualized and delivered integrated security solutions to protect the people, property and assets of commercial customers.
  • Customized security solutions with the latest advances in technology, training, surveillance and personnel development.
  • Provided round-the-clock armed protection details until professional residential and commercial security solutions were implemented.
  • Secure Pacific is a leading provider of verified commercial and residential security solutions.
  • Interacted with high management to custom-tailor security solutions to their company needs.
  • Analyze security deficiencies and develop security solutions for Bulk Power System environment.
  • Design and develop end to end security solutions for business applications.
  • Provide security solutions to United States business and residential customers.
  • Provided security solutions for business and homes.
  • Provide professional information about security solutions.
  • Performed functional testing of security solutions like RSA two factor authentication, Novel single sign on, DLP and SIEM.
  • Install and configure security solutions for small & medium size businesses to monitor both physical and logical network security.
  • Marketed and sold commercial turnkey security solutions to large and small business.
  • Create promotional campaigns to drive growth of security solutions.
  • Recommended home security solutions, by assessing needs.
  • Developed and maintained effective security solutions for banking/money management applications (Linux, Solaris 9).
  • Position Responsibilities: Position Responsibilities: - Provide excellent customer service while designing and presenting security solutions to commercial clients.

Show More

61 Security Solutions Jobs

No jobs at selected location

21. Linux

demand arrow
average Demand
Here's how Linux is used in Securities Consultant jobs:
  • Managed a government/military development lab with 80 desktop/laptop machines consisting of Linux, Fedora, Ubuntu, and Windows.
  • Installed and configured Linux, Sun, and HP servers for the enterprise, and Network Appliance filers.
  • Install, configure, maintain, and troubleshoot Linux Red Hats servers.
  • Run penetration tests utilizing programs on a Linux platform.
  • Used Linux on a daily basis.
  • Participated in GPOS (Win XP & Debian Linux) & RTOS (GHS INTEGRITY) software code reviews.
  • Utilized Linux, Ruby, Bash, ArcSight 5.0.
  • Standardized Splunk forwarder deployment, configuration and maintenance in Linux and windows platforms.
  • Conducted Vulnerability Assessment of Windows, Linux and Solaris servers.
  • Managed System Security (Linux Cent OS 4.6, Sun Solaris 10, Window 2003).
  • Installed and configured Solaris and Linux operating systems on a mixture of Sun and x86 hardware.
  • Helped install a new PBX system for a resort using Elastix system on a Linux server.
  • Complete Splunk migration from Windows platform to Linux platform, head, indexers, forwarders.
  • Played Major Role in Migration of Webseal from Windows to Linux.
  • Installed Ipchains on Linux Servers.
  • Utilized lightweight virtualization/ isolation/task partitioning via Linux's cgroups resource management utility and OOM-Killer taming.
  • Utilized: ArcSight, Bash, Korn, Perl, Ruby, Linux, Solaris, Windows.
  • Experience in using Kali Linux to do web application assessment with tools like Dirbuster, Nikto, and NMap.
  • Design and implement Wireless "Hotspot" solutions based on Linux wireless tools.
  • Utilized Linux,Windows, Solaris, Ruby, Korn, Bash, and ArcSight 4.0.

Show More

2 Linux Jobs

No jobs at selected location

22. PCI DSS

demand arrow
average Demand
Here's how PCI DSS is used in Securities Consultant jobs:
  • Assist the lead Qualified Security Assessor (QSA) in PCI DSS assessments
  • Performed risk assessments to comply with PCI DSS standard.
  • Develop IR Plans and Test Plans for customer to meet the standards of PCI DSS 1.2.
  • Perform initial analysis and defensive posture work for organizations to meet the PCI DSS and PA-DSS PA-DSS standards.

Show More

59 PCI DSS Jobs

No jobs at selected location

23. Cyber

demand arrow
average Demand
Here's how Cyber is used in Securities Consultant jobs:
  • Configured a SSH Proxy server in development to connect with CyberArk.
  • Modified password policies within CyberArk.
  • Communicated regularly with senior management, cyber intelligence analysts, vendors and other stakeholders to enhance operational efficiency.
  • Led a new concept of cyber security for authentication and authorization based on behavioral analysis and device access.
  • Utilize various security strategies and interventions including surveillance, cyber security, reporting systems, and data collection/analysis.
  • Perform quality risk review of written reports documenting findings and tasks performed related to cyber security incidents.
  • Assisted in generating technical reports on cyber security standards to enhance policy and procedure of the organization.
  • Reported on current events relevant to cyber security.
  • Educated clients on basic cyber-security.
  • Provide Cyber Tracking for a PI company of individual's activity, address, phone numbers, GPS location, etc.
  • Experienced in cyber best practices, technology / tools, risk management, current threats, etc.
  • Utilized extensive management skills to lead several teams with 15 senior cyber security engineers and project managers.
  • Supported the NIST/WhiteHouse Cybersecurity Framework for CIP / DIB (centered on RMF / COBIT).
  • Designed monitoring and response plan based on various cyber kill chain model for various clients.
  • Project 3: General Directorate for National Security - Cyber Security Program.
  • Briefed Congressional staffers and leadership of Atlantic Council on current cyber threats.
  • Utilize various tools and countermeasures to identify and remedy detected vulnerabilities Provide detection, analysis, and documentation of cyber-threats.
  • Initial development of Cyber Security training module for each CSIP Electric energy consulting company.
  • Conducted internal cyber security hackathons to innovate solutions to enhance security standards.
  • Helped Westinghouse with the design and specifications for the Cyber Security Monitoring System (CSMS).

Show More

31 Cyber Jobs

No jobs at selected location

24. Nist

demand arrow
average Demand
Here's how Nist is used in Securities Consultant jobs:
  • Apply security and administrative policies, procedures, and techniques to develop viable programmatic options to security related problems.
  • Supported the administration of personnel actions and development of career advancements.
  • Developed and administered personnel security programs within civilian organizations.
  • Overlooked, evaluated and supported the development of policy documents such as the Afghanistan and United States Strategic Partnership Document.
  • Assist in the implementation and administration of an Automated Information System (AIS) security programs for critical security programs.
  • Support in elaboration of Handbooks, guidelines, didactic materials and policy proposals to the Health Ministry.
  • Designed a new IT contingency plan and DRP for the agency using NIST 800-34 as a guide.
  • Administer global sales program that tackled potential privacy regulatory and compliance issues throughout the sales life cycle.
  • Ensured SAP and SAP-F administration and management were based on guidance from the program security officer.
  • Provided support to business operations, to include administrative actions, and special projects.
  • Developed and administered a new security program for a $1.2 billion dollar bank.
  • Helped set up the Security Force along with Hospital Administration and Director of Security.
  • Utilized NIST and DIACAP IA Controls for Security Test & Evaluation.
  • Project 2: Ministry of Defense - End Point Security Project.
  • Maintained permissions and administrated updates and patches for web servers.
  • Registered domain names, established e-mail accounts and ODBC database connections, audited monthly Web site reports and administered e-mail servers.
  • Integrated security into the Systems Development Lifecycle for a Government agency to adhere to NIST standards.
  • Work with several different call accounting systems and Smart phone Administrator.
  • Consulted with Executives and Administrators to design Processes, Policies, and Procedures to pass latest Sarbanes Oxley audit.
  • Implemented DHCP rollout using Quadrtitek QIP and administered DNS and Bootp servers for a Fortune 500 company.

Show More

74 Nist Jobs

No jobs at selected location

25. Incident Response

demand arrow
average Demand
Here's how Incident Response is used in Securities Consultant jobs:
  • Focus on delivering enterprise security advisory services, infrastructure security assessments, incident response operations assessments, and PCI-DSS compliance preparations.
  • Served as Security Expert for incident response to malicious/ phishing websites and identity theft investigations related to online banking portal.
  • Performed forensic investigations, incident response, and event reconstruction using EnCase Forensic Edition.
  • Performed security event analysis on events from customer devices to manage incident response.
  • Provide guidance in data breach and security incident response and investigation.
  • Instantiated Threat and Vulnerability assessment and incident response processes.
  • Author, deploy, train and test Computer Security Incident Response Plans for credit unions, reinsurance companies and global organizations.
  • Handled incident response for 148 sites globally as well as 4,000 endpoints including the investigation and remediation of all security incidents.
  • Created and tested global Computer Security Incident Response Plans for large banking institutions and reinsurance companies.
  • Conduct Contingency Plan, Recovery Plan and Incident Response tests for assigned IT systems.
  • Provided incident response services for a number of commercial clients of varying sizes.
  • Participate in Incident Response activities for assigned IT systems.
  • Design the Incident Response Plan.
  • Assist in developing procedures surrounding incident response, computer forensics, and malware analysis.
  • Performed preliminary incident response for customers Performed remote assistance for clients.
  • Lead incident response efforts to determine the criticality of an incident, appropriate containment, and mitigation activities at client sites.
  • Lead on Incident Response: Primary Response Engineer to address all facets of technical response (e.g.
  • Provide clients guidance and advice related to cyber incidents, forensics, and incident response.
  • Categorized subprocess as high, med and low for better incident response time.
  • Executed Incident Response exercise CIP 009 - Business Recovery controls Reviewed Business Recovery documentation, and evidence.

Show More

3 Incident Response Jobs

No jobs at selected location

26. Law Enforcement

demand arrow
average Demand
Here's how Law Enforcement is used in Securities Consultant jobs:
  • Liaised with U.S. military, local law enforcement and supporting security organizations to assess and report threat climate and vulnerabilities.
  • Recruited active and retired law enforcement personnel to staff new government security contracts.
  • Participated in meetings with Chief of Police and other local law enforcement representatives.
  • Provide Needed Security Contract or/and Local Law Enforcement for events of client meetings/receptions.
  • Created and implemented intensive training programs for major metropolitan law enforcement agencies.
  • Established a network of bank security investigators and law enforcement jurisdictions.
  • Maintain cooperative relationships with local & international law enforcement agencies.
  • Maintained detailed records of security incidents and law enforcement actions.
  • Performed preliminary investigative duties to assist with law enforcement procedures.
  • Conduct certified security and law enforcement training.
  • Maintain liaisons with Host Nation Security Apparatus, US Embassies, Federal Law Enforcement Agencies, State and Local Agencies.
  • Set a standard for conducting financial crime investigations that was modeled by both bank investigators and law enforcement officers alike.
  • Provide training to Federal law enforcement officers in the areas of interview, interrogation, investigation and surveillance.
  • Handled such accounts as homeland security, department of defense and other local law enforcement agencies.
  • Conduct firearms and tactics training to military, law enforcement, government, and civilian students.
  • Provide a spectrum of support to military, government agencies, law enforcement
  • Received awards / honors from the Philippines law enforcement agencies.
  • Worked in conjunction with local law enforcement.
  • Served as senior law enforcement liaison.
  • Initiated citizen contacts Instructor Certification for a variety of Law Enforcement subjects.

Show More

27. Security Issues

demand arrow
average Demand
Here's how Security Issues is used in Securities Consultant jobs:
  • Provided security for functions, supervised other security staff and advised on particular methods of handling security issues.
  • Monitored and evaluated unit performance on key security issues, recommending corrective action programs where appropriate.
  • Participated in incident management and troubleshooting of security issues for daily operations and Command Center support.
  • Assess and advise environmental concerns regarding security issues, providing cost-effective and targeted solutions.
  • Advised senior leadership on operational security issues.
  • Consult external service providers on security issues.
  • Recommend solutions to technical security issues.
  • Help clients with the remediation process by guiding them with best and easiest techniques to overcome the security issues.
  • Conducted seminars on a wide range of security issues at statewide conferences on behalf of cooperation.
  • Managed the effort to reduce the number of identified security issues for the supported business unit.
  • Analyzed and trouble shoot security issues (Short Dumps, Background Jobs and BDC).
  • Worked with Agency Security Lead and advised them of security issues and best practices.
  • Worked with departments to establish GPO's related to specific functions and security issues.
  • Interview staff and heads of departments to determine specific security issues.
  • Advise subscribers to my blog website regarding their security issues.
  • Ensured previously found security issues are fixed in future products.
  • Analyzed and troubleshoot security issues using SU53 / ST01.
  • Offer expert advice on resolving critical security issues.
  • Answer all phone calls requiring security issues.
  • Arranged meetings, provided support and training to software developers in IT security issues during SDLC lifecycle.

Show More

9 Security Issues Jobs

No jobs at selected location

28. Small Business

demand arrow
average Demand
Here's how Small Business is used in Securities Consultant jobs:
  • Performed security needs analysis for homeowners and small businesses and executed necessary paperwork for customer approval and installation.
  • Evaluated homes and small businesses and designed appropriate security systems.
  • Obtained top ranking by utilizing a consultative sales approach to provide cutting edge Security Systems for families and small businesses.
  • Hired as small business rep, consistently ranked in top 5% of region, occasionally #1.
  • Provided security and delivery services to small businesses in the Austin area.
  • Sell monitored fire and security systems to home owners and small businesses.
  • Promoted to commercial sales from small business; consistently met and exceeded goals
  • Mentored new small business team members on sales strategies and relationship building.
  • Created my own sales for residential and small business security systems.
  • Installed and supported computer networks for individuals and small businesses.
  • Initiated Small Business and Residential Sales for all of Oklahoma.
  • Developed a disaster recovery plan for a small business.
  • Designed and implemented PCI programs for small business clients.
  • Demonstrated product lines to homes and small business owners.
  • Provided security protection to 40+ commercial and small businesses.
  • Demonstrate in-home and on-site presentation to potential residential and small business customers on the productsand services Central Security Group offers.
  • Developed a small business as Emergency Management and Physical Security Consultant in the country of Ecuador.
  • Accounted for outside sales of security systems to small businesses and homeowners along with networking with Realtors and Insurance Agents.
  • Participated in building a small business division for Brinks Home Security in the Columbus, Ohio marketplace.
  • Utilize Nessus to detect and resolve vulnerabilities within small business networks.

Show More

29. Internet

demand arrow
average Demand
Here's how Internet is used in Securities Consultant jobs:
  • Provided subject-matter expertise to the first Internet Voting application sponsored by Election.com, including security threat analysis for the voting process.
  • Led security architecture design and deployment for enterprise Internet firewall and services for major bankcard issuer.
  • Gathered & documented intranet, internet & internal business application requirements from various business lines.
  • Supervised security responses and hardening of internet resources in response to external threats.
  • Conducted Internet security assessments and diagnosed existing installations using SATAN security analysis tool.
  • Provided security services to an Internet Service Provider.
  • Provided subject-matter expertise to AT&T Internet Platform Organization for X.509-based Public Key Infrastructure (PKI) for e-Business systems.
  • Managed various projects, including a high-available dot com Internet portal re-launch from a few systems to a co-located network.
  • Led enterprise and Internet network security design and implementation for wireless phone service simultaneous launch in 19 major U.S. cities.
  • Project scope included defining the quality criteria, assessing and insuring Internet security, and executing performance tests and reports.
  • Secure accounts through, cold calling in person and via telephone, direct mail, internet and networking.
  • Contributed to Industry/Government project to protect Computer Data Intrusions (POVD) via the Internet.
  • Provided support for Active Directory and Internet Information Server (IIS) on Windows 2000.
  • Audited IT retail and internet hosted e-commerce environments in scope for PCI requirements.
  • Designed a Database to collect Information on general Internet Email Fraud activities.
  • Ensured the accomplishment of sales objectives completely over the phone and internet.
  • Configured high availability Internet access solutions utilizing Radware Link Proof network appliances and redundant DNS servers via multiple Internet Service Providers.
  • Performed troubleshooting and resolution for complex internetworking problems at router/switch level.
  • Diagnose internet and extranet security threat.
  • Used the consultative sales approach to promote Frontpoint products and services over a telephone and internet platform.

Show More

4 Internet Jobs

No jobs at selected location

30. Security Operations

demand arrow
low Demand
Here's how Security Operations is used in Securities Consultant jobs:
  • Prepared the overall security plan and managed the security operations of the organization, including assignments and staffing.
  • Planned, oversaw, executed armed personal, vehicular, residential security operations for affluent client and family.
  • Integrated security identity management software, access controls, and mass notification systems into security operations.
  • Lead numerous teams in communications, information systems, personnel, physical and technical security operations.
  • Contracted by U.S. Government agencies and private corporations for international security operations and security training.
  • Created key performance indicators for evaluating physical security operations and systems.
  • Handled Security Operations aboard contracted shipping lines vessels.
  • Coordinate security operations for the corporate offices.
  • Traveled with client and directed security operations.
  • Engage leadership, line staff and personnel throughout both client and contract security operations groups, including law enforcement agency stakeholders.
  • Assisted in planning site and mobile security, training plans for multinational employees in complex security operations.
  • Controlled the security operations of the $650 million pipeline project during construction and start-up phase.
  • Oversee security operations and monitor activities at chase bank locations threw out the United States.
  • Scoped requirements for Horizon s new Global Security Operations Center and mail screening facilities.
  • Created use case testing, processes, and incident response procedures for security operations.
  • Created Security Operations Center and full lifecycle security incident management including personnel, processes, procedures, and remediation actions.
  • Developed and improved network and security operations; developed and updated Symantec documentation and product Wiki's.
  • Supported safety and security operations in Hong Kong, Singapore and Chennai during development and transition periods.
  • Oversee Security Operations Center (SOC) day to day activities, customer co-ordination, onboarding and maintenance.

Show More

37 Security Operations Jobs

No jobs at selected location

31. Alarm Systems

demand arrow
low Demand
Here's how Alarm Systems is used in Securities Consultant jobs:
  • Conducted security assessments and solicited corporations to invest in security and fire alarm systems.
  • Generated leads, assessed customer needs and sold residential security alarm systems.
  • Provided monitored alarm systems to residential and small business accounts.
  • Designed and sold custom alarm systems to business/individual clients.
  • Provide in home presentation of alarm systems and security products while designing a security system to meet the customer's needs.
  • Design and Sale of Burglar Alarm Systems & Closed Circuit Television Systems in the Greater New Orleans area.
  • Stay current on all new alarm equipment, as we switch alarm systems/devices every few months.
  • Certified as a Fire Alarm Systems Agent/Burglary Alarm Systems Agent in the state of Florida.
  • Assisted with installations of alarm systems for home/business and did fire inspections for businesses.
  • Designed and sold security alarm systems and closed-circuit TV systems to business and industry.
  • Marketed and sold commercial and industrial alarm systems through referrals and leads.
  • Market and sold security alarm systems to commercial businesses.
  • Fire, smoke, access control and alarm systems.
  • Monitor CCTV and alarm systems.
  • Provided presentations/demonstrations of alarm systems and security monitoring products and services.
  • Installed camera Assisted in Installing Alarm Systems

Show More

32. Loss Prevention

demand arrow
low Demand
Here's how Loss Prevention is used in Securities Consultant jobs:
  • Performed security risk assessments surveys, physical security surveys, provide protective strategies, executive protection, retail loss prevention reviews.
  • Communicate and coordinate with local authorities and corporate loss prevention consultants.
  • Developed customer specific loss prevention programs for small businesses.
  • Developed customized loss prevention policies and procedures.
  • Frequent meetings with facility managers at various levels to discuss loss situations, policies and specific work environment loss prevention strategies.
  • Created the Loss Prevention Today educational series of PowerPoint presentations for Criminal Justice Students at ITT Technical College.
  • Provide assistance with access control, loss prevention routes, traffic enforcement, and policy enforcement.
  • Worked with hard and soft line supervisors to insure proper inventory procedures and loss prevention.
  • Maintain any and all procedure violations that pertain to safety and loss prevention issues.
  • Assisted commercial customers with following proper procedures when handling freight, loss prevention.
  • Developed comprehensive loss prevention programs for three major divisions of AT&T.
  • Provide consulting services for businesses in the loss prevention and asset protection areas.
  • Assisted the Food and Beverage Department in their loss prevention programs.
  • Conducted loss prevention investigations for 16 Crystal Winds Inc. locations.
  • Inspect premises to define security needs and loss prevention tactics.
  • Improved loss prevention and other techniques & security guidelines.
  • Advised in Retail Security and Loss Prevention.
  • Trained all personnel in loss prevention procedures.
  • Provided security/loss prevention consulting services for the top corporations in Puerto Rico.
  • provided physical store security and loss prevention for the retail store.

Show More

33. Project Management

demand arrow
low Demand
Here's how Project Management is used in Securities Consultant jobs:
  • Performed automated network vulnerability scans, general information security consulting, and other forms of project management.
  • Directed / lead project management methodology to protect consumer credit card information on various systems.
  • Position - Various positions in personal security details to project management.
  • Positioned and sold Project Management and Integration Services.
  • Managed all aspects of the business, including budget, contract negotiations, and project management of contract staff.
  • Project management and generating business on Referrals (Self-Generated) formed a critical component of the Sales process.
  • Provide project management, business, and functional analyst support to high profile and highly visible projects.
  • Project management of Archer engagements, implementation and configuration of software, policies, and assessments.
  • Assist companies in security assessments, advice, design, project management, and management.
  • Provided project management support for scheduling, coordinating and scoping of small and medium projects.
  • Assist in project management duties.
  • Provide technical leadership and project management for internal security teams to drive multiple security practices.
  • Secure datacenter/hosting environment evaluations, architecture, deployment and project management.
  • Utilize project management and quality assurance practices to ensure the ATO packages reviewed were complete and met client requirements.
  • Provide lifecycle project management, define workflows, track equipment shipments, and facilitate solution development.

Show More

34. Hipaa

demand arrow
low Demand
Here's how Hipaa is used in Securities Consultant jobs:
  • Worked in coordination with Business Continuity Planning and Disaster Recovery departments for HIPAA compliance.
  • Conduct HIPAA/PCI security risk assessments internally and for external customers.
  • Graded systems for TAC202, HIPAA, and JCAHO CAM-H security standards as requested by the chancellor of the UT system.
  • Provide guidance and assist in the identification, implementation and management of policies and procedures relating to HIPAA privacy and security.
  • Exercised knowledge in SOX, HIPAA, PCI, GLBA, PIPEDA, and FERPA regulatory compliance to ensure data security.
  • Assisted the Privacy Office and Audit groups in remediation of systems as a result of HIPAA, SOX and GLBA reports.
  • Advised clients on the most secure infrastructure to host internal PKI and on how PKI could assist with achieving HIPAA requirements.
  • Provide consulting services to clients to include security assessments against environments subject to PCI, HIPAA, and SOX regulations.
  • Positioned professional services and products (HIPAA, PENN Test and PCI) for clients to pass their corporate audits.
  • Participated in numerous HIPAA, GLBA, PCI/DSS, ISO 27001, SOX, and Massachusetts Data Protection Law audits.
  • Implemented software (ESM) on multiple operating systems to automate audits for HIPAA, SOX and GLBA compliance.
  • Develop, Document and Implement policies as well as procedures with management buy-in to adhere to HIPAA Administrative Safeguards.
  • Audited organization for HIPAA/HITECH Compliance based on requirements in Business Associate Agreements with Texas Health and Human Services.
  • Completed an analysis document outlining the Final HIPAA Security Rule to existing Policies and Procedures.
  • Transferred to PHS-IT to be a HIPAA consultant for Security of Non-Production environments.
  • Review of policies to determine gaps of policies for HIPAA/HITECH and security.
  • Performed HIPAA risk assessments for numerous healthcare organizations and FFIEC risk assessments for various banking institutions across the United States.
  • Assess process for receiving, documenting, tracking and investigating HIPAA policy complaints, including a review of sanction policies.
  • Conducted an IT assessment which included PCI and HIPAA compliance.
  • Conduct HIPAA "Desk Audit" for Small and Mid-Sized Providers and Business Associates.

Show More

1 Hipaa Jobs

No jobs at selected location

35. ISO

demand arrow
low Demand
Here's how ISO is used in Securities Consultant jobs:
  • Facilitated liaison with local oil company management, staff, and domestic and international security consultants who visited project site.
  • Served as the application security subject matter expert and liaison in support of various Fidelity application development groups.
  • Provided advisory and technical support to help clients improve security management.
  • Project management, trusted IS Security advisory.
  • General security advisory and recommendation.
  • Performed other related duties as assigned or requested in compliance with ISO 27001 and 9000 (International Standards Organization).
  • Provide technical support to Site Supervisors that have access to security equipment (CCTV) system.
  • Worked as a liaison to check the security loop holes by performing pen-testing and vulnerabilities scanning.
  • Develop and implement a SOX program based on COSO, COBIT, and ISO 27001/2 Frameworks.
  • Acted as interim CISO and assist in recruitment effort for long-term CISO.
  • Research competitive companies and compile comparison report to aid in closing sales.
  • Prepare ATO letter and Executive Summary Report for CISO approval.
  • Act as the senior research and technical advisor to Fishnet on PCI matters for customers.
  • Supervised four senior advisors nationwide consulting on over $6M of physical security projects.
  • Researched best practices using ISO 17799 framework for Affirmative Insurance, Dallas, TX.
  • Perform IT Audit compliance checks, using ISO Gap Analysis and CobiT standards.
  • Play an advisor and strategic role.
  • Gap Analysis of industry recognized control frameworks including NIST SP 800-53 Rev , ISO 2700x, and FedRAMP.
  • Performed role as both technical advisor and actor in major motion picture "Geostorm."
  • contract) Providing businesses with HIPAA Security Risk Assessments using Riskwatch and Octave-S Disaster Recovery and Business Continuity Planning Technical advisor

Show More

75 ISO Jobs

No jobs at selected location

36. Application Security

demand arrow
low Demand
Here's how Application Security is used in Securities Consultant jobs:
  • Conduct research and development of advanced application security threats and countermeasures and publish findings for internal and external consumption
  • Provided Application Security and Penetration testing support several high profile DHS and OPM information technology systems.
  • Provided expertise on wireless technologies, single-sign, intellectual capital protection and application security.
  • Locate and report application security breeches through white-box code review and application penetration testing.
  • Prepared and maintained application security documentation related to project planning and system compliance.
  • Provided strategic and operational leadership for a mobile application security project.
  • Performed internal IT audits covering Infrastructure and Application Security.
  • Consulted on development of corporate-wide Application Security QA curriculum.
  • Host and application security configuration and deployment assessment.
  • Document application security guidelines, which will be used to evaluate the security mechanisms in other ADP products.
  • Participated in SOAP and SAML based Web Services and Single SignOn design & Implementation for application security.
  • Reviewed application security, including Gauntlet, Firewall-1 and Cisco ACL reviews.
  • Web and mobile Application Security Assessments (WASA).
  • Web application security assessment for e-commerce, e-banking and emoney applications.
  • Fixed application security vulnerabilities (POA&Ms) after security scan using OWASP.
  • Remediated 9.1-application security for PeopleSoft HCM modules at large northeast grocery store chain.

Show More

20 Application Security Jobs

No jobs at selected location

37. SOX

demand arrow
low Demand
Here's how SOX is used in Securities Consultant jobs:
  • Provided SOX compliance services for CSK Auto by testing the design and operating effectiveness of controls within IT and business processes.
  • Reviewed the current Event Management strategy for compliance with PCI/DSS and SOX controls and developed plan to close gaps found.
  • Implemented CERTUS Governance, Risk, & Compliance software to manage and track SOX compliance.
  • Worked with DTE Energy's security team to comply with NERC/FERC and SOX security regulations.
  • Provided HIPPA, SOX, and PCI research and consultant services.
  • Worked SAP controls for Sarbanes-Oxley (SOX) compliance.
  • Involved in SOX control testing for EFH environment.
  • Maintained Tripwire for SOX audit.
  • Created Skip Approval workflow as part of SOX requirement.
  • Design new proxy server environment Perform vulnerability assessments to evaluate security of various IT infrastructure Perform SOX and PCI audits.

Show More

38. Security Management

demand arrow
low Demand
Here's how Security Management is used in Securities Consultant jobs:
  • Trained security officers, counter-surveillance operatives and security management personnel on all aspects of law enforcement and operations security.
  • Employed exceptional security management skills while managing a team of eight senior security engineers.
  • Mentored the usages of Vulnerability assessment tools, packet analyzers & security management suites.
  • Consulted on Business Continuity and Security Management topics for Risk and Compliance teams.
  • Reviewed and audited clients' facility security management program.
  • Designed network security architecture and security management systems.
  • Experienced in safety planning, security management, investigative techniques, case preparation, and public relations.
  • Communicate with the shopping center's management as well as security management on a daily basis.
  • Design identity and access security management solutions, provide proof of concept trials.
  • Consulted company on various aspects of security management, operations, and sales.
  • Presented final report to the security management for review and approval.
  • Implement business security management processes and methodologies, standards and other documentation.Selected Projects:
  • Helped several managers drafting Security management plans and EOPs
  • Co-created the SLAs and the introduced of a formal project security management framework.
  • Coordinate Force Protection and Security Management Issues for Fluor.

Show More

39. New Accounts

demand arrow
low Demand
Here's how New Accounts is used in Securities Consultant jobs:
  • Maintained and developed current and new accounts through referrals, professional associations and personal contacts in the security and banking industries.
  • Performed daily checklist of all reports processed by the offshore (India) new accounts team for accuracy.
  • Generated over 50 new accounts in contracted revenue in just 4 months.
  • Managed existing customers while acquiring new accounts through B2B and residential sales.
  • Called on Company's to secure new accounts through company promotions.
  • Maintained and developed current and new accounts.
  • Process orders and set up new accounts.
  • Call on established & new accounts.
  • Reviewed and approved workflow applications/templates processed by the offshore (India) new accounts team.
  • Created many new accounts, maintained ongoing accounts and client relationships.

Show More

40. Security Products

demand arrow
low Demand
Here's how Security Products is used in Securities Consultant jobs:
  • Negotiated and sold reactivation services, new services and upgraded security products within assigned territory.
  • Applied marketing skills to promote security products to eligible customers within Miami-Dade county.
  • Developed security products offering to existing fire/life safety customer base.
  • Recommended proper security products tailored to specific customer needs.
  • Prospect a protected territory; selling and proposing an array of integrated security products and services to businesses.
  • Direct sales of security products and services, specializing in IP surveillance and access controls.
  • Release Engineered ZoneAlarm consumer firewall/security products in the market from ZA Pro 4.5 and above.
  • Market Honeywell security products, First Alarm services, and myself on a daily basis.
  • Create self-generated sales leads for the purpose of selling Home Security products and services.
  • Sell security products and solutions to homeowners, business owners and senior decision makers.
  • Sell various types of Fire and Security products to the Residential Market.
  • Answer and respond to customer inquiries on security products and services.
  • Engineer and provide quotes for security products and services.
  • Engineered and supported clients' systems and security products.
  • Direct sales of security products to customers.
  • Evaluated DLP security products (McAfee, Symantec and RSA).
  • Benchmarked vendors' information security products and solutions for NASA.

Show More

41. ADT

demand arrow
low Demand
Here's how ADT is used in Securities Consultant jobs:
  • Present ADT Security products to Hispanic/non Hispanic business owners in Arizona.
  • Created new market share by selling ADT products and services to new and existing homeowners also small and commercial businesses.
  • Present sales presentations and proposals to prospects, identifying why ADT products and services are better than the competition.
  • Work with ADT Installers and customers, including fielding customer calls, issues, rebate processes.
  • Trained new consultants on paperwork and ADT presentations and have new consultants shadow on presentations.
  • Consulted with customer in their homes and recommend best ADT residential security solutions for them.
  • Consult with Clients to recommend and sell a variety of ADT Products and Services.
  • Received paid off-site training seminars from ADT on conducting excellent sales and customer service.
  • Adhere to current ADT policies, procedures, products, programs and services.
  • Represented ADT Home Security, Security Networks, Vector Home Securities.
  • Write contracts for customers to get ADT security in their homes.
  • Offer sales consultation on ADT's lineup of products and services.
  • Assigned the most challenging Atlanta market for ADT penetration.
  • Served on the ADT Safety Committee and Safety Team.
  • Take over existing ADT security systems.
  • Install wireless ADT security system.
  • Demonstrate how ADT's services go past security and into home automation, eco-friendly/energy efficiency and other convenient electronic solutions.
  • Ranked #1 locally at ADT for most self generated sales in 2015 and #1 for office ADTPays sales performance.
  • Promote ADT Security Systems to prevent crime, Fires and Medical first responder calls.
  • Switch platforms from Cisco, Adtran, 3Com, Linksys and Netgear.

Show More

42. Checkpoint

demand arrow
low Demand
Here's how Checkpoint is used in Securities Consultant jobs:
  • Prepared and documented Checkpoint firewall alerts implementation plan for performance monitoring and real-time alerts notification on WhatsUp monitoring system.
  • Design and implementation of highly available network infrastructure using Linux, Checkpoint, F5, Nokia, Cisco and RadWare products.
  • Configure and Administration of the Checkpoint Firewall R77.30 rule management, change control and Policy install package.
  • Implemented CheckPoint firewall service for a large managed service provider by administering managed firewalls for 500 clients.
  • Configure, test, install, and maintain Checkpoint VPN Nokia Appliance and Provider-1.
  • Installed and configured Checkpoint Firewall-1 v.4.x firewalls on Nokia, Sun and NT.
  • Experience with convert Checkpoint VPN rules over to the Cisco ASA solution.
  • Performed Checkpoint firewall upgrade of 50 firewalls from R55 to R65.
  • Maintain public safety > Performed daily tasks and paperwork for checkpoints
  • Worked with best of breed Security Partners (Cisco, Juniper, BlueCoat, Checkpoint, Varonis and Tipping Point).
  • Co-ordinated with client for the patch updates on firewalls (Checkpoint, Cisco PIX, ASA and FWSM).
  • Implemented IDS (Intrusion), Checkpoint (Secure Platform) and IPS (Raritan).

Show More

43. IDS

demand arrow
low Demand
Here's how IDS is used in Securities Consultant jobs:
  • Developed and implemented lesson plans and training aids for residential and commercial security systems sales and marketing techniques.
  • Design and implement network solutions for small and midsize offices including end-to-end security planning and Wireless data solutions.
  • Negotiated and reviewed security contract bids and proposals.
  • Consulted with midsize and SOHO companies with network, application, operating system and security problems on an on-call basis.
  • Worked with Engineers to develop patch management Process, Procedures and job aids for SCADA systems and network devices.
  • Experienced with Business Continuity Planning, Windows NT Server, deployment and management of IDS systems.
  • Master Data Services and BIDS using BIML for manage customer and dashboards information for KPI.
  • Designed and installed network and host based IDS sensors to monitor malicious activities.
  • Designed system layouts, presented bids, closed sales, and obtained referrals.
  • Shared IDs and privilege users now have enforced guidelines in place.
  • Configure / Monitor IDS and other firewall protection.
  • Prepare bids and contracts for sale and installation.
  • Quoted prices and prepared customized bids.
  • Performed POC for Websense product for seven potential clients, showcasing IDS, HTTPS, SSL & vulnerability threats.
  • Collected and analyzed IDS Information re: Network Intruders/Intrusion, IDS software, War Dialers.
  • Conducted attack analysis on the IDS reports to detect the attacks and reported the analysis.
  • Perform onsite security assessment, wireless assessment, and IDS/IPS hardware deployment.
  • Front Desk (check all IDs at the door.
  • Map the FFIDs to Owners and Controllers.
  • Installed Nessus Security scanner, Snort and IDS Center, Radware Network IDS and ISS Host based IDS.

Show More

1 IDS Jobs

No jobs at selected location

44. IP

demand arrow
low Demand
Here's how IP is used in Securities Consultant jobs:
  • Performed customer satisfaction surveys after all equipment was installed and operating.
  • Served as Safety and Security Manager in Omaha, NE and Phoenix, AZ during multiple-month transition periods.
  • Compiled data and composed tablet PC documentation to be utilized by multiple support groups upon full deployment.
  • Recruited to provide leadership and to develop security practice within the US primarily the Eastern region.
  • Participated in GLBA, FFIEC and HIPPA compliance based IT security risk assessments.
  • Developed and implemented HIPPA, SOX and NERC CIP regulatory compliance solutions.
  • Worked on preparation of Big fix reports and submitted to senior leadership.
  • Developed pipeline at 4 times quota target within 6 months.
  • Established relationship with community Home Owner's Association members.
  • Set up and explained new membership contracts.
  • Arranged equipment and service install dates.
  • identified and delivered on changes to policies and process; provided continuous improvements and good leadership guidance.
  • Designed test scripts for IBM Appscan Source developer plugin and verified the features for new upgrades.
  • Assisted in moving different data servers and related equipment for Lucent, Lisle, IL.
  • Implemented HSM solution with Ncipher for protecting the keys of CA advanced authentication products.
  • Collaborated multiple times with bits&digits's Co-Founder & Chief Intelligence Officer.
  • Included review of drawings, blueprints and other construction/pre-existing locations for such security equipment placement.
  • Assist with attaining FEDRamp accreditation by developing policies and procedures to adhere to multiple federal government mandated SOPs and standards.
  • Improved lost & stolen equipment process by removing non-security incidents out of SOC and into help desk screening.
  • Managed Virtual Machines Using VMware vSphere Migrated multiple citrix farms from XenApp 5 to XenApp 6.5 in Production servers.

Show More

7 IP Jobs

No jobs at selected location

45. Security Requirements

demand arrow
low Demand
Here's how Security Requirements is used in Securities Consultant jobs:
  • Retail Technology Security Program was aimed at understanding security requirements and providing support to business owners.
  • Architect/Defined, Implemented and Documented Security Requirements and Roles in line with company standards.
  • Audit, analyze and define security requirements for information protection.
  • Inspect and assess training programs and facility security requirements.
  • Supported customer relationships with respect to system security requirements.
  • Defined security requirements for network elements and applications.
  • Develop database to meet functional and security requirements.
  • Review and apply Security Requirements for information systems.
  • Developed security report test cases and testing procedures to verify compliance with DHS, DCID and NIST system security requirements.
  • Maintained record of passing all PCI audits related to physical security requirements for all data centers and secure areas.
  • STRIDE assessment of the applications during the design phase, identifying the threats possible and providing security requirements.
  • Played a key role in developing information security requirements involved with the design of a new data center.
  • Assist companies of all sizes to meet complex compliance and security requirements in a variety of industries.
  • Consulted with the Director of IT to define security requirements for their major systems for this year.
  • Work with Project manager and Technical lead to determine security requirements for projects.
  • Worked to ensure that the outsourcing contract security requirements were followed.
  • Consult with clients to assess risks and to determine security requirements.
  • Managed Data Security requirements and changes (via DOORS DB).
  • Led efforts to integrate approved security requirements into outsourced Credit Suisse services.
  • Contributed to team on Network and Security requirements gathering and SOC Planning for major quasi-governmental' energy client.

Show More

7 Security Requirements Jobs

No jobs at selected location

46. Unix

demand arrow
low Demand
Here's how Unix is used in Securities Consultant jobs:
  • Provided daily UNIX system resource allocation and backup management.
  • Performed general Unix Administrative functions.
  • Installed and configured Windows, Linux, and Unix operating systems within virtual machine environments to test corrective configurations for clients.
  • Focused on the Unix environment with core OS systems on both IBM AIX and HP Unix platforms.
  • Collaborated with and guided the UNIX & Windows teams in order to adhere to security best practices.
  • Assess vulnerabilities of systems, networks, and applications including Windows, Linux, Unix.
  • Advanced Software Optimization through low level programming in Unix, Linux and Windows Platforms.
  • Provided SUN UNIX support to the foreign exchange traders in fast pace environment.
  • Performed UNIX system administration tasks to support maintenance activities Participated in Y2K readiness preparations for NYSE security infrastructure.
  • Conducted assurance reviews of all midrange systems including AIX, Digital Unix and Windows NT.
  • Privileged access management and integration of UNIX, Windows, Sybase, and Oracle accounts.
  • Created Custom fixlets to extract information's from UNIX machines.
  • Configured UNIX Sendmail relay agent to communicate with IMA gateway.
  • Implemented in Visual C++, Cygwin Unix environment.

Show More

47. SQL

demand arrow
low Demand
Here's how SQL is used in Securities Consultant jobs:
  • Mitigated vulnerabilities of SQL Server, Apache configurations and installations.
  • Work with the new SQL Server 2016 Always Encrypted features, the TDE, and/or security certificates to encrypt sensitive data.
  • Major steps included writing SQL code, stored procedures, importing and exporting data, and system analysis.
  • Established ODBC and SQL connections with Archer and various asset management systems e.g.
  • Direct table reads were identified and proper index and SQL modifications were added.
  • Perform Cross Site Scripting/SQL Injection.
  • Identified issues like SQL injection, XSS, CSRF etc using Burp Suite.
  • Conducted validation testing in SQLPlus, Converted CalibreRM document to Access Database and generated validation comparison reports.
  • Cross Site Scripting, Session Leakage, Race Condition, SQL Injection, and Information Leakage).
  • Helped the customer understand their business use cases Advanced Linux Systems Administration, LDAP, MySQL.
  • Created ad hoc reports upon user requests, using SQL and Platinum Report Facilities.
  • Utilize Salesforce CRM to maintain a defined SQL funnel.
  • Create packages (ssrs) to load data into SQL Server 2008.
  • Installed Postnuke and Mysql database for internal web portals.
  • Lead penetration testing Nikto, Nessus, Metasploit Framework, NMAP, BURP, SQL Map, Wire Shark and OllyDebug.

Show More

8 SQL Jobs

No jobs at selected location

48. Active Directory

demand arrow
low Demand
Here's how Active Directory is used in Securities Consultant jobs:
  • Automated provisioning: Newly created users are provisioned to Active Directory and also Involved in Custom attribute provisioning in Active directory.
  • Worked with Microsoft representatives to provide customized program changes to resolve various Active Directory functional deficiencies.
  • Configured Target Reconciliation for getting users from Active Directory into OIM.
  • Configured Password Synchronization with Microsoft Active Directory.
  • Demonstrated how to incorporate Epic EMP, Active Directory, and third party provider data into SER data evaluation.
  • Advised the changes to Fujitsu Custom code to integrate with new Active Directory and complied against R12 SDK.
  • Involved in design and implementation of IdentityIQ solution in FDIC, configuring Active Directory, and Shared Folders.
  • Managed creation of user accounts, email, and shared folders, through Active Directory and MS Exchange.
  • Implemented Active Directory, group policies, user and computer accounts, etc.
  • Assign Portal Roles to users using Active Directory Services.
  • Import data from Active Directory.
  • Assisted in the design and implementation of the Nation Wide Windows 2000 Active Directory Structure of 190,000+ computers and users.

Show More

49. New Clients

demand arrow
low Demand
Here's how New Clients is used in Securities Consultant jobs:
  • Contacted and Called large number of New Clients a day.
  • Collaborated with Sales in identifying new clients.
  • Assisted new clients with sales, fire design, submittals, and customer service.

Show More

50. VPN

demand arrow
low Demand
Here's how VPN is used in Securities Consultant jobs:
  • Clean up activity of unused or dead VPN tunnels were performed as part of Decommissioning task.
  • Designed and implemented network infrastructure with a VPN solution for a mortgage company in Cobb County.
  • Provided admin support and troubleshoot services on Juniper SA platform for SSL VPN remote access.
  • Worked with management team and security administrators to resolve VPN remote user accesses.
  • Provide managed firewall services - firewall policies, traffic monitoring, VPN connectivity.
  • Provided principle design and engineering for deployment of VPN initiative for the client.
  • Implemented VPN for use of obtaining proprietary and confidential data.
  • Designed reliable VPN solution for Global Center's customers.
  • Connected sites and mobile users by using VPN.
  • Identified the active and Inactive VPN tunnels.
  • Implemented SSL VPN for remote office users.
  • Implemented NetScreen firewall and VPN solution.
  • Configure and troubleshoot VLAN, VPN, VTP, STP and Trunks.
  • Secure VPN access: Build corporation's remote access requirements whilepreventing fraudulent access to any corporate assets.
  • Design and implement firewall/vpn solutions on a variety of Linux platforms.
  • Migrated site-to-site vpn tunnel to T1 router connection for wan connectivity.
  • Create IPSEC VPNs for customer deployments Setup hardware test environment for Services team.

Show More

Securities Consultant Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For A Securities Consultant

Security Procedures

11.2%

Security Systems

9.7%

Ensure Compliance

8.4%

Vulnerability Assessments

6.1%

Security Consultant

5.8%

Security Policies

5.4%

Access Control

5.1%

Infrastructure

4.9%

Risk Assessments

4.6%

Video Surveillance

4.6%

Customer Service

4.3%

Security Audits

3.9%

Information Security

3.8%

Security Assessment

3.7%

Security Personnel

3.5%

Cctv

3.5%

Architecture

3.5%

Firewall

2.8%

Security Services

2.6%

Security Solutions

2.5%
Show More

Typical Skill-Sets Required For A Securities Consultant

Rank Skill
1 Security Procedures 7.7%
2 Security Systems 6.6%
3 Ensure Compliance 5.7%
4 Vulnerability Assessments 4.2%
5 Security Consultant 4.0%
6 Security Policies 3.7%
7 Access Control 3.5%
8 Infrastructure 3.3%
9 Risk Assessments 3.1%
10 Video Surveillance 3.1%
11 Customer Service 3.0%
12 Security Audits 2.6%
13 Information Security 2.6%
14 Security Assessment 2.6%
15 Security Personnel 2.4%
16 Cctv 2.4%
17 Architecture 2.4%
18 Firewall 1.9%
19 Security Services 1.8%
20 Security Solutions 1.7%
21 Linux 1.5%
22 PCI DSS 1.5%
23 Cyber 1.5%
24 Nist 1.4%
25 Incident Response 1.3%
26 Law Enforcement 1.3%
27 Security Issues 1.2%
28 Small Business 1.2%
29 Internet 1.2%
30 Security Operations 1.1%
31 Alarm Systems 1.1%
32 Loss Prevention 1.1%
33 Project Management 1.0%
34 Hipaa 1.0%
35 ISO 1.0%
36 Application Security 1.0%
37 SOX 1.0%
38 Security Management 0.9%
39 New Accounts 0.9%
40 Security Products 0.9%
41 ADT 0.9%
42 Checkpoint 0.9%
43 IDS 0.9%
44 IP 0.9%
45 Security Requirements 0.9%
46 Unix 0.8%
47 SQL 0.8%
48 Active Directory 0.8%
49 New Clients 0.8%
50 VPN 0.8%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

9,818 Securities Consultant Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.