Tustin Recruiting
Security Operations Manager Resume Template
A professional resume template tailored for Security Operations Manager positions, highlighting technical skills and project experience brought to you by Tustin Recruiting.
[Your Full Name]
Security Operations Manager
Summary
Results-driven professional with experience in overseeing security measures and risk management. Proven track record of delivering high-quality solutions and optimizing performance.
Skills
languages: Python, SQL
frameworks: NIST, ISO/IEC 27001
tools: Splunk, ArcSight, FireEye
concepts: Incident Response, Threat Analysis, Vulnerability Management, Access Control
Experience
Security Operations Manager
SecureTech Solutions
Jan 2022 - Present
- Led a team of 10 security analysts to reduce incident response time by 30% within the first year.
- Implemented a new risk assessment strategy that reduced vulnerabilities by 25% across the organization.
- Developed and executed comprehensive security protocols that improved overall system integrity by 40%.
Senior Security Analyst
CyberGuard Inc.
Mar 2019 - Dec 2021
- Coordinated a cross-functional team to implement Splunk for security monitoring, achieving a 50% reduction in false positives.
- Enhanced threat detection capabilities by integrating AI-powered tools, increasing threat identification by 35%.
- Collaborated with IT and legal teams to establish compliance procedures that satisfied all regulatory requirements.
Junior Security Analyst
InfoSec Enterprises
Jun 2017 - Feb 2019
- Assisted in the development of security measures, significantly contributing to a 70% decrease in phishing incidents.
- Monitored a wide array of tools to safeguard the network, resulting in a 20% reduction in unauthorized access attempts.
- Produced comprehensive reports and alerted upper management on potential risks, improving proactive measures by 25%.
Education
B.S. in Cybersecurity
University of Texas, Austin, TX
Graduated: 2017
Projects
Network Vulnerability Assessment
Led a project to assess and improve network security, identifying critical vulnerabilities and developing mitigation strategies.
Technologies: Nessus, Wireshark, Metasploit