Data Security CV

Data security is the practice of keeping data protected from corruption and unauthorized access.

Unauthorized access to data could lead to many problems in large corporations. The corporate organizations hire data security personal to protect their data from passing into unauthorized hands. The data security workers usually help the organization in encrypting data, creating backup solutions and creating strong user authentication for the usage of data.

People interested to work in the field of data security should have a bachelor’s degree in computer science or related fields. They must be familiar with networking technologies such as TCP/IP, Windows NT and UNIX. They must also have good understanding of computer programming and risk management. For better employment opportunities the data security workers should get themselves certified by the Information Systems Security Professional (CISSP).

Data Security Specialist CV Template

Claire Vowel

96 Waffle Street W1H 4PO London

United Kingdom

Phone: 44 (0)23 4354 5678




Experienced data security specialist having experience in Security Program Management, Penetration Testing, Compliance, Risk Assessment, Threat Modeling, Security Design Review, Security Code Review looking for suitable opportunities in the filed of data security.

Professional experience

2007- Present Data Security Specialist Gamezone Inc.



  • Interfacing with internal customers and gathering functional requirement.
  • Designing security solutions in line with business requirements.
  • Implementing group strategy
  • Improving and maintaining vulnerability management infrastructure.
  • Monitoring security incidents.
  • Conducting internal gap analysis against relevant information.
  • Maintaining security standards including PCI-DSS, ISO27000.
  • Developing complex security tools in API’s in Java,C,C++ and Python.
  • Maintaining the RSA authentication manager and Sun LDAP Directory Server.


2005- 2007 Security analyst Bernard’s Inc.


  • Providing support, control and management of information system and associated information systems.
  • Provide security advice to internal staff supporting the client.
  • Reviewing, developing security deliverables from the risk assessment process.
  • Providing consultant to local staff on security, audit and compliance matters.
  • Determining associated risk and develops strategy for mitigation.
  • Performing change control functions.


  • Masters in Information technology TYU University .(2005)
  • Bachelors in Information technology Jade University. (2003)
  • CISSP, CISA certified.


  • Best employee (IT department) Gammon Inc 2008.

Hobbies and Interests

  • Video Games
  • Chess




Can be provided upon request