CYBER SECURITY SKILLS, EXPERIENCE, AND JOB REQUIREMENTS

Published: Jun 03, 2025 - The Cyber Security Professional demonstrates strong expertise in threat detection, vulnerability assessment, and incident response to protect organizational assets. This position applies knowledge of firewalls, intrusion prevention systems, and encryption protocols to ensure secure network infrastructure. This role leverages experience in compliance frameworks such as ISO 27001 and NIST to maintain regulatory alignment and mitigate cyber risks.

Essential Hard and Soft Skills for a Standout Cyber Security Resume
  • Process Development
  • Activity Review
  • Ticket Management
  • Security Architecture
  • Threat Modeling
  • Risk Assessment
  • Infrastructure Design
  • Incident Analysis
  • Control Implementation
  • Risk Management
  • Shift Mentoring
  • External Communication
  • Continuous Improvement
  • Client Engagement
  • Team Collaboration
  • Time Management
  • Stakeholder Management
  • Risk Advising
  • Cyber Awareness
  • Team Mentoring

Summary of Cyber Security Knowledge and Qualifications on Resume

1. BS in Cyber Security with 4 years of Experience

  • Knowledge of Cyber Security Essentials, ISO27001/22301, Azure
  • Experience in delivering process improvement for Cyber Operations.
  • Ability to implement key security operations, services and processes.
  • Ability to react quickly, decisively and professionally.
  • Experience in identifying potential weaknesses, implementing measures to deter threats.
  • Analytical and problem-solving skills
  • Strong documentation skills for technical and non-technical staff and stakeholders.

2. BS in Computer Science with 3 years of Experience

  • Familiar with security-related frameworks including CIS20, NIST and PCI
  • Experience with Incident Management programs
  • Experience in intrusion detection and analysis
  • Knowledge of SPLUNK, Nessus, email gateway, O365, and Palo Alto technologies
  • Experience in monitoring, investigating, and solving IT security-related concerns
  • Strong interpersonal skills including strong written and oral communication skills
  • Experience with building & managing user awareness training programs
  • Ability to multitask and balance priorities

3. BS in Information Technology with 5 years of Experience

  • Familiar with security best practices
  • Familiar with networking and TCP/IP protocol
  • Experience installing, managing, and maintaining Windows and Linux operating systems
  • Familiar with various security architectures and methodologies (Defense in Depth, Kill-Chain, NIST, Critical Controls, OWASP, etc.)
  • Strong analytical and problem-solving skills
  • Strong written and verbal communication skills
  • Ability to work flexibly in line with the organization’s corporate objectives and role and to be willing to undertake other duties
  • Ability to think and act creatively, championing and promoting new ideas that contribute to the aims of the organization and the department.
  • Experience implementing, supporting, or defining requirements for security tools such as WAF, SIEM, IPS, CASB, EDRExperience with AWS public cloud services and security tools

4. BS in Information Assurance with 5 years of Experience

  • Experience with Docker/container platforms that include Kubernetes, Mesosphere, etc.
  • Experience in administering messaging solutions that include IBM MQ, Tibco EMS, Confluent Kafka, etc.
  • Strong knowledge of Linux, UNIX, Windows operating systems and virtualization technologies
  • Experience with middleware clustering and load balancing
  • Knowledge of Microsoft Azure, AWS, and GCP
  • Proficiency in project estimations, capacity planning, availability planning and performance
  • Knowledge of Documentation and development of processes and procedures.
  • Experience in managing 100+ applications.
  • Automation and Scripting experience that includes UNIX/Linux shell, Chef, Puppet, Ansible, Jenkins
  • Experience with Architecture frameworks like Zachman, FEA, TOGAF, MODAF/DODAF

5. BS in Network Security with 4 years of Experience

  • Experience with a deep understanding of the cybersecurity space
  • Familiarity with common development practices such as waterfall, agile, and scrum
  • Familiarity with offensive security, advanced attack and pen, and red teams
  • Experience in an outward and customer-facing role
  • Experience in people and project management
  • Experience working alongside product teams
  • Experience managing a technical team
  • Familiarity with software maturity models such as OpenSAMM, BSIMM, and SDL
  • Familiarity with security design patterns, cloud blueprints, and common architectures
  • Familiarity with Google Beyond Corp and other advanced defensive design models
  • Familiarity with MITRE ATT&CK and various detection response solutions
  • Ability to maintain high levels of output and work ethic
  • Ability to work within constraints and to challenge the status quo
  • Ability to self-direct work, orient to action, and truly own the position in a hyper-growth environment
  • Ability to translate business objectives into tactical, technical activities and vice versa

6. BS in Network Security with 3 years of Experience

  • Experience penetration testers, cloud engineers or cloud architects who want to specialise in cloud security
  • Passionate about information security, particularly as related to the major cloud platforms
  • Strong interest in emerging cloud technologies, latest cybersecurity trends and vulnerabilities
  • Understanding of how various core cloud services work for at least one of the Cloud Service Providers like AWS, Azure and GCP
  • Knowledge in one or more of the following specialisms including AWS, Azure, Google Cloud, Kubernetes or Docker
  • Ability to challenge existing approaches to information security
  • Excellent at communicating to both technical and senior-management audiences
  • Familiarity with infrastructure management and operations lifecycle concepts and ecosystem (Git, CI/CD, Terraform, Cloud Formation etc)

7. BS in Computer Engineering with 5 years of Experience

  • Experience/knowledge about IT Security
  • Experience/knowledge in Industrial Networking
  • Experience with Security Projects would represent an asset
  • Experience in industrial automation network systems engineering would represent an asset
  • Experience performing audits/assessments
  • Linux/Windows Security Basics
  • Excellent troubleshooting skills to resolve complex network and or application or system integration issues

8. BS in Software Engineering with 4 years of Experience

  • Knowledge of TPRM, SOX Reporting, FedRamp
  • Knowledge of the NIST Framework and the ISO Framework
  • Understanding of SOC 1 and 2
  • Experience with CAIQ
  • Experience with Loopio
  • Knowledge and understanding of relevant legal and regulatory requirements, such as Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry/Data Security Standard (PCI DSS), SANS and ISO27001
  • Knowledge and understanding of common information security management frameworks such as HITRUST, ISO, IEC27001, ITIL, and COBIT

9. BS in Information Systems with 3 years of Experience

  • Knowledge of Windows/Unix systems administration and security vulnerabilities
  • Knowledge of network protocols (IPV6, DNS, HTTP, etc.) and accompanying tools (Wireshark, TCPDump, etc.)
  • Understanding of network administration of Routers and switching technology (CCNA)
  • Understanding of penetration testing tools and techniques (Kali, Backtrack, Metasploit)
  • Experience in Forensics will be considered as an asset
  • Knowledge of key business informational systems
  • Knowledge of Risk Management Principles
  • Knowledge of penetration testing techniques
  • Excellent level of writing and oral communication skills in Greek and English

10. BS in Electrical Engineering with 6 years of Experience

  • Strong interest in developing a Cybersecurity/Infosec skillset
  • Knowledge of Active Directory and Azure AD
  • Knowledge of Azure and Microsoft 365 solutions, including both infrastructure and security components.
  • Knowledge of Windows-based server networks.
  • Basic understanding of Networks and Network Security (Cisco, Palo Alto, Azure Networks)
  • Dabbled with Linux/Unix (RHEL, Kali)
  • Basic understanding of email systems and mail security (Exchange Online, Mimecast)
  • Basic understanding of system management tools (SCCM, InTune, JAMF)
  • Ability to manage multiple projects simultaneously.
  • Excellent communication and interpersonal skills.
  • Ability to prioritize and organize assignments.
  • Strong verbal and written communication skills.
  • Ability to compartmentalize sensitive information
  • Experience with Microsoft certs, Azure certs, Security +, and/or are contemplating CySA+, CEH, CISSP (note, certs)

11. BS in Data Science with 5 years of Experience

  • Knowledge in automotive network architectures, CAN communication and cybersecurity.
  • Experience with vehicle automotive testing and development.
  • Experience in embedded control system design.
  • Good technical problem-solving skills.
  • Strong written and verbal communication skills.
  • Basic Program management experience.
  • Familiarity with AUTOSAR.
  • Knowledge of ISO/SAE 21434.
  • Experience with embedded automotive security concepts and technologies.

12. BS in Applied Mathematics with 4 years of Experience

  • Experience working with RMF and NIST 800-53
  • Experience working with GRC applications
  • Ability to provide clients with strategic direction to help them improve risk management processes/procedures
  • Experience operating as a Cyber Manager, leading Security testing
  • Knowledge of regulatory compliance for states
  • Experience with Azure implementation streams
  • Ability to identity and Access management experience

13. BS in Management Information Systems with 3 years of Experience

  • Experience with SOA security design, controls and implementation, IT system engineering process and life cycle, Networking protocols and products and Cyber security incident response
  • Expertise in the development of information, applications and cybersecurity operational services, standards and solution designs
  • Expertise in applying security operations principles, practices and processes
  • Experience in security with Microsoft Azure Security Suite
  • Experience in computer security-related disciplines, including but not limited to the following subject areas including software vulnerabilities and exploitation, host forensics, malware analysis, network traffic analysis, Insider Threat, and web-focused security topics.
  • Experience with Advanced Persistent Threat (APT), Spear Phishing, and credential compromise techniques.
  • Strong Knowledge of Windows Endpoint Internals and Automation
  • Excellent interpersonal and group dynamic skills

14. BS in Digital Forensics with 4 years of Experience

  • Ability to work independently and in teams
  • Ability to organize and prioritize responsibilities
  • Ability to interact in a courteous, helpful, and professional manner
  • Well-organized, detail-oriented, and able to handle a fast-paced work environment
  • Strong computer skills including proficiency with Microsoft Word, Excel, PowerPoint, Access, Outlook, and web browsers
  • Strong problem-solving skills
  • Excellent critical thinking and analytical skills
  • Strong interpersonal skills including written and verbal communication skills
  • Experience with a cybersecurity program.

15. BS in Systems Engineering with 3 years of Experience

  • Ability to navigate in an international environment and in an organization with a matrix structure
  • Communication skills at various levels of the organization, including presenting the status of the project, reporting on the progress of work, financial aspects of the project, but also communication with the client of the project
  • Experience in building relationships with the business
  • Experience in mobilizing and motivating a project team, building commitment and trust of project stakeholders
  • Experience in planning, organization of activities and supervision over the process of IT solutions implementation
  • Experience in making decisions, planning and organizing and project team’s work
  • Knowledge of Cyber Security Frameworks, CMMI and Information Security measures
  • Knowledge of SOC/SIEM, CSIRT, Vulnerabilities Management, and Penetration Testing
  • Practical knowledge of the MS Project/JIRA/Clarity tool and recognized project management methodology (e.g. waterfall, agile)
  • Knowledge of English at a level that enables communication

16. BS in Cloud Computing with 4 years of Experience

  • Ability to manage medium to large-scale IT Information Cyber Security Projects
  • Knowledge of project management disciplines (e.g. PMBOK, Schedule, Scope, Quality, HR, Communications, Risk Management)
  • Experience in managing projects leveraging different software development methodologies such as enable, waterfall, agile, scaled agile framework (SAFe)
  • Experience with PPM and Galileo
  • Strong experience interacting with business customers and managing expectations
  • Proven work experience working as a Project Manager with a successful project delivery record
  • Strong communication skills, both verbal and written
  • Ability to work independently with minimal supervision

17. BA in Cyber Security with 3 years of Experience

  • Understanding of technology risk management and IT governance principles and familiarity with cybersecurity solution offerings used to meet business and technical objectives
  • Experience with vulnerability assessment and penetration testing technologies
  • Knowledge of incident response, host and network forensic technologies
  • Knowledge of Microsoft, Linux & OSX operating systems
  • Networking knowledge (technologies, ports and protocols)
  • Proficient with cloud environments and technologies
  • Experience with IDAM, Active Directory/LDAP and other authentication technologies
  • Experience with Network & infrastructure cybersecurity best practices
  • Experience with Mobile and endpoint security
  • Experience with Technical report writing and research

18. BA in Criminal Justice with 6 years of Experience

  • Knowledge of key domains within the security field
  • Experience of working as part of a Cyber Security Incident Response Team
  • Knowledge of IT Infrastructure, Cloud security, with MS Azure, Amazon Cloud Services, Windows, Linux and DevOps
  • Experience in fact-finding and investigating incidents and alerts within the field of cybersecurity
  • Knowledge of penetration testing techniques, vulnerability scanning, assessments and remediation methods.
  • Experience with Source Code Review and Application Development
  • Strong business analysis skills, sound understanding of the Systems Development Life Cycle, and Agile process
  • A current, recognized, professional security management certification (e.g. CISM, CISA, CISSP)
  • A current, recognized technical security certification (e.g. CompTIA Security+, CEH, GPEN, OSCP, GCIH)
  • Excellent communication skills (both written and oral), able to work both independently and in a team-oriented collaborative environment.
  • Excellent interpersonal skills, with all levels of management

19. BA in Intelligence Studies with 7 years of Experience

  • Able to support DFARS & CMMC compliance work involving gap assessment, documentation and remediation actions.
  • Able to lead the assessment and implementation of cybersecurity controls in different business and engineering networks.
  • Able to assess and determine new controls and processes to harden systems and configurations against attacks.
  • Able to configure, deploy and monitor Endpoint Detection & Response tool across all systems in NORAM.Develops a process for other regions to utilize this capability to reduce risk and strengthen security posture globally.
  • Able to provide technical security requirements and recommendations on new IT and business projects.
  • Experience in working with HR and Legal to lead security activities around access management, security investigations and actions requiring data gathering and analysis.
  • Experience in defining plans to mature all Security processes and controls.
  • Experience in providing security engineering solutions and support during incidents, proactively considering the prevention of similar incidents from occurring in the future.
  • Experience in leading Security Monitoring maturity project and leading engagement with vendor on process improvements.
  • Ability to lead on ITSM implementation to define security controls and processes to protect Thales' data in the cloud.

20. BA in Political Science with 5 years of Experience

  • Experience in cyber cybersecurity domain
  • Experience with embedded hardware and/or software design
  • Experience with threat modeling, threat Analysis and Risk Assessment.
  • Experience with cybersecurity features including secure boot, secure communications (CAN/Ethernet), secure logging, secure diagnostics, and secure debug.
  • Experience with Development time with languages (e.g. C, C++, Python, Matlab, etc.)
  • Experience in developing and conducting laboratory and vehicle tests, gathering, and analyzing data
  • Experience with Engineering specification development, FMEA, DVPR, EMC and environmental testing
  • Knowledge of cryptographic algorithms and concepts (i.e. AES, RSA, SHA, Public key certificate, PKI, KDF).
  • Experience with the development of automotive ECUs
  • Experience with automotive networks and communication (i.e. CAN, CAN-FD, Ethernet
  • Experience with Ethernet communication and network security protocols (MACsec, IPsec, SRTP, SFTP, TLS, DTLS)

21. BA in International Relations with 8 years of Experience

  • Extensive experience in Information Security with focus on Incident Response, Security Engineering, and/or Intrusion Detection.
  • Experience working in Security Operations Center and/or Computer Incident Response Team.
  • Solid knowledge of computer networks and common protocols including TCP/IP, UDP, DNS, FTP, SSH, SSL/TLS, HTTP, and etc.
  • Proficiency in one or more programming/scripting languages.
  • In-depth technical knowledge of Mac OS X and Linux Operating Systems.
  • Experience with disk and memory forensic tools.
  • Ability to analyze endpoint, network, and application logs.
  • Experience with writing and tuning of IDS signatures.
  • Demonstrated an understanding of MITRE ATT&CK, Threat Modeling, operational threat intelligence and common attack Vectors.
  • Excellent problem-solving skills combined with hands-on experience doing root cause analysis and post-incident reviews.
  • Experience using big data log collection and correlation tools for data analytics.
  • Ability to analyze malware and obfuscated code.
  • Knowledge of CVEs and recent security vulnerabilities.
  • Knowledge of web application vulnerabilities with the ability to triage/verify OWASP Top 10 issues.
  • Experience with the creation of comprehensive technical reports.
  • Led proof of concept and evaluation of new technologies and tools to improve team operations.
  • Implemented partial or end-to-end automations of detection and incident response workflows.
  • Excellent verbal and written communication skills.
  • Demonstrated ability to work in a team environment.
  • Highly motivated individual and an enthusiastic learner.

22. BA in Psychology with 7 years of Experience

  • Capable of performing security assessments of servers and endpoints through various tools such as Qualys, Nessus, LanSweeper, Nmap, Wireshark, etc.,
  • Ability to perform network and infrastructure assessments
  • Experience on Windows, iOS and Linux Operating systems
  • Strong knowledge and experience in cybersecurity incident handling and security event analysis capability.
  • Experience in endpoint security.
  • Experience with cybersecurity tools in the current workplace (Endpoint solutions, disk encryption, intrusion prevention system, data loss prevention system, vulnerability scanner, etc)
  • Knowledge in various OS platforms (Windows, Linux, MAC)
  • Knowledge in converged IT environment (AD, DNS, Firewalls, IPS, AV, routers, switches, hybrid network environment (on-prem+Cloud), etc)
  • Understanding of networking and various network technologies
  • Experienced and understanding of vulnerability assessment and penetration testing
  • Experienced in leading security incident investigation and response
  • Ability to manage remote environments
  • Ability to effectively manage timelines and prioritize tasks with varying deadlines 
  • Excellent oral and written communication skills
  • Ability to solve practical problems and carry out responsibilities under general supervision
  • Provide concise and regular updates to management in the region
  • Ability to interact effectively at all levels with sensitivity to cultural diversity
  • Ability to function as an effective team member

23. BA in Sociology with 4 year of Experience

  • Ability to complete and oversee installation, configuration, maintenance, and troubleshooting of network firewall hardware, software, and connections.
  • Excellent hands-on technical knowledge of network switches, routers, firewalls, and management software.
  • Ability to monitor and test network performance and provide network performance statistics and reports.
  • Ability to write/edit and execute technical documents including Standard Operating Procedures (SOP), Concept of Operations (CONOPS), and other documents.
  • Understanding of Defense Information Systems Agency (DISA) STIG requirements.
  • Ability to review customer requests and provide IA scope management for Technical Requirements.
  • Understanding of Tipping Point with a strong knowledge of TCP/IP, HTTP/HTTPS, FTP, cookies, authentication, web filtering, virus scanning, web servers, SSL/encryption and reporting packages.
  • Experience working with the NIST 800-53r Risk Management Framework.
  • Experience working with Security Gateway and BCAP technologies.
  • Experience with Enclave Test and Development (T & D) Security Technical Implementation Guide (STIG).
  • Knowledge of Symantec's Blue Coat proxy products to include deployment, design, and architecture with the ability to troubleshoot proxy issues.
  • Experience with the Development of internal policy and procedure documents and plans.
  • In-depth understanding of established security standards and governmental requirements.
  • Ability to research network products, services, protocols, and standards to remain abreast of developments in the networking industry.

24. BA in Communication Studies with 5 years of Experience

  • Knowledge of Administration and hardening of Linux/UNIX systems.
  • Knowledge of Administration and hardening of Windows server and client systems including Active Directory and related components.
  • Knowledge of Administration and hardening of cloud environments such as AWS or Azure.
  • Knowledge of DNS security, DLP concepts and tooling and OWASP security concepts IDS/IPS, WAF, NetFlow, and protocol collection and analysis tools.
  • Ability to identify and Access Management concepts and tooling.
  • Knowledge of TCP/IP or OSI network protocol stack, including major protocols such as IP, ICMP, TCP, UDP, SMTP, HTTP, and SSH.
  • Knowledge of popular cryptographic algorithms and protocols such as RSA, SHA, Kerberos, and TLS.
  • Experience administering and automating centralized logging architectures and SIEM tools.
  • Experience with static and dynamic code review tooling.
  • Experience with vulnerability assessment and penetration testing tools.
  • Experience with programming and scripting languages and text manipulation tools (RegEx, Java/PHP, Python, Powershell).
  • Knowledge of Automation techniques (Terraform, Jamf, GPO, SSCM).
  • Strong problem-solving skills and ability to work under pressure with limited supervision.
  • Ability to lead the definition of project plans and projects.
  • Strong ability to multitask and prioritize multiple projects.

25. BA in Philosophy with 6 years of Experience

  • Experience with application security architecture, computer networking, cryptography, security engineering and architecture, programming, vulnerability assessments, and operating systems.
  • Configuration of SIEM tools including log aggregations, alarm management, and integration into an incident management process.
  • Experience managing scan results and driving resolution within multiple organizations.
  • Knowledge of security best practices and standards such as ISO27001, HIPAA/HITECH, HITRUST CSF, and NIST 800-53.
  • Experience automating recovery or investigation activities using a scripting language such as PowerShell, Python, etc.
  • Experience running projects including setting meetings and managing action items.
  • Experience working with external auditors as well as executing tasks related to internal audits.
  • Experience in an Active Directory-based identity environment including experience integrating Active Directory with SSO tooling (Okta, Ping Identity, etc).
  • Configuration and operation of tooling to support a Vendor Management process (OneTrust, TrustARC, etc). 
  • Experience with the design and maintenance of questionnaire forms in the tool as well as the ability to process results and assess the risk of vendor responses.
  • Experience in designing, executing, and reporting on security awareness programs including simulated phishing attacks.
  • Knowledge of Intrusion Detection and/or Intrusion Prevention Systems. 
  • Experience in scoping, implementing, and maintaining.
  • Experience working with security tooling in public cloud environments (AWS, Azure).
  • Experience with Identity and Access Management concepts and tooling (Cyberark, Thycotic, Sailpoint, LDAP, AD).

26. BA in Public Administration with 7 years of Experience

  • Experience with a wide variety of security platforms, both on-premises and in the Cloud such as AWS, AZURE
  • Experience in designing and architecting IAM stacks including Saviynt, ForgeRock, Symantec MFA, and other similar products..
  • Deep expertise with data model design including traditional RDBMS, Document NoSQL, Wide-column NoSQL, Key-Value Database, and conversion of relational data models to NoSQL data models.
  • Expert in understanding the Consistency, Availability, and Partitioning (CAP) capabilities of SQL and NoSQL databases and experience with tuning Consistency capabilities of eventually consistent NoSQL Databases.
  • Strong experience with architecting and delivering data and Big Data platforms capabilities such as database Clustering, Replication, Disaster Recovery, ship-to-shore data replication, resiliency, and maintaining data integrity.
  • Experience with large-scale package implementations like Siebel CRM, PeopleSoft.
  • Experience with data ER modeling and mapping the ER model to SQL and NoSQL models including Cassandra, CouchDB, and Relational DBs.
  • Experience in data platform high availability design, both on-premises and on the cloud.
  • Experience with performance tuning on traditional RDBMS and NoSQL platforms in a large enterprise.
  • Experience with application middleware technologies family of products
  • Architecture and design experience with platform implementations across Business, Application, Data, and Platform architecture.
  • Knowledge in Data Ingestion, Data pipeline design for extracting, transforming data from heterogeneous data sources to a target state architecture data source.
  • Platform design and implementation experience with projects that encompass digital, web services, microservices, API gateways etc.