INFORMATION SECURITY RESUME EXAMPLE

Published: Jun 20, 2025 - The Information Security Professional implements robust cybersecurity frameworks to safeguard organizational assets and ensure compliance with industry standards. This role involves continuous risk assessment, threat intelligence analysis, and timely response to security incidents. The individual enhances system resilience through regular audits, vulnerability testing, and security awareness training.

Tips for Information Security Skills and Responsibilities on a Resume

1. Information Security Analyst, South Orange County Community College District, Mission Viejo, CA

Job Summary: 

  • Maintain and mature certifications such as ISO27001, SOC2
  • Ensure compliance with Information Security policies, procedures, guidelines, and standards
  • Conduct internal compliance reviews and serve as a consultant for security issues that require immediate resolution
  • Liaison between the Information Technology department and third parties engaged to provide Information Security monitoring and/or management services
  • Interpret and disseminate security-related information to invoke operational/security responses and/or actions
  • Interpret and disseminate security-related information to upper management and the board of directors in relevant terms, e.g., summary dashboards
  • Facilitate audit and regulatory reviews by gathering documentation or representing facts to auditors and regulators
  • Ensure the company is compliant with data destruction methods
  • Review internal, external, and regulatory recommendations and follow up to ensure company adaptation


Skills on Resume: 

  • Compliance Monitoring (Hard Skills)
  • Audit Facilitation (Hard Skills)
  • Policy Enforcement (Hard Skills)
  • Risk Communication (Soft Skills)
  • Third-Party Liaison (Soft Skills)
  • Certification Management (Hard Skills)
  • Data Governance (Hard Skills)
  • Regulatory Interpretation (Soft Skills)

2. Information Security Analyst, Veterans Sourcing Group, White Plains, NY

Job Summary: 

  • Maintaining and reviewing risk and compliance registers and documentation
  • Facilitating workshops to evaluate ISO 27001 impact assessment and gap analysis for future state projects
  • Assist with the implementation of compliance projects and ongoing governance
  • Provide ongoing monitoring of compliance risks and controls, and coordination of internal audit engagements including driving mitigation actions
  • Research on best practices and regulatory guidance to drive business improvement
  • Coordinate and facilitate risk and compliance meetings, audits and workshops
  • Review of risk and compliance registers and documentation
  • Advise the manager of potential new threats and plausible mitigation, and suggest user education
  • Participate with Information Security and Information Technology teams and any required third-party partners to protect data
  • Perform day-to-day tasks as they relate to Information Security


Skills on Resume: 

  • Risk Documentation (Hard Skills)
  • Gap Analysis (Hard Skills)
  • Compliance Projects (Hard Skills)
  • Audit Coordination (Hard Skills)
  • Regulatory Research (Hard Skills)
  • Threat Advisory (Soft Skills)
  • Team Collaboration (Soft Skills)
  • Security Operations (Hard Skills)

3. Information Security Architect, Intuitive Research and Technology Corporation, Huntsville, AL

Job Summary: 

  • Advise technology and business leaders in defining priorities, key initiatives, and organizational alignment to support making informed risk decisions
  • Act as a visionary to proactively assist in setting direction for future security strategies
  • Align standards, frameworks, and security business cases with the overall business and technology strategy
  • Identify and communicate current and emerging security threats
  • Assist in the development of proposals for enterprise security strategy based on threat analysis, opportunity identification, value cases, and risk
  • Act as a subject matter expert to IT and business leaders to support security goals within new projects, existing use cases, and vendors
  • Consult with project teams to align projects to the security program
  • Assist with efforts for the evaluation and selection of security architecture standards to maximize value and trust
  • Prepare, champion, and educate the organization and individual teams on changes in security policies and best practices
  • Partner with the Security Architect to develop security program strategies and develop key metrics to track effectiveness


Skills on Resume: 

  • Risk Advisory (Soft Skills)
  • Strategic Planning (Soft Skills)
  • Threat Analysis (Hard Skills)
  • Standards Alignment (Hard Skills)
  • Security Consulting (Soft Skills)
  • Policy Education (Soft Skills)
  • Project Alignment (Hard Skills)
  • Metrics Development (Hard Skills)

4. Information Security Consultant, CoreAVI, Fort Worth, TX

Job Summary: 

  • Ensuring Group and Divisional policies are implemented locally
  • Providing advice on Information Security related to AMT-SYBEX's products and services
  • Supporting all business functions in Information Security-related activities
  • Provide consulting to customers on Security considerations, act as AMT's SME in technology discussions
  • Work with product development teams and advise on security considerations regarding product development, recommend and undertake vulnerability and surface attack testing
  • Keep up to date with industry best practice and new security technology, working with the technical and product teams
  • Input into solution designs for PQQ/RFx/ITT tender responses and individual proposals
  • Review and advise on new security risk considerations
  • Own completion and maintenance of responses to security questionnaires
  • Help define and maintain security policies and maintain ISO27001 certification


Skills on Resume: 

  • Policy Implementation (Hard Skills)
  • Security Consulting (Soft Skills)
  • Vulnerability Testing (Hard Skills)
  • Customer Advisory (Soft Skills)
  • Product Security (Hard Skills)
  • Risk Review (Hard Skills)
  • Certification Maintenance (Hard Skills)
  • Tender Support (Hard Skills)

5. Information Systems Security Engineer, Blue Star Partners LLC, Columbus, OH

Job Summary: 

  • Provide systems security engineering leadership and support for high-performance computing systems, specifically in Cybersecurity, Information Systems Security Engineering (ISSE) / Information Assurance (IA), and Risk Management Framework (RMF)
  • Interpret system requirements and provide subject matter expertise to program management and customers
  • Address and develop solutions for computing security requirements (e.g., RMF)
  • Perform security evaluation of vendor hardware, software, documentation and testing, and document findings in reports and briefings
  • Evaluate and apply government cybersecurity (DoD, NIST, FIPS, JSIG and NSA) policies and instructions
  • Coordinate with system stakeholders to define ISSE-related system integration needs and schedules, such as certification events and test
  • Develop and/or acquire, install, configure and integrate ISSE/Cybersecurity tools for auditing
  • Apply a logical approach in solving challenging problems
  • Use OS Environments such as Windows, Unix (Solaris), Linux (RHEL)
  • Use Cybersecurity applications and tools (e.g., Splunk)


Skills on Resume: 

  • Security Engineering (Hard Skills)
  • Risk Management (Hard Skills)
  • System Evaluation (Hard Skills)
  • Policy Application (Hard Skills)
  • Stakeholder Coordination (Soft Skills)
  • Tool Integration (Hard Skills)
  • Problem Solving (Soft Skills)
  • OS Proficiency (Hard Skills)

6. Information Security Manager, North Wind Group, Richland, WA

Job Summary: 

  • Responsible for the development, evaluation and implementation of processes to mitigate cybersecurity risk and ensure protection of company assets and information
  • Stays current on emerging threats, new vulnerabilities and industry standards
  • Focus is on holistic vulnerability management and ensuring the secure design of internal products and systems
  • Manages a team responsible for SAST, DAST, and network-based vulnerability scanners and associated processes related to risk rating, remediation, and reporting
  • Responsible for security audits and testing and evaluating system security configurations to ensure efficacy and compliance with policies and procedures
  • Conduct penetration testing and vulnerability assessments of applications, operating systems and/or networks
  • Coordinate with business and technology departments to ensure security is incorporated into new and existing processes
  • Cybersecurity breaches, identify intrusions and isolate, block and remove unauthorized access
  • Assist in the creation and implementation of security solutions


Skills on Resume: 

  • Vulnerability Management (Hard Skills)
  • Threat Monitoring (Hard Skills)
  • Team Leadership (Soft Skills)
  • Security Auditing (Hard Skills)
  • Penetration Testing (Hard Skills)
  • Incident Response (Hard Skills)
  • Secure Design (Hard Skills)
  • Process Integration (Soft Skills)

7. Information Security Manager, ShorePoint, Washington, DC

Job Summary: 

  • Work closely with Information Technology to identify and mitigate risks, perform security reviews, and design best-of-breed security practices and procedures
  • Design, implement, execute, and manage enterprise-wide security solutions to address Information Security needs as they are identified and prioritized
  • Propose, design, plan and execute strategic and tactical operational security objectives
  • Analyze threats and current security controls to identify gaps in the company’s security posture
  • Monitor changes and trends in the threat landscape to enable proactive security controls
  • Assist in the development of information strategy/technology roadmaps and metrics/measures packages
  • Coordinate and manage 3rd party vulnerability assessments, penetration testing, remediation activities, and post-remediation re-testing
  • Communicate threat intelligence and security performance metrics to the Executive Team and Board of Directors


Skills on Resume: 

  • Security Design (Hard Skills)
  • Threat Analysis (Hard Skills)
  • Risk Mitigation (Hard Skills)
  • Strategic Planning (Soft Skills)
  • Vulnerability Testing (Hard Skills)
  • Trend Monitoring (Hard Skills)
  • Executive Reporting (Soft Skills)
  • Roadmap Development (Hard Skills)

8. Information Security Risk Manager, BAE Systems, Clarksburg, WV

Job Summary: 

  • Identify, understand and manage information (security), data and technology risks associated with the Multifamily Division
  • Drive technology and security risk assessments on the technology of the Multifamily Division, which includes use of third-party services
  • Considered as the domain expert for the Multifamily Division around Information Security, Data and Technology risks, such as vulnerability management, technology debt, access management and data risks around privacy/personal information and public/non-public data
  • Facilitate annual and quarterly Risk and Control Self-Assessments (RCSAs) on information (security), data and technology risks
  • Drive remediation of issues and action plans and help ensure robust action plans are developed and complete
  • Partner with appropriate groups to develop and implement effective strategies related to information risk management and data governance
  • Advocate and champion the corporate risk framework and policy - driving awareness, adoption and execution in the groups within the department
  • Build positive relationships to influence strong risk management outcomes


Skills on Resume: 

  • Risk Assessment (Hard Skills)
  • Data Governance (Hard Skills)
  • Access Management (Hard Skills)
  • Issue Remediation (Hard Skills)
  • Policy Advocacy (Soft Skills)
  • Risk Communication (Soft Skills)
  • Relationship Building (Soft Skills)
  • Privacy Management (Hard Skills)

9. Information Security Specialist, Johns Hopkins Applied Physics Laboratory, Laurel, MD

Job Summary: 

  • Support maintaining industry certification activities including ISO20000, ISO27001 and SOC2 audit
  • Develop and maintain information security standards, plans, policies and operating procedures
  • Manage day-to-day operations of risk management activities for various client environments
  • Work with risk owners and risk treatment owners and platform leads to ensure risks and issues are managed and remediated promptly
  • Track and manage the security calendar activities
  • Review of data and analysis, develop and deliver customized reporting
  • Identify areas for improvement and work with the delivery team for a successful outcome
  • Correlate data from various sources to provide observations to internal Trustwave Stakeholders


Skills on Resume: 

  • Certification Support (Hard Skills)
  • Policy Development (Hard Skills)
  • Risk Operations (Hard Skills)
  • Issue Management (Hard Skills)
  • Calendar Tracking (Soft Skills)
  • Data Analysis (Hard Skills)
  • Process Improvement (Soft Skills)
  • Stakeholder Reporting (Soft Skills)

10. Information Security Specialist, Irvine Ranch Water District, Sand Canyon, CA

Job Summary: 

  • Monitor computer networks for security issues
  • Investigate and document suspected security breaches and other cybersecurity incidents
  • Install security measures and operate software to protect systems and information infrastructure, including firewalls, EDR tools, data encryption utilities and others
  • Work with the other IT teams within the department to perform testing and uncover network vulnerabilities
  • Help develop company-wide best practices for IT security
  • Convey the importance of good information security practices and help colleagues understand information security management
  • Research security enhancements and make recommendations to management
  • Stay up-to-date on information technology trends and security standards


Skills on Resume: 

  • Network Monitoring (Hard Skills)
  • Incident Investigation (Hard Skills)
  • Security Installation (Hard Skills)
  • Vulnerability Testing (Hard Skills)
  • Best Practices (Soft Skills)
  • Security Awareness (Soft Skills)
  • Enhancement Research (Hard Skills)
  • Standards Knowledge (Hard Skills)