INFORMATION SECURITY SPECIALIST RESUME EXAMPLE

Published: Sep 12, 2025 - The Information Security Specialist develops, implements, and maintains the organization’s information security framework, ensuring alignment with security policies, industry standards, and regulatory requirements. This role involves coordinating the deployment of security processes, leading risk assessments, managing compliance with frameworks such as ISO 27001/27002/27032 and PCI DSS, and driving awareness programs to mitigate cyber risks. The Specialist also oversees critical security domains, including cloud, network, identity and access management, vulnerability management, and incident response, while monitoring KPIs and defining action plans to strengthen overall security posture.

Tips for Information Security Specialist Skills and Responsibilities on a Resume

1. Information Security Specialist, CyberFort Solutions, Austin, TX

Job Summary: 

  • Serve as the service owner for endpoint security.
  • Monitor security events and promptly identify abnormalities.
  • Report and document information security events proactively.
  • Manage vulnerabilities and protect systems and equipment.
  • Implement and maintain security controls.
  • Manage the email system, especially the spam wall.
  • Monitor daily events from a SIEM solution.
  • Manage data leakage prevention and apply current forensic analysis know-how.
  • Monitor threats proactively and quickly detect indicators of compromise.
  • Provide cybersecurity user awareness training.


Skills on Resume: 

  • Endpoint Security (Hard Skills)
  • Event Monitoring (Hard Skills)
  • Incident Reporting (Hard Skills)
  • Vulnerability Management (Hard Skills)
  • Email Administration (Hard Skills)
  • SIEM Monitoring (Hard Skills)
  • Forensic Analysis (Hard Skills)
  • User Training (Soft Skills)

2. Information Security Specialist, Sentinel IT Services, Raleigh, NC

Job Summary: 

  • Perform proactive site-based asset management and database maintenance.
  • Oversee and interact with field teams to maintain IT security compliance.
  • Administer move, add, change, and de-install activities of IT assets for sites.
  • Maintain ongoing database input and updates.
  • Generate status reports.
  • Participate in weekly meetings to provide status and activity updates.
  • Provide best practice advice and counsel to users and managers.
  • Support Analyst with the deployment of new IT features and functions.
  • Perform other related asset management and security compliance activities.


Skills on Resume: 

  • Asset Management (Hard Skills)
  • Database Maintenance (Hard Skills)
  • IT Compliance (Hard Skills)
  • Asset Administration (Hard Skills)
  • Report Generation (Hard Skills)
  • Meeting Participation (Soft Skills)
  • Best Practice Advice (Soft Skills)
  • IT Deployment Support (Hard Skills)

3. Information Security Specialist, Guardian Cyber Defense, Denver, CO

Job Summary: 

  • Manage the Security Operations Team composed of L0 and L1 analysts.
  • Manage the server and network infrastructure for the security operations function.
  • Serve as the escalation contact for SOC Analysts L1 and L2.
  • Create and maintain detection use cases.
  • Work closely with other business units to onboard additional log sources.
  • Conduct proactive threat hunting and threat intelligence research.
  • Lead incident response activities.
  • Develop and maintain incident response plans.
  • Participate in a 24/7 on-call roster.
  • Mentor junior team members.


Skills on Resume: 

  • Team Management (Soft Skills)
  • Infrastructure Management (Hard Skills)
  • Escalation Handling (Soft Skills)
  • Use Case Development (Hard Skills)
  • Log Onboarding (Hard Skills)
  • Threat Hunting (Hard Skills)
  • Incident Response (Hard Skills)
  • Staff Mentoring (Soft Skills)

4. Information Security Specialist, NovaShield Technologies, Tampa, FL

Job Summary: 

  • Conduct information security and data privacy assessments of vendors, including cloud services.
  • Develop risk mitigation strategies and advise management on addressing identified risks.
  • Work with internal and external teams to conduct security and privacy control assessments.
  • Ensure compliance with information security and data privacy policies and procedures.
  • Coordinate with vendor managers to communicate, track, and close open risk items.
  • Manage tasks associated with monitoring FRS security and data privacy programs and standards.
  • Collaborate with FRS security and privacy communities to support activities.
  • Develop and maintain logical data diagrams to identify information flow and suggest process improvements.
  • Become proficient, including obtaining internal certification, in FRS security and data privacy frameworks and operational processes.
  • Develop data and perform analysis for risk reporting and tracking IT risk profiles.
  • Influence key stakeholders across the Bank regarding data privacy and information security policies, practices, and procedures.
  • Engage with information, data privacy, and cybersecurity leaders and peers to represent diverse subject matter expertise in day-to-day duties.


Skills on Resume: 

  • Vendor Assessments (Hard Skills)
  • Risk Mitigation (Hard Skills)
  • Control Assessments (Hard Skills)
  • Policy Compliance (Hard Skills)
  • Risk Tracking (Hard Skills)
  • Program Monitoring (Hard Skills)
  • Data Diagramming (Hard Skills)
  • Stakeholder Influence (Soft Skills)

5. Information Security Specialist, Titan Data Systems, Salt Lake City, UT

Job Summary: 

  • Establish plans and protocols to protect digital files and information systems against unauthorized access, modification, and destruction.
  • Maintain data and monitor security access.
  • Perform vulnerability testing, risk analyses, and security assessments.
  • Conduct internal and external security audits.
  • Anticipate security alerts, incidents, and disasters and reduce their likelihood.
  • Manage network, intrusion detection, and prevention systems.
  • Analyze security breaches to determine their root cause.
  • Monitor and investigate unusual network and account activity.
  • Recommend and install appropriate tools and countermeasures.
  • Define, implement, and maintain corporate security policies.
  • Train staff in security awareness and procedures.
  • Coordinate security plans with outside vendors.
  • Provide weekly status reports, including outstanding issues.


Skills on Resume: 

  • Security Planning (Hard Skills)
  • Access Monitoring (Hard Skills)
  • Vulnerability Testing (Hard Skills)
  • Security Auditing (Hard Skills)
  • Threat Prevention (Hard Skills)
  • Intrusion Management (Hard Skills)
  • Breach Analysis (Hard Skills)
  • Staff Training (Soft Skills)

6. Information Security Specialist, IronGate Networks, Columbus, OH

Job Summary: 

  • Manage processes to identify and access security management controls effectively.
  • Monitor and analyze security alerts, logs, notices, and reports.
  • Respond promptly and appropriately to detected security vulnerabilities and threats.
  • Provide technical solutions and support to safeguard sensitive corporate data.
  • Conduct security awareness training for all employees and agents.
  • Collaborate with other departments to ensure compliance with data security standards like SOC1, SOX, and PCI.
  • Participate in third-party vendor reviews to verify adequate data protection.
  • Act as a security subject matter expert to guide risk remediation efficiently.
  • Support project teams and Deviation Committees in designing secure, compliant solutions.
  • Deliver professional and field services in both on-premises and remote settings.


Skills on Resume: 

  • Control Management (Hard Skills)
  • Alert Monitoring (Hard Skills)
  • Threat Response (Hard Skills)
  • Data Protection (Hard Skills)
  • Security Training (Soft Skills)
  • Compliance Collaboration (Hard Skills)
  • Vendor Reviews (Hard Skills)
  • Risk Guidance (Soft Skills)

7. Information Security Specialist, SilverPeak Cybersecurity, Phoenix, AZ

Job Summary: 

  • Develop incident response plans that outline residual risks and trade-offs.
  • Recommend actionable steps to ensure ongoing business continuity.
  • Actively participate in incident response efforts under the direction of the Director.
  • Present incident findings, propose actions, and clearly communicate risks.
  • Deliver both verbal and written reports to technical and non-technical audiences.
  • Contribute to reports, briefs, and documentation relevant to their area of work.
  • Evaluate risks and define recovery and contingency procedures to support incident response.
  • Escalate issues promptly and appropriately under general supervision.
  • Assist the organization during audits by supporting process and procedure reviews.
  • Lead and coordinate major initiatives that impact multiple product reviews or involve key process improvements.


Skills on Resume: 

  • Incident Planning (Hard Skills)
  • Business Continuity (Hard Skills)
  • Incident Participation (Hard Skills)
  • Risk Communication (Soft Skills)
  • Report Writing (Hard Skills)
  • Risk Evaluation (Hard Skills)
  • Issue Escalation (Soft Skills)
  • Process Improvement (Soft Skills)

8. Information Security Specialist, Horizon Security Partners, Albany, NY

Job Summary: 

  • Install and configure security software to monitor systems and prevent breaches and violations.
  • Conduct penetration testing to identify vulnerabilities within information systems.
  • Plan and manage response strategies and countermeasures during cyber attacks.
  • Deliver training and educational programs on cybersecurity and data protection practices.
  • Serve as the Information Security Officer (ISO), liaising with the Chief Information Security Officer (CISO).
  • Advise leadership and management on recommended security enhancements.
  • Contribute to the design and implementation of the organization’s ongoing Information Security Roadmap.
  • Take full accountability for managing internal security projects from start to finish.
  • Oversee security operations with a focus on vulnerability management.
  • Support departmental quality management initiatives and compliance activities.
  • Coordinate and collaborate with IT Infrastructure and Operations teams to align on security goals.


Skills on Resume: 

  • Software Configuration (Hard Skills)
  • Penetration Testing (Hard Skills)
  • Attack Response (Hard Skills)
  • Security Training (Soft Skills)
  • Security Leadership (Soft Skills)
  • Security Roadmap (Hard Skills)
  • Project Management (Soft Skills)
  • Vulnerability Oversight (Hard Skills)

9. Information Security Specialist, Vertex Cyber Group, Kansas City, MO

Job Summary: 

  • Act as a subject matter expert in Information Security across the organization.
  • Ensure corporate devices, systems, and procedures meet security standards.
  • Promptly raise security alerts and issues to the Security Operations Center (SOC).
  • Oversee vendor relationships with a focus on information security compliance.
  • Communicate security threats, audit findings, and best practices to key stakeholders.
  • Maintain accurate inventories of all computer systems and network assets.
  • Lead training and compliance programs for employees and third parties with security clearance.
  • Proactively adopt new technologies and implement automation to streamline security review processes.
  • Integrate quality control measures to ensure data integrity and adaptability to changing IT Information Security (IT IS) requirements.
  • Perform quality assurance reviews on team outputs and provide coaching to enhance performance.


Skills on Resume: 

  • Security Expertise (Hard Skills)
  • Standards Compliance (Hard Skills)
  • Alert Management (Hard Skills)
  • Vendor Oversight (Hard Skills)
  • Threat Communication (Soft Skills)
  • Asset Inventory (Hard Skills)
  • Compliance Training (Soft Skills)
  • Quality Assurance (Hard Skills)

10. Information Security Specialist, Granite InfoSec Solutions, Manchester, NH

Job Summary: 

  • Conduct information security risk assessments and recommend appropriate mitigation controls.
  • Lead the implementation of security initiatives to enable business-aligned use cases.
  • Carry out regular information security assessments across systems and processes.
  • Drive the deployment of Cloud Access Security Broker (CASB) tools and maintain consistent reporting.
  • Support cross-functional initiatives by enabling security use cases tailored to various business needs.
  • Collaborate with the security platform team to develop methodologies and practices for effective information security.
  • Design, implement, and manage resilient, high-performance security solutions in both cloud and on-premises environments.
  • Lead and mentor a team of skilled information security professionals.
  • Thrive in a fast-paced engineering environment by adapting to rapid changes and emerging threats.
  • Apply automation techniques to optimize and streamline daily security operations.


Skills on Resume: 

  • Risk Assessment (Hard Skills)
  • Security Initiatives (Hard Skills)
  • System Assessments (Hard Skills)
  • CASB Deployment (Hard Skills)
  • Security Collaboration (Soft Skills)
  • Solution Design (Hard Skills)
  • Team Leadership (Soft Skills)
  • Security Automation (Hard Skills)

11. Information Security Specialist, ClearPath Data Security, Charleston, SC

Job Summary: 

  • Provide on-site ISSO support.
  • Provide O&M security engineering.
  • Perform risk analysis, cost/benefit analysis, security test and evaluation, countermeasure implementation, system review, and interconnection analysis.
  • Provide certification and accreditation support.
  • Develop and implement a user security training program.
  • Develop disaster recovery and business continuity plans to ensure that all processes developed are consistent with defined security practices.
  • Provide security engineering assistance with tasks related to technical controls.
  • Assist in all aspects of operations, system, and network security.
  • Conduct vulnerability scanning, network device hardening, server system hardening, password auditing, and log consolidation and interpretation for the system, IDS, and firewall logs.
  • Support the business development.


Skills on Resume: 

  • ISSO Support (Hard Skills)
  • Security Engineering (Hard Skills)
  • Risk Analysis (Hard Skills)
  • Certification Support (Hard Skills)
  • Security Training (Soft Skills)
  • Disaster Recovery (Hard Skills)
  • Vulnerability Scanning (Hard Skills)
  • Business Development (Soft Skills)

12. Network Security Specialist, RedRock Cyber Systems, Boise, ID

Job Summary: 

  • Manage network security solutions and recommend solutions, including design and configuration.
  • Understand and research the cyber threat landscape, trends, regulatory requirements, and new technologies.
  • Provide insights into how group and global cybersecurity solutions meet local requirements from a functionality, capability, and cost perspective.
  • Define, implement, and maintain network security policies.
  • Partner with network engineering teams, core networks, IP/MPLS teams to manage and secure infrastructure (VPN, wireless, routers, ISDN, firewalls, and switches).
  • Participate in network and systems designs to ensure implementation of appropriate systems security policies.
  • Perform periodic network compliance audits.
  • Communicate findings and corrective actions in management reports and recommend network security upgrades and improvements.
  • Investigate and assist in the remediation of security incidents.
  • Apply best practices to provide practical security guidance to stakeholders in the market.
  • Report the impact of security incidents and lead post-incident forensic investigations.
  • Identify key stakeholders and develop relationships to further embed security requirements in IT, networks, and business operations.


Skills on Resume: 

  • Network Security (Hard Skills)
  • Threat Research (Hard Skills)
  • Security Policies (Hard Skills)
  • Infrastructure Security (Hard Skills)
  • Compliance Audits (Hard Skills)
  • Incident Remediation (Hard Skills)
  • Security Guidance (Soft Skills)
  • Stakeholder Engagement (Soft Skills)

13. Information Security Specialist, Eagle Eye Security Services, Omaha, NE

Job Summary: 

  • Review, design, and implement information security policies and standards across the organization.
  • Provide support to ensure the consistent application of security policies throughout all business units.
  • Serve as a lead subject matter expert in information security, guiding teams with expertise.
  • Foster a strong security culture across all brands within the group.
  • Collaborate with cross-functional teams to align on security initiatives.
  • Manage and communicate effectively with both internal and external stakeholders.
  • Report on outcomes and take appropriate actions based on findings.
  • Develop and deploy creative, effective solutions to meet security objectives.
  • Respond quickly to challenges and shifting priorities in a dynamic environment.
  • Contribute to team success by ensuring efficient and effective project delivery.
  • Understand stakeholder needs, gather requirements, connect key parties, and support delivery within established timelines.


Skills on Resume: 

  • Policy Management (Hard Skills)
  • Security Support (Hard Skills)
  • Security Expertise (Hard Skills)
  • Security Culture (Soft Skills)
  • Cross-Functional Collaboration (Soft Skills)
  • Stakeholder Management (Soft Skills)
  • Solution Development (Hard Skills)
  • Project Delivery (Soft Skills)

14. Information Security Specialist, OptiSecure Consulting, Tulsa, OK

Job Summary: 

  • Prepare, analyze, and follow up on security reports covering patch management, compliance, antivirus status, vulnerability scans, privileged access, and risk management.
  • Identify potential security issues and escalate them appropriately.
  • Report the security status of managed customer environments to the Lead Information Security Specialist and Account Management.
  • Provide support during both internal and external security audits.
  • Actively participate in internal meetings at various levels, including management and delivery.
  • Conduct regular reviews of access rights and security controls.
  • Document processes and implement security controls, including database access and data schema management.
  • Collaborate closely with Data Infrastructure, Data Ingestion, and analytics teams.
  • Investigate and improve workflows across other teams, influencing decisions to implement secure and efficient solutions.
  • Develop, enforce, and communicate security policies and procedures based on data center and regulatory standards.


Skills on Resume: 

  • Security Reporting (Hard Skills)
  • Issue Escalation (Soft Skills)
  • Audit Support (Hard Skills)
  • Meeting Participation (Soft Skills)
  • Access Reviews (Hard Skills)
  • Process Documentation (Hard Skills)
  • Workflow Improvement (Soft Skills)
  • Policy Enforcement (Hard Skills)

15. Information Security Specialist, TrueNorth Information Systems, Minneapolis, MN

Job Summary: 

  • Contribute to the development and maintenance of the IT Security, Risk, and Compliance framework to align with regulatory standards and protect organizational assets.
  • Support the creation, promotion, and auditing of security-related policies, procedures, standards, guidelines, and reporting practices.
  • Design, document, and implement architectural standards to ensure systems and infrastructure meet compliance requirements.
  • Define and oversee the implementation of key monitoring and control measures in operational units.
  • Provide expert IT security guidance and support across the organization.
  • Collaborate with Sales teams to respond to customer security questionnaires and assessments.
  • Develop strategic plans for implementing information security tools, programs, and operational improvements.
  • Recommend enhancements to security processes, governance practices, and regulatory compliance frameworks.
  • Offer guidance to team members on security controls, compliance, and risk management practices.
  • Monitor regulatory changes and help internal teams adapt to evolving compliance requirements.


Skills on Resume: 

  • Security Framework (Hard Skills)
  • Policy Auditing (Hard Skills)
  • Architectural Standards (Hard Skills)
  • Control Measures (Hard Skills)
  • Security Guidance (Soft Skills)
  • Customer Assessments (Soft Skills)
  • Strategic Planning (Hard Skills)
  • Regulatory Monitoring (Hard Skills)

16. Information Security Specialist, Summit Security Operations, Des Moines, IA

Job Summary: 

  • Ensure the organization is in compliance with NIST 800-171 and emerging CMMC Level 3 requirements.
  • Define security controls needed to achieve compliance with organizational requirements.
  • Develop and maintain IT security documentation, procedures, and technical guidance.
  • Serve as subject matter expert for all information security-related questions using established security tools and procedures.
  • Participate in exercises and direct audits that test IT policies, procedures, and skills.
  • Assist with remediation efforts by fixing deficiencies found during incident analysis, audits, and tests.
  • Design and implement monitoring capabilities to identify security vulnerabilities.
  • Investigate information security issues and incidents using software and vendor security systems.
  • Analyze existing security systems and make recommendations for changes and improvements.
  • Oversee the entire IT infrastructure and provide real-time threat prevention.
  • Communicate system status and keep users informed of downtime or changes made to the system.


Skills on Resume: 

  • Regulatory Compliance (Hard Skills)
  • Security Controls (Hard Skills)
  • Documentation Management (Hard Skills)
  • Security Expertise (Soft Skills)
  • Audit Participation (Hard Skills)
  • Remediation Support (Hard Skills)
  • Threat Prevention (Hard Skills)
  • System Communication (Soft Skills)

17. Information Security Specialist, BlackRiver Cyber Defense, Baton Rouge, LA

Job Summary: 

  • Contribute to the development of a sustainable and repeatable privacy-by-design program.
  • Review policies and procedures relating to privacy and data protection.
  • Support the privacy incident management framework and recommend appropriate controls to contain and mitigate potential technical vulnerabilities.
  • Review the security policies, procedures, and standards.
  • Identify and communicate security non-compliances and vulnerabilities that could impact business operations.
  • Assess, document, and communicate risks in context with business operations.
  • Develop and communicate remediation plans capable of reducing risk to the organization.
  • Assist business owners with prioritizing risks and consult users on adequate compensating controls to reduce risks.
  • Manage CSRC compliance to deliver CSRC compliance.
  • Work with CSRC leaders to establish and fine-tune controls and processes.
  • Establish processes and tools to effectively deliver third-party compliance, URL/website compliance, and application systems compliance.
  • Perform SRAs for the assigned projects, and evaluate programs for security risks per the SRA norms.


Skills on Resume: 

  • Privacy Program (Hard Skills)
  • Policy Review (Hard Skills)
  • Incident Management (Hard Skills)
  • Security Standards (Hard Skills)
  • Risk Assessment (Hard Skills)
  • Remediation Planning (Hard Skills)
  • Compliance Management (Hard Skills)
  • Risk Communication (Soft Skills)

18. Information Security Specialist, HighPoint IT Security, Cheyenne, WY

Job Summary: 

  • Perform security monitoring activities with security products within the organization and report the results.
  • Carry out control activities within the framework of the annual internal audit plan and prepare reports on the results.
  • Participate in all audits, regular activities, coordination, follow-up, and improvement processes.
  • Establish and implement technical and administrative measures within the scope of data protection regulations.
  • Audit the compliance of activities carried out within the scope of information systems with legal regulations, international standards, internal policies, and procedures.
  • Coordinate audits carried out by independent audit firms and follow corrective actions regarding the findings.
  • Contribute to information security awareness training activities.
  • Control the security standards of system infrastructure and platforms.
  • Analyze and prevent information security violations.
  • Update and monitor information security and risk management policies and procedures.
  • Take necessary precautions by following up-to-date cyber threats.
  • Work on risk management and regulations (ISO 27001, GDPR, and other applicable standards).


Skills on Resume: 

  • Security Monitoring (Hard Skills)
  • Audit Controls (Hard Skills)
  • Process Improvement (Soft Skills)
  • Data Protection (Hard Skills)
  • Regulatory Compliance (Hard Skills)
  • Independent Audits (Hard Skills)
  • Awareness Training (Soft Skills)
  • Risk Management (Hard Skills)

19. Information System Security Specialist, LakeView Data Protection, Madison, WI

Job Summary: 

  • Provide PKI processing, troubleshooting, and support services, and respond to customer requests on PKI issues or approved PKI installs.
  • Support the organization’s information assurance program.
  • Apply knowledge of federal risk management practices, NIST 800-53 standards, and the Federal Information Security Management Act (FISMA).
  • Utilize expertise in federal security policies, standards, and day-to-day operations with emphasis on current security tools and encryption techniques.
  • Assist with the analysis of FISMA metrics in relation to gathered enterprise asset data.
  • Coordinate risk impact levels for confidentiality, integrity, and availability of IT systems with the AO and ISSM.
  • Provide IT technical solutions to complex problems.
  • Coordinate and assist with conducting data spill cleanup and evidence preservation.
  • Develop procedures and approve cross-domain data transfers.
  • Work with system owners and helpdesks to establish and ensure security policies are implemented.
  • Establish procedures and assist with the installation and troubleshooting of PKIs.
  • Develop security metrics and measures and report progress.
  • Ensure ISSOs follow established IT system policies and procedures.


Skills on Resume: 

  • PKI Support (Hard Skills)
  • Information Assurance (Hard Skills)
  • Risk Management (Hard Skills)
  • Security Policies (Hard Skills)
  • FISMA Analysis (Hard Skills)
  • Technical Solutions (Hard Skills)
  • Data Transfer (Hard Skills)
  • Security Metrics (Hard Skills)

20. Information Security Specialist, MetroGuard Cyber Systems, Detroit, MI

Job Summary: 

  • Monitor all security-related activities for the business, including software, platforms, risks, and remediation.
  • Take direct action to address security needs or initiate activities with responsible teams and keep them on track.
  • Work with project teams to initiate security assessments and vendor risk questionnaires.
  • Understand security policies and help the business interpret and address requirements.
  • Compile management reports and summary analyses to describe risk and control assessments.
  • Drive improvement of the business unit’s security posture through reporting and tracking of control self-attestation results.
  • Interface with global security and security infrastructure teams to support business goals securely and improve security posture.
  • Advocate for the business unit with global security teams and help drive the direction of policies.
  • Proactively search for and address potential future security issues to stay ahead of risks.
  • Follow established assessment methodologies to facilitate control self-attestation by business and technology teams.
  • Ensure information security controls are aligned to relevant risks in the Archer platform for risk and security management.
  • Document control self-attestation and associated findings in the Archer GRC platform.
  • Provide support for security audits and ensure outcomes are accurate and applicable to the business.


Skills on Resume: 

  • Security Monitoring (Hard Skills)
  • Risk Remediation (Hard Skills)
  • Security Assessments (Hard Skills)
  • Policy Interpretation (Soft Skills)
  • Risk Reporting (Hard Skills)
  • Posture Improvement (Hard Skills)
  • Global Collaboration (Soft Skills)
  • Audit Support (Hard Skills)

21. Information Security Specialist, StoneWall Security Solutions, Portland, ME

Job Summary: 

  • Manage and maintain security systems such as EDR, VM, CSPM, SIEM, MDM, IdP, CASB, VPN, and email security.
  • Research, evaluate, and perform POCs of new security solutions.
  • Lead large security projects, including the design and deployment of new security systems and services.
  • Participate in incident management processes and activities.
  • Promote activities to ensure policy compliance.
  • Execute routines to meet KPIs and measure results.
  • Generate and review security reports to drive continuous improvement.
  • Write security procedures, prepare diagrams, and perform evidence collection documentation.
  • Work closely with IT operations and engineering teams to promote processes and activities.
  • Respond to security-related tickets.


Skills on Resume: 

  • Security Systems (Hard Skills)
  • Solution Evaluation (Hard Skills)
  • Project Leadership (Soft Skills)
  • Incident Management (Hard Skills)
  • Policy Compliance (Hard Skills)
  • Performance Metrics (Hard Skills)
  • Report Generation (Hard Skills)
  • Documentation Skills (Hard Skills)

22. Information Security Specialist, Secure Horizon IT, Billings, MT

Job Summary: 

  • Identify, assess, and document data security and privacy risks, recommending suitable countermeasures and controls.
  • Participate in cybersecurity audits such as ISO 27001 and SOC 2, ensuring program compliance.
  • Track audit findings and ensure timely implementation of mitigation actions.
  • Analyze the security and threat landscape to propose effective risk reduction solutions.
  • Develop, review, and maintain security policies, standards, procedures, and guidelines.
  • Ensure that all applications adhere to established security requirements.
  • Promote secure coding practices by conducting training sessions and advocating best practices.
  • Recommend updates to security controls in response to emerging threats.
  • Build strong working relationships with business and IT stakeholders across all levels.
  • Manage incident escalations, resolve production issues, and keep management informed of technical updates and status reports.


Skills on Resume: 

  • Risk Assessment (Hard Skills)
  • Audit Participation (Hard Skills)
  • Mitigation Tracking (Hard Skills)
  • Threat Analysis (Hard Skills)
  • Policy Development (Hard Skills)
  • Secure Coding (Hard Skills)
  • Stakeholder Relations (Soft Skills)
  • Incident Management (Hard Skills)

23. Information Security Specialist, HarborPoint Cyber Defense, Anchorage, AK

Job Summary: 

  • Develop and monitor information security policies, procedures, and processes.
  • Ensure compatibility with ISO 27001 certification requirements.
  • Detect and report information security issues.
  • Manage and monitor Security Information and Event Management (SIEM).
  • Work with third-party consultants responsible for SOC services.
  • Plan and conduct internal audits.
  • Conduct social engineering simulations.
  • Perform internal vulnerability scans and coordinate remediation efforts.
  • Manage and monitor information security incidents.
  • Manage and monitor business continuity activities.
  • Provide information and cybersecurity consulting for ongoing projects in line with international standards.


Skills on Resume: 

  • Policy Management (Hard Skills)
  • ISO Compliance (Hard Skills)
  • Issue Detection (Hard Skills)
  • SIEM Monitoring (Hard Skills)
  • SOC Coordination (Hard Skills)
  • Internal Audits (Hard Skills)
  • Vulnerability Scanning (Hard Skills)
  • Incident Management (Hard Skills)

24. Information Security Specialist, BlueSky Information Security, Dover, DE

Job Summary: 

  • Coordinate responses to security incidents and requests.
  • Manage the incident and request a ticket queue for information security-related incidents and tasks.
  • Work on all tickets initially assigned to the Information Security queue.
  • Escalate complex issues to Tier 2 SOC.
  • Apply security policies and procedures.
  • Perform deep-dive investigations and log analysis on a wide range of security incidents.
  • Stay informed, communicate, and record new vulnerabilities and associated risks within the company footprint.
  • Perform advanced analysis of IDS, Syslog, and SIEM alerts.
  • Apply broad knowledge of TCP/IP and Linux/Windows operating systems.
  • Create incidents based on suspicious alerts and proceed according to incident response guidelines.
  • Use advanced analytic tools to determine emerging threat patterns and vulnerabilities.
  • Monitor network availability for potential security incidents and investigate security events.


Skills on Resume: 

  • Incident Response (Hard Skills)
  • Ticket Management (Hard Skills)
  • Issue Escalation (Soft Skills)
  • Policy Application (Hard Skills)
  • Log Analysis (Hard Skills)
  • Vulnerability Tracking (Hard Skills)
  • Alert Analysis (Hard Skills)
  • Threat Detection (Hard Skills)

25. Information Security Specialist, RiverEdge Security Partners, Richmond, VA

Job Summary: 

  • Provide consulting services to clients by evaluating, recommending, and implementing information security solutions and process improvements.
  • Build strong client relationships by understanding their business and security needs through direct engagement.
  • Develop a deep knowledge of client areas to assess and address their information security requirements effectively.
  • Analyze data and advise clients on best practices for implementing necessary security changes.
  • Offer strategic support to clients and leaders in moderately complex scenarios.
  • Lead discussions on long-term security solutions and process improvements, presenting results to senior management.
  • Play a key role in the development of projects involving new processes and integration with existing systems.
  • Assist in communicating process changes to impacted stakeholders and support teams.
  • Review requirement documents, define software, hardware, and tools needs, and update procedures accordingly.
  • Support compliance efforts to ensure alignment with audit and regulatory standards.


Skills on Resume: 

  • Security Consulting (Hard Skills)
  • Client Engagement (Soft Skills)
  • Needs Assessment (Hard Skills)
  • Data Analysis (Hard Skills)
  • Strategic Support (Soft Skills)
  • Process Improvement (Hard Skills)
  • Change Communication (Soft Skills)
  • Compliance Support (Hard Skills)

26. Information Security Specialist, CrossTech Cyber Solutions, Lexington, KY

Job Summary: 

  • Maintain the effectiveness of the organization’s enterprise-wide information security strategy, including associated programs and initiatives.
  • Coordinate and allocate tasks within a team or project, ensuring efficient execution.
  • Assist in developing, implementing, and enforcing company-wide security policies, standards, and procedures.
  • Provide consultation to business and infrastructure teams on security architectures and best practices for both new and existing technologies.
  • Analyze complex data sets to deliver insights, conclusions, and actionable recommendations through detailed reporting.
  • Collaborate closely with IT infrastructure and application development teams to uphold the integrity of security systems and procedures.
  • Work with developers to ensure all risk assessments are completed in line with policy requirements.
  • Support the team in achieving collective objectives and performance goals.
  • Explore and recommend new automation tools and technologies to drive innovation and future-readiness.
  • Help maintain compliance and certification of all currently supported security tools and systems.


Skills on Resume: 

  • Security Strategy (Hard Skills)
  • Task Coordination (Soft Skills)
  • Policy Enforcement (Hard Skills)
  • Security Consultation (Soft Skills)
  • Data Analysis (Hard Skills)
  • Team Collaboration (Soft Skills)
  • Automation Tools (Hard Skills)
  • Compliance Maintenance (Hard Skills)

27. Information Security Specialist, WestBridge IT Security, Sacramento, CA

Job Summary: 

  • Enhance the security team’s capabilities by planning and delivering impactful cybersecurity solutions.
  • Determine security needs by evaluating organizational strategies and aligning them with technical requirements.
  • Maintain a secure environment by monitoring compliance with established standards, policies, and procedures.
  • Continuously upgrade security systems in response to changes in the threat landscape.
  • Research and implement emerging security practices, standards, and technologies.
  • Leverage cybersecurity expertise and business insight to develop innovative security architectures that influence strategic decisions.
  • Collaborate with internal and external peers to refine and strengthen solution strategies and development.
  • Create plans to protect computer files from unauthorized access, modification, destruction, or disclosure, while ensuring readiness for emergency data processing.
  • Engage users to understand security needs, violations, and system modification requirements.
  • Maintain and monitor antivirus software across servers and personal computing devices to prevent malware threats.


Skills on Resume: 

  • Cybersecurity Solutions (Hard Skills)
  • Needs Assessment (Hard Skills)
  • Compliance Monitoring (Hard Skills)
  • System Upgrades (Hard Skills)
  • Security Research (Hard Skills)
  • Security Architecture (Hard Skills)
  • Peer Collaboration (Soft Skills)
  • Antivirus Management (Hard Skills)

28. Information Security Specialist, Fortress Data Systems, Albuquerque, NM

Job Summary: 

  • Conduct organizational assessments and provide guidance, training, mentoring, and support on information security issues and topics to local partners.
  • Develop a country strategy and action plan in partnership with the Chief of Party and Deputy Chief of Party based on the program’s annual work plan.
  • Ensure partners learn, internalize, use, and propagate appropriate information security practices.
  • Disseminate knowledge on information security and potential applications of new technologies.
  • Train local counterparts on information security.
  • Stay up to date on new technologies, emerging trends, and issues related to information security.
  • Write quarterly reports on activities and program implementation in the region.
  • Participate in conferences, trainings, and other events.
  • Develop a Training of Trainers cadre within the CSO community.
  • Attend and actively participate in the annual global conference and annual staff retreat.


Skills on Resume: 

  • Security Guidance (Soft Skills)
  • Strategy Development (Hard Skills)
  • Practice Adoption (Soft Skills)
  • Knowledge Sharing (Soft Skills)
  • Security Training (Soft Skills)
  • Trend Monitoring (Hard Skills)
  • Report Writing (Hard Skills)
  • Community Engagement (Soft Skills)

29. Information Security Specialist, ShieldCore Technologies, Seattle, WA

Job Summary: 

  • Support and maintain security solutions, including antivirus, privileged access, next-generation firewalls, web application firewalls, endpoint encryption, and log analysis tools.
  • Work with IT operations to monitor and identify security issues.
  • Conduct regular security assessments on IT systems.
  • Create and maintain security standards and guidelines for technical platforms, including operating systems, web application platforms, and network devices.
  • Stay updated on the latest security threats, attacks, and updates.
  • Assist the Information Security Manager with incident response.
  • Administer the security awareness training program.
  • Conduct research and studies on security solutions.
  • Identify and manage security risks related to business functions and processes.
  • Participate in compliance and audit projects.
  • Participate in information and cybersecurity-related technology implementations.
  • Manage and monitor access controls.


Skills on Resume: 

  • Security Solutions (Hard Skills)
  • Issue Monitoring (Hard Skills)
  • Security Assessments (Hard Skills)
  • Standards Management (Hard Skills)
  • Threat Awareness (Hard Skills)
  • Incident Response (Hard Skills)
  • Awareness Training (Soft Skills)
  • Access Control (Hard Skills)

30. Information Security Specialist, DeltaForce Security Services, Helena, MT

Job Summary: 

  • Work with different teams across the organization to identify, select, and implement technical security controls.
  • Provide information security advice and guidance to system architects and engineering teams to ensure security requirements are implemented when designing and building new systems.
  • Determine and document baseline security configuration standards and guidelines.
  • Validate and guide on implementing these standards and guidelines for operating systems, applications, cloud deployments, firewalls, and hardware.
  • Undertake risk assessments for system migrations, system integrations, and the implementation of new technologies.
  • Participate in the development, testing, and maintenance of disaster recovery solutions and exercises.
  • Architect and implement solutions to address security audit results.
  • Work with the security and compliance team to ensure controls are applied to any PII data within information systems.
  • Ensure that proposed technology and process changes meet compliance requirements with internal standards and regulatory, legal, and compliance obligations.


Skills on Resume: 

  • Security Controls (Hard Skills)
  • Security Guidance (Soft Skills)
  • Configuration Standards (Hard Skills)
  • System Validation (Hard Skills)
  • Risk Assessment (Hard Skills)
  • Disaster Recovery (Hard Skills)
  • Audit Remediation (Hard Skills)
  • Compliance Assurance (Hard Skills)

31. Information Security Specialist, GoldenGate Cyber Consulting, San Jose, CA

Job Summary: 

  • Provide advice and guidance on minimizing the impact of potential threats to assets and services.
  • Liaise with potential or current partners and suppliers to evaluate information security levels.
  • Manage requests for security waivers.
  • Review new third-party applications for possible security risks.
  • Support compliance activities for regulators and contractual requirements.
  • Manage information security policies and standards.
  • Ensure controls implemented in production systems operate as designed to mitigate known risks.
  • Create suitable security training material and ad hoc messages alerting staff to new threats.
  • Support monitoring of the effectiveness of security training and identify and implement improvements.
  • Provide governance reports on the effectiveness of controls to internal and external stakeholders.
  • Stay aware of current and emerging trends in the information security landscape and assess their impact on policies and standards.
  • Ensure adherence to standards, including ISO 27001, PCI DSS, and ITIL.


Skills on Resume: 

  • Threat Guidance (Soft Skills)
  • Partner Evaluation (Soft Skills)
  • Waiver Management (Hard Skills)
  • Application Review (Hard Skills)
  • Compliance Support (Hard Skills)
  • Policy Management (Hard Skills)
  • Security Training (Soft Skills)
  • Governance Reporting (Hard Skills)

32. Information Security Specialist, PrairieTech Security, Fargo, ND

Job Summary: 

  • Maintain awareness of security directives, orders, standards, plans, and procedures.
  • Ensure security operating manuals and procedural documents remain current when regulations change.
  • Evaluate the efficiency, effectiveness, and compliance of operational processes with corporate security policies and related government regulations.
  • Provide guidance and support to global entities and subsidiaries for consistent creation and enforcement of security documentation, such as policies and procedures.
  • Maintain all policy, procedure, and governance documentation related to organization-specific security compliance methodologies.
  • Assist with third-party audit documentation and remediation tracking.
  • Interface regularly with staff from various departments to communicate security issues, obtain additional information, and provide remediation status to security management.
  • Identify security gaps and obstacles and launch projects to establish solutions.
  • Foster strong partnerships and effectively prioritize workload demands to meet deadlines.
  • Assist the security team with internal process improvement initiatives, including establishing workflows and automating manual processes.


Skills on Resume: 

  • Security Awareness (Hard Skills)
  • Document Management (Hard Skills)
  • Process Evaluation (Hard Skills)
  • Security Guidance (Soft Skills)
  • Policy Maintenance (Hard Skills)
  • Audit Support (Hard Skills)
  • Gap Identification (Hard Skills)
  • Process Improvement (Soft Skills)

33. Information Security Specialist, NorthStar Cyber Defense, St. Paul, MN

Job Summary: 

  • Monitor security controls and ensure required quarterly and yearly testing is accomplished.
  • Establish and maintain the Risk Management Framework (RMF) to provide a disciplined and structured process that integrates information security and risk management activities into the SDLC.
  • Establish a security control baseline by identifying and documenting inheritable controls, selecting and documenting security controls, and developing a security control monitoring strategy.
  • Apply security controls and assess their effectiveness.
  • Confer with users to discuss issues such as data access needs, security violations, and programming changes.
  • Document computer security and emergency measures policies, procedures, and tests.
  • Promote security awareness to ensure system security and improve server and network efficiency.
  • Coordinate implementation of computer system plans with internal personnel and external vendors.
  • Provide technical support in the areas of computer network operations (CNO), assessment and authorization (A&A), and cybersecurity threat recognition and response.
  • Facilitate organizational response to evolving influences and mandates, enabling improvements in mission performance requirements.


Skills on Resume: 

  • Control Monitoring (Hard Skills)
  • Risk Framework (Hard Skills)
  • Baseline Establishment (Hard Skills)
  • Control Assessment (Hard Skills)
  • User Consultation (Soft Skills)
  • Policy Documentation (Hard Skills)
  • Security Awareness (Soft Skills)
  • Technical Support (Hard Skills)

34. Information Security Specialist, LoneStar InfoSec Solutions, Houston, TX

Job Summary: 

  • Regularly review the current configurations of production information systems and networks to assess potential attack paths, and recommend configuration, system settings, network topology, and other modifications to enhance security.
  • Design, specify, program, deploy, and fine-tune capabilities that analyze logs, audit trails, and other recorded activity to immediately detect unauthorized activity, intrusions, or execution of unauthorized software.
  • Develop automated scripts, contingency plans, and programmed responses to address automated attacks, reducing reliance on manual intervention.
  • Design, specify, program, and investigate middleware and system integration tools that connect multiple security monitoring systems to better meet organizational information security needs.
  • Integrate and interface information security monitoring systems with physical security monitoring systems to improve visibility and strengthen overall security.
  • Collaborate with business applications programmers, systems programmers, and other technical teams to optimize the use of deployed security monitoring tools.
  • Fine-tune existing security monitoring systems to minimize false positives and false negatives, ensuring accurate and actionable information.
  • Work with technical staff to monitor information system activities to effectively utilize recorded data and integrate it with security monitoring systems.
  • Perform product evaluations of information security monitoring systems being considered for deployment.
  • Conduct post-mortem analysis using logs, network traffic flows, and other recorded data to identify intrusions by unauthorized parties and detect unauthorized activities by authorized users.


Skills on Resume: 

  • Configuration Review (Hard Skills)
  • Log Analysis (Hard Skills)
  • Automated Response (Hard Skills)
  • System Integration (Hard Skills)
  • Security Integration (Hard Skills)
  • Tool Optimization (Hard Skills)
  • Product Evaluation (Hard Skills)
  • Post-Mortem Analysis (Hard Skills)

35. Information Security Specialist, CapitalCity Cyber Partners, Montgomery, AL

Job Summary: 

  • Analyze data from threat and vulnerability feeds and assess applicability to the organization.
  • Configure and monitor a variety of security devices and tools, including anti-virus endpoints, IDS/IPS, firewalls, SIEM, DLP, NAC, spam filters, web filters, patch management, and vulnerability management tools.
  • Execute policies and audit plans, identify security risks, and operational needs.
  • Ensure compliance with all applicable configuration standards.
  • Generate reports on assessment findings and summarize results to facilitate remediation tasks.
  • Recommend improvements to the information security program to the Information Security Manager.
  • Support the management of information security, the establishment and implementation of the information security framework and program in compliance with internal and external regulations, and perform tasks assigned by the Information Security Manager.
  • Follow established safety policies and procedures as outlined in internal prevention programs.
  • Submit to initial and ongoing compliance training.
  • Incorporate current regulatory requirements into applicable job functions.


Skills on Resume: 

  • Threat Analysis (Hard Skills)
  • Device Monitoring (Hard Skills)
  • Policy Execution (Hard Skills)
  • Standards Compliance (Hard Skills)
  • Report Generation (Hard Skills)
  • Program Improvement (Hard Skills)
  • Framework Support (Hard Skills)
  • Compliance Training (Soft Skills)

36. Information Security Specialist, SwiftGuard Security Systems, Little Rock, AR

Job Summary: 

  • Build automation pipelines to streamline perimeter security operations.
  • Automate the deployment and management of security components within cloud platforms.
  • Ensure all activities comply with established security policies, standards, and frameworks.
  • Enhance and leverage SIEM dashboards to monitor and review real-time security events.
  • Investigate and respond to security incidents by analyzing events, identifying weaknesses, and implementing corrective actions.
  • Generate comprehensive reports for management with current status updates and recommended remediation steps.
  • Lead critical security projects and drive key initiatives to successful completion.
  • Develop, present, and implement effective mitigation and remediation strategies.
  • Stay current on emerging hacking techniques and update security assessments to reflect new threats.
  • Promote and strengthen awareness of the security assessment program across the organization.
  • Collaborate with internal teams to design marketing strategies and adjust content to align with evolving assessment updates.


Skills on Resume: 

  • Automation Pipelines (Hard Skills)
  • Cloud Security (Hard Skills)
  • Policy Compliance (Hard Skills)
  • SIEM Dashboards (Hard Skills)
  • Incident Response (Hard Skills)
  • Report Generation (Hard Skills)
  • Project Leadership (Soft Skills)
  • Mitigation Strategies (Hard Skills)

37. Information Security Specialist, BrightShield Cybersecurity, Providence, RI

Job Summary: 

  • Schedule user desktop and laptop security assessments through the appropriate channels.
  • Manage schedules and ensure punctuality so users receive assessments promptly.
  • Arrange schedules to minimize travel requirements.
  • Review OS-level security settings such as firewall, antivirus, patch, and OS update configurations.
  • Review application security settings, including browser and email client configurations.
  • Review network security settings, such as wireless network configurations.
  • Provide instruction on desktop and laptop best practices, including keeping patches current, running antivirus checks, and setting system restore points.
  • Advise end users on current security incident trends and effective countermeasures, such as phishing awareness and safe browsing.
  • Prioritize and document findings and recommended changes.
  • Research and recommend the best security practices for end-user and desktop interaction continually.
  • Follow up with users to ensure satisfaction, documenting survey results for metrics to assess assessment effectiveness, and update the assessment.
  • Stay current on malware trends, particularly in the financial industry, and adjust assessments accordingly.
  • Stay current on wireless network technologies and encryption methodologies.


Skills on Resume: 

  • Schedule Management (Hard Skills)
  • Travel Optimization (Hard Skills)
  • OS Security (Hard Skills)
  • App Security (Hard Skills)
  • Network Security (Hard Skills)
  • User Training (Soft Skills)
  • Threat Awareness (Hard Skills)
  • Documentation Skills (Soft Skills)

38. Information Security Specialist, Frontier InfoSec Solutions, Wichita, KS

Job Summary: 

  • Implement security strategies, controls, and architectures tailored for REST APIs, web and mobile applications, and database endpoint protection.
  • Maintain and manage Data Loss Prevention (DLP) and Security Information and Event Management (SIEM) systems to ensure continuous security monitoring.
  • Deploy security technologies and processes as designed by the Information Security Engineering Lead.
  • Conduct information security risk assessments in alignment with industry frameworks such as NIST, ISO, and SANS Critical Security Controls.
  • Respond to advisory service requests, providing expert guidance to address client questions and security requirements.
  • Deliver comprehensive assessment reports with actionable recommendations to enhance information security and ensure regulatory compliance.
  • Contribute to shaping the information security strategy and operations at both strategic and tactical levels.
  • Provide guidance and training on best security practices, communicating effectively with stakeholders across the organization.
  • Facilitate cross-functional assessments and lead efforts to drive key security projects forward.
  • Collaborate with external consultants to implement components of the information security toolkit.
  • Work closely with engineers from product, services, and data teams to enhance existing solutions and participate in incident response initiatives.


Skills on Resume: 

  • Security Strategy (Hard Skills)
  • DLP and SIEM (Hard Skills)
  • Tech Deployment (Hard Skills)
  • Risk Assessment (Hard Skills)
  • Advisory Services (Soft Skills)
  • Assessment Reporting (Hard Skills)
  • Security Leadership (Soft Skills)
  • Training Guidance (Soft Skills)

39. Information Security Specialist, SummitPeak Security, Sioux Falls, SD

Job Summary: 

  • Drive and support the implementation of a leading international retailer’s Information Security Management System consistent with legislated, contractual, and best practice standards.
  • Maintain awareness of relevant issues, policy obligations, insights, challenges, industry trends, practices, and opportunities.
  • Recommend innovative solutions that optimize outcomes and contribute to a best practice governance function in line with organizational and government priorities.
  • Support the documentation, development, deployment, and coordination of the ISMS with internal stakeholders.
  • Coordinate and liaise with external IT consultants to ensure they are effectively utilized.
  • Assist with ad hoc tasks related to IT security, such as consulting, penetration testing, security assessment, and data protection.
  • Ensure appropriate procedures are in place to maintain data integrity.
  • Identify and manage key risks relating to privacy and data protection.
  • Build and deploy advanced alerting and reporting for key stakeholders.
  • Promote a culture of data protection adherence across all areas of the organization.
  • Ensure that the company and its employees are informed about their data protection rights, obligations, and responsibilities, and raise awareness about them.


Skills on Resume: 

  • ISMS Implementation (Hard Skills)
  • Industry Awareness (Soft Skills)
  • Governance Solutions (Soft Skills)
  • ISMS Coordination (Hard Skills)
  • Consultant Liaison (Soft Skills)
  • IT Security Support (Hard Skills)
  • Data Integrity (Hard Skills)
  • Privacy Risk Management (Hard Skills)

40. Information Security Specialist, StormGuard Cyber Defense, Hartford, CT

Job Summary: 

  • Identify and assess threats, support the development of appropriate security countermeasures, and evaluate their effectiveness.
  • Assess implementation and maturity status for applications, platforms, and teams for information security and compliance end-to-end, including communication of gaps and definition of required activities.
  • Enhance security by supporting application developers and owners in integrating security guidelines and providing security consultancy.
  • Provide technical consulting for projects and existing systems regarding confidentiality, integrity, and availability of assets, information, data, and IT services within the organization.
  • Execute the information security program by providing consultancy support, product offerings, and security guidance in ALM areas such as release management, change management, incident management, and access management.
  • Provide information security subject matter expertise in various security areas and risk assessments.
  • Create security profiles and reviews for applications and services.
  • Build and maintain documentation of relevant security guidelines.
  • Report and correct security incidents, vulnerabilities, and deficiencies.
  • Perform oversight reviews to monitor program implementation and practices in supported organizations and lower echelons.


Skills on Resume: 

  • Threat Assessment (Hard Skills)
  • Security Compliance (Hard Skills)
  • Developer Support (Soft Skills)
  • Technical Consulting (Hard Skills)
  • Program Execution (Hard Skills)
  • Risk Expertise (Hard Skills)
  • Security Documentation (Hard Skills)
  • Incident Management (Hard Skills)

41. Information Security Specialist, SafeHarbor IT Security, Jackson, MS

Job Summary: 

  • Perform the information security review of infrastructure products and verify their compliance with the Citi Information Security Standards (CISS).
  • Document findings, security breaches, and non-compliant items.
  • Take ownership of the IS certification of certain products and solutions, advise clients, and make security decisions on products and solutions to be released into Citi’s production environment.
  • Assess risks of identified gaps and advise clients and partners on the feasibility of addressing them.
  • Present results of an IS review, defend key points to senior clients, and remain helpful, flexible, and open to good solutions.
  • Act as a specialist owner of certain technical domains, gather information, follow state-of-the-art practices, and embed industry best practices into Citi IS processes and standards.
  • Build strong relationships with key stakeholders in assigned domains.
  • Provide intelligence on products within assigned domains and on vendors across domains, including executive summaries, product comparisons, and trending insights.
  • Train team members in selected technical domains by sharing knowledge.
  • Evaluate the security and compliance of products by reviewing documentation and conducting hands-on testing.
  • Investigate remediation or risk mitigation options for non-compliant items and provide recommendations.
  • Support Technical Information Security Officers in remediating non-compliant items.


Skills on Resume: 

  • Security Review (Hard Skills)
  • Findings Documentation (Hard Skills)
  • IS Certification (Hard Skills)
  • Risk Advisory (Hard Skills)
  • Client Presentation (Soft Skills)
  • Domain Expertise (Hard Skills)
  • Stakeholder Relations (Soft Skills)
  • Team Training (Soft Skills)

42. Information Security Specialist, RidgeLine Data Security, Reno, NV

Job Summary: 

  • Identify appropriate key stakeholders and SMEs required to provide the remediation plan.
  • Facilitate regular meetings with key stakeholders to monitor remediation status and identify potential issues.
  • Provide regular status reporting, action, and milestone tracking, RAID log management, escalations, and communications related to the remediation of technology regulatory findings.
  • Maintain the Regulatory Findings Book of Record utilizing the GRC tool.
  • Run targeted focus groups with selected individuals to drive efficient agreement of findings and pragmatic actions.
  • Conduct follow-up on actions required of subject matter experts to ensure timely response.
  • Perform quality assurance and review evidence and artifacts for relevance.
  • Organize and file digital artifacts and evidence.
  • Coordinate required internal regulatory challenge meetings and assist in finding owners in preparing for them.
  • Ensure timely submission of remediation packages to the regulator.
  • Promote and foster a cohesive team and positive work environment that encourages innovation, creativity, and collaboration.
  • Build and maintain positive working relationships by effectively communicating and regularly sharing information, issues, learnings, and knowledge with the team and business partners.
  • Support management and team members in achieving individual, divisional, and team goals.


Skills on Resume: 

  • Stakeholder Identification (Soft Skills)
  • Meeting Facilitation (Soft Skills)
  • Status Reporting (Hard Skills)
  • GRC Management (Hard Skills)
  • Focus Groups (Soft Skills)
  • Quality Assurance (Hard Skills)
  • Regulatory Coordination (Hard Skills)
  • Team Collaboration (Soft Skills)

43. Information Security Specialist, IronClad Cyber Partners, Tallahassee, FL

Job Summary: 

  • Drive supplier compliance with contractual security requirements.
  • Contribute to the execution and improvement of the security metrics program from a supplier performance standpoint.
  • Work with all security functions within Information Security to define contractual security requirements, including service levels and key performance indicators.
  • Ensure Information Security SLAs and KPIs meet or exceed industry standards.
  • Collaborate with the IT Supplier Relationship Management team, using the contract change management process for updates to supplier performance measurement, the scope of security requirements, and other contractual language supporting the overall Information Security program.
  • Ensure complete, accurate, and timely reporting of supplier analytics and insights to stakeholders within Information Security and broader IT regarding supplier performance.
  • Perform analysis, identify issues, and effectively communicate information security risks around supplier performance to leadership through key deliverables and verbal updates.
  • Develop information and documentation with strong writing skills, ensuring clarity, grammar, spelling, consistency, presentation, and logical organization.
  • Establish and document best practices and processes for the security metrics program, specifically for supplier performance measurement.
  • Provide management with insights around the region in relation to Information Security matters.


Skills on Resume: 

  • Supplier Compliance (Hard Skills)
  • Security Metrics (Hard Skills)
  • Contract Management (Hard Skills)
  • SLA and KPI (Hard Skills)
  • Supplier Collaboration (Soft Skills)
  • Performance Reporting (Hard Skills)
  • Risk Communication (Soft Skills)
  • Process Documentation (Hard Skills)

44. Information Security Specialist, Keystone Security Systems, Harrisburg, PA

Job Summary: 

  • Coordinate, lead, and execute the deployment of security policies in tangible actions with the areas involved.
  • Execute the information security processes in charge.
  • Define and establish an information security framework based on organizational security policies and standards.
  • Assess and determine the inclusion of new security frameworks and industry best practices based on well-known benchmarks.
  • Develop and ensure that information security policies and standards are updated according to business needs and technological, operational, and regulatory changes.
  • Ensure the information security awareness program to mitigate people-related cyber risks.
  • Coordinate and ensure that all ISMS artifacts are current and accurate.
  • Ensure that all regulatory and industry security requirements are met by all business units, including ISO 27001/27002/27032 and PCI DSS.
  • Set and monitor KPIs and KRIs, and define action plans to address negative results.
  • Define team requirements in terms of hard and soft skills based on the organizational security strategy.
  • Develop, sustain, and lead processes for risk assessment and analysis, human resources security, asset security, cloud security, network security, vulnerability management, identity and access management, endpoint security, third-party risk management, and computer security incident response.


Skills on Resume: 

  • Policy Deployment (Hard Skills)
  • Process Execution (Hard Skills)
  • Security Framework (Hard Skills)
  • Best Practices (Hard Skills)
  • Policy Development (Hard Skills)
  • Awareness Program (Soft Skills)
  • Regulatory Compliance (Hard Skills)
  • Risk Management (Hard Skills)

45. Information Security Specialist, Alpine Cyber Solutions, Burlington, VT

Job Summary: 

  • Review current security controls and recommend and implement improvements.
  • Ensure security tooling is implemented, maintained, and enhanced.
  • Create and maintain technical security standards and procedures.
  • Test and evaluate security tools and services.
  • Build monitoring and alerting capabilities to proactively detect security breaches and threats.
  • Integrate security tools into the existing environment.
  • Conduct IT security audits across the business.
  • Perform penetration testing, run scans, and simulate attacks to identify exploitable weaknesses.
  • Identify potential areas of risk that require remediation.
  • Develop and implement SOPs.


Skills on Resume: 

  • Control Improvement (Hard Skills)
  • Security Tooling (Hard Skills)
  • Technical Standards (Hard Skills)
  • Tool Evaluation (Hard Skills)
  • Threat Monitoring (Hard Skills)
  • Tool Integration (Hard Skills)
  • Security Audits (Hard Skills)
  • Penetration Testing (Hard Skills)

46. Information Security Specialist, DeepShield InfoSec, Indianapolis, IN

Job Summary: 

  • Maintain effective access controls across the business.
  • Investigate security breaches, including performing root cause analysis.
  • Lead incident response activities, minimizing impact, and conducting technical and forensic investigations into the cause and extent of damage.
  • Mitigate future IT security risks.
  • Maintain current knowledge of cybersecurity incidents and trends.
  • Stay up to date with the latest industry tools, trends, and standards.
  • Research new technologies and approaches to apply best practices.
  • Identify innovative approaches to ensure world-class security measures are in place.
  • Compile monthly reports on IT security management.
  • Manage professional growth and self-development.


Skills on Resume: 

  • Access Control (Hard Skills)
  • Incident Investigation (Hard Skills)
  • Incident Response (Hard Skills)
  • Risk Mitigation (Hard Skills)
  • Cybersecurity Knowledge (Hard Skills)
  • Technology Research (Hard Skills)
  • Security Innovation (Soft Skills)
  • Reporting Skills (Hard Skills)

47. Information Assurance Security Specialist, FortressPeak Cybersecurity, Springfield, IL

Job Summary: 

  • Collaborate with business and technology segments to ensure timely remediation of regulatory findings, audit issues, and self-identified or second line of defense gaps.
  • Serve as project manager to track and manage all remediation activities effectively across segments.
  • Apply organizational risk frameworks and strategies based on the operational and technology risks relevant to the business.
  • Represent the business in technology audit and challenge forums.
  • Communicate and escalate risks related to remediation timelines, governance, or control issues promptly.
  • Provide independent oversight and constructive challenge on operational and technology risk matters.
  • Advise teams to help maintain compliance with operational and technology risk policies.
  • Work closely with enterprise architects and subject matter experts to develop robust network security architecture solutions.
  • Evaluate private and public cloud technologies for technical performance, functionality, and cost-effectiveness.
  • Lead proof-of-concept initiatives to validate solutions and demonstrate their potential value to product stakeholders.


Skills on Resume: 

  • Regulatory Remediation (Hard Skills)
  • Project Management (Soft Skills)
  • Risk Frameworks (Hard Skills)
  • Audit Representation (Soft Skills)
  • Risk Communication (Soft Skills)
  • Risk Oversight (Hard Skills)
  • Compliance Advisory (Soft Skills)
  • Security Architecture (Hard Skills)

48. Information Security Specialist, ClearWave Security Consulting, Nashville, TN

Job Summary: 

  • Develop and support an enterprise risk management program by establishing core processes, governance structures, and operational models.
  • Implement risk aggregation and monitoring tools tailored to organizational needs.
  • Analyze network traffic to detect malicious or unauthorized activity and respond effectively to intrusion incidents.
  • Configure, operate, and maintain network defense systems, audit security controls, and manage vulnerabilities.
  • Perform continuous vulnerability management to identify and remediate security weaknesses.
  • Lead the development and enforcement of security policies, standards, and compliance reporting across diverse business environments such as R&D, labs, and OT systems.
  • Assist business information security leadership in making informed, risk-based decisions on both strategic and operational security matters.
  • Ensure the security framework, policies, and standards are effectively implemented and functional across the organization.
  • Maintain a high level of incident response readiness to minimize the impact of multi-vector attacks on business operations and reputation.
  • Foster strong relationships with key stakeholders to facilitate and support ongoing security initiatives.


Skills on Resume: 

  • Risk Management (Hard Skills)
  • Risk Monitoring (Hard Skills)
  • Traffic Analysis (Hard Skills)
  • Network Defense (Hard Skills)
  • Vulnerability Management (Hard Skills)
  • Policy Enforcement (Hard Skills)
  • Incident Readiness (Hard Skills)
  • Stakeholder Relations (Soft Skills)

49. Information Security Specialist, TerraGuard Cyber Defense, Charleston, WV

Job Summary: 

  • Ensure compliance with all applicable regulatory and legal requirements by validating adherence to relevant laws, rules, and regulations.
  • Drive the development and execution of action plans to close regulatory gaps and enhance the accuracy of risk and compliance reporting.
  • Collaborate with risk regulatory management teams to complete risk-related activities with precision and timeliness.
  • Coordinate with regulatory management teams to ensure prompt and accurate handling of regulatory exams, attestations, and non-financial compliance reporting.
  • Support the advancement of the Data Loss Prevention (DLP) solution by designing, testing, and deploying new DLP policies for various business units and engagements.
  • Manage DLP tools to maintain monitoring policies for email, desktop, and network environments.
  • Continuously evaluate the effectiveness of DLP safeguards and perform trend analysis to identify emerging risks.
  • Develop comprehensive operational procedures for incident analysis, escalation, and remediation support.
  • Assist in the management of cloud security operations to strengthen the overall security posture.
  • Triage and respond to DLP incidents to ensure timely resolution and minimize data exposure risks.


Skills on Resume: 

  • Regulatory Compliance (Hard Skills)
  • Action Planning (Hard Skills)
  • Risk Collaboration (Soft Skills)
  • Regulatory Coordination (Hard Skills)
  • DLP Development (Hard Skills)
  • DLP Management (Hard Skills)
  • Incident Procedures (Hard Skills)
  • Cloud Security (Hard Skills)

50. Information Security Controls Specialist, SilverLine Security Services, Honolulu, HI

Job Summary: 

  • Collaborate with teams across cybersecurity to define, gather, and align cybersecurity metrics with business objectives.
  • Design intuitive dashboards and data visualizations tailored for different audiences, from executives to operational staff.
  • Assist in automating or streamlining data collection and preparation processes to increase efficiency.
  • Maintain and update dashboards regularly, implementing automation where feasible to reduce manual effort.
  • Work with teams to synthesize key insights and present them in executive-level reports.
  • Ensure the timely delivery of summarized reports to key stakeholders.
  • Map collected metrics to the organization’s established risk management framework.
  • Enforce global information security policies, standards, and procedures with regional stakeholders and provide guidance.
  • Manage and support business-as-usual (BaU) technical security operations, including tools, solutions, and collaboration with IT and infrastructure teams.
  • Support security assurance governance through vulnerability management reporting and contribute to cybersecurity project improvements that enhance the security environment and address control gaps.


Skills on Resume: 

  • Cybersecurity Metrics (Hard Skills)
  • Dashboard Design (Hard Skills)
  • Data Automation (Hard Skills)
  • Report Preparation (Hard Skills)
  • Executive Reporting (Soft Skills)
  • Risk Mapping (Hard Skills)
  • Policy Enforcement (Hard Skills)
  • Security Operations (Hard Skills)