Published: Oct 01, 2025 - The Information Technology Security Specialist protects organizational systems, networks, and employees from cyber threats by monitoring, detecting, and responding to security incidents. This role involves analyzing infrastructure logs for anomalies, assisting IT teams in resolving security events, drafting security procedures, and ensuring compliance with best practices and regulations. The Specialist also contributes to disaster recovery planning, supports security strategy development, and provides guidance during application and infrastructure projects to reduce risk and strengthen overall system defenses.

Tips for Information Technology Security Specialist Skills and Responsibilities on a Resume
1. Information Technology Security Specialist, Nexora Systems, Albany, NY
Job Summary:
- Determine security criteria for products used in the IT infrastructure and ensure appropriate controls and reporting.
- Answer customer security questionnaires.
- Monitor and report on security logs, and evaluate results.
- Analyze information security violations and take necessary precautions.
- Perform ISO 27001 and KVKK controls, create documentation, and coordinate and plan audits in working areas.
- Audit the operation of security systems in accordance with security policies and procedures.
- Operate the ISMS and maintain its continuity through ISO 27001 audits.
- Fulfill activities within the scope of risk and compliance management.
- Support initiatives to increase information security awareness among users.
- Follow legislation and support necessary actions within the organization.
- Coordinate and track actions required to reduce risks identified in risk assessments.
Skills on Resume:
- Security Controls (Hard Skills)
- Questionnaire Response (Hard Skills)
- Log Monitoring (Hard Skills)
- Incident Analysis (Hard Skills)
- ISO27001 Compliance (Hard Skills)
- Risk Management (Hard Skills)
- Audit Coordination (Hard Skills)
- Security Awareness (Soft Skills)
2. Information Technology Security Specialist, Betrix Digital Solutions, Austin, TX
Job Summary:
- Support the project process to ensure information security aspects are considered upfront and throughout the project lifecycle.
- Take responsibility for the security of the tested product within the project context.
- Conduct manual and automated source code reviews.
- Contribute to and utilize Bet365 security testing methodologies, creating and updating technical documentation.
- Complete security vulnerability analyses and assessments, and take an active role in external audits.
- Develop an understanding of the wider business.
- Liaise with software development teams to ensure security is integrated throughout the lifecycle.
- Identify security flaws within business software and manage remediation, liaising with external bodies.
- Identify and develop new tools to improve the security testing process.
- Stay up to date with new and emerging threats.
Skills on Resume:
- Project Security (Hard Skills)
- Product Security (Hard Skills)
- Code Review (Hard Skills)
- Vulnerability Assessment (Hard Skills)
- Testing Methods (Hard Skills)
- Business Insight (Soft Skills)
- Secure Development Liaison (Soft Skills)
- Threat Awareness (Soft Skills)
3. Information Technology Security Specialist, VantagePoint IT Services, Columbus, OH
Job Summary:
- Monitor security factors that can affect the system.
- Implement systems that provide effective security support.
- Investigate suspected systems that may interfere with operations.
- Align the activities of other security specialists with the compliance roadmap.
- Assist auditors and internal or external advisers.
- Build communication with the team and address all matters regarding security.
- Support with preparations for ISO certifications
- Research and implement ways to improve processes in all business system applications.
- Maintain high levels of IT user satisfaction and implement plans to address identified areas of opportunity for user satisfaction improvement.
- Stay up to date with the latest industry tools, standards, and practices.
Skills on Resume:
- Security Monitoring (Hard Skills)
- Security Implementation (Hard Skills)
- Incident Investigation (Hard Skills)
- Compliance Alignment (Hard Skills)
- Audit Support (Hard Skills)
- Team Communication (Soft Skills)
- ISO Preparation (Hard Skills)
- Process Improvement (Soft Skills)
4. Information Technology Security Specialist, CloudSec Innovations, Richmond, VA
Job Summary:
- Develop and implement a comprehensive plan to secure the application and cloud network.
- Identify and mitigate network vulnerabilities.
- Implement a security training program.
- Implement information security standards such as HIPAA and HITECH.
- Work with vendors to perform security vulnerability assessments and penetration tests of organizational solutions.
- Document necessary proof and compliance documentation for organizational solution security.
- Document security breaches and assess their damage.
- Perform security assessments of cloud resources.
- Complete prospect security form submissions.
- Advise leadership and staff on a wide range of information security issues and best practices.
Skills on Resume:
- Application Security (Hard Skills)
- Vulnerability Mitigation (Hard Skills)
- Security Training (Soft Skills)
- Standards Compliance (Hard Skills)
- Penetration Testing (Hard Skills)
- Compliance Documentation (Hard Skills)
- Breach Assessment (Hard Skills)
- Cloud Security (Hard Skills)
5. Information Technology Security Specialist, Novatek Cyber Group, Orlando, FL
Job Summary:
- Play an active role in defining the strategy for information security and privacy within the organization.
- Integrate new security and privacy requirements into the Information Security Management System (ISMS).
- Guide product management teams during feature planning to ensure secure design considerations.
- Conduct secure code reviews to support development teams and improve application security.
- Collaborate with colleagues to evaluate the effectiveness of security implementations.
- Support certification audits of the ISMS by preparing materials and coordinating activities.
- Assist in creating and maintaining training content to strengthen ISMS awareness.
- Contribute expertise to the design and enhancement of security architecture.
- Plan and oversee information security activities, ensuring accurate reporting of outcomes.
- Prepare security reports that summarize key findings and highlight areas of focus.
Skills on Resume:
- Security Strategy (Hard Skills)
- ISMS Integration (Hard Skills)
- Secure Design (Hard Skills)
- Code Review (Hard Skills)
- Security Evaluation (Hard Skills)
- Audit Support (Hard Skills)
- Security Training (Soft Skills)
- Security Architecture (Hard Skills)
6. Information Technology Security Specialist, IronShield Technologies, Phoenix, AZ
Job Summary:
- Build relationships with business units and technical teams to identify the environment, attack surface, and IT risk posture.
- Report on IT risks facing the organization.
- Conduct regular internal and external vulnerability scans on core systems and hosting environments, and raise tickets with respective teams for remediation.
- Carry out security reviews for new applications or major changes.
- Provide security opinions on new projects and initiatives.
- Monitor security controls, including reviewing malware report alerts, email quarantine, and other security mechanisms.
- Conduct penetration testing assignments.
- Liaise with security auditors and regulators.
- Support the implementation of the BIR2017/BIO.
- Stay up to date with the latest threat intelligence and deliver annual information security awareness training sessions.
Skills on Resume:
- Stakeholder Collaboration (Soft Skills)
- IT Risk Reporting (Hard Skills)
- Vulnerability Scanning (Hard Skills)
- Security Reviews (Hard Skills)
- Project Security (Hard Skills)
- Control Monitoring (Hard Skills)
- Penetration Testing (Hard Skills)
- Threat Awareness (Soft Skills)
7. Information Technology Security Specialist, Stratacore IT Consulting, Charlotte, NC
Job Summary:
- Monitor internal and external compliance review activities, follow up on identified deficiencies, and ensure remediation steps are completed.
- Perform control and vulnerability assessments, and assist in compliance monitoring reviews to identify control weaknesses and recommend remedial actions.
- Report to senior management on residual risks, vulnerabilities, security exposures, misuse of information assets, and any noncompliance cases.
- Advise business units and IT groups on security requirements and controls, and enforce security control policies as planned.
- Assist in the development of security architecture, policies, standards, and related processes.
- Resolve negative audit findings reported by internal and external audits by collaborating with IT action owners and tracking remediation progress.
- Develop and validate baseline security configurations for operating systems, applications, networking, and telecommunications equipment.
- Research and assess new threats and security alerts, and recommend appropriate solutions.
- Assist in building and monitoring the IT security architecture for the company’s infrastructure and business application environment.
- Promote IT risk awareness across business units.
Skills on Resume:
- Compliance Monitoring (Hard Skills)
- Vulnerability Assessment (Hard Skills)
- Risk Reporting (Hard Skills)
- Security Advisory (Soft Skills)
- Policy Development (Hard Skills)
- Audit Remediation (Hard Skills)
- Security Configuration (Hard Skills)
- Risk Awareness (Soft Skills)
8. Information Technology Security Specialist, DataFort Compliance Partners, Denver, CO
Job Summary:
- Maintain awareness of security directives, orders, standards, plans, and procedures.
- Ensure security operating manuals and procedural documents remain current when regulations change.
- Evaluate the efficiency, effectiveness, and compliance of operational processes with corporate security policies and related government regulations.
- Provide guidance and support to global entities and subsidiaries for consistent creation and enforcement of security documentation, such as policies and procedures.
- Maintain all policy, procedure, and governance documentation related to organization-specific security compliance methodologies.
- Assist with third-party audit documentation and remediation tracking.
- Interface regularly with staff from various departments to communicate security issues, gather information, and provide remediation status updates to security management.
- Identify security gaps and obstacles, and launch projects to establish solutions.
- Foster strong partnerships and effectively prioritize workload demands to meet deadlines.
- Assist the security team with internal process improvement initiatives, including establishing workflows and automating manual processes.
Skills on Resume:
- Security Compliance (Hard Skills)
- Documentation Management (Hard Skills)
- Process Evaluation (Hard Skills)
- Global Support (Soft Skills)
- Policy Governance (Hard Skills)
- Audit Support (Hard Skills)
- Security Communication (Soft Skills)
- Process Improvement (Soft Skills)
9. Information Technology Security Specialist, GlobalTrust Security Services, Salt Lake City, UT
Job Summary:
- Coordinate responses to security incidents and requests.
- Manage the incident and request a ticket queue for information security-related incidents and tasks.
- Work on all tickets initially assigned to the information security queue.
- Escalate complex issues to Tier 2 SOC.
- Apply security policies and procedures.
- Perform deep-dive investigations and log analysis on a wide range of security incidents.
- Stay updated on new vulnerabilities and associated risks, and communicate and record them within the organizational footprint.
- Perform advanced analysis of IDS, Syslog, and SIEM alerts.
- Create incidents based on suspicious alerts and follow incident response guidelines.
- Use advanced analytic tools to identify emerging threat patterns and vulnerabilities.
- Monitor network availability for potential security incidents and investigate events.
- Identify security breaches and take actions to stop and prevent future occurrences.
Skills on Resume:
- Incident Response (Hard Skills)
- Ticket Management (Hard Skills)
- Policy Application (Hard Skills)
- Log Analysis (Hard Skills)
- Vulnerability Awareness (Soft Skills)
- Alert Analysis (Hard Skills)
- Threat Detection (Hard Skills)
- Breach Prevention (Hard Skills)
10. Information Technology Security Specialist, Sentinel Cyber Operations, Kansas City, MO
Job Summary:
- Serve as an information security program specialist responsible for enforcing all operational and mission assurance requirements.
- Deliver security guidance, training, and direction to both civilian and military personnel across wing organizations and assigned locations.
- Act as the primary representative for all information security concerns within the wing.
- Ensure security specialists receive the necessary training, resources, and support to fulfill their responsibilities.
- Collaborate with peers to design and implement Security Awareness and Education Programs that meet organizational training requirements.
- Oversee identity and access management processes to detect misuse of permissions by authorized users.
- Coordinate with operational teams to assign clear ownership of security events.
- Assist in the upkeep and operation of monitoring tools that support security operations.
- Provide technical support for a range of back-office information security products.
- Manage and administer internal solutions tailored to the needs of the security team.
- Contribute to maintaining continuous SOC coverage on a 24x7 basis.
Skills on Resume:
- Program Enforcement (Hard Skills)
- Security Training (Soft Skills)
- Security Representation (Soft Skills)
- Resource Support (Soft Skills)
- Awareness Programs (Soft Skills)
- Access Management (Hard Skills)
- Event Coordination (Hard Skills)
- SOC Operations (Hard Skills)
11. Information Technology Security Specialist, Primark IT Security Consulting, Minneapolis, MN
Job Summary:
- Provide subject matter expertise and guidance to project teams on building appropriate levels of security into delivered systems and applications.
- Conduct security impact assessments for all projects passing through IT governance and report compliance status to the security team.
- Define and deploy minimum security baseline standards across a wide range of technologies and platforms.
- Evaluate true security impact by analyzing information from multiple sources, ensuring proposed solutions align with all security standards and controls.
- Translate complex security requirements into project-understandable requirements documents using templates, plain English, diagrams, process flows, and scenarios.
- Collaborate with teams on different aspects of large projects to ensure objectives are aligned and solutions function as end-to-end processes.
- Perform detailed security control assessments and reviews, conduct research, document conclusions and recommendations, provide security guidance, and manage follow-on actions.
- Participate in forensic investigations, penetration tests, and vulnerability assessments, consolidate findings, and manage subsequent actions.
- Contribute proactively to the implementation of Primark’s IT security policies and to the improvement of process efficiencies.
- Engage successfully in multiple initiatives in parallel.
Skills on Resume:
- Security Guidance (Hard Skills)
- Impact Assessment (Hard Skills)
- Baseline Standards (Hard Skills)
- Security Analysis (Hard Skills)
- Requirement Translation (Soft Skills)
- Project Collaboration (Soft Skills)
- Control Assessment (Hard Skills)
- Forensic Testing (Hard Skills)
12. Information Technology Security Specialist, Federal Cyber Defense Partners, Norfolk, VA
Job Summary:
- Assist in drafting "Authorization to Operate" (ATO) packages for new and existing systems.
- Provide subject matter expertise in all cybersecurity initiatives and explain new guidance.
- Draft documentation to announce new cybersecurity initiatives and participate in building and implementing related processes.
- Provide cybersecurity reports to leadership, conduct scans, and participate in the process to obtain ATO status for identified systems.
- Comply with cybersecurity program implementation plans and ensure alignment with management policies.
- Ensure compliance with data security policies and applicable legal and regulatory requirements in accordance with directives and Risk Management Framework (RMF) requirements.
- Implement required changes and improvement actions.
- Maintain current knowledge of authenticator management for unclassified systems.
- Ensure compliance with protection requirements, control procedures, incident management reporting, remote access requirements, and system management for all systems under scope.
- Work flexible shifts to ensure uninterrupted security monitoring and response capabilities.
Skills on Resume:
- ATO Support (Hard Skills)
- Cybersecurity Expertise (Hard Skills)
- Process Documentation (Hard Skills)
- Security Reporting (Hard Skills)
- Policy Compliance (Hard Skills)
- Risk Management (Hard Skills)
- Authenticator Management (Hard Skills)
- Incident Management (Hard Skills)
13. Information Technology Security Specialist, AccuraTech Security Solutions, Milwaukee, WI
Job Summary:
- Liaise closely with certification and accreditation authorities to describe cybersecurity threats and risks associated with solution delivery.
- Develop security architecture, design, and remediation guidance for cybersecurity capability while working cohesively with stakeholders.
- Work across a wide range of cybersecurity fields to enhance organizational cybersecurity capability.
- Determine security requirements by evaluating business strategies and leading threat risk assessment activities.
- Research information security standards and conduct system security and vulnerability analyses and risk assessments.
- Architect solutions aligned with mitigation strategies and compliant with relevant security frameworks and information security manuals.
- Review existing system security measures, recommend and implement enhancements, and assess internally and externally developed security engineering artefacts to ensure all security requirements are addressed.
- Develop, deliver, and update the System Accreditation Plan (SAP) and Security Risk Management Plan (SRMP) to ensure solution architectures mitigate identified threats.
- Liaise with certification and accreditation authorities, business stakeholders, and solution architects to drive solutions and designs toward accreditation outcomes.
- Advise program leadership on system security threats, risks, and mitigations.
Skills on Resume:
- Certification Liaison (Soft Skills)
- Security Architecture (Hard Skills)
- Cybersecurity Capability (Hard Skills)
- Risk Assessment (Hard Skills)
- Standards Research (Hard Skills)
- Solution Design (Hard Skills)
- System Review (Hard Skills)
- Accreditation Planning (Hard Skills)
14. Information Technology Security Specialist, Firewall Dynamics Group, San Antonio, TX
Job Summary:
- Take responsibility for and extend firewall structures conceptually and operationally, including hardware selection, network component configuration, project planning, drafting concepts, penetration testing, and intrusion detection.
- Manage firewall systems and core switches at existing and future sites worldwide.
- Analyze, improve, and document existing and future firewall infrastructures.
- Handle change and incident requests in line with SLAs using the internal ticket system.
- Support IT security team projects related to business continuity management and disaster recovery.
- Manage web application and core firewall systems at the primary site.
- Maintain expertise in POS system software and hardware.
- Create and maintain training materials, documentation, videos, and other resources.
- Deliver one-on-one, classroom-style, and remote training for all aspects of business systems from an IT perspective.
- Maintain technical knowledge by attending educational workshops and necessary meetings.
Skills on Resume:
- Firewall Management (Hard Skills)
- Network Configuration (Hard Skills)
- Infrastructure Analysis (Hard Skills)
- Incident Handling (Hard Skills)
- Business Continuity (Hard Skills)
- POS Expertise (Hard Skills)
- Training Delivery (Soft Skills)
- Knowledge Development (Soft Skills)
15. Information Technology Security Specialist, BlueHaven Information Security, Raleigh, NC
Job Summary:
- Protect organizational technology systems and employees from attacks.
- Provide second- and third-level support and analysis during and after a security incident.
- Assist IT staff in the resolution of reported security incidents.
- Review and assess security and infrastructure logs for indicators of compromise (IOCs) or other anomalous behavior within networks, applications, or user profiles.
- Assist in the completion of information security operations documentation.
- Work with information security leadership to develop strategies and plans to enforce security requirements and address identified risks.
- Participate in application and infrastructure projects to provide security planning advice.
- Draft security procedures and standards to be reviewed and approved by management.
- Validate IT infrastructure and other referenced architectures for security best practices and recommend changes to enhance security and reduce risk.
- Coordinate operational components of incident management, including detection, response, and reporting.
- Maintain a knowledge base comprising a technical reference library, security advisories and alerts, information on security trends and practices, and laws and regulations.
- Assist the disaster recovery planning team in the selection of recovery strategies and the development, testing, and maintenance of disaster recovery plans.
Skills on Resume:
- System Protection (Hard Skills)
- Incident Support (Hard Skills)
- Log Review (Hard Skills)
- Security Documentation (Hard Skills)
- Risk Planning (Hard Skills)
- Security Procedures (Hard Skills)
- Incident Coordination (Hard Skills)
- Disaster Recovery (Hard Skills)
16. Information Technology Security Specialist, Titan Cyber Risk Advisors, Pittsburgh, PA
Job Summary:
- Monitor existing security tools daily.
- Review and follow up on level 2 alerts and escalate more complex alerts.
- Identify gaps causing recurring issues and advise on procedures or tools to resolve them.
- Participate in incident response by providing requested data and investigating additional leads.
- Maintain solid knowledge of cybersecurity issues via RSS feeds, security blogs, and podcasts.
- Increase and maintain knowledge of security disciplines through on-the-job training and online security courses, to obtain certifications.
- Determine the impact of current threats on the organization’s security posture.
- Maintain up-to-date baselines for secure configuration and operations of all in-place devices, including workstations, servers, network devices, and security tools.
- Maintain operational configurations of all in-place security solutions according to established baselines.
- Monitor all in-place security solutions for efficient and effective operations.
- Review logs and reports of all in-place devices and interpret implications of activity to devise appropriate resolutions.
Skills on Resume:
- Tool Monitoring (Hard Skills)
- Alert Management (Hard Skills)
- Gap Analysis (Hard Skills)
- Incident Investigation (Hard Skills)
- Threat Awareness (Soft Skills)
- Security Knowledge (Soft Skills)
- Configuration Management (Hard Skills)
- Log Analysis (Hard Skills)
17. Information Technology Security Specialist, Redline Security Consulting, Sacramento, CA
Job Summary:
- Participate in investigations of problematic activity.
- Design and execute vulnerability assessments, penetration tests, and security audits.
- Provide on-call support for end users regarding in-place security solutions.
- Perform user account maintenance.
- Assist with cybersecurity integration during mergers and acquisitions.
- Create technical documentation for specific situations to support applications or endpoints and assist the helpdesk in performing tasks.
- Handle phishing and spam reports in accordance with company policies.
- Manage all cybersecurity incidents.
- Use orchestration and management solutions such as MDMs or MEMs.
- Evaluate new cybersecurity threats and IT trends, and develop effective security controls.
- Maintain Active Directory and group policies for the domain.
- Evaluate potential security breaches, coordinate responses, and recommend corrective actions.
Skills on Resume:
- Incident Investigation (Hard Skills)
- Vulnerability Testing (Hard Skills)
- User Support (Soft Skills)
- Account Management (Hard Skills)
- Cybersecurity Integration (Hard Skills)
- Phishing Handling (Hard Skills)
- Threat Evaluation (Hard Skills)
- Directory Management (Hard Skills)