Information Security Analyst

Information Security Analyst Resume Keywords and Skills (Hard Skills)

Here are the keywords and skills that appear most frequently on recent Information Security Analyst job postings. In other words, these are the most sought after skills by recruiters and hiring managers. Go to Sample Templates ↓ below to see how to include them on your resume.

Remember that every job is different. Instead of including all keywords on your resume, identify those that are most relevant to the job you're applying to. Use the free Targeted Resume tool to help with this.

Choose a category
  • Information Security
  • ISO 27001
  • Cybersecurity
  • Security Information and Event Management (SIEM)
  • Information Security Management
  • Network Security
  • Security
  •  Find out what your resume's missing
  • Vulnerability Management
  • Vulnerability Assessment
  • Threat & Vulnerability Management
  • Payment Card Industry Data Security Standard (PCI DSS)
  • Incident Response
  • Penetration Testing
  • Security Incident Response
  • Identity & Access Management (IAM)
  • Vulnerability Scanning
  • Risk Management
  • ITIL
  • Tenable Nessus
  • Splunk
  • Ethical Hacking
  • ArcSight
  • Web Application Security
  • IBM QRadar
  • Malware Analysis
  • Firewalls
  • Application Security
  • DLP
  • IPS

  •   Show full list

Resume Skills: Programming

Resume Skills: Security Tools

  • Snort
  • Wireshark
  • Nessus
  • Metasploit
  • Nmap
  • Symantec Endpoint Protection
  • ArcSight
  • kali Linux
  • Burp Suite
  • Intrusion Detection Systems (IDS)
  • Firewalls
  • Anti-virus software
  • Cryptographic tools
  • Data Leak Prevention (DLP)
  • Unified Threat Management (UTM)
  • Security Event and Incident Management (SEIM)
  • OpenVAS
  • Aircrack
  • Netcat
  • Kali Linux
  • Nexpose
  • Intrusion Prevention Systems (IPS)
  • Security Information and Event Management (SIEM)
  • Antivirus
  • Intrusion Detection
  • Data Encryption
  • Secure Code Review
  • SIEM proficiency(AlienVault, Splunk)
  •  Match your resume to these skills

Resume Skills: Security Frameworks

  • ISO 27001
  • NIST Cybersecurity Framework
  • CIS Controls
  • NIST
  • CIS Critical Security Controls
  • ISO 27001/27002
  • ITIL
  • TCP/IP
  • DNS
  • SMTP
  • ISO27001/IEC27002
  • SOX
  • GDPR
  •  Match your resume to these skills

Resume Skills: Operating Systems

Resume Skills: Networking

  • TCP/IP
  • SSL
  • SSH
  • FTP
  • VPN
  • DNS
  • DHCP
  • Ethernet
  • Wireless LAN
  • VPNs
  • Firewalls
  • Intrusion Detection Systems (IDS)
  • Subnetting
  • Routers/Switches Configuration
  •  Match your resume to these skills

Resume Skills: Penetration Testing Tools

Resume Skills: Cybersecurity Tools

Resume Skills: Tools and Technologies

Resume Skills: Cloud Platforms

Resume Skills: Database Management

  Does your resume contain all the right skills? Paste in your resume in the AI Resume Scan ↓ section below and get an instant score.

Compare Your Resume To These Information Security Analyst Skills (ATS Scan)

Paste your resume below and our AI will identify which keywords are missing from your resume from the list above (and what you need to include). Including the right keywords will help you get past Applicant Tracking Systems (i.e. resume screeners) which may scan your resume for keywords to see if you're a match for the job.

Sample Information Security Analyst Resume Examples: How To Include These Skills

Add keywords directly into your resume's work experiences, education or Skills section, like we've shown in the examples below. Use the examples below as inspiration.

Select a free resume example
Your Name
Information Security Analyst
City, Country  •  (123) 456-789  •  [email protected]  •
Resume Worded January 2021 - Present
Senior Information Security Analyst
Established an Information Security Management system in compliance with ISO 27001, reducing security risks by 35%
Boosted company's network security by implementing advanced SIEM tools and practices
Led a team to develop robust Incident Response process, effectively reducing response time by 40%
Improved Vulnerability Assessment protocols to identify and mitigate emergent threats, enhancing system security by 50%
Conducted regular Penetration Testing using ethical hacking methods, finding and fixing system vulnerabilities before attackers May 2018 - December 2020
Information Security Analyst
Implemented IAM measures to streamline access protocols, improving security without limiting system usability
Executed PCI DSS, ensuring secure cardholder data processing and storage, achieved full compliance in record 6 months
Managed Vulnerability Scanning of all network devices, identifying potential risks and implementing mitigation strategies
Microsoft June 2016 - April 2018
Cybersecurity Analyst
Performed Threat & Vulnerability Management to safeguard the company's data, reducing system breaches by 25%
Managed ITIL processes significantly improving SLA performance by 20%
Utilized Tenable Nessus and Splunk analytics to monitor network traffic, preventing potential cyber-attacks
Resume Worded University April 2016
Master of Science - Computer Science with Specialization in Cybersecurity
Selected as top 1% in Network Security course
Resume Worded Academic Center June 2014
Certification: Ethical Hacking
Distinguished as the best performer in exploiting and reporting system vulnerabilities
Cybersecurity Tools: Firewall (SonicWall, Fortinet), SIEM (Splunk), IDS/IPS, Antivirus (McAfee, Symantec), DLP (Digital Guardian)
Programming: Python, Java, C++, HTML, CSS, PowerShell, Bash, SQL
Operating Systems: Windows Server, Linux (Ubuntu, Red Hat), MacOS
Frameworks and Standards: ISO27001/IEC27002, COBIT, NIST Cybersecurity Framework, PCI DSS
Certifications: Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP)
Conferences & Workshops: Participated in Black Hat USA 2020, DefCon 27
Projects: Designed a Cybersecurity Risk Assessment Tool based on NIST Framework
Seminars & Guest Lectures: Invited as Guest Speaker on 'Importance of Cyber Hygiene' at Resume Worded Academic Center
Your Name
Cybersecurity Consultant
City, Country  •  (123) 456-789  •  [email protected]  •
KPMG February 2019 - Present
Senior Cybersecurity Consultant
Enhanced clients' security posture by tailoring a comprehensive Information Security framework
Conducted comprehensive Penetration Testing on clients’ networks, successfully identifying and securing potential vulnerabilities
Provided effective security solutions by evaluating clients' Risk Management and Incident Response strategies and making necessary adjustments
Directly contributed to ISO 27001 certification for 10+ clients, leading to a significant increase in retention and referrals
Coordinated with teams to implement robust IAM protocols, optimizing security without impacting employee productivity
EY August 2016 - January 2019
Cybersecurity Consultant
Collaborated with cross-functional teams to ensure optimal Security Information and Event Management practices
Contributed significantly to PCI DSS compliance for 20+ clients
Managed successful Vulnerability Assessment and Threat Management strategies for high-risk clients June 2014 - July 2016
Information Security Specialist
Implemented Splunk and Tenable Nessus to detect and mitigate potential network threats
Conducted regular Security Incident Response drills to improve readiness
Assisted in Network Security optimization by updating threat intelligence regularly
Resume Worded Institute January 2019
Certified Information Systems Security Professional (CISSP)
Awarded as highest scoring participant of the year
Resume Worded University May 2016
Master of Science in Cybersecurity
Focused Study: Intrusion Detection and Incident Response
Cyber Security Tools: Intrusion Detection Systems (IDS), Firewalls, Anti-virus software, Cryptographic tools, Data Leak Prevention (DLP), Unified Threat Management (UTM), Security Event and Incident Management (SEIM)
Programming & Scripting Languages: Python (Intermediate), Bash (Intermediate), SQL (Basic), JavaScript (Basic), R (Basic)
Operating Systems: Linux (Advanced), Windows (Advanced), MacOS (Intermediate)
Frameworks & Protocols: NIST Cybersecurity Framework, ISO 27001, TCP/IP, DNS, SMTP, SSL/TLS
Certifications: Certified Ethical Hacker (CEH), Certified Cloud Security Professional (CCSP), Offensive Security Certified Professional (OSCP)
Professional Affiliations: Active member of Information Systems Security Association (ISSA), and ISACA
Projects: Developed security plan for a mid-size corporation, providing comprehensive security solutions and detailed risk assessment
Publications: Authored multiple articles published in 'Cybersecurity Journal' on latest threats and cybersecurity trends
Your Name
Ethical Hacker
City, Country  •  (123) 456-789  •  [email protected]  •
Resume Worded March 2017 - Present
Lead Ethical Hacker
Performed advanced Penetration Testing on company networks, preemptively identifying and mitigating vulnerabilities
Boosted system security by prioritizing Vulnerability Management and evaluating system exposure
Improved the Security Incident Response by implementing stringent measures, resulting in faster and more effective reactions
Contributed to achieving ISO 27001 certification by integrating information security strategies with company procedures
Leveraged SIEM tools to continuously monitoring network, effectively preventing any potential breaches
IBM July 2014 - February 2017
Ethical Hacker
Implemented robust cyber risk management strategies aligning with ITIL practices
Conducted PCI DSS audits to ensure secure payment transactions for the organisation
Led effective Vulnerability Scanning for 50+ network devices, allowing for timely mitigation
Microsoft May 2010 - June 2014
Information Security Officer
Managed IAM implementation for over 100 users
Improved the efficiency of network security protocols using security analytics tools like Splunk
Assisted in risk profiling efforts to manage cyber threats threat landscape intelligently
Resume Worded Institute February 2017
Certified Ethical Hacker (CEH)
Achieved top marks in the practical application of ethical hacking strategies.
Resume Worded University May 2010
Master of Science - Cyber Security
Specialization in Network Security
Graduated with Distinction
Programming Languages: Python, C++, Java, JavaScript, SQL, PHP
Penetration Testing Tools: Metasploit, Burp Suite, Wireshark, Nessus, Nmap, Acunetix
Security Frameworks: ISO 27001, NIST, CIS Critical Security Controls, PCI DSS
Operating Systems: Linux, Windows, MacOS, Unix
Certifications: Offensive Security Certified Professional (OSCP), Certified Information Systems Security Professional (CISSP)
Projects: Developed a security automation framework which reduced manual testing time by 30%
Volunteering & Leadership: Mentor at Cybersecurity For All, Lead Organizer for Resume Worded Security Conference 2019
Awards: Recognized at IBM for outstanding contributions to security innovation (2016), Microsoft Security Star Award (2012, 2013)
Your Name
Director Information Security
City, Country  •  (123) 456-789  •  [email protected]  •
Resume Worded March 2018 - Present
Director Information Security
Implemented ISO 27001 and PCI DSS certified Information Security Management System (ISMS), reducing security risks by 45%
Established and led a cybersecurity team, decreased the response time to security incidents by 30%
Developed and oversaw an effective disaster recovery and business continuity plan, ensuring 99.9% system uptime
Architected and enforced cloud and network security measures, resulting in a 40% reduction in vulnerabilities
Designed and conducted security audits, identifying and rectifying any non-conformities, increasing system resilience by 20% May 2015 - February 2018
Senior Security Architect
Executed a security architecture design that increased the security posture by 35%
Drove the creation and implementation of IT strategy, leading to a 50% improvement in IT service delivery
Led the vulnerability assessment and penetration testing team, that reduced system exposures by 60%
Administered cloud computing and information technology services, reducing maintenance costs by 25%
Amazon January 2012 - April 2015
Information Security Manager
Managed information security governance, improving policy adherence by 40%
Steered the implementation of NIST frameworks, leading to robust, federal-compliant systems
Handled incident response activities, decreasing the incident dwell time by 70%
Resume Worded Institute March 2020
Certified Information Systems Security Professional (CISSP)
One of the most globally recognised certification in Information Security Domain.
Resume Worded University May 2010
Master of Science in Information Systems
Specialized in Data Protection and Cryptography.
Cyber Security: Cloud Security, Network Security, Endpoint Security, Application Security, IT Disaster Recovery, Cyber Incident Response, Data Loss Prevention
Regulatory Compliance: GDPR, HIPAA, PCI-DSS, ISO 27001, SOX, NIST
Security Tools: Splunk, Nessus, SIEM, Snort, Wireshark, Firewall (Juniper, CheckPoint, Cisco, PaloAlto)
Programming: Python, Java, Shell Scripting, SQL
Certifications: Certified Ethical Hacker (CEH), Certified Cloud Security Professional (CCSP), Certified Information Privacy Professional (CIPP)
Leadership & Volunteering: Mentor for Cybersecurity at Coached Initiative, Volunteer at IT Security Awareness Campaigns for community education
Awards: Amazon 'Guardian Award' for best Security Practices, Coached 'Shield Award' for Information Security Leadership
Contributions: Published articles on 'Impact of AI on Cyber Security' and 'Importance of Data Privacy in Digital Age' in renowned Tech Magazines.
Your Name
Network Security Director
City, Country  •  (123) 456-789  •  [email protected]  •
EXPERIENCE June 2019 - Present
Network Security Director
Spearheaded a network security initiative, decreasing average threat detection time by 80%
Oversaw disaster recovery measures that improved critical system redundancy by 99%
Managed PCI DSS compliance tasks, reducing audit findings by 30%
Improved threat response efficiency by 40% via streamlined incident response
Coordinated pen-testing activities that minimized potential security flaws by 45%
Resume Worded February 2015 - May 2019
Cybersecurity Manager
Orchestrated the implementation of cybersecurity policies compliant with ISO 27001, leading to improved risk management by 50%
Instrumental in vulnerability management, decreasing system vulnerabilities by 45%
Led incident response activities, which increased threat containment speed by 55%
IBM August 2010 - January 2015
Cloud Security Administrator
Administered multi-cloud environments, enhancing security efficiency by 35%
Facilitated compliance-related tasks for cloud security, leading to a risk reduction by 40%
Monitored and managed cloud-information security threats, thereby enhancing system integrity by 25%
Resume Worded Institute May 2019
Certified Information Systems Security Professional (CISSP)
Obtained score among top 5% contributors
Resume Worded University May 2010
Master of Business Administration (MBA) - Information Technology
Relevant coursework: Network Security, Cloud Computing, Cybersecurity Management
Graduated Summa Cum Laude
CyberSecurity Tools & Techniques: Vulnerability Assessment, Intrusion Prevention, Endpoint Security, Firewalls, SIEM, IPS
Cloud Security: AWS Security, Azure Security, Google Cloud Security, Cloud Encryption Methods, Cloud Access Security Brokers
Network Security: DDoS Mitigation, SSL/IPSec, Network Segmentation, PKI Management, Secure VPN, Zero Trust Networking
Regulatory Compliance: HIPAA, PCI DSS, GLBA, SOX, GDPR
Certifications: CCSP - Certified Cloud Security Professional (2015), CEH - Certified Ethical Hacker (2016)
Leadership & Professional Associations: Member, International Association of Privacy Professionals
Projects: Established a robust IDS/IPS system for Resume Worded, protecting sensitive customer data
Awards: Cybersecurity Excellence Award, (2020)
Your Name
IT Security Director
City, Country  •  (123) 456-789  •  [email protected]  •
Resume Worded August 2017 - Present
IT Security Director
Crafted comprehensive IT security strategies, resulting in improved system defences by 50%
Spearheaded business continuity measures, effectively maintaining 99.9% operational uptime
Managed PCI DSS, ISO 27001 compliance, reducing risks by 40%
Spearheaded a team responsible for security architecture design and incident response, improving malicious intrusion detection by 30%
Oversaw the vulnerability assessment team, enhancing threat remediation by 35% January 2014 - July 2017
Information Security Governance Manager
Supervised the implementation of NIST and information security management norms, ensuring adherence by 96%
Orchestrated data security initiatives which reduced data breaches by 60%
Steered routine penetration testing, mitigating potential threats by 55%
Microsoft April 2010 - December 2013
Security Analyst
Managed incident responses thereby reducing detection times by 30%
Part of a team that conducted regular vulnerability assessments, leading to a decrease in system exposures by 50%
Assisted in information security governance tasks, ensuring policies were effectively enacted and followed
Resume Worded Academic Center August 2018
Certified Information Security Manager (CISM)
Practicum focus: Advanced Threat Response Strategies
Resume Worded University May 2010
Master of Business Administration (MBA) - Information Systems
Specialization in Information Security Management
Security Softwares: Sophos, FireEye, McAfee, Qualys, Symantec Endpoint Protection
Operating Systems: Windows, Linux, iOS, Android
Networking: TCP/IP, DHCP, DNS, IPV6, Network Protocols, VPNs
Programming Languages: Python, Java, C++, SQL, Bash
Certifications: CompTIA Security+ (2015), CISSP Certified (2013)
Professional Development: Advanced Cybersecurity Bootcamp - HarvardX (2019)
Leadership & Volunteering: Helpline Volunteer at National Cyber Security Alliance (2020-Present)
Awards: ‘Cybersecurity Professional of the Year’ - Leading IT Magazine, 2016
Your Name
Information Security Manager
City, Country  •  (123) 456-789  •  [email protected]  •
EXPERIENCE September 2018 - Present
Information Security Manager
Established a comprehensive ISMS that improved risk management by 30% and enhanced adherence to ISO 27001.
Directed cross-department initiatives for data security, reducing data breaches by 37% and ensuring compliance with GDPR.
Oversaw a strategic move towards automated vulnerability assessments: this reduced the time taken to identify threats by 70%.
Led company-wide cyber security awareness trainings, increasing staff compliance by 80%.
Formulated and implemented security audits that enhanced system defenses and threat detection by 27%.
Resume Worded November 2016 - August 2018
Senior Information Security Analyst
Pioneered the application of AI for network security, mitigating threats by 50%.
Championed the PCI DSS compliance project that significantly improved payment card security.
Forefronted an initiative to develop robust Business Continuity and Disaster Recovery plans, reducing potential downtime by 60%.
IBM June 2014 - October 2016
Information Security Analyst
Implemented a SIEM system that improved threat detection and management by 35%.
Revamped company security policies to better protect sensitive data.
Administered quarterly vulnerability assessments to address threats, reducing system breaches by 20%.
Resume Worded Institute May 2014
Master of Science - Information Security
Thesis: Advanced Security Protocols in Cloud Computing
Resume Worded University May 2012
Bachelor of Science - Computer Science
Specialization in Cryptography
Dean's List 2011 (Top 10%)
Security Systems: Intrusion Detection Systems (IDS), Firewalls, Antivirus, SIEM Systems, Data Loss Prevention (DLP)
Security Standards: ISO 27001/27002, ITIL, COBIT, NIST Cybersecurity Framework
Programming & Scripting: Python (Proficient), PowerShell (Proficient), JavaScript (Basic)
Operating Systems: Windows, Linux, Unix
Certifications: Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH)
Publications: Co-authored 'Security Measures for Today's Cyber Threats' - Published in 'InfoSec Journal' in 2017.
Leadership & Volunteering: Led Cybersecurity Awareness Workshops for Local Community, Co-ordinator at Resume Worded Security Camp 2019
Your Name
Cybersecurity Manager
City, Country  •  (123) 456-789  •  [email protected]  •
EXPERIENCE February 2019 - Present
Cybersecurity Manager
Initiated a cybersecurity framework compliant with ISO 27001, strengthening the security posture by 40%.
Headed the integration of advanced threat intelligence tools, boosting threat detection by 50%.
Managed a major upgrade of the ITIL based service management framework, improving productivity by 20%.
Enforced PCI DSS guidelines, enhancing payment card industry's data security.
Led the development and execution of rigorous security audits, reducing system vulnerabilities by 30%.
Resume Worded August 2017 - January 2019
Senior Cybersecurity Analyst
Orchestrated penetration testing and vulnerability assessments, mitigating cyber threats by 40%.
Crafted an effective incident response plan which improved recovery time by 60%.
Successfully trained staff in security awareness ensuring 90% compliance.
Microsoft June 2015 - July 2017
Cybersecurity Analyst
Upgraded the SIEM system, enhancing threat response by 25%.
Implemented standard information security governance policies.
Assured GDPR compliance through meticulous audits and enforcement practices.
Resume Worded Academic Center February 2019
Certified Information Systems Security Professional (CISSP)
Received a prestigious international certification in cybersecurity, known for its rigorous exam criteria and comprehensive knowledge base.
Resume Worded University May 2015
Master of Science - Cybersecurity
Specialized modules covered: Cryptography, Systems & Network Security, Database Security.
Security Protocols & Standards: Cryptography, VAPT, SIEM, IDS/IPS, Patch Management, Firewalls and VPN
Cybersecurity Tools: Metasploit, Wireshark, Nessus, Nmap, Cisco Security Manager
Operating Systems: Linux OS, Windows Server 2016/2019, macOS
Programming: Python, Java, C, C++, PowerShell
Certifications: Certified Ethical Hacker (CEH) - EC-Council (2017), Certified Information Security Manager (CISM) - Information Systems Audit and Control Association (ISACA) (2016)
Leadership & Volunteering: Co-Founder, CyberWomen (An initiative to promote women in cybersecurity), Committee Member, ISACA Local Chapter
Publications: Co-author, 'Cybersecurity in the Digital Era', Published in InfoSec Magazine.
Continuing Education: Regularly attending cybersecurity conferences and workshops
Your Name
IT Security Manager
City, Country  •  (123) 456-789  •  [email protected]  •
Resume Worded April 2019 - Present
IT Security Manager
Developed an efficient ISMS certified with ISO 27001, enhancing mitigation of IT risks by 40%.
Steered the integration of cutting-edge security infrastructure, resulting in a 60% reduction in security breaches.
Initiated GDPR compliant security strategies, providing superior protection to sensitive data.
Conducted regular security audits as part of risk management, significantly reducing vulnerabilities.
Established a comprehensive security awareness program for employees, boosting compliance by 60%. July 2017 - March 2019
Senior IT Security Analyst
Performed vulnerability assessments utilizing AI, enhancing the predictive threat model accuracy by 45%.
Ensured PCI DSS compliance in all payment security measures.
Revamped the business continuity plan, reducing the potential downtime by 50%.
Apple January 2015 - June 2017
IT Security Analyst
Managed the execution of effective security policies.
Led the team responsible for SIEM, boosting threat resolution speed by 30%.
Played a crucial role in implementing GDPR, achieving full compliance.
Resume Worded Institute March 2020
Certified Information Systems Security Professional (CISSP)
Focusing on security policy development and risk management
Resume Worded University May 2014
Master of Science in Information Technology - Cybersecurity
Completed with Distinction
Security Software: Norton, McAfee, Avast, Bitdefender, ESET, Malwarebytes
Programming & Scripting Languages: Python, Java, Bash, PowerShell, SQL, JavaScript
Operating Systems: Linux (Experienced), Windows (Experienced), macOS (Intermediate)
Network Security: Firewalls, Intrusion Detection Systems (IDS), VPNs, Network architecture
Certifications: CompTIA Security+ (2017), Certified Ethical Hacker (CEH v10, 2018)
Projects: Led security infrastructure implementation for’s nationwide expansion
Professional Development: Attended annual DEFCON security conference (2015-2019)
Memberships: Active member of Information Systems Security Association (ISSA)
Your Name
Information Security Architect
City, Country  •  (123) 456-789  •  [email protected]  •
EXPERIENCE January 2022 - Present
Senior Information Security Analyst
Leveraged advanced Security Information and Event Management (SIEM) tools to monitor and respond to security incidents, reducing system breaches by 15%
Designed a vulnerability assessment strategy, conducting regular scans to identify and remediate system vulnerabilities. This led to a 30% improvement in overall system security
Collaborated with multiple teams to integrate Application Security measures during the development stage, reducing post-deployment vulnerabilities by 20%
Created and executed a successful disaster recovery plan that ensured 99.9% system uptime during outage periods
Leveraged my advanced knowledge of cloud security to initiate a system migration to a more secure cloud platform, reducing security breaches by 30%
Resume Worded June 2017 - December 2021
Information Security Analyst
Performed continuous network security monitoring to detect and tackle intrusions, improving incident response time by 25%
Implemented robust firewalls and information security measures that reduced network attacks by 40%
Developed information security management protocols in line with industry best practices
Proactively performed penetration testing on company's infrastructure, identifying potential weak points and reinforcing them
Microsoft January 2014 - June 2017
IT System Analyst
Assisted in implementing a comprehensive identity and access management (IAM) system, reducing unauthorized access by 35%
Participated in enterprise architecture planning, working with senior architects in integrating security considerations within design
Worked on upgrading the company's cloud computing infrastructure, enhancing the system's resilience to cyber threats
Resume Worded Institute January 2022
Certified Information Systems Security Professional (CISSP)
Recognized globally as a standard of achievement for security professionals
Resume Worded University May 2017
Master of Science (MSc) - Cybersecurity
Thesis on 'Advanced Threats in Cybersecurity', Published in the university journal
Security Tools: Nessus, Wireshark, Nmap, Snort, RSA enVision, Splunk
Programming: Python, C, Java, Shell scripting
Cloud and Virtualization: AWS, Azure, VMware, Docker, Kubernetes
Security Protocols: TCP/IP, DNS, SMTP, NTP, HTTPS, SSL/TLS, IPsec
Certifications: Certified Ethical Hacker (CEH), Certified Cloud Security Professional (CCSP)
Professional Memberships: Fellow Member, Information Systems Audit and Control Association (ISACA)
Awards: Microsoft Security Analyst of the Year, 2016
Volunteering: Cybersecurity mentorship program at local community college
Your Name
Cybersecurity Architect
City, Country  •  (123) 456-789  •  [email protected]  •
EXPERIENCE March 2020 - Present
Senior Cybersecurity Engineer
Conducted thorough penetration testing on corporate infrastructure, highlighting potential vulnerabilities. This strategy reduced successful cyber attacks by 30%
Managed the deployment of a cloud-based SIEM solution to detect, prevent and respond to security threats in real-time, improving threat detection rates by 40%
Implemented an optimized identity and access management (IAM) solution leading to a significant reduction in unauthenticated access to sensitive departmental resources
Created robust cybersecurity architecture providing the firm a strong defense against advanced persistent threats (APTs) and zero-day attacks
Formulated and executed threat and vulnerability management activities, resulting in a 35% improvement in patch management and threat response
Resume Worded April 2015 - February 2020
Cybersecurity Engineer
Developed company-wide information security policies in line with PCI DSS guidelines
Led the establishment of enterprise-wide disaster recovery strategies, ensuring system resilience in the event of a catastrophic failure
Coordinated with external auditors and compliance officers to pass all cybersecurity audits
Facebook July 2011 - March 2015
Network Security Engineer
Engineered network security solutions for company infrastructure, resulting in a 20% reduction in network attacks
Assisted in the deployment of cutting-edge firewalls and intrusion detection systems, enhancing the company's defense against cyber threats
Collaborated with the IT team to integrate security considerations in the design and implementation of new systems
Resume Worded Academic Center June 2014
Master of Science - Cybersecurity
Thesis - 'Cybersecurity measures to secure a network infrastructure'
Resume Worded University May 2011
Bachelor of Engineering - Computer Science
Specialization in Network Security.
Awards: Dean's List 2011 (Top 10%)
Cybersecurity: Data Encryption, Intrusion Detection Systems (IDS), Firewalls, SIEM, DLP, Endpoint Security
Programming/Scripting: Python, JavaScript, Shell Scripting, Ruby, C++, Java
Network Security: SSL/TLS, DNSSEC, IPSEC, OSPF, BGP, Network Monitoring Tools
Operating Systems: Linux (Expert), Windows Server (Proficient), MacOS (Intermediate)
Certifications: Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), CompTIA Security+
Publications: Authored 'Building Cyber Resilience: A Practical Guide' published in the International Journal of Security and Resilience.
Membership: Active member of The Networking and Information Technology Research and Development (NITRD) program.
Projects: Developed an automated script to detect network vulnerabilities at leading to 40% improvement in response time.
Your Name
Enterprise Security Architect
City, Country  •  (123) 456-789  •  [email protected]  •
EXPERIENCE February 2023 - Present
Senior Security Engineer
Initiated a strategic plan for cloud security that led to a 25% improvement in the protection of confidential data and applications in the cloud
Aligned security architecture with enterprise architecture, resulting in improved complex system resilience
Conducted penetration testing on internal systems and implemented remediation activities, contributing to a 30% decrease in potential points of exploit
Monitored and updated the company's firewall configurations, resulting in enhanced network security
Deployed solutions for managing security events and information, resulting in a 40% improvement in incident response times
Resume Worded August 2018 - January 2023
Security Engineer
Designed and implemented a thorough disaster recovery process that ensured 99% uptime during several outage occurrences
Managed vulnerability scanning and assessment activities, reducing system vulnerabilities by 20%
Assisted the team in implementing Payment Card Industry Data Security Standard (PCI DSS), strengthening customer data security
Google January 2015 - July 2018
IT Operations Analyst
Contributed to the development and implementation of information security policies as per company protocols
Assisted in identity and access management (IAM) activities, contributing to decreased unauthorized accesses
Participated in audits regarding the company's compliance with information security standards
Resume Worded University January 2018
Master of Computer Science - Cybersecurity
Specialized in IT Security Architecture and Database Security
Resume Worded Institute December 2017
Certified Information System Security Professional (CISSP)
Valid until 2023
Security Systems and Tools: Firewall Administration, Intrusion Detection Systems (IDS), Security Information Event Management (SIEM), Anti-Virus Software, RSA SecurID, Splunk
Security Standards and Protocols: ISO 27001/27002, SSL, IPSec, VPN, NIST, Cisco Security
Programming Languages: Python, Shell, Perl, C/C++, Java, JavaScript, Ruby
Operating Systems: Windows Server, Linux, macOS, UNIX
Certifications: Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM)
Professional Affiliations: Member of the Information Systems Security Association (ISSA)
Conferences Attended: Global Security Exchange (GSX) 2021, Cyber Security & Cloud Expo Global 2021
Additional Training: Attended specialized training in Forensic Investigation and Incident Response

How do I add skills to an Information Security Analyst resume?

Review the job posting closely.

Go through the Information Security Analyst posting you're applying to, and identify hard skills the company is looking for. For example, skills like Cybersecurity, Security and Information Security Management are possible skills. These are skills you should try to include on your resume.

Add industry skills like Network Security and Information Security.

Add other common skills from your industry - such as Vulnerability Management, Security Information and Event Management (SIEM) and ISO 27001 - into your resume if they're relevant.

Add skills into your work experience.

Incorporate skills - like Ethical Hacking, Security Incident Response and Identity & Access Management (IAM) - into your work experience too. This shows hiring managers that you have practical experience with these tools, techniques and skills.

Emphasize your ability to solve problems.

Recruiters want to know that you're the kind of person that can solve new and challenging problems. In your Information Security Analyst resume, highlight projects that involved problems that were technically complex or mattered to the company.

Show evidence of your analytical skills.

Analytical skills involve your ability to break down a problem and come up with effective solutions. On Information Security Analyst resumes, hiring managers want to see evidence of how you analyzed quantitative or qualitative data.

Use the exact job title.

Try to add the exact job title, Information Security Analyst, somewhere into your resume to get past resume screeners. See the infographic for how to do this.

Word Cloud for Information Security Analyst Skills & Keywords

The following word cloud highlights the most popular keywords that appear on Information Security Analyst job descriptions. The bigger the word, the more frequently it shows up on employer's job postings. If you have experience with these keywords, include them on your resume.

Top Information Security Analyst Skills and Keywords to Include On Your Resume

Get your Resume Instantly Checked, For Free

Upload your resume and we'll spot the issues in it before an actual Information Security Analyst recruiter sees it. For free.

Information Security Analyst Resume Templates

Here are examples of proven resumes in related jobs and industries, approved by experienced hiring managers. Use them as inspiration when you're writing your own resume. You can even download and edit the resume template in Google Docs.

Resume Example
Chief Information Officer (CIO) - 1

Resume Example
Chief Information Officer (CIO) - 2

Resume Example
IT Security Manager

Resume Example
Cyber Security Analyst

Resume Example
Cyber Security Engineer

Resume Example
Cyber Security Consultant

Browse Skills from Similar Jobs

Frequently Asked Questions

What skills should you add to an Information Security Analyst resume?

Some effective Information Security Analyst skills you can add to your resume include:

  • Information Security
  • ISO 27001
  • Cybersecurity
  • Security Information and Event Management (SIEM)
  • Information Security Management
  • Network Security
  • Security
  • Vulnerability Management

Target your Resume to a Job Description

While the keywords above are a good indication of what skills you need on your resume, you should try to find additional keywords that are specific to the job. To do this, use the free Targeted Resume tool. It analyzes the job you are applying to and finds the most important keywords you need on your resume.

It is personalized to your resume, and is the best way to ensure your resume will pass the automated resume filters.

Start targeting your resume

© 2024 Resume Worded. All rights reserved.

Get expert insights from hiring managers