Information Technology Security Specialist

Information Technology Security Specialist Resume Keywords and Skills (Hard Skills)

Here are the keywords and skills that appear most frequently on recent Information Technology Security Specialist job postings. In other words, these are the most sought after skills by recruiters and hiring managers. Go to Sample Templates ↓ below to see how to include them on your resume.

Remember that every job is different. Instead of including all keywords on your resume, identify those that are most relevant to the job you're applying to. Use the free Targeted Resume tool to help with this.

Choose a category
  • Information Security
  • Cybersecurity
  • Network Security
  • Security
  • Vulnerability Assessment
  • Active Directory
  • Information Technology
  •  Find out what your resume's missing
  • Information Security Management
  • Firewalls
  • System Administration
  • Penetration Testing
  • Disaster Recovery
  • Incident Response
  • Splunk
  • Linux
  • Security Information and Event Management (SIEM)
  • Vulnerability Scanning
  • Networking
  • Vulnerability Management
  • Windows Server

  •   Show full list

Resume Skills: Programming

Resume Skills: Security & Compliance

Resume Skills: Operating Systems

Resume Skills: Networking

Resume Skills: Software & Tools

Resume Skills: Security Expertise

Resume Skills: Cybersecurity Tools

Resume Skills: Systems & Tools

  Does your resume contain all the right skills? Paste in your resume in the AI Resume Scan ↓ section below and get an instant score.

Compare Your Resume To These Information Technology Security Specialist Skills (ATS Scan)

Paste your resume below and our AI will identify which keywords are missing from your resume from the list above (and what you need to include). Including the right keywords will help you get past Applicant Tracking Systems (i.e. resume screeners) which may scan your resume for keywords to see if you're a match for the job.

Sample Information Technology Security Specialist Resume Examples: How To Include These Skills

Add keywords directly into your resume's work experiences, education or Skills section, like we've shown in the examples below. Use the examples below as inspiration.

Choose a template
Your Name
Information Technology Security Specialist
City, Country  •  (123) 456-789  •  [email protected]  •
Resume Worded August 2020 - Present
Senior Information Technology Security Specialist
Defined, developed, and implemented enterprise-wide security framework resulting in robust Network Security, reducing potential threats by 45%
Enhanced Information Technology security posture by conducting comprehensive Vulnerability Assessment, mitigating risks by 60%
Led Disaster Recovery operations, significantly reducing downtime and ensuring 99.9% availability during critical incidents
Championed the use of Splunk for improved Security Information and Event Management (SIEM), facilitating quicker incident responses and recovery
Implemented automated Vulnerability Scanning processes, increasing security efficiency by 55% and saving an estimated 15 hours per week
IBM January 2018 - July 2020
Information Technology Security Analyst
Mitigated security breaches by 50% by performing rigorous penetration testing measures on our platforms and infrastructure
Improved incident response time by 35% through strategic use of advanced Linux-based server monitoring tools
Strengthened security infrastructure by deploying state-of-the-art firewalls and developing stringent disaster recovery measures
Microsoft March 2014 - December 2017
IT Support Specialist
Reduced customer support issues by 65% through proficient handling of Windows Server related issues and queries
Maintained Active Directory services, ensuring zero downtime and thereby increasing user satisfaction by 89%
Resume Worded Institute August 2016
Master of Science in Cyber Security
Specialized in Network Security, Web-based Security
Resume Worded University May 2014
Bachelor of Technology - Information Technology
Honors: Graduated Cum Laude, Dean's List (Top 10%)
Security & Compliance: Risk Assessments, Vulnerability Assessments, PCI DSS, ISO27001, Cybersecurity Frameworks (NIST, MITRE ATT&CK)
Operating Systems: Windows Server, Unix, Linux, MacOS
Networking: TCP/IP, Subnetting, VLANs, Cisco IOS, Firewalls (Cisco, Juniper)
Software & Tools: WireShark, Nessus, Azure, AWS, RSA Archer, Splunk, ELK Stack, Active Directory
Certifications: Certified Information Systems Security Professional (CISSP), Cisco Certified Network Associate (CCNA), Certified Ethical Hacker (CEH)
Volunteering: Offered digital education classes for the elderly at local community center
Leadership: Team Lead in ‘Cyber Security Club’ at Resume Worded University, led team in winning state-wide ‘Hackathon’ in 2013
Projects: Developed 'PhishBlock', a tool for detecting and blocking phishing scams, as part of final semester university project
Your Name
Cybersecurity Analyst
City, Country  •  (123) 456-789  •  [email protected]  •
EXPERIENCE July 2018 - Present
Senior Cybersecurity Analyst
Directed a team to prevent cyber threats, reducing security events by 65% through robust cybersecurity measures
Streamlined vulnerability management process, mitigating security risks by 70% and ensuring a solid cybersecurity posture
Developed cybersecurity protocols for disaster recovery, decreasing system recovery time by 40% and maintaining 100% data integrity
Instituted use of SIEM systems for effective incident management, reducing the number of security incidents by 86%
Boosted cybersecurity awareness across the organization, resulting in a 55% decrease in user-related security incidents
Amazon Web Services January 2015 - June 2018
Information Security Specialist
Executed regular vulnerability scans resulting in 30% rise in the detection of potential security breaches
Used advanced firewall technology to enhance system security, reducing potential attack vectors by 80%
Boosted system defense capabilities by taking strategic steps in penetrate testing, reducing successful hacking attempts by 60%
Cisco System Inc. September 2012 - December 2014
Network Support Specialist
Enhanced network productivity by executing innovative networking solutions handling both software and hardware issues
Planned and implemented strategic network upgrades, enhancing overall network security and efficiency by 30%
Increased satisfaction level by 80% by resolving escalated customer issues promptly and efficiently
Resume Worded Institute June 2016
Certification in Ethical Hacking (CEH)
Part-time, during tenure at Amazon Web Services
Resume Worded University August 2012
Master of Science - Cybersecurity
Award: Cyber Defense Competition Winner (National level)
Security Expertise: Network Security, Cryptography, Cloud Security, End-point Security, Web Application Security, Risk Assessment
Cybersecurity Tools: Wireshark, Nessus, Snort, Metasploit, OpenVAS, AlienVault
Programming & Scripting: Python, Bash, Perl, PowerShell, SQL, Java
Operating Systems: Linux, Windows, MacOS, iOS, Android
Certifications: Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP)
Leadership & Volunteering: Cybersecurity Mentor for Women in Tech Initiative, Resume Worded Cyber Sleuths Club (Club President, 2016-2018)
Projects: Established a multi-layered cybersecurity system for an ecommerce giant, safeguarding financial data of 500,000+ users
Publications: Author of 'Securing the Digital Frontier' - a comprehensive guide to understanding and mitigating cybersecurity threats
Your Name
Security Systems Engineer
City, Country  •  (123) 456-789  •  [email protected]  •
Resume Worded December 2014 - Present
Principal Security Systems Engineer
Engineered information security solutions resulting in 70% reduction in data breaches
Streamlined the usage of Active Directory services, saving approximately 18 hours per week on system administration tasks
Transformed our disaster recovery strategy, ensuring 100% system availability, even in high-intensity & critical scenarios
Introduced Splunk for SIEM, enabling quicker incident handling and reducing response time by 40%
Formulated and brought into action a robust vulnerability management system leading to improved Cybersecurity.
Accenture July 2012 - November 2014
Security Consultant
Boosted client's security posture by implementing a rigorous penetration testing process, reducing system vulnerabilities by 50%
Controlled potential data leaks by introducing Linux-based security measures, leading to a 68% reduction in data breaches
Implemented advanced firewall measures to proactively defend the operational infrastructure reducing attacks vectors by 73%
HP Enterprise Services November 2010 - June 2012
Network Engineer
Enabled smooth and reliable connectivity solutions, increasing network performance by 60%
Advanced network security by addressing network vulnerabilities and deploying effective measures, reducing breaches by 32%
Triggered instant troubleshoot measures for network issues, improving service availability by 40%
Resume Worded University June 2008
Master of Science in Information Security
Thesis: 'Innovative Solutions in Network Infrastructure Security'
Resume Worded University May 2006
Bachelor of Science in Computer Engineering
Focus on Network Architecture and Design
Recipient of the Academic Excellence Award in Computer Engineering
Systems & Tools: Linux, Palo Alto Networks, Cisco ISE, Fortinet, FireEye, CyberArk, Ansible
Programming: Python, Java, PowerShell, Bash, C/C++, Perl
Networking: TCP/IP, Ethernet, Firewalls, Intrusion Detection Systems, Network Architecture & Design
Certifications: CISSP - Certified Information Systems Security Professional (2015), CCSP - Certified Cloud Security Professional (2017)
Professional Development: Attended annual RSA Conference on cybersecurity practices and trends (2016-2020)
Projects: Lead the design and implementation of a secure network infrastructure for a multinational corporation

How do I add skills to an Information Technology Security Specialist resume?

Review the job posting closely.

Go through the Information Technology Security Specialist posting you're applying to, and identify hard skills the company is looking for. For example, skills like Network Security, Active Directory and Information Security are possible skills. These are skills you should try to include on your resume.

Add industry skills like Information Technology and Cybersecurity.

Add other common skills from your industry - such as Information Security Management, Security and Vulnerability Assessment - into your resume if they're relevant.

Add skills into your work experience.

Incorporate skills - like Vulnerability Management, Vulnerability Scanning and Firewalls - into your work experience too. This shows hiring managers that you have practical experience with these tools, techniques and skills.

Highlight any software engineering or development experience.

Programming and software development are common skill sets for Information Technology Security Specialist roles, so try to highlight related accomplishments in your summary, work experience or skills sections.

Show how you have strong attention to detail.

A good Information Technology Security Specialist has strong attention to detail, so try to include examples of where you handled complex projects or processes.

Use the exact job title.

Try to add the exact job title, Information Technology Security Specialist, somewhere into your resume to get past resume screeners. See the infographic for how to do this.

Word Cloud for Information Technology Security Specialist Skills & Keywords

The following word cloud highlights the most popular keywords that appear on Information Technology Security Specialist job descriptions. The bigger the word, the more frequently it shows up on employer's job postings. If you have experience with these keywords, include them on your resume.

Top Information Technology Security Specialist Skills and Keywords to Include On Your Resume

Get your Resume Instantly Checked, For Free

Upload your resume and we'll spot the issues in it before an actual Information Technology Security Specialist recruiter sees it. For free.

Information Technology Security Specialist Resume Templates

Here are examples of proven resumes in related jobs and industries, approved by experienced hiring managers. Use them as inspiration when you're writing your own resume. You can even download and edit the resume template in Google Docs.

Resume Example
Chief Information Officer (CIO) - 1

Resume Example
Chief Information Officer (CIO) - 2

Resume Example
IT Security Manager

Resume Example
Cyber Security Analyst

Resume Example
Cyber Security Engineer

Resume Example
Cyber Security Consultant

Browse Skills from Similar Jobs

Frequently Asked Questions

What skills do hiring managers want to see on an Information Technology Security Specialist resume?

The most common skills and keywords we found on Information Technology Security Specialist resumes and job postings were Information Security, Cybersecurity, Network Security, Security, Vulnerability Assessment, Active Directory, Information Technology and Information Security Management.

Skills like Penetration Testing, Vulnerability Scanning, Vulnerability Management, Security Information and Event Management (SIEM) and Firewalls also appeared on related job postings.

Target your Resume to a Job Description

While the keywords above are a good indication of what skills you need on your resume, you should try to find additional keywords that are specific to the job. To do this, use the free Targeted Resume tool. It analyzes the job you are applying to and finds the most important keywords you need on your resume.

It is personalized to your resume, and is the best way to ensure your resume will pass the automated resume filters.

Start targeting your resume

© 2024 Resume Worded. All rights reserved.

Get expert insights from hiring managers