Information Security Resume Sample

The responsibilities of an information security engineer include monitoring network activity for threats, analyzing the impact of threats on the system, and identifying potential problems. Duties also include planning, configuring, implementing, and auditing security measures in computer networks. The top skills for this position are customer service skills, problem-solving/decision-making skills, communication skills, technical knowledge/experience with networking systems/security protocols/software programs. A bachelor’s degree in engineering is required for this position along with experience working as a computer support technician or network administrator.

The Best Information Security Resume Samples

These are some examples of accomplishments we have handpicked from real Information Security resumes for your reference.

Information Security Officer

  • Performs and reviews monthly vulnerability scanning from the Internet and the Local Area Network interprets the results and validates potential exposures.
  • Performs analysis of logs from several systems to identify unexpected or malicious activity.
  • Customizes intrusion detection prevention systems to maximize the value of event logs and minimize the number of false positives.
  • Researched, implemented, and updated information security standards of the PC’s on-campus network.
  • Promoted awareness and education of information security issues to all users with a focus on secure coding practices.

Information Security Officer

  • Managed Technology Security Officer (TSO) functional role activities that support specific Line of Business, suites of applications, technology risk assessments, consulting, risk remediation projects, penetration/database/vulnerability/code testing reviews.
  • TSO team administrative management including semi-annual performance reviews of ING US-IT Technology Security Officers located in multiple onshore domestic facilities supporting multiple Line of Business units.
  • Managed offshore technology operational support resources contracted to process elevated and privileged access to systems.
  • Provided leadership to address issues identified in software security testing and secure coding practices.
  • The evaluated need for system enhancements using risk management techniques.

Information Security Officer

  • Acted as the Information Security Officer for the Risk Management organization.
  • Oversaw the implementation of the Global Information Security (GIS) program across Corporate Center businesses, with approximately 55,000 employees.
  • These reports cover the state of Information Security both within Citi and external to Citi.
  • Within the Vulnerability Assessment working group, I was able to partner with a separate team to address and resolve long-standing issues that had no prior movement.
  • Trained users on techniques preventing unauthorized access to systems.

Information Security Officer

  • Conduct audits and floor walks to ensure compliance with local and global policies/procedures.
  • Maintain procedures and policies to ensure specific details are established.
  • Work for hand and hand with support functions such as IT and Facilities to ensure compliance.
  • Perform risk assessments for engagements and support functions throughout the center.
  • Preserved assets by completing a comprehensive threat assessment report in order to safeguard the confidentiality, integrity, and availability of various public and private computer systems.

Information Security Officer

  • Redesigned WAN infrastructure to facilitate Disaster Recovery initiatives while maintaining the highest levels of security and reduction in communications costs providing a significant return on investment.
  • Continued ongoing development, enforcement, and training of the Credit Union’s Information Security Program consistent with changes regarding current threats, regulations, products, etc.
  • Developed the Credit Union’s Vendor Management Program and provide ongoing management/oversight.
  • Co-developed and currently coordinate the Credit Union’s Enterprise Risk Management Program.
  • Advised executive management regarding current and future threats to networks and computer systems after completing an exhaustive examination of the security holes existing within all company systems.

Information Security Officer

  • Assist bank employees with the operation of the banks’ technology systems and resources as necessary.
  • Provide technical training to bank staff and management as necessary including all cyber security training.
  • Deliver and execute the short and long-term visions of the bank’s technology needs and goals.
  • Develop and execute plans for the bank’s network, telecommunications, hardware, and enterprise software requirements according to business needs.
  • Managed complex network security issues. Developed policies and procedures that were required in compliance with federal regulations related to IT security.

Information Security Officer

  • Provided guidance to leadership, peers, and business operations on the overall authority to operate (ATO) effort for a moderately rated web application and corresponding internal systems.
  • Collected control evidence for MSLA’s ATO VA system accreditation effort both individually and with other business process owners.
  • Correlated VA Handbook 6500 and NIST guidance to provide a roadmap for system accreditation amongst all the various teams.
  • Reviewed, provided guidance, and directed remediation efforts based on web application vulnerability and Nessus scan data for local systems and Amazon AWS applications and instances.
  • Established access control strategy for mobile devices, workstations, servers, applications, databases, network devices, network shares/resources, web servers/content hosted by corporations; monitored for potential vulnerabilities.

Information Security Officer

  • Ran several external audits and penetration tests, implemented Single Sign-On.
  • Developed an internal logging database for monitoring PHI access from various systems and automated report generation.
  • Setup a Nessus server that feeds a Nagios server for monitoring and probes for vulnerabilities on windows/Linux servers.
  • Recognized by management for contribution to team efforts that produced a 59% increase in product sales.
  • Earned respect and recognition from peers as a result of the successful discovery of financial fraud committed by a peer.

Information Security Officer

  • Created and implemented the information security department policies and procedures.
  • Developed and delivered security awareness training to all employees.
  • Created and maintained user accounts and security access to Florida’s mainframe and intranet systems.
  • Asked and answered questions in an online forum that guided other users through complex repair procedures.
  • Expanded the social media presence for an organization, resulting in an increased following by 33%.

Information Security Officer

  • Provide day-to-day operations of enterprise security consulting, in the area of information risk and vulnerability management, audit and compliance, security awareness, and training.
  • Review upcoming legislation and provide the operational impact of legislation on the agency.
  • Research, plan, and assess information risk and implement new security initiatives, including, but not limited to, developing business cases for security investments.
  • Studiously developed policy for use of social media during corporate-sponsored sporting events.
  • Reviewed real-time and historical security events to detect affronts to data systems, including breaches of internal policies and state or federal regulations.

Information Security Officer

  • Develop and administer the system and information ownership; information and data classification guidelines; policies, standards, and procedures.
  • Work closely with DevOps and Operations to design, build and operate security tools within the public cloud infrastructure.
  • Identify and address exposures to accidental or intentional destruction, disclosure, modification, or interruption of information that may cause serious financial and/or information loss to Trintech and/or customers.
  • Analyzed information systems transactions to detect threats to the security or integrity of operations or assets, including attempts at unauthorized access or denial of service.
  • Prepared plans for inspection of information systems for compliance with privacy standards, regulatory requirements, and company policies.

Information Security Officer

  • Manage the information security function in accordance with established guidelines, while reporting to the Executive Director of Advancement Business Services and Chief Security Officer of UH.
  • Maintain information security standards and procedures in compliance with state information security and risk management policies, standards, and guidelines.
  • Review compliance with the information security policy and associated procedures.
  • Established primary network defenses for all Internet-based connections; implemented secondary system procedures for review of all incoming/outgoing traffic on servers using firewalls.
  • Trained staff on processes involving information security incident response, incident investigation, and event analysis by conducting workshops.

Wrap Up

Resumes are a crucial aspect of any job search. In order to make a good first impression, it is important that your resume be formatted and written professionally.

Hope these samples gave you an idea of what your resume should look like and some tips on how to make sure that your resume stands out from the rest.

Leave a Comment