Information Security Analyst Resume Examples
Years of Experience
- #1
- #2
- #3
Samantha Li
(123) 456-7890
[email protected]
123 Your Street, Cincinnati, OH 12345
Profile
An Information Security Analyst with five years of professional experience specializing in cybersecurity, vulnerability assessment, and risk management. A strong history of developing and maintaining network security protocols for enterprise organizations. Adept at identifying and mitigating potential security threats.
Professional Experience
Information Security Analyst, Wells Fargo Bank, Cincinnati, OH
May 2018 – Present
- Coordinate with the IT Director and security teams to develop and maintain IT security policies, architecture, and security across the organization, including performing audits of security systems to maintain compliance with standards and protocols
- Lead the development and implementation of security requirements for various IT projects, including system migrations to compliant environments
- Perform analysis on security data and conduct data visualization to create comprehensive technology risk reports for the IT department and senior leadership
Information Security Analyst, TD Bank, Cincinnati, OH
May 2016 – May 2018
- Served as the point of contact for all aspects of information security, including access management, endpoint protection, cloud security, and PCI compliance
- Developed security plans for technology implementations, coordinated with the IT department to create security controls, and performed audits to ensure compliance
Education
Bachelor of Science (B.S.) Computer Science
University of Cincinnati, Cincinnati, OH September 2012 – May 2016
Key Skills
- Cloud Security
- Vulnerability Assessment
- Cisco Products
- PCI Compliance
- Security Audits
Certifications
- Certified Information Systems Security Professional (CISSP), 2021
- CompTIA Security+, 2017
- CompTIA Network+, 2016
Jessica Morrison
(123) 456-7890
[email protected]
123 Your Street, Philadelphia, PA 12345
Profile
A Senior Information Security Analyst with 10+ years of experience within the healthcare industry, specializing in SIEM, cybersecurity, and security assessments. A strong history of leading cloud deployments and security assessments to ensure confidentiality and integrity of patient data for large hospitals and healthcare organizations.
Professional Experience
Information Security Analyst, Penn Medical Center, Philadelphia, PA
October 2016 – Present
- Provide subject matter expertise to project teams for cloud and on-site deployments, including developing system security plans, conducting testing on security controls, and performing vulnerability assessments to ensure HIPAA compliance
- Partner with technology teams to enhance access management protocols and improve the user experience for 500+ employees
- Coordinated with data governance teams to ensure confidentiality of medical records, including leading the implementation of new security protocols
Information Security Analyst, Jefferson University Hospital, Philadelphia, PA
May 2014 – October 2016
- Oversaw all aspects of network security, threat prevention, and incident reporting systems, identified root causes of security threats and intrusions
- Delivered training to 100+ team members on security protocols and best practices, which included creating training materials and assets
Education
Bachelor of Science (B.S.) Computer Science
Drexel University, Philadelphia, PA September 2010 – May 2014
Key Skills
- Cybersecurity
- HIPAA Compliance
- Network Security
- Threat Prevention
- PCI Compliance
Certifications
- Certified Information Systems Auditor (CISA), 2019
- Certified Information Systems Security Professional (CISSP), 2019
- CompTIA Security+, 2014
Jose Ramirez
(123) 456-7890
[email protected]
123 Your Street, New York, NY 12345
Profile
An Information Security Analyst with seven years of professional experience, specializing in cloud security, project management, and technology implementations. A proven track record of coordinating with technical teams and third-party agencies to perform comprehensive security audits and achieve compliance with industry regulations and security standards.
Professional Experience
Information Security Analyst, Advanced Security Consultants, New York, NY
July 2016 – Present
- Deliver information security consulting services to client accounts valued at $600K-$1.3M, conduct vulnerability assessments and security audits of existing protocols, and interface with internal teams and client IT groups to refine security controls and policies
- Develop access management protocols and implement 2-factor authentication to ensure secure access across 500K users for an enterprise customer account
- Create strategy and plans for the implementation of cloud security technology and the migration from outdated legacy systems
Information Security Analyst, Brooklyn IT Consultants, New York, NY
May 2011 – July 2016
- Coordinated with the Senior Security Advisor to deliver IT consulting services to 20+ client businesses and ensure customer success, including penetration testing, disaster recovery planning, and security audits
- Developed and implemented security controls and technology solutions to aid clients in obtaining compliance with industry requirements, including PCI, ISO 27001, and SOX
Education
Bachelor of Science (B.S.) Computer Science
University of Syracuse, Syracuse, CA September 2007 – May 2011
Key Skills
- Information Security
- Penetration Testing
- Access Management
- User Authentication
- Technology Implementation
Certifications
- Certified Information Security Manager (CISM) 2017
- Certified Information Systems Auditor (CISA), 2016
- Certified Information Systems Security Professional (CISSP), 2016
- CompTIA Security+, 2013
- CompTIA Network+, 2011
Common Key Skills and Action Verbs for Information Security Analyst Resumes
To secure interviews during your job search, you need to incorporate key skills and action verbs that match the needs of prospective employers. By tactically integrating keywords from the job description into your resume, you’ll ensure that your document is appropriately optimized for Applicant Tracking Systems (ATS). This strategy will also help differentiate you from the field of applicants and grab the hiring manager’s attention. Be sure to include specific examples of using these skill sets throughout your career, as you want to draw attention to your hands-on experience. Below, you’ll find a list of key skills and action verbs that you may encounter during your job hunt.
Key Skills and Proficiencies | |
---|---|
Access Management | Compliance |
Cloud Security | Cloud Technology |
Cybersecurity | Data Analytics |
Data Analysis | Endpoint Protection |
Firewalls | Information Security |
Information Technology | ISO 27001 |
IT Security | MySQL |
Network Security | PCI Compliance |
Project Management | Python |
Risk Management | Root Cause Analysis |
SDLC | Security Audits |
Security Controls | SIEM |
TCP IP | Top Secret Clearance |
User Authentication | Vulnerability Assessment |
Action Verbs | |
---|---|
Analyzed | Built |
Conducted | Coordinated |
Created | Designed |
Determined | Developed |
Diagnosed | Drove |
Enhanced | Evaluated |
Examined | Identified |
Implemented | Improved |
Led | Managed |
Oversaw | Performed |
Planned | Resolved |
Spearheaded | Supported |
Tested |
Tips for Writing a Better Information Security Analyst Resume
Quantify your information security experience
Incorporating key metrics and monetary figures from your work experience into your bullet points will significantly enhance the impact of your professional achievements. Although it can sometimes be challenging to identify appropriate numbers when dealing with information security, you want to provide specific examples of you creating value for the organizations you work for. For example, if you automated an incident response procedure, you might be able to incorporate data that showcases a cost reduction or increase in response time. Providing specific metrics from your career will also mitigate the risk of your document appearing generic and paint a clearer picture of your experience. Below, you’ll find examples to help you quantify your information security experience on your resume.
Example #1
Good
Identified automation opportunities for the incident response process and provided technical project management during implementation, resulting in over $100K in cost savings.
Bad
Helped to improve the automation of processes for reporting of incidents and supported implementation, which reduced costs substantially
Example #2
Good
Delivered information security consulting services to high-net-worth clients valued at $300K-$1M, which included providing recommendations to improve network security, security controls, and access management to ensure data integrity for over 300K users
Bad
Provided consulting services to aid clients in improving information security for their businesses, which included enhancing security controls and access management for a substantial number of users
Feature your leadership abilities
As an information security analyst, you’ll be providing subject matter expertise to cross-functional teams, clients, and users in a wide range of different environments and settings. Employers want more than just a technical expert. They also want a candidate with strong people management and interpersonal skills, so it’s important to highlight specific examples of your leadership experience throughout your career. Below, you’ll find examples to help you feature your leadership capabilities on your resume.
Example #1
Good
Served as the subject matter expert for project teams and cross-functional groups to ensure data integrity and security during multimillion-dollar cloud migration projects
Bad
Communicated with various groups to respond to security issues, maintained satisfactory working relationships, and supported migration projects
Example #2
Good
Served as the point of contact for all information security functions, created comprehensive reports on security data, attended meetings with technology teams and management to review findings, and provided recommendations to enhance network security
Bad
Interfaced with various teams to respond to information security questions, created reports, delivered findings, and resolved complex problems
How to Align Your Resume With the Job Description
According to the Bureau of Labor Statistics, the average annual salary for information security analysts was $103,590 in 2020. These positions are expected to grow by 33% over the next decade, one of the fastest growth rates of any single occupation. Despite the number of opportunities available, you’ll still face considerable competition over the course of your job hunt.
To secure interviews during your job search, you need to tailor your resume to individual job descriptions. Employers value candidates who have the qualifications and industry expertise to succeed in the role. The best way to demonstrate this is by tactically integrating keywords from the job posting into your professional profile, bullet points, and skills section. This will ensure that your document is fully optimized for the requirements of the initial ATS scan. You’ll also be sending a strong message to hiring managers that you’re the ideal candidate they’ve been looking for. It’s important to avoid simply copying and pasting responsibilities directly from the posting, however, as you want to provide tangible examples of you putting these skill sets into practice throughout your career.
When determining what key terms to prioritize on your resume, you should evaluate the order in which the keywords appear throughout the job posting. Any industry terms you notice within the opening paragraphs are likely being tracked by the Applicant Tracking System (ATS). In addition, if you notice that a keyword is being mentioned more than once, this is another indicator that the employer highly values this particular skill set. Below, you’ll find an example to help you align your resume with the job description.