Information Security Analyst Resume Examples of 2022

Frank headshot

Frank Hackett

Certified Professional Resume Writer (CPRW)

Frank Hackett is a professional resume writer and career consultant with over eight years of experience. As the lead editor at a boutique career consulting firm, Frank developed an innovative approach to resume writing that empowers job seekers to tell their professional stories. His approach involves creating accomplishment-driven documents that balance keyword optimization with personal branding. Frank is a Certified Professional Resume Writer (CPRW) with the Professional Association of Resume Writers and Career Coaches (PAWRCC).

Create a professional resume in minutes for free.

Build Resume

According to the Bureau of Labor Statistics, the average annual salary for information security analysts was $103,590 in 2020. These positions are expected to grow by 33% over the next decade, one of the fastest growth rates of any single occupation. Despite the number of opportunities available, you’ll still face considerable competition over the course of your job hunt. To secure interviews and differentiate yourself from other applicants, you’ll need to build a strong resume highlighting your career achievements and industry expertise. Below, you’ll find three examples to help you accelerate your job search.

Downloadable Resume Examples

Example #1
Information-Security-Analyst_Example-1.pdf

Example #1

Example #2
Information-Security-Analyst_Example-2.pdf

Example #2

Example #3
Information-Security-Analyst_Example-3.pdf

Example #3

Information Security Analyst Resume Examples

Years of Experience
  • Example #1 #1
  • Example #2 #2
  • Example #3 #3

Samantha Li 
(123) 456-7890
[email protected]
123 Your Street, Cincinnati, OH 12345

Profile

An Information Security Analyst with five years of professional experience specializing in cybersecurity, vulnerability assessment, and risk management. A strong history of developing and maintaining network security protocols for enterprise organizations. Adept at identifying and mitigating potential security threats.

Professional Experience

Information Security Analyst, Wells Fargo Bank, Cincinnati, OH
May 2018 – Present

  • Coordinate with the IT Director and security teams to develop and maintain IT security policies, architecture, and security across the organization, including performing audits of security systems to maintain compliance with standards and protocols
  • Lead the development and implementation of security requirements for various IT projects, including system migrations to compliant environments
  • Perform analysis on security data and conduct data visualization to create comprehensive technology risk reports for the IT department and senior leadership

Information Security Analyst, TD Bank, Cincinnati, OH
May 2016 – May 2018

  • Served as the point of contact for all aspects of information security, including access management, endpoint protection, cloud security, and PCI compliance
  • Developed security plans for technology implementations, coordinated with the IT department to create security controls, and performed audits to ensure compliance

Education

Bachelor of Science (B.S.) Computer Science
University of Cincinnati, Cincinnati, OH  September 2012 – May 2016

Key Skills

  • Cloud Security
  • Vulnerability Assessment
  • Cisco Products
  • PCI Compliance
  • Security Audits

Certifications

  • Certified Information Systems Security Professional (CISSP), 2021
  • CompTIA Security+, 2017
  • CompTIA Network+, 2016

Jessica Morrison
(123) 456-7890
[email protected]
123 Your Street, Philadelphia, PA 12345

Profile

A Senior Information Security Analyst with 10+ years of experience within the healthcare industry,  specializing in SIEM, cybersecurity, and security assessments. A strong history of leading cloud deployments and security assessments to ensure confidentiality and integrity of patient data for large hospitals and healthcare organizations.

Professional Experience

Information Security Analyst, Penn Medical Center, Philadelphia, PA
October 2016 – Present

  • Provide subject matter expertise to project teams for cloud and on-site deployments, including developing system security plans, conducting testing on security controls, and performing vulnerability assessments to ensure HIPAA compliance
  • Partner with technology teams to enhance access management protocols and improve the user experience for 500+ employees
  • Coordinated with data governance teams to ensure confidentiality of medical records, including leading the implementation of new security protocols

Information Security Analyst, Jefferson University Hospital, Philadelphia, PA
May 2014 – October 2016

  • Oversaw all aspects of network security, threat prevention, and incident reporting systems, identified root causes of security threats and intrusions
  • Delivered training to 100+ team members on security protocols and best practices, which included creating training materials and assets

Education

Bachelor of Science (B.S.) Computer Science
Drexel University, Philadelphia, PA September 2010 – May 2014

Key Skills

  • Cybersecurity
  • HIPAA Compliance
  • Network Security
  • Threat Prevention
  • PCI Compliance

Certifications

  • Certified Information Systems Auditor (CISA), 2019
  • Certified Information Systems Security Professional (CISSP), 2019
  • CompTIA Security+, 2014

Jose Ramirez
(123) 456-7890
[email protected]
123 Your Street, New York, NY  12345

Profile

An Information Security Analyst with seven years of professional experience, specializing in cloud security, project management, and technology implementations. A proven track record of coordinating with technical teams and third-party agencies to perform comprehensive security audits and achieve compliance with industry regulations and security standards.

Professional Experience

Information Security Analyst, Advanced Security Consultants, New York, NY
July 2016 – Present

  • Deliver information security consulting services to client accounts valued at $600K-$1.3M, conduct vulnerability assessments and security audits of existing protocols, and interface with internal teams and client IT groups to refine security controls and policies
  • Develop access management protocols and implement 2-factor authentication to ensure secure access across 500K users for an enterprise customer account
  • Create strategy and plans for the implementation of cloud security technology and the migration from outdated legacy systems

Information Security Analyst, Brooklyn IT Consultants, New York, NY
May 2011 – July 2016

  • Coordinated with the Senior Security Advisor to deliver IT consulting services to 20+ client businesses and ensure customer success, including penetration testing, disaster recovery planning, and security audits
  • Developed and implemented security controls and technology solutions to aid clients in obtaining compliance with industry requirements, including PCI, ISO 27001, and SOX

Education

Bachelor of Science (B.S.) Computer Science
University of Syracuse, Syracuse, CA  September 2007 – May 2011

Key Skills

  • Information Security
  • Penetration Testing
  • Access Management
  • User Authentication
  • Technology Implementation

Certifications

  • Certified Information Security Manager (CISM) 2017
  • Certified Information Systems Auditor (CISA), 2016
  • Certified Information Systems Security Professional (CISSP), 2016
  • CompTIA Security+, 2013
  • CompTIA Network+, 2011

Common Key Skills and Action Verbs for Information Security Analyst Resumes

To secure interviews during your job search, you need to incorporate key skills and action verbs that match the needs of prospective employers. By tactically integrating keywords from the job description into your resume, you’ll ensure that your document is appropriately optimized for Applicant Tracking Systems (ATS). This strategy will also help differentiate you from the field of applicants and grab the hiring manager’s attention. Be sure to include specific examples of using these skill sets throughout your career, as you want to draw attention to your hands-on experience. Below, you’ll find a list of key skills and action verbs that you may encounter during your job hunt.

Key Skills and Proficiencies
Access Management Compliance
Cloud Security Cloud Technology
Cybersecurity Data Analytics
Data Analysis Endpoint Protection
Firewalls Information Security
Information Technology ISO 27001
IT Security MySQL
Network Security PCI Compliance
Project Management Python
Risk Management Root Cause Analysis
SDLC Security Audits
Security Controls SIEM
TCP IP Top Secret Clearance
User Authentication Vulnerability Assessment
Action Verbs
Analyzed Built
Conducted Coordinated
Created Designed
Determined Developed
Diagnosed Drove
Enhanced Evaluated
Examined Identified
Implemented Improved
Led Managed
Oversaw Performed
Planned Resolved
Spearheaded Supported
Tested  

Tips for Writing a Better Information Security Analyst Resume

Quantify your information security experience

Incorporating key metrics and monetary figures from your work experience into your bullet points will significantly enhance the impact of your professional achievements. Although it can sometimes be challenging to identify appropriate numbers when dealing with information security, you want to provide specific examples of you creating value for the organizations you work for. For example, if you automated an incident response procedure, you might be able to incorporate data that showcases a cost reduction or increase in response time. Providing specific metrics from your career will also mitigate the risk of your document appearing generic and paint a clearer picture of your experience. Below, you’ll find examples to help you quantify your information security experience on your resume.

Example #1

Good


Identified automation opportunities for the incident response process and provided technical project management during implementation, resulting in over $100K in cost savings.

Bad


Helped to improve the automation of processes for reporting of incidents and supported implementation, which reduced costs substantially

Example #2

Good


Delivered information security consulting services to high-net-worth clients valued at $300K-$1M, which included providing recommendations to improve network security, security controls, and access management to ensure data integrity for over 300K users

Bad


Provided consulting services to aid clients in improving information security for their businesses, which included enhancing security controls and access management for a substantial number of users

Feature your leadership abilities

As an information security analyst, you’ll be providing subject matter expertise to cross-functional teams, clients, and users in a wide range of different environments and settings. Employers want more than just a technical expert. They also want a candidate with strong people management and interpersonal skills, so it’s important to highlight specific examples of your leadership experience throughout your career. Below, you’ll find examples to help you feature your leadership capabilities on your resume.

Example #1

Good


Served as the subject matter expert for project teams and cross-functional groups to ensure data integrity and security during multimillion-dollar cloud migration projects

Bad


Communicated with various groups to respond to security issues, maintained satisfactory working relationships, and supported migration projects

Example #2

Good


Served as the point of contact for all information security functions, created comprehensive reports on security data, attended meetings with technology teams and management to review findings, and provided recommendations to enhance network security

Bad


Interfaced with various teams to respond to information security questions, created reports, delivered findings, and resolved complex problems

How to Align Your Resume With the Job Description

To secure interviews during your job search, you need to tailor your resume to individual job descriptions. Employers value candidates who have the qualifications and industry expertise to succeed in the role. The best way to demonstrate this is by tactically integrating keywords from the job posting into your professional profile, bullet points, and skills section. This will ensure that your document is fully optimized for the requirements of the initial ATS scan. You’ll also be sending a strong message to hiring managers that you’re the ideal candidate they’ve been looking for. It’s important to avoid simply copying and pasting responsibilities directly from the posting, however, as you want to provide tangible examples of you putting these skill sets into practice throughout your career.

When determining what key terms to prioritize on your resume, you should evaluate the order in which the keywords appear throughout the job posting. Any industry terms you notice within the opening paragraphs are likely being tracked by the Applicant Tracking System (ATS). In addition, if you notice that a keyword is being mentioned more than once, this is another indicator that the employer highly values this particular skill set. Below, you’ll find an example to help you align your resume with the job description.

Information Security Job Description Example


XYZ, Inc. is a leading information security consulting firm named one of Boston’s best places to work. Put your cybersecurity skills to the test in a fast-paced team environment. We’re seeking an experienced information security analyst to join our team who excels in cloud security and vulnerability assessments. Our company prides itself on our reputation for aiding our clients in achieving PCI and ISO 27001 compliance.

Responsibilities:

  • Conduct audits of security controls, network security, and access management protocols for client businesses, conduct root cause analysis of security risks, provide recommendations for threat mitigation
  • Coordinate with external IT security teams to perform security audits for client organizations and identify enhancements for security protocols

Qualifications:

  • Bachelor’s degree in Computer Science required
  • 4-5 years of experience as an information security analyst preferred
  • Certified Information Systems Security Professional (CISSP) required
  • CompTIA Security+ certification required
  • Expertise in cloud security and endpoint protection

According to the job description, the ideal job applicant should have the following qualities and/or experience:

  • Information Security
  • Information Security Analyst
  • IT Security
  • Cloud Security
  • Cybersecurity
  • Vulnerability Assessment
  • Endpoint Protection
  • PCI
  • ISO 27001
  • Security Controls
  • Network Security
  • Access Management
  • Root Cause Analysis
  • Security Audits
  • Certified Information Systems Security Professional (CISSP)
  • Threat Mitigation
  • CompTIA Security+

Next, take what you highlighted from the job description and include your experience and skills that match. Below is an example of how to incorporate them in your resume to your advantage:

Information Security Analyst Work Experience Example


Profile

 

An Information Security Analyst with five years of cybersecurity experience, specializing in network security, root cause analysis, threat mitigation, and cloud security. A proven track record of performing comprehensive security audits to reduce security risks for client organizations. 

Information Security Analyst

New England Security Consultants, October 2016 – Present

  • Provide information security consulting to clients, conduct vulnerability assessments, perform testing on security controls, and deliver recommendations to aid businesses in maintaining compliance with PCI and ISO 27001 standards
  • Serve as the point of contact of IT security functions, including access management, endpoint protection, and cloud security

 

Certifications

  • Certified Information Systems Security Professional (CISSP), 2021
  • CompTIA Security+, 2016