Information Security Specialist Resume Samples

HIGH QUALITY

The best examples from thousands of real-world resumes

EXPERT APPROVED

Handpicked by resume experts based on rigorous standards

DIVERSE EXAMPLES

Tailored for various backgrounds and experience levels

Information Security Specialists ensure the security of data and prevent security breaches. Typical resume samples for this job highlight duties like strengthening information systems, running tests, developing network line defense, preventing unauthorized access, and detecting abnormal activity. A successful resume example for Information Security Specialist showcases the following qualities: data protection expertise, problem solving orientation, fast thinking, attention to details, communication, and teamwork. Successful candidates hold a Bachelor's Degree in information technology or computer science.

Want 2-3x more interviews (guaranteed)? Get a Professional Resume Rewrite from ZipJob

1

Senior Information Security Specialist

Led 7 technicians in securing an $8.5M network hosting multiple classified domains providing connectivity for 1000 international personnel.

  • Directed bi-weekly internal network security scans and assessments to minimize and/or eliminate known vulnerabilities on 1,100 personal computers.
  • Configured and distributed corporate level-directed software security upgrades using automated network utilities.
  • Maintained and created custom signatures for multiple host and network protection tools
  • Performed password complexity checks to ensure compliance with security standards, and implemented an in house built host data collection tool to identify anomalous activity.
Candidate Info
9
years in
workforce
6
years
at this job
BS
Information Systems Security
2

Information Security Specialist

Bolstered security efforts by providing awareness training to new employees/managers.

  • Ensured secure, robust infrastructure systems, including DNS, email, VPN, wireless networks, firewalls, & enterprise authentication, by performing efficient troubleshooting.
  • Reduced downtime by remaining on-call 24/7 and quickly responding to emergencies.
  • Strengthened vendor relationships by effectively managing problems, assisting with escalations, and developing resolutions that promoted loyalty and collaboration.
Candidate Info
15
years in
workforce
6
years
at this job
BA
Business Administration
3

Information Security Specialist, Division of Resolutions and Receiverships

Established Information Technology (IT) budget estimates for strategic planning by upper management.

  • Performed impact analysis for software project feasibility
  • Supervised security staff (including contractors)
  • Project Manager for IT security support contracts (budgets exceeded $1.5 million)
  • Liaison for all audits - Office of the Inspector General (OIG), Government Accountability Office (GAO), and those conducted by the risk management staff
  • Developed the first set of standards for design of security elements in software applications
  • Prepared and delivered high-level security briefings for various user groups and upper management
Candidate Info
13
years in
workforce
8
years
at this job
BA
Jurisprudence
4

Senior Electronic Information Security Specialist

Responsible for the day-to-day operations for Information Security at the customer site. Interacted daily with customer to consult on a wide variety of technical issues involving Windows NT, UNIX, Firewall evaluation, Virus Detection, Security Investigations, removal of sensitive equipment from the site, etc.

  • Responsible for Information Security Engineering in a networked environment using IBM […] SUN and PC systems.
  • Supported all facets of operations to include physical security, product production, communications security, personnel security, software upgrades, etc.
  • Provided technical support and analysis of current and proposed system architectures, and security capabilities.
  • Evaluated new security products and security audits. Responsible for security audits, configuration controls of security systems and as required, design security for current information systems.
  • Led a team of three junior Information Security Specialists via delegation of duties and daily guidance. Monitored local system usage and audit trails. Responsible for reviewing proposals for any additions, modifications or deletions of security access information.
  • Assisted with IC&T preparation activities and tests for all involved sites.
Candidate Info
12
years in
workforce
3
years
at this job
HS
High School Diploma
BA
Computer Science
MS
Information Security Management
5

Information Security Specialist

Expertly coordinated, designed and implemented monthly vulnerability scanning for [company name] (ABA-20) and remediation utilizing various scanning tools such as McAfee Vulnerability Manager, Nessus, AppDetective, and Acunetix Web Scanner

  • Managed processes for scanning production Linux, HP-UX, Windows 2003 & 2008 servers, Windows XP workstations, and Oracle and SQL 2005 databases
  • Coordinated and responded to Cyber Security Management Center (CSMC) Security Incidents for FAA (ABA-20)
  • Achieved Memo of Appreciation award from FAA ABA-20 Chief Information Officer for superior support in FY11 contributing to meeting FY11 Security and Privacy Business Plan Goals
  • Credited with the FAA ABA Security Dashboard consistently outplacing other lines of business due to excellent incident response and reporting capabilities
Candidate Info
21
years in
workforce
5
years
at this job
BS
Electrical Engineering
6

Information Security Specialist

Responsible for the security of over 3,500 hosts

  • Maintained the confidentiality, integrity, and availability of information stored on 15 servers
  • Trained over 1,000 users on the importance of information security
  • Supervised the certification and accreditation process for over 2,500 circuits
  • Directly responsible for the instruction, supervision, and evaluation of 4 personnel
  • Established a newsletter program informing employees of information security related matters and prevention
Candidate Info
6
years in
workforce
6
years
at this job
AS
Computer Programming
7

Information Security Specialist / User Access Provisioning

Cease and investigate unauthorized access, use, disclosure, disruption, modification, or destruction by identifying, researching, and addressing vulnerabilities in areas of information systems and network security. Perform role-based access control (RBAC) of user creation, maintenance, and deactivation to directories or applications. Provide troubleshooting for incidents supporting user access.

  • Created standardized operating (SOPs) practices and procedures that ensured audit compliance and standard levels of agreement (SLA).
  • Obtained required approvals before granting user access to an application or data.
  • Beta tested software and reported results to architects ensuring smoother roll out.
  • Selected to train team mates or individual users on new or modified processes and procedures by demonstrating ability to learn and apply new knowledge quickly and to explain complex technical issues in a non-technical, easy to understand manner.
  • Selected as administrator to create roles, grant access, and troubleshoot incidents by demonstrating extensive knowledge of application.
  • Participated in maintenance and review of Disaster Recovery Plan as it related to Information Security that solidified role in Disaster Recovery Plan.
  • Kept compliant with healthcare regulations that protected company from litigation and ensured client discretion.
Candidate Info
21
years in
workforce
5
years
at this job
BS
Telecommunications Management
BS
Information Systems Management
8

Information Security Specialist

  • Managed the classified and unclassified LLNL Public Key Infrastructure (PKI), including its Registration Authority (RA)
  • Prepared and executed Security Test and Evaluation (ST&E) plans for the 2009/2010 Certification and Accreditation (C&A) of unclassified LLNL information systems.
  • Evaluated security-significant changes to accredited information systems on an ongoing basis, and recommended safeguards or enhancements that maintained or improved the laboratory's security posture.
  • Periodically audited the effectiveness of NIST 800-53 security controls implemented within the laboratory, ensuring FISMA baseline requirements were met or exceeded.
  • Developed and reviewed LLNL unclassified cyber security policy and guidelines, and provided recommendations and feedback to management.
Candidate Info
7
years in
workforce
5
years
at this job
MS
Computer Science
9

Information Security Specialist

  • Analyzed and worked on a research project sponsored by the DoD that related to Information-Warfare and Computer Crime
  • Trained at USMA, West Point in regard to a recently developed network attack / defense mechanism
  • Developed a simulated environment model to measure the effect of different network attacks
  • Created a virtual framework for attack and defense platform using VMware
  • Participated in a two state university curricula development for attack and defense.
Candidate Info
6
years in
workforce
4
months
at this job
BS
Computer Science
MS
Information Systems (network Security)
PhD
Information Technology
10

Information Security Specialist

Recommended, developed and implemented the appointment of site specific IA liasons

  • Coordinated Bluecoat and Firewall Exemption Requests
  • Identified and responded to Category 1 network incidents as trusted agent for unit
  • Conducted site assistance visits for all Iraqi units to ensure compliance/standardization of IA programs
Candidate Info
5
years in
workforce
5
years
at this job
BS
Psychology

Your Resume, Made Easy.

You are looking for your dream job and need a resume? My Perfect Resume is your solution and takes the hassle out of resume writing. Create the perfect job-worthy resume effortlessly in just a few clicks!