boy

Build your resume in 15 minutes

Give yourself the best chance of standing out from the competition!

Create an awesome resume that meets the expectations of potential employers with our selection of professional, field-tested resume templates.

information security specialist: Resume Samples & Writing Guide

William Watson

11 Cypress Avenue, Hallwood, VA 23359
[email protected]
679-569-9872

Employment history

Senior Information Security Specialist, IBM San Francisco, California
February 2019 – Present
  • Monitor security systems for possible intrusions or breaches
  • Analyze security breaches and provide recommendations for remediation
  • Perform security risk assessments
Information Security Specialist, Dell Technologies Round Rock, Texas
August 2018 – January 2019
  • Perform security risk assessments
  • Monitor compliance with security policies and procedures
  • Analyze security breaches and provide recommendations for remediation
Entry Level Information Security Specialist, IBM San Francisco, California
August 2017 – July 2018
  • Develop and implement security policies, standards and procedures
  • Educate staff on security best practices
  • Monitor compliance with security policies and procedures

Education

Massachusetts Institute of Technology, Boston, Massachusetts
Master of Science in Computer Engineering, June, 2017
Massachusetts Institute of Technology, Boston, Massachusetts
Bachelor of Science in Information Systems, June, 2013

Skills

Listening
Financial Management
Documentation
Adaptability
Firewalls
Vulnerability Scanning
Linux Administration
Encryption

Do you already have a resume? Use our PDF converter and edit your resume.

Oscar Hawkins

229 Valley Drive, Hoboken, NJ 07030
[email protected]
806-095-6381

Professional Summary

 A highly motivated Information Security Specialist with a proven track record of success in the IT field. Experienced in identifying and mitigating security risks and developing policies and procedures to protect data and systems. 

Employment history

Lead Information Security Specialist, Google Mountain View, California
November 2012 – Present
  • Implement and maintain security tools, such as firewalls and anti-virus software
  • Perform security risk assessments
  • Educate staff on security best practices
Associate Information Security Specialist, Oracle Redwood City, California
April 2012 – October 2012
  • Perform vulnerability assessments and security audits
  • Analyze security breaches and provide recommendations for remediation
  • Investigate security violations and incidents
Junior Information Security Specialist, Accenture New York, New York
May 2011 – April 2012
  • Design and implement security solutions
  • Analyze security breaches and provide recommendations for remediation
  • Perform vulnerability assessments and security audits

Education

Georgia Institute of Technology, Atlanta, Georgia
Master of Science in Information Technology, March, 2011
Georgia Institute of Technology, Atlanta, Georgia
Bachelor of Science in Cyber Security, March, 2007

Skills

Public Speaking
Collaboration
Innovation
Communication
Network Administration
Encryption
Security Auditing
Data Protection

Kenny Grant

194 Hickory St., San Antonio, PR 00678
[email protected]
861-425-6261

Employment history

Lead Information Security Specialist, Google Mountain View, California
November 2022 – Present
  • Design and implement security solutions
  • Maintain up-to-date knowledge of security trends and best practices
  • Monitor compliance with security policies and procedures
Information Security Specialist, IBM San Francisco, California
November 2021 – October 2022
  • Develop security awareness and training programs
  • Develop and implement security policies, standards and procedures
  • Maintain up-to-date knowledge of security trends and best practices
Entry Level Information Security Specialist, HP Palo Alto, California
May 2020 – October 2021
  • Perform security risk assessments
  • Monitor security systems for possible intrusions or breaches
  • Develop security awareness and training programs

Education

University of California, Berkeley, California
Master of Science in Cyber Security, March, 2020
University of California, Berkeley, California
Bachelor of Science in Information Systems Management, March, 2016

Skills

Communication
Quality Assurance
Visualization
Flexibility
Encryption
Linux Administration
Scripting.
Security Auditing

Tony Wood

165 Cypress Avenue, Page, ND 58064
[email protected]
918-856-1298

Employment history

Chief Information Security Specialist, Intel Santa Clara, California
September 2016 – Present
  • Monitor compliance with security policies and procedures
  • Analyze security breaches and provide recommendations for remediation
  • Monitor security systems for possible intrusions or breaches
Associate Information Security Specialist, Dell Technologies Round Rock, Texas
March 2015 – August 2016
  • Implement and maintain security tools, such as firewalls and anti-virus software
  • Research and recommend security enhancements
  • Configure and troubleshoot security systems
Entry Level Information Security Specialist, Oracle Redwood City, California
September 2014 – February 2015
  • Implement and maintain security tools, such as firewalls and anti-virus software
  • Develop and implement security policies, standards and procedures
  • Design and implement security solutions

Education

University of Texas at Austin, Austin, Texas
CompTIA Security+, July, 2014

Skills

Business Acumen
Flexibility
Reporting
Strategic Thinking
Security Auditing
Penetration Testing
Data Protection
System Administration

Victor Griffin

118 Sunset Drive, Pecan Acres, TX 76071
[email protected]
885-362-9976

Employment history

Senior Information Security Specialist, Intel Santa Clara, California
August 2022 – Present
  • Monitor compliance with security policies and procedures
  • Manage security incidents and respond to security threats
  • Develop and implement security policies, standards and procedures
Associate Information Security Specialist, Oracle Redwood City, California
January 2022 – July 2022
  • Monitor compliance with security policies and procedures
  • Perform vulnerability assessments and security audits
  • Implement and maintain security tools, such as firewalls and anti-virus software
Junior Information Security Specialist, HP Palo Alto, California
January 2021 – December 2021
  • Educate staff on security best practices
  • Configure and troubleshoot security systems
  • Design and implement security solutions

Education

University of Michigan, Ann Arbor, Michigan
Bachelor of Science in Cyber Security, December, 2020

Skills

Stress Management
Database Management
Presentation
Negotiation
Cloud Security
Encryption
Windows Administration
Cybersecurity

Not in love with this template? Browse our full library of resume templates

information security specialist Job Descriptions; Explained

If you're applying for an information security specialist position, it's important to tailor your resume to the specific job requirements in order to differentiate yourself from other candidates. Including accurate and relevant information that directly aligns with the job description can greatly increase your chances of securing an interview with potential employers.

When crafting your resume, be sure to use action verbs and a clear, concise format to highlight your relevant skills and experience. Remember, the job description is your first opportunity to make an impression on recruiters, so pay close attention to the details and make sure you're presenting yourself in the best possible light.

1

information security specialist

  • Implement access control best practices. Access request processing time improved by about 50%. 
  • Scan infrastructure for vulnerabilities.
  • Implement and automate anti-fraud controls. 
  • Participate in BCP and DRP planning and testing.
2

information security specialist

  • Lead security role on S4 HANA production redesign which reduced the number of overall roles by nearly 50% and eliminated intra-role SoD conflicts using task based roles.
  • Lead in developing security for BusinessObjects (BOBJ) application and provided administrative support.
  • Worked with all business areas to create Risk Analysis and Remediation (RAR) customized global rule set.
  • Participated in the implementation and deployment of the Central User Administration (CUA) application for the entire SAP landscape
  •  Developed and implemented security monitoring and reporting tools 
  •  Provided Production support in SAP Security related daily activities related to user authorization issues and user account administration 
  •  Assisted users in troubleshooting and identifying authorization issues using SU53 and trace analysis 
3

information security specialist

  • Utilized HP ArcSight SIEM Tool, Splunk, ArcSight Logger, RSA E-Cat, SEPM, Websense security tools for real time security incident investigation and analysis.
  • Monitored security logs from Firewalls (Checkpoint, Juniper, Cisco ASA, and Cisco Pix) and IDS (ISS, and Snort),  Antivirus (SEP), Proxy (Websense), Web Servers(Apache, IIS) and Exchange Servers(Symantec) 
  • Worked on Imperva and F5 web application firewalls to detect and investigate web application attacks (XSS, CSRF, Directory Traversal etc.).
  • Research and Investigation of Botnets, CnC, Ransomware and Phishing attacks in the network.
  • Creation of rules and Dashboards to detect malicious activities in the network.
  • Increased the number of security reviews performed utilizing the same resources.
  • Investigation of logs to detect exploitation in the vulnerabilities present in the network.
4

information security specialist

  • Implements information security policies and procedures for new projects to meet information security objectives and ensure effective implementation.
  • Manages strategies to control risks from inadequate protection of confidentiality, integrity, and availability of the information assets, processing facilities and connected services. 
  • Acts as technical SME that provide guidance to the team in-terms of best practices implementation and design on every new project that teams encountered. 
  •  Mentored my teammates in SAP Security concepts, and procedures. 
5

information security specialist

  •  Resolved wide range of SAP incident tickets as per established procedures. 
  • Malware analysis and Investigation using SEP, RSA Ecat, and raw logs.
  • Served as the team’s primary curator of documentation for security engineering and incident response procedures.
  • Developed security documentation to include policies and procedures for Incident Investigation, response and closure.
  • Presentation of security incident handling and improvement to CISO on monthly basis.

information security specialist Job Skills

For an information security specialist position, your job skills are a key factor in demonstrating your value to the company and showing recruiters that you're the ight fit for the role. It's important to be specific when highlighting your skills and ensure that they are directly aligned with the job requirements, as this can greatly improve your chances of being hired. By showcasing your relevant skills and experience, you can make a compelling case for why you're the best candidate for the job.

How to include technical skills in your resume:

Technical skills are a set of specialized abilities and knowledge required to perform a particular job effectively. Some examples of technical skills are data analysis, project management, software proficiency, and programming languages, to name a few.

Add the technical skills that will get hired in your career field with our simple-to-use resume builder. Select your desired resume template, once you reach the skills section of the builder, manually write in the skill or simply click on "Add more skills". This will automatically generate the best skills for your career field, choose your skill level, and hit "Save & Next."

  • Encryption
  • Cybersecurity
  • Firewalls
  • Network Security
  • Vulnerability Scanning
  • Penetration Testing
  • Intrusion Detection
  • Incident Response
  • System Administration
  • Linux Administration
  • Windows Administration
  • Network Administration
  • Security Auditing
  • Risk Analysis
  • Identity Management
  • Access Control
  • Disaster Recovery
  • Data Protection
  • Cloud Security
  • Malware Analysis
  • Scripting.

How to include soft skills in your resume:

Soft skills are non-technical skills that relate to how you work and that can be used in any job. Including soft skills such as time management, creative thinking, teamwork, and conflict resolution demonstrate your problem-solving abilities and show that you navigate challenges and changes in the workplace efficiently.

Add competitive soft skills to make your resume stand-out to recruiters! Simply select your preferred resume template in the skills section, enter the skills manually or use the "Add more skills" option. Our resume builder will generate the most relevant soft skills for your career path. Choose your proficiency level for each skill, and then click "Save & Next" to proceed to the next section.

  • Communication
  • Interpersonal
  • Leadership
  • Time Management
  • Problem Solving
  • Decision Making
  • Critical Thinking
  • Creativity
  • Adaptability
  • Teamwork
  • Organization
  • Planning
  • Public Speaking
  • Negotiation
  • Conflict Resolution
  • Research
  • Analytical
  • Attention to Detail
  • Self-Motivation
  • Stress Management
  • Collaboration
  • Coaching
  • Mentoring
  • Listening
  • Networking
  • Strategic Thinking
  • Negotiation
  • Emotional Intelligence
  • Adaptability
  • Flexibility
  • Reliability
  • Professionalism
  • Computer Literacy
  • Technical
  • Data Analysis
  • Project Management
  • Customer Service
  • Presentation
  • Written Communication
  • Social Media
  • Troubleshooting
  • Quality Assurance
  • Collaboration
  • Supervisory
  • Risk Management
  • Database Management
  • Training
  • Innovation
  • Documentation
  • Accounting
  • Financial Management
  • Visualization
  • Reporting
  • Business Acumen
  • Process Improvement
  • Documentation
  • Relationship Management.

How to Improve Your information security specialist Resume

Navigating resume pitfalls can mean the difference between landing an interview or not. Missing job descriptions or unexplained work history gaps can cause recruiters to hesitate. Let's not even talk about the impact of bad grammar, and forgetting your contact info could leave your potential employer hanging. Aim to be comprehensive, concise, and accurate.

Tom Carter

870 Greenwood Drive, Penn Wynne, PA 19096

Professional Summary

 A highly experienced Information Security Specialist with a passion for protecting data and systems. Proven track record of successful implementation of security protocols to ensure the integrity of IT systems. 

Employment history

Chief Information Security Specialist, Microsoft Redmond, Washington
April 2013 – Present
  • Configure and troubleshoot security systems
  • Develop and implement security policies, standards and procedures
  • Design and implement security solutions
Information Security Specialist, IBM San Francisco, California
October 2012 – March 2013
  • Perform security risk assessments
  • Analyze security breaches and provide recommendations for remediation
  • Research and recommend security enhancements
Junior Information Security Specialist, Google Mountain View, California
March 2012 – September 2012

Education

University of California, Berkeley, California
Bachelor of Science in Cyber Security, January, 2012

Skills

Negotiation
Professionalism
Visualization
Business Acumen
Disaster Recovery
Scripting.
Data Protection
Windows Administration

Include your Contact Information and Job Descriptions

Missing job descriptions lessens your chances of getting hired.

Key Insights
  • Employers want to know what you've accomplished, so make sure to include descriptions for all of your previous jobs.
  • Keep job descriptions short but don't just list your jobs.
  • Never copy-paste a job description to post on your resume. Get inspired and use tools to help you write customized descriptions.

How to Optimize Your information security specialist Resume

Keep an eye out for these resume traps. Neglecting to detail your job roles or explain gaps in your career can lead to unnecessary doubts. Grammar blunders can reflect negatively on you, and without contact information, how can employers reach you? Be meticulous and complete.

Pete Gray

379 Laurelwood Avenue, Frisco City, AL 36445
[email protected]
702-031-3853

Employment history

Lead Information Security Specialist, HP Palo Alto, California
January 2016 – May 2022
  • Develop security awarnesss and trainning programs
  • Monitor complience with security policies and procedurs
  • Eduacte staff on security best praxtices
Information Security Specialist, Google Mountain View, California
July 2015 – December 2015
  • Perform vulnurability assesments and securiy audits
  • Montior compliance with securiy policies and proceduers
  • Design and implement securiy soluitions
Jr. Information Security Specialist, Google Mountain View, California
December 2014 – June 2015
  • Designd and implemet security solutions
  • Manage security incidnets and respondd to security threats
  • Investigate security viloations and incidnets

Education

University of California, Berkeley, California
Bachelor of Science in Computer Science, October, 2014

Skills

Attention to Detail
Stress Management
Adaptability
Communication
Penetration Testing
Vulnerability Scanning
Cloud Security
Encryption

Correct Grammar and Address Gap Years in Your Resume

Don't leave unexplained gaps in your work history.

Key Insights
  • When explaining gaps in your employment section, start by being honest.
  • Elaborate on the gap and show that you never stopped learning.
  • Explain and elaborate any gap in your work history by highlighting new skills.

information security specialist Cover Letter Example

A cover letter can be a valuable addition to your job application when applying for an information security specialist position. Cover letters provide a concise summary of your qualifications, skills, and experience, also it also gives you an opportunity to explain why you're the best fit for the job. Crafting a cover letter that showcases your relevant experience and enthusiasm for the Accounts Payable role can significantly improve your chances of securing an interview.



William
Watson

[email protected]
679-569-9872
11 Cypress Avenue, Hallwood, VA
23359

Senior Information Security Specialist
Oracle
Redwood City, California

Oracle Recruitment Team


I am writing to express my interest in the Senior Information Security Specialist role at Oracle. As an Information Security Specialist with 6 years of experience, I am confident that I possess the necessary skills and qualifications to excel in this position.


Throughout my life, I have pursued my passion for Business Analysis and sought out opportunities to learn and grow. My experience in Information Technology (IT) has given me valuable skills such as Listening and Financial Management that have allowed me to improve professionally and personally. I am excited to bring these skills and my passion as a Information Security Specialist to the position and work with a team of like-minded individuals to achieve our common goals.


I cannot stress enough how thrilled I am about the chance to join a team of like-minded individuals who share my values and passion for this amazing field. Thank you for considering my application and I hope for the chance to work together.


Best regards,
William Watson
679-569-9872
[email protected]

William Watson






Showcase your most significant accomplishments and qualifications with this cover letter.
Personalize this cover letter in just few minutes with our user-friendly tool!

last guy

Build your Resume in 15 minutes

Give yourself the best chance of standing out from the competition!

Create an awesome resume that meets the expectations of potential employers with our selection of professional, field-tested resume templates.