Cyber security

Cyber security
Resume examples

Resume Examples Objectives and summaries Templates Create your resume
Cyber security
Cyber security
Resume examples

13Cyber security resume examples found

All examples are written by certified resume experts, and free for personal use. Copy any of the Cyber security resume examples to your own resume, or use one of our free downloadable Word templates. We recommend using these Cyber security resume examples as inspiration only, while creating your own resume.

Learn more about: how to write a perfect resume

Cyber security analyst

Entry level

Demonstrated ability to work on multiple tasks and respond to rapidly changing priorities under the direction of the IT Manager. Formulated, organized, and effectively presented ideas while serving as the company’s official representative in technical forums and panel discussions.

  • Supported all cyber security and IT programs reporting to the cyber security lead and regularly interacted with all levels of contractor management.
  • Researched, documented, and implemented software application requirements specifications and worked with the system end users to ensure effective use of applications.
  • Ensured all changes to systems are performed according to configuration control standards and company policies.
  • Developed and maintained user guides, manuals, and other types of software application documentation.
  • Participated in the development of database architectures, coding standards, quality assurance policies, and procedures.

Copy to clipboard 66

Information security analyst

Entry level

Developed, installed, and monitored security software and hardware components for the company’s network. Assisted with the configuration and optimization of IT tools, and performed vulnerability scans, web applications, penetration tests, and security assessments.

  • Collaborated with corporate compliance and security teams across enterprise networks to identify and resolve technical issues and threats.
  • Documented and reported technical requirements to the leadership team for review and approval of security updates.
  • Assigned to troubleshoot large, complex, and cross-functional challenges and provide suggestions for updated risk management tools.
  • Evaluated numerous security applications including Okta, Mimecast, Zscaler, and Sentinel One to identify network improvement needs.
  • Served as a consultant on the long-term vision for security design for the company’s ability to make enhancements as potential threats evolve.

Copy to clipboard 50

System analyst


Provided the highest level of technical expertise in the analysis, installation, configuration, testing, and maintenance of Enterprise Technology Architecture. Supported all phases of projects, programs, and initiatives to facilitate requirement elicitation for application servers and content management.

  • Developed highly scalable business and technical solutions – requirements, dataflow diagrams, as-is analysis and comparison, solution design, assessment, validation, implementation, and control initiatives.
  • Provided technical consultation on technical projects including Simple Object Access Protocol (SOAP), Web Services, and Extensive Markup Language (XML) and data integration points
  • Conducted requirements gathering sessions, developed and published a request for information (RFI) and the Request for Proposal (RFP).
  • Designed key metrics to assess which vendors would formally present their solution for a cloud-based scalable system; first cloud-based system solutions that were scaled throughout all city departments.

Copy to clipboard 11

Network security engineer

Entry level

Responsible for managing firewalls and network security components and devices to provide timely, accurate, and planned completion and implementation of security services for the organization. Supported clients with data protection, the internet of things, and overarching cloud capabilities.

  • Provided primary day-to-day support for network security infrastructure interactions with project and cybersecurity teams.
  • Analyzed tactical network security architecture and topology to determine security risks and make recommendations to the lead IT Director.
  • Delivered and maintained IT security objectives in cost-effective and time-efficient manners while monitoring risks and vulnerabilities.
  • Conducted bi-weekly network vulnerability and risk tests to create emergency patches and identify long-term solutions.
  • Recommended security solutions to improve architecture and controls for security infrastructures for authentication and authorization processes.

Copy to clipboard 23

Cyber security analyst


Managed a $10M budget to operate and defend 3 unique networks for client engagement in accordance with SOW, exceeding KPIs. Supported 1K users; overseeing 10 direct reports including 4 division managers executing vulnerability management, cyber protection, incident response, and cyber forensics analysis as well as protection management, cyber intelligence, and reporting. Rebuild client trust and course‐corrected program after winning mismanaged contract.

  • Developed key relationships, assess client needs, identify pain points, and replaced incorrectly utilized technology in existing inventory, and built a high‐performing team to earn a client for program turnaround.
  • Spearheaded development of advanced cyber forensics capability, pinpointing appropriate technology, and integrating technology into the enclave, resulting in a profound surge of in‐house detection of cyber incidents across national field sites and a secure evidence chain of custody.
  • Provided end-to-end leadership from discovery to problem resolution for cross‐functional problems related to vulnerability management, data management, cybersecurity, application management, customer service, hardware/software.
  • Presented actionable insights related to human cyber risk measures to an audience of security professionals.

Copy to clipboard 53

Information security analyst


Developed technology roadmaps for security tools in alignment with the company’s business objectives while partnering with the executive team and cross-functional global teams. Functioned as a key strategic member of the Security Steering Committee and Security Governance team. Supervised 7 direct reports. Managed up to $30M in project budgets and $5M in IT P&L.

  • Accountable for implementing strategy, planning, and delivery of the IAM, and Crypto capabilities.
  • Oversaw multiple areas and personnel including a team of Sr Managers, Architects, Engineers, and PMs to deliver business IAM capabilities to key retail areas including POS, Order Management, and corporate systems for over 12K users.
  • Implemented an extensive and complex encryption solution to protect transactions on POS systems.
  • Architected a world-class onshore and offshore team to support a fast pace and dynamic Security Engineering and Operations environment.
  • Deployed Office 365 Exchange online to 170,000 users along with the development of architecture, authentication, and provisioning controls.
  • Led a significant point-to-point encryption solution.
  • Managed overall contract renewals for the company (EAS, Premier & Office 365) and versed in MS UR and licensing.

Copy to clipboard 15

System analyst


Directed a broad range of IT initiatives for a diversified education and media company. Provided incident/situation management and ongoing technical training to over 500 users while resolving issues promptly with ITIL methodologies. Supported over 130 licensed users annually.

  • Managed all facets of the system development cycle including analysis, design, specification, development, testing, training, documentation, and implementation of technical solutions.
  • Oversaw applications and server usage; administered applications during roll-out and planned and prepared standard procedures, support, and enhancement for the ongoing administration of advertising systems.
  • Spearheaded SAP ERP administration, upgrades, testing, and troubleshooting for 165 users; configured and maintained accounts, ensured adherence to Sarbanes Oxley guidelines.
  • Coordinated Service Level Agreement (SLA) documentation for external technology vendors; organized weekly meetings with vendors to ensure adherence to SLAs and prompt incident resolution.
  • Primary technical contact and administrator for client-based website; provided exceptional service during the online ordering process by interfacing with clients and internal development teams to resolve problems.
  • Supported $5M in annual advertising revenue from a client-server-based platform to a web application while maintaining the system, configuring users, coordinating training, and escalating issues to vendors.
  • Managed the full project lifecycle including product development, integration implementation, scheduling, training, and service delivery.
  • Designed and completed a cutting-edge project allowing small-mid size businesses to directly place their display advertising online significantly reduced cost and improved customer experience.
  • Researched the business impact of migrating CMS tools to Drupal.

Copy to clipboard 6

Network security engineer


Implemented core and cloud infrastructure security systems to identify and manage network risks. Led network architecture and operational complex network solutions to rapidly changing technologies and complex company environments. Trained and led network technologists to deploy complex solutions.

  • Maintained and increased technical knowledge and competence in company applications, products, and services.
  • Supported and troubleshot network infrastructure issues and coordinated with vendors to develop solutions as needed.
  • Performed internal penetration test of account records to identify misconfigurations, create reports, and develop presentations for management.
  • Planned and coordinated the setup, installation, configuration, and maintenance of firewalls, routers, and switches.
  • Educated various teams on the security threats, tactics, and techniques, and guided IT teams to improve security controls and enhance software and hardware.

Copy to clipboard 7

Cyber security analyst


Conducted regular surveys and audits of cyber security programs and provided assistance and consulting services to all departments. Oversaw firewall, email security systems, web security systems, and IDS/IPS. Maintained a current understanding of all applicable DOE and Federal regulatory requirements.

  • Coordinated investigative activities with appropriate management and formulated written reports and presented verbal and written briefings.
  • Performed cyber security incident triage to determine the scope, urgency, and potential impact as well as identify the specific vulnerabilities and threats.
  • Ensured project teams complied with enterprise and IT security policies, industry regulations, and best practices.
  • Conducted and monitored performance tests on new and existing software and databases to identify security threats and vulnerabilities.
  • Collaborated with functional architects and third-party security specialists to ensure adequate solutions were in place to identify and deter cyber risks.

Copy to clipboard 24

Information security analyst


Worked cross-functionally with our software and hardware development teams to ensure security threats are identified, prioritized, and resolved promptly. Contributed to the development and implementation of security policies and procedures to support confidentiality and integrity.

  • Served as the Senior ISA to the business team to determine vulnerabilities related to compliance and governance considerations.
  • Defined requirements and collaborated with the metrics team to develop measuring tools that adequately analyzed security performance.
  • Participated in a 5-person IT management team that provided vision, direction, and expertise to senior leadership on implementing innovative ways to improve security.
  • Ensured IT Security Analyst Department achieved high levels of satisfaction according to company standards and client report cards.
  • Researched and monitored open-source software to determine where applications and patches could be used to improve account security.

Copy to clipboard 7
View all

Professional resume templates

Make a resume that wins you interviews! Choose one of these professionally-designed resume templates and follow 3 easy steps to complete.

Create a perfect resume in a few minutes

  • Field-tested resume templates created by experts
  • Powered by
  • Try now for free!
Resume examples

Free resume templates

  • Free for personal use
  • Direct download as a Microsoft Word document
  • Created by a CPRW certified resume expert
  • Optimized for applicant tracking system (ATS) screening

Choosing a correct resume format and template

Resume examples

Resume template

Download our American style resume template. Chronological resume format. Download a functional resume template.

resume chronological

Learn more about the differences between a resume and a CV.

CV template

Download our British/European style cv template. Similar to a resume but more commonly used in Europe, Asia and Africa.

cv template